-
Accelerating Graph Neural Networks with a Novel Matrix Compression Format
Authors:
João N. F. Alves,
Samir Moustafa,
Siegfried Benkner,
Alexandre P. Francisco,
Wilfried N. Gansterer,
Luís M. S. Russo
Abstract:
The inference and training stages of Graph Neural Networks (GNNs) are often dominated by the time required to compute a long sequence of matrix multiplications between the sparse graph adjacency matrix and its embedding. To accelerate these stages, we first propose the Compressed Binary Matrix (CBM) storage format to succinctly represent the binary adjacency matrix of an unweighted graph. Then, we…
▽ More
The inference and training stages of Graph Neural Networks (GNNs) are often dominated by the time required to compute a long sequence of matrix multiplications between the sparse graph adjacency matrix and its embedding. To accelerate these stages, we first propose the Compressed Binary Matrix (CBM) storage format to succinctly represent the binary adjacency matrix of an unweighted graph. Then, we show how to generalize this representation to normalized adjacency matrices of unweighted graphs which arise in the context of GNNs. Finally, we develop efficient matrix multiplication kernels based on this compressed representation. The matrix multiplication kernels proposed in this work never require more scalar operations than classic sparse matrix multiplication algorithms. Experimental evaluation shows that the matrix multiplication strategies proposed outperform the current state-of-the-art implementations provided by Intel MKL, achieving speedups close to 5$\times$. Furthermore, our optimized matrix-multiplication strategies accelerated the inference time of a GNN by up to $3\times$.
△ Less
Submitted 3 September, 2024;
originally announced September 2024.
-
European Quantum Ecosystems -- Preparing the Industry for the Quantum Security and Communications Revolution
Authors:
Noel Farrugia,
Daniel Bonanno,
Nicholas Frendo,
André Xuereb,
Evangelos Kosmatos,
Alexandros Stavdas,
Marco Russo,
Bartolomeo Montrucchio,
Marco Menchetti,
Davide Bacco,
Silvia Marigonda,
Francesco Stocco,
Guglielmo Morgari,
Antonio Manzalini
Abstract:
There is mounting evidence that a second quantum revolution based on the technological capabilities to detect and manipulate single quantum particles (e.g., electrons, photons, ions, etc), a feat not achieved during the first quantum revolution, is progressing fast. It is expected that in less than 10 years, this second quantum revolution shall have a significant impact over numerous industries, i…
▽ More
There is mounting evidence that a second quantum revolution based on the technological capabilities to detect and manipulate single quantum particles (e.g., electrons, photons, ions, etc), a feat not achieved during the first quantum revolution, is progressing fast. It is expected that in less than 10 years, this second quantum revolution shall have a significant impact over numerous industries, including finance, medicine, energy, transportation, etc. Quantum computers threaten the status quo of cybersecurity, due to known quantum algorithms that can break asymmetric encryption, which is what gives us the ability to communicate securely using a public channel. Considering the world's dependence on digital communication through data exchange and processing, retaining the ability to communicate securely even once quantum computers come into play, cannot be stressed enough. Two solutions are available: Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC); which, we emphasise, are not mutually exclusive. The EuroQCI initiative, of which EQUO is a part of, focuses on QKD and aims to build a network whereby EU countries can communicate securely through QKD. To this aim, the DEP (Digital Europe Programme) project aims to bring technological matureness to QKD by deploying a QKD test network and, through this exercise, understand what is lacking from an operator's point of view when the time to integrate QKD in their network comes.
△ Less
Submitted 27 August, 2024;
originally announced August 2024.
-
Generating Automatically Print/Scan Textures for Morphing Attack Detection Applications
Authors:
Juan E. Tapia,
Maximilian Russo,
Christoph Busch
Abstract:
Morphing Attack Detection (MAD) is a relevant topic that aims to detect attempts by unauthorised individuals to access a "valid" identity. One of the main scenarios is printing morphed images and submitting the respective print in a passport application process. Today, small datasets are available to train the MAD algorithm because of privacy concerns and the limitations resulting from the effort…
▽ More
Morphing Attack Detection (MAD) is a relevant topic that aims to detect attempts by unauthorised individuals to access a "valid" identity. One of the main scenarios is printing morphed images and submitting the respective print in a passport application process. Today, small datasets are available to train the MAD algorithm because of privacy concerns and the limitations resulting from the effort associated with the printing and scanning of images at large numbers. In order to improve the detection capabilities and spot such morphing attacks, it will be necessary to have a larger and more realistic dataset representing the passport application scenario with the diversity of devices and the resulting printed scanned or compressed images. Creating training data representing the diversity of attacks is a very demanding task because the training material is developed manually. This paper proposes two different methods based on transfer-transfer for automatically creating digital print/scan face images and using such images in the training of a Morphing Attack Detection algorithm. Our proposed method can reach an Equal Error Rate (EER) of 3.84% and 1.92% on the FRGC/FERET database when including our synthetic and texture-transfer print/scan with 600 dpi to handcrafted images, respectively.
△ Less
Submitted 18 August, 2024;
originally announced August 2024.
-
Articulation Work and Tinkering for Fairness in Machine Learning
Authors:
Miriam Fahimi,
Mayra Russo,
Kristen M. Scott,
Maria-Esther Vidal,
Bettina Berendt,
Katharina Kinder-Kurlanda
Abstract:
The field of fair AI aims to counter biased algorithms through computational modelling. However, it faces increasing criticism for perpetuating the use of overly technical and reductionist methods. As a result, novel approaches appear in the field to address more socially-oriented and interdisciplinary (SOI) perspectives on fair AI. In this paper, we take this dynamic as the starting point to stud…
▽ More
The field of fair AI aims to counter biased algorithms through computational modelling. However, it faces increasing criticism for perpetuating the use of overly technical and reductionist methods. As a result, novel approaches appear in the field to address more socially-oriented and interdisciplinary (SOI) perspectives on fair AI. In this paper, we take this dynamic as the starting point to study the tension between computer science (CS) and SOI research. By drawing on STS and CSCW theory, we position fair AI research as a matter of 'organizational alignment': what makes research 'doable' is the successful alignment of three levels of work organization (the social world, the laboratory, and the experiment). Based on qualitative interviews with CS researchers, we analyze the tasks, resources, and actors required for doable research in the case of fair AI. We find that CS researchers engage with SOI research to some extent, but organizational conditions, articulation work, and ambiguities of the social world constrain the doability of SOI research for them. Based on our findings, we identify and discuss problems for aligning CS and SOI as fair AI continues to evolve.
△ Less
Submitted 28 August, 2024; v1 submitted 23 July, 2024;
originally announced July 2024.
-
Online Learning with Sublinear Best-Action Queries
Authors:
Matteo Russo,
Andrea Celli,
Riccardo Colini Baldeschi,
Federico Fusco,
Daniel Haimovich,
Dima Karamshuk,
Stefano Leonardi,
Niek Tax
Abstract:
In online learning, a decision maker repeatedly selects one of a set of actions, with the goal of minimizing the overall loss incurred. Following the recent line of research on algorithms endowed with additional predictive features, we revisit this problem by allowing the decision maker to acquire additional information on the actions to be selected. In particular, we study the power of \emph{best…
▽ More
In online learning, a decision maker repeatedly selects one of a set of actions, with the goal of minimizing the overall loss incurred. Following the recent line of research on algorithms endowed with additional predictive features, we revisit this problem by allowing the decision maker to acquire additional information on the actions to be selected. In particular, we study the power of \emph{best-action queries}, which reveal beforehand the identity of the best action at a given time step. In practice, predictive features may be expensive, so we allow the decision maker to issue at most $k$ such queries. We establish tight bounds on the performance any algorithm can achieve when given access to $k$ best-action queries for different types of feedback models. In particular, we prove that in the full feedback model, $k$ queries are enough to achieve an optimal regret of $Θ\left(\min\left\{\sqrt T, \frac Tk\right\}\right)$. This finding highlights the significant multiplicative advantage in the regret rate achievable with even a modest (sublinear) number $k \in Ω(\sqrt{T})$ of queries. Additionally, we study the challenging setting in which the only available feedback is obtained during the time steps corresponding to the $k$ best-action queries. There, we provide a tight regret rate of $Θ\left(\min\left\{\frac{T}{\sqrt k},\frac{T^2}{k^2}\right\}\right)$, which improves over the standard $Θ\left(\frac{T}{\sqrt k}\right)$ regret rate for label efficient prediction for $k \in Ω(T^{2/3})$.
△ Less
Submitted 23 July, 2024;
originally announced July 2024.
-
Universal Optimization for Non-Clairvoyant Subadditive Joint Replenishment
Authors:
Tomer Ezra,
Stefano Leonardi,
Michał Pawłowski,
Matteo Russo,
Seeun William Umboh
Abstract:
The online joint replenishment problem (JRP) is a fundamental problem in the area of online problems with delay. Over the last decade, several works have studied generalizations of JRP with different cost functions for servicing requests. Most prior works on JRP and its generalizations have focused on the clairvoyant setting. Recently, Touitou [Tou23a] developed a non-clairvoyant framework that pr…
▽ More
The online joint replenishment problem (JRP) is a fundamental problem in the area of online problems with delay. Over the last decade, several works have studied generalizations of JRP with different cost functions for servicing requests. Most prior works on JRP and its generalizations have focused on the clairvoyant setting. Recently, Touitou [Tou23a] developed a non-clairvoyant framework that provided an $O(\sqrt{n \log n})$ upper bound for a wide class of generalized JRP, where $n$ is the number of request types.
We advance the study of non-clairvoyant algorithms by providing a simpler, modular framework that matches the competitive ratio established by Touitou for the same class of generalized JRP. Our key insight is to leverage universal algorithms for Set Cover to approximate arbitrary monotone subadditive functions using a simple class of functions termed \textit{disjoint}. This allows us to reduce the problem to several independent instances of the TCP Acknowledgement problem, for which a simple 2-competitive non-clairvoyant algorithm is known. The modularity of our framework is a major advantage as it allows us to tailor the reduction to specific problems and obtain better competitive ratios. In particular, we obtain tight $O(\sqrt{n})$-competitive algorithms for two significant problems: Multi-Level Aggregation and Weighted Symmetric Subadditive Joint Replenishment. We also show that, in contrast, Touitou's algorithm is $Ω(\sqrt{n \log n})$-competitive for both of these problems.
△ Less
Submitted 22 July, 2024;
originally announced July 2024.
-
A global approximation method for second-kind nonlinear integral equations
Authors:
Luisa Fermo,
Anna Lucia Laguardia,
Concetta Laurita,
Maria Grazia Russo
Abstract:
A global approximation method of Nyström type is explored for the numerical solution of a class of nonlinear integral equations of the second kind. The cases of smooth and weakly singular kernels are both considered. In the first occurrence, the method uses a Gauss-Legendre rule whereas in the second one resorts to a product rule based on Legendre nodes. Stability and convergence are proved in fun…
▽ More
A global approximation method of Nyström type is explored for the numerical solution of a class of nonlinear integral equations of the second kind. The cases of smooth and weakly singular kernels are both considered. In the first occurrence, the method uses a Gauss-Legendre rule whereas in the second one resorts to a product rule based on Legendre nodes. Stability and convergence are proved in functional spaces equipped with the uniform norm and several numerical tests are given to show the good performance of the proposed method. An application to the interior Neumann problem for the Laplace equation with nonlinear boundary conditions is also considered.
△ Less
Submitted 15 July, 2024;
originally announced July 2024.
-
Leveraging Ontologies to Document Bias in Data
Authors:
Mayra Russo,
Maria-Esther Vidal
Abstract:
Machine Learning (ML) systems are capable of reproducing and often amplifying undesired biases. This puts emphasis on the importance of operating under practices that enable the study and understanding of the intrinsic characteristics of ML pipelines, prompting the emergence of documentation frameworks with the idea that ``any remedy for bias starts with awareness of its existence''. However, a re…
▽ More
Machine Learning (ML) systems are capable of reproducing and often amplifying undesired biases. This puts emphasis on the importance of operating under practices that enable the study and understanding of the intrinsic characteristics of ML pipelines, prompting the emergence of documentation frameworks with the idea that ``any remedy for bias starts with awareness of its existence''. However, a resource that can formally describe these pipelines in terms of biases detected is still amiss. To fill this gap, we present the Doc-BiasO ontology, a resource that aims to create an integrated vocabulary of biases defined in the \textit{fair-ML} literature and their measures, as well as to incorporate relevant terminology and the relationships between them. Overseeing ontology engineering best practices, we re-use existing vocabulary on machine learning and AI, to foster knowledge sharing and interoperability between the actors concerned with its research, development, regulation, among others. Overall, our main objective is to contribute towards clarifying existing terminology on bias research as it rapidly expands to all areas of AI and to improve the interpretation of bias in data and downstream impact.
△ Less
Submitted 9 August, 2024; v1 submitted 29 June, 2024;
originally announced July 2024.
-
Simple and Optimal Sublinear Algorithms for Mean Estimation
Authors:
Beatrice Bertolotti,
Matteo Russo,
Chris Schwiegelshohn
Abstract:
We study the sublinear multivariate mean estimation problem in $d$-dimensional Euclidean space. Specifically, we aim to find the mean $μ$ of a ground point set $A$, which minimizes the sum of squared Euclidean distances of the points in $A$ to $μ$. We first show that a multiplicative $(1+\varepsilon)$ approximation to $μ$ can be found with probability $1-δ$ using $O(\varepsilon^{-1}\log δ^{-1})$ m…
▽ More
We study the sublinear multivariate mean estimation problem in $d$-dimensional Euclidean space. Specifically, we aim to find the mean $μ$ of a ground point set $A$, which minimizes the sum of squared Euclidean distances of the points in $A$ to $μ$. We first show that a multiplicative $(1+\varepsilon)$ approximation to $μ$ can be found with probability $1-δ$ using $O(\varepsilon^{-1}\log δ^{-1})$ many independent uniform random samples, and provide a matching lower bound. Furthermore, we give two sublinear time algorithms of optimal sample complexity for extracting a suitable approximate mean:
1. Our first algorithm is based on gradient descent and exploits properties of the geometric median to estimate the mean. It runs in time $O((\varepsilon^{-1}+\log δ^{-1})\cdot \log δ^{-1} \cdot d)$.
2. Our second algorithm leverages properties of empirical means order statistics as well as clustering to estimate the mean. This allows to decrease the running time to near-optimal, namely $O\left((\varepsilon^{-1}+\log^γδ^{-1})\cdot \log δ^{-1} \cdot d\right)$ for any constant $γ>0$.
Throughout our analysis, we also generalize the familiar median-of-means estimator to the multivariate case, showing that the geometric median of $\log δ^{-1}$ empirical means well-estimates the mean $μ$, which may be of independent interest.
△ Less
Submitted 7 August, 2024; v1 submitted 7 June, 2024;
originally announced June 2024.
-
Learning-Based Link Anomaly Detection in Continuous-Time Dynamic Graphs
Authors:
Tim Poštuvan,
Claas Grohnfeldt,
Michele Russo,
Giulio Lovisotto
Abstract:
Anomaly detection in continuous-time dynamic graphs is an emerging field yet under-explored in the context of learning-based approaches. In this paper, we pioneer structured analyses of link-level anomalies and graph representation learning for identifying anomalous links in these graphs. First, we introduce a fine-grain taxonomy for edge-level anomalies leveraging structural, temporal, and contex…
▽ More
Anomaly detection in continuous-time dynamic graphs is an emerging field yet under-explored in the context of learning-based approaches. In this paper, we pioneer structured analyses of link-level anomalies and graph representation learning for identifying anomalous links in these graphs. First, we introduce a fine-grain taxonomy for edge-level anomalies leveraging structural, temporal, and contextual graph properties. We present a method for generating and injecting such typed anomalies into graphs. Next, we introduce a novel method to generate continuous-time dynamic graphs with consistent patterns across time, structure, and context. To allow temporal graph methods to learn the link anomaly detection task, we extend the generic link prediction setting by: (1) conditioning link existence on contextual edge attributes; and (2) refining the training regime to accommodate diverse perturbations in the negative edge sampler. Building on this, we benchmark methods for anomaly detection. Comprehensive experiments on synthetic and real-world datasets -- featuring synthetic and labeled organic anomalies and employing six state-of-the-art learning methods -- validate our taxonomy and generation processes for anomalies and benign graphs, as well as our approach to adapting link prediction methods for anomaly detection. Our results further reveal that different learning methods excel in capturing different aspects of graph normality and detecting different types of anomalies. We conclude with a comprehensive list of findings highlighting opportunities for future research.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
A Declarative System for Optimizing AI Workloads
Authors:
Chunwei Liu,
Matthew Russo,
Michael Cafarella,
Lei Cao,
Peter Baille Chen,
Zui Chen,
Michael Franklin,
Tim Kraska,
Samuel Madden,
Gerardo Vitagliano
Abstract:
A long-standing goal of data management systems has been to build systems which can compute quantitative insights over large corpora of unstructured data in a cost-effective manner. Until recently, it was difficult and expensive to extract facts from company documents, data from scientific papers, or metrics from image and video corpora. Today's models can accomplish these tasks with high accuracy…
▽ More
A long-standing goal of data management systems has been to build systems which can compute quantitative insights over large corpora of unstructured data in a cost-effective manner. Until recently, it was difficult and expensive to extract facts from company documents, data from scientific papers, or metrics from image and video corpora. Today's models can accomplish these tasks with high accuracy. However, a programmer who wants to answer a substantive AI-powered query must orchestrate large numbers of models, prompts, and data operations. For even a single query, the programmer has to make a vast number of decisions such as the choice of model, the right inference method, the most cost-effective inference hardware, the ideal prompt design, and so on. The optimal set of decisions can change as the query changes and as the rapidly-evolving technical landscape shifts. In this paper we present Palimpzest, a system that enables anyone to process AI-powered analytical queries simply by defining them in a declarative language. The system uses its cost optimization framework to implement the query plan with the best trade-offs between runtime, financial cost, and output data quality. We describe the workload of AI-powered analytics tasks, the optimization methods that Palimpzest uses, and the prototype system itself. We evaluate Palimpzest on tasks in Legal Discovery, Real Estate Search, and Medical Schema Matching. We show that even our simple prototype offers a range of appealing plans, including one that is 3.3x faster and 2.9x cheaper than the baseline method, while also offering better data quality. With parallelism enabled, Palimpzest can produce plans with up to a 90.3x speedup at 9.1x lower cost relative to a single-threaded GPT-4 baseline, while obtaining an F1-score within 83.5% of the baseline. These require no additional work by the user.
△ Less
Submitted 29 May, 2024; v1 submitted 23 May, 2024;
originally announced May 2024.
-
A Universe of Sound: Processing NASA Data into Sonifications to Explore Participant Response
Authors:
Kimberly K. Arcand,
Jessica S. Schonhut-Stasik,
Sarah G. Kane,
Gwynn Sturdevant,
Matt Russo,
Megan Watze,
Brian Hsu,
Lisa F. Smith
Abstract:
Historically, astronomy has prioritized visuals to present information, with scientists and communicators overlooking the critical need to communicate astrophysics with blind or low-vision audiences and provide novel channels for sighted audiences to process scientific information. This study sonified NASA data of three astronomical objects presented as aural visualizations, then surveyed blind or…
▽ More
Historically, astronomy has prioritized visuals to present information, with scientists and communicators overlooking the critical need to communicate astrophysics with blind or low-vision audiences and provide novel channels for sighted audiences to process scientific information. This study sonified NASA data of three astronomical objects presented as aural visualizations, then surveyed blind or low-vision and sighted individuals to elicit feedback on the experience of these pieces as it relates to enjoyment, education, and trust of the scientific data. Data analyses from 3,184 sighted or blind or low-vision survey participants yielded significant self-reported learning gains and positive experiential responses. Results showed that astrophysical data engaging multiple senses could establish additional avenues of trust, increase access, and promote awareness of accessibility in sighted and blind or low-vision communities.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Contracts with Inspections
Authors:
Tomer Ezra,
Stefano Leonardi,
Matteo Russo
Abstract:
In the classical principal-agent hidden-action model, a principal delegates the execution of a costly task to an agent for which he can choose among actions with different costs and different success probabilities to accomplish the task. To incentivize the agent to exert effort, the principal can commit to a contract, which is the amount of payment based on the task's success. A crucial assumption…
▽ More
In the classical principal-agent hidden-action model, a principal delegates the execution of a costly task to an agent for which he can choose among actions with different costs and different success probabilities to accomplish the task. To incentivize the agent to exert effort, the principal can commit to a contract, which is the amount of payment based on the task's success. A crucial assumption of this model is that the principal can only base the payment on the outcome but not on the agent's chosen action.
In this work, we relax the hidden-action assumption and introduce a new model where the principal is allowed to inspect subsets of actions at some cost that depends on the inspected subset. If the principal discovers that the agent did not select the agreed-upon action through the inspection, the principal can withhold payment. This relaxation of the model introduces a broader strategy space for the principal, who now faces a tradeoff between positive incentives (increasing payment) and negative incentives (increasing inspection).
We show how to find the best deterministic incentive-compatible inspection scheme for all monotone inspection cost functions. We then turn to randomized inspection schemes and show that one can efficiently find the best randomized incentive-compatible inspection scheme when the inspection cost function is submodular. We complement this result by showing that it is impossible to efficiently find the optimal randomized inspection scheme for the more general case of XOS inspection cost functions.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
Empowering machine learning models with contextual knowledge for enhancing the detection of eating disorders in social media posts
Authors:
José Alberto Benítez-Andrades,
María Teresa García-Ordás,
Mayra Russo,
Ahmad Sakor,
Luis Daniel Fernandes Rotger,
Maria-Esther Vidal
Abstract:
Social networks are vital for information sharing, especially in the health sector for discussing diseases and treatments. These platforms, however, often feature posts as brief texts, posing challenges for Artificial Intelligence (AI) in understanding context. We introduce a novel hybrid approach combining community-maintained knowledge graphs (like Wikidata) with deep learning to enhance the cat…
▽ More
Social networks are vital for information sharing, especially in the health sector for discussing diseases and treatments. These platforms, however, often feature posts as brief texts, posing challenges for Artificial Intelligence (AI) in understanding context. We introduce a novel hybrid approach combining community-maintained knowledge graphs (like Wikidata) with deep learning to enhance the categorization of social media posts. This method uses advanced entity recognizers and linkers (like Falcon 2.0) to connect short post entities to knowledge graphs. Knowledge graph embeddings (KGEs) and contextualized word embeddings (like BERT) are then employed to create rich, context-based representations of these posts.
Our focus is on the health domain, particularly in identifying posts related to eating disorders (e.g., anorexia, bulimia) to aid healthcare providers in early diagnosis. We tested our approach on a dataset of 2,000 tweets about eating disorders, finding that merging word embeddings with knowledge graph information enhances the predictive models' reliability. This methodology aims to assist health experts in spotting patterns indicative of mental disorders, thereby improving early detection and accurate diagnosis for personalized medicine.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Low-Distortion Clustering with Ordinal and Limited Cardinal Information
Authors:
Jakob Burkhardt,
Ioannis Caragiannis,
Karl Fehrs,
Matteo Russo,
Chris Schwiegelshohn,
Sudarshan Shyam
Abstract:
Motivated by recent work in computational social choice, we extend the metric distortion framework to clustering problems. Given a set of $n$ agents located in an underlying metric space, our goal is to partition them into $k$ clusters, optimizing some social cost objective. The metric space is defined by a distance function $d$ between the agent locations. Information about $d$ is available only…
▽ More
Motivated by recent work in computational social choice, we extend the metric distortion framework to clustering problems. Given a set of $n$ agents located in an underlying metric space, our goal is to partition them into $k$ clusters, optimizing some social cost objective. The metric space is defined by a distance function $d$ between the agent locations. Information about $d$ is available only implicitly via $n$ rankings, through which each agent ranks all other agents in terms of their distance from her. Still, we would like to evaluate clustering algorithms in terms of social cost objectives that are defined using $d$. This is done using the notion of distortion, which measures how far from optimality a clustering can be, taking into account all underlying metrics that are consistent with the ordinal information available. Unfortunately, the most important clustering objectives do not admit algorithms with finite distortion. To sidestep this disappointing fact, we follow two alternative approaches: We first explore whether resource augmentation can be beneficial. We consider algorithms that use more than $k$ clusters but compare their social cost to that of the optimal $k$-clusterings. We show that using exponentially (in terms of $k$) many clusters, we can get low (constant or logarithmic) distortion for the $k$-center and $k$-median objectives. Interestingly, such an exponential blowup is shown to be necessary. More importantly, we explore whether limited cardinal information can be used to obtain better results. Somewhat surprisingly, for $k$-median and $k$-center, we show that a number of queries that is polynomial in $k$ and only logarithmic in $n$ (i.e., only sublinear in the number of agents for the most relevant scenarios in practice) is enough to get constant distortion.
△ Less
Submitted 6 February, 2024;
originally announced February 2024.
-
On Finding Optimal (Dynamic) Arborescences
Authors:
Joaquim Espada,
Alexandre P. Francisco,
Tatiana Rocher,
Luís M. S. Russo,
Cátia Vaz
Abstract:
Let G = (V, E) be a directed and weighted graph with vertex set V of size n and edge set E of size m, such that each edge (u, v) \in E has a real-valued weight w(u, c). An arborescence in G is a subgraph T = (V, E') such that for a vertex u \in V, the root, there is a unique path in T from u to any other vertex v \in V. The weight of T is the sum of the weights of its edges. In this paper, given G…
▽ More
Let G = (V, E) be a directed and weighted graph with vertex set V of size n and edge set E of size m, such that each edge (u, v) \in E has a real-valued weight w(u, c). An arborescence in G is a subgraph T = (V, E') such that for a vertex u \in V, the root, there is a unique path in T from u to any other vertex v \in V. The weight of T is the sum of the weights of its edges. In this paper, given G, we are interested in finding an arborescence in G with minimum weight, i.e., an optimal arborescence. Furthermore, when G is subject to changes, namely edge insertions and deletions, we are interested in efficiently maintaining a dynamic arborescence in G. This is a well known problem with applications in several domains such as network design optimization and in phylogenetic inference. In this paper we revisit algorithmic ideas proposed by several authors for this problem, we provide detailed pseudo-code as well as implementation details, and we present experimental results on large scale-free networks and on phylogenetic inference. Our implementation is publicly available at \url{https://gitlab.com/espadas/optimal-arborescences}.
△ Less
Submitted 6 November, 2023;
originally announced November 2023.
-
Submodular Norms with Applications To Online Facility Location and Stochastic Probing
Authors:
Kalen Patton,
Matteo Russo,
Sahil Singla
Abstract:
Optimization problems often involve vector norms, which has led to extensive research on developing algorithms that can handle objectives beyond the $\ell_p$ norms. Our work introduces the concept of submodular norms, which are a versatile type of norms that possess marginal properties similar to submodular set functions. We show that submodular norms can accurately represent or approximate well-k…
▽ More
Optimization problems often involve vector norms, which has led to extensive research on developing algorithms that can handle objectives beyond the $\ell_p$ norms. Our work introduces the concept of submodular norms, which are a versatile type of norms that possess marginal properties similar to submodular set functions. We show that submodular norms can accurately represent or approximate well-known classes of norms, such as $\ell_p$ norms, ordered norms, and symmetric norms. Furthermore, we establish that submodular norms can be applied to optimization problems such as online facility location, stochastic probing, and generalized load balancing. This allows us to develop a logarithmic-competitive algorithm for online facility location with symmetric norms, to prove a logarithmic adaptivity gap for stochastic probing with symmetric norms, and to give an alternative poly-logarithmic approximation algorithm for generalized load balancing with outer $\ell_1$ norm and inner symmetric norms.
△ Less
Submitted 6 October, 2023;
originally announced October 2023.
-
Accelerating Aggregation Queries on Unstructured Streams of Data
Authors:
Matthew Russo,
Tatsunori Hashimoto,
Daniel Kang,
Yi Sun,
Matei Zaharia
Abstract:
Analysts and scientists are interested in querying streams of video, audio, and text to extract quantitative insights. For example, an urban planner may wish to measure congestion by querying the live feed from a traffic camera. Prior work has used deep neural networks (DNNs) to answer such queries in the batch setting. However, much of this work is not suited for the streaming setting because it…
▽ More
Analysts and scientists are interested in querying streams of video, audio, and text to extract quantitative insights. For example, an urban planner may wish to measure congestion by querying the live feed from a traffic camera. Prior work has used deep neural networks (DNNs) to answer such queries in the batch setting. However, much of this work is not suited for the streaming setting because it requires access to the entire dataset before a query can be submitted or is specific to video. Thus, to the best of our knowledge, no prior work addresses the problem of efficiently answering queries over multiple modalities of streams.
In this work we propose InQuest, a system for accelerating aggregation queries on unstructured streams of data with statistical guarantees on query accuracy. InQuest leverages inexpensive approximation models ("proxies") and sampling techniques to limit the execution of an expensive high-precision model (an "oracle") to a subset of the stream. It then uses the oracle predictions to compute an approximate query answer in real-time. We theoretically analyzed InQuest and show that the expected error of its query estimates converges on stationary streams at a rate inversely proportional to the oracle budget. We evaluated our algorithm on six real-world video and text datasets and show that InQuest achieves the same root mean squared error (RMSE) as two streaming baselines with up to 5.0x fewer oracle invocations. We further show that InQuest can achieve up to 1.9x lower RMSE at a fixed number of oracle invocations than a state-of-the-art batch setting algorithm.
△ Less
Submitted 17 August, 2023;
originally announced August 2023.
-
On the error of best polynomial approximation of composite functions
Authors:
Luisa Fermo,
Concetta Laurita,
Maria Grazia Russo
Abstract:
The purpose of the paper is to provide a characterization of the error of the best polynomial approximation of composite functions in weighted spaces. Such a characterization is essential for the convergence analysis of numerical methods applied to non-linear problems or for numerical approaches that make use of regularization techniques to cure low smoothness of the solution. This result is obtai…
▽ More
The purpose of the paper is to provide a characterization of the error of the best polynomial approximation of composite functions in weighted spaces. Such a characterization is essential for the convergence analysis of numerical methods applied to non-linear problems or for numerical approaches that make use of regularization techniques to cure low smoothness of the solution. This result is obtained through an estimate of the derivatives of composite functions in weighted uniform norm.
△ Less
Submitted 11 August, 2023;
originally announced August 2023.
-
Quantum Kernel Estimation With Neutral Atoms For Supervised Classification: A Gate-Based Approach
Authors:
Marco Russo,
Edoardo Giusto,
Bartolomeo Montrucchio
Abstract:
Quantum Kernel Estimation (QKE) is a technique based on leveraging a quantum computer to estimate a kernel function that is classically difficult to calculate, which is then used by a classical computer for training a Support Vector Machine (SVM). Given the high number of 2-local operators necessary for realizing a feature mapping hard to simulate classically, a high qubit connectivity is needed,…
▽ More
Quantum Kernel Estimation (QKE) is a technique based on leveraging a quantum computer to estimate a kernel function that is classically difficult to calculate, which is then used by a classical computer for training a Support Vector Machine (SVM). Given the high number of 2-local operators necessary for realizing a feature mapping hard to simulate classically, a high qubit connectivity is needed, which is not currently possible on superconducting devices. For this reason, neutral atom quantum computers can be used, since they allow to arrange the atoms with more freedom. Examples of neutral-atom-based QKE can be found in the literature, but they are focused on graph learning and use the analogue approach. In this paper, a general method based on the gate model is presented. After deriving 1-qubit and 2-qubit gates starting from laser pulses, a parameterized sequence for feature mapping on 3 qubits is realized. This sequence is then used to empirically compute the kernel matrix starting from a dataset, which is finally used to train the SVM. It is also shown that this process can be generalized up to N qubits taking advantage of the more flexible arrangement of atoms that this technology allows. The accuracy is shown to be high despite the small dataset and the low separation. This is the first paper that not only proposes an algorithm for explicitly deriving a universal set of gates but also presents a method of estimating quantum kernels on neutral atom devices for general problems using the gate model.
△ Less
Submitted 28 July, 2023;
originally announced July 2023.
-
Bound by the Bounty: Collaboratively Shaping Evaluation Processes for Queer AI Harms
Authors:
Organizers of QueerInAI,
Nathan Dennler,
Anaelia Ovalle,
Ashwin Singh,
Luca Soldaini,
Arjun Subramonian,
Huy Tu,
William Agnew,
Avijit Ghosh,
Kyra Yee,
Irene Font Peradejordi,
Zeerak Talat,
Mayra Russo,
Jess de Jesus de Pinho Pinhal
Abstract:
Bias evaluation benchmarks and dataset and model documentation have emerged as central processes for assessing the biases and harms of artificial intelligence (AI) systems. However, these auditing processes have been criticized for their failure to integrate the knowledge of marginalized communities and consider the power dynamics between auditors and the communities. Consequently, modes of bias e…
▽ More
Bias evaluation benchmarks and dataset and model documentation have emerged as central processes for assessing the biases and harms of artificial intelligence (AI) systems. However, these auditing processes have been criticized for their failure to integrate the knowledge of marginalized communities and consider the power dynamics between auditors and the communities. Consequently, modes of bias evaluation have been proposed that engage impacted communities in identifying and assessing the harms of AI systems (e.g., bias bounties). Even so, asking what marginalized communities want from such auditing processes has been neglected. In this paper, we ask queer communities for their positions on, and desires from, auditing processes. To this end, we organized a participatory workshop to critique and redesign bias bounties from queer perspectives. We found that when given space, the scope of feedback from workshop participants goes far beyond what bias bounties afford, with participants questioning the ownership, incentives, and efficacy of bounties. We conclude by advocating for community ownership of bounties and complementing bounties with participatory processes (e.g., co-creation).
△ Less
Submitted 25 July, 2023; v1 submitted 14 July, 2023;
originally announced July 2023.
-
Fair Division with Interdependent Values
Authors:
Georgios Birmpas,
Tomer Ezra,
Stefano Leonardi,
Matteo Russo
Abstract:
We introduce the study of designing allocation mechanisms for fairly allocating indivisible goods in settings with interdependent valuation functions. In our setting, there is a set of goods that needs to be allocated to a set of agents (without disposal). Each agent is given a private signal, and his valuation function depends on the signals of all agents. Without the use of payments, there are s…
▽ More
We introduce the study of designing allocation mechanisms for fairly allocating indivisible goods in settings with interdependent valuation functions. In our setting, there is a set of goods that needs to be allocated to a set of agents (without disposal). Each agent is given a private signal, and his valuation function depends on the signals of all agents. Without the use of payments, there are strong impossibility results for designing strategyproof allocation mechanisms even in settings without interdependent values. Therefore, we turn to design mechanisms that always admit equilibria that are fair with respect to their true signals, despite their potentially distorted perception. To do so, we first extend the definitions of pure Nash equilibrium and well-studied fairness notions in literature to the interdependent setting. We devise simple allocation mechanisms that always admit a fair equilibrium with respect to the true signals. We complement this result by showing that, even for very simple cases with binary additive interdependent valuation functions, no allocation mechanism that always admits an equilibrium, can guarantee that all equilibria are fair with respect to the true signals.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Fast Variational Inference for Bayesian Factor Analysis in Single and Multi-Study Settings
Authors:
Blake Hansen,
Alejandra Avalos-Pacheco,
Massimiliano Russo,
Roberta De Vito
Abstract:
Factors models are routinely used to analyze high-dimensional data in both single-study and multi-study settings. Bayesian inference for such models relies on Markov Chain Monte Carlo (MCMC) methods which scale poorly as the number of studies, observations, or measured variables increase. To address this issue, we propose variational inference algorithms to approximate the posterior distribution o…
▽ More
Factors models are routinely used to analyze high-dimensional data in both single-study and multi-study settings. Bayesian inference for such models relies on Markov Chain Monte Carlo (MCMC) methods which scale poorly as the number of studies, observations, or measured variables increase. To address this issue, we propose variational inference algorithms to approximate the posterior distribution of Bayesian latent factor models using the multiplicative gamma process shrinkage prior. The proposed algorithms provide fast approximate inference at a fraction of the time and memory of MCMC-based implementations while maintaining comparable accuracy in characterizing the data covariance matrix. We conduct extensive simulations to evaluate our proposed algorithms and show their utility in estimating the model for high-dimensional multi-study gene expression data in ovarian cancers. Overall, our proposed approaches enable more efficient and scalable inference for factor models, facilitating their use in high-dimensional settings. An R package VIMSFA implementing our methods is available on GitHub (github.com/blhansen/VI-MSFA).
△ Less
Submitted 12 April, 2024; v1 submitted 22 May, 2023;
originally announced May 2023.
-
GCNH: A Simple Method For Representation Learning On Heterophilous Graphs
Authors:
Andrea Cavallo,
Claas Grohnfeldt,
Michele Russo,
Giulio Lovisotto,
Luca Vassio
Abstract:
Graph Neural Networks (GNNs) are well-suited for learning on homophilous graphs, i.e., graphs in which edges tend to connect nodes of the same type. Yet, achievement of consistent GNN performance on heterophilous graphs remains an open research problem. Recent works have proposed extensions to standard GNN architectures to improve performance on heterophilous graphs, trading off model simplicity f…
▽ More
Graph Neural Networks (GNNs) are well-suited for learning on homophilous graphs, i.e., graphs in which edges tend to connect nodes of the same type. Yet, achievement of consistent GNN performance on heterophilous graphs remains an open research problem. Recent works have proposed extensions to standard GNN architectures to improve performance on heterophilous graphs, trading off model simplicity for prediction accuracy. However, these models fail to capture basic graph properties, such as neighborhood label distribution, which are fundamental for learning. In this work, we propose GCN for Heterophily (GCNH), a simple yet effective GNN architecture applicable to both heterophilous and homophilous scenarios. GCNH learns and combines separate representations for a node and its neighbors, using one learned importance coefficient per layer to balance the contributions of center nodes and neighborhoods. We conduct extensive experiments on eight real-world graphs and a set of synthetic graphs with varying degrees of heterophily to demonstrate how the design choices for GCNH lead to a sizable improvement over a vanilla GCN. Moreover, GCNH outperforms state-of-the-art models of much higher complexity on four out of eight benchmarks, while producing comparable results on the remaining datasets. Finally, we discuss and analyze the lower complexity of GCNH, which results in fewer trainable parameters and faster training times than other methods, and show how GCNH mitigates the oversmoothing problem.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Quantum Brownian Motion in the Caldeira-Leggett Model with a Damped Environment
Authors:
Lester Buxton,
Marc-Thomas Russo,
Jim Al-Khalili,
Andrea Rocco
Abstract:
We model a quantum system coupled to an environment of damped harmonic oscillators by following the approach of Caldeira-Leggett and adopting the Caldirola-Kanai Lagrangian for the bath oscillators. In deriving the master equation of the quantum system of interest (a particle in a general potential), we show that the potential is modified non-trivially by a new inverted harmonic oscillator term, i…
▽ More
We model a quantum system coupled to an environment of damped harmonic oscillators by following the approach of Caldeira-Leggett and adopting the Caldirola-Kanai Lagrangian for the bath oscillators. In deriving the master equation of the quantum system of interest (a particle in a general potential), we show that the potential is modified non-trivially by a new inverted harmonic oscillator term, induced by the damping of the bath oscillators. We analyze numerically the case of a particle in a double-well potential, and find that this modification changes both the rate of decoherence at short times and the well-transfer probability at longer times. We also identify a simple rescaling condition that keeps the potential fixed despite changes in the environmental damping. Here, the increase of environmental damping leads to a slowing of decoherence.
△ Less
Submitted 16 March, 2023;
originally announced March 2023.
-
Fully Dynamic Online Selection through Online Contention Resolution Schemes
Authors:
Vashist Avadhanula,
Andrea Celli,
Riccardo Colini-Baldeschi,
Stefano Leonardi,
Matteo Russo
Abstract:
We study fully dynamic online selection problems in an adversarial/stochastic setting that includes Bayesian online selection, prophet inequalities, posted price mechanisms, and stochastic probing problems subject to combinatorial constraints. In the classical ``incremental'' version of the problem, selected elements remain active until the end of the input sequence. On the other hand, in the full…
▽ More
We study fully dynamic online selection problems in an adversarial/stochastic setting that includes Bayesian online selection, prophet inequalities, posted price mechanisms, and stochastic probing problems subject to combinatorial constraints. In the classical ``incremental'' version of the problem, selected elements remain active until the end of the input sequence. On the other hand, in the fully dynamic version of the problem, elements stay active for a limited time interval, and then leave. This models, for example, the online matching of tasks to workers with task/worker-dependent working times, and sequential posted pricing of perishable goods. A successful approach to online selection problems in the adversarial setting is given by the notion of Online Contention Resolution Scheme (OCRS), that uses a priori information to formulate a linear relaxation of the underlying optimization problem, whose optimal fractional solution is rounded online for any adversarial order of the input sequence. Our main contribution is providing a general method for constructing an OCRS for fully dynamic online selection problems. Then, we show how to employ such OCRS to construct no-regret algorithms in a partial information model with semi-bandit feedback and adversarial inputs.
△ Less
Submitted 8 January, 2023;
originally announced January 2023.
-
2-hop Neighbor Class Similarity (2NCS): A graph structural metric indicative of graph neural network performance
Authors:
Andrea Cavallo,
Claas Grohnfeldt,
Michele Russo,
Giulio Lovisotto,
Luca Vassio
Abstract:
Graph Neural Networks (GNNs) achieve state-of-the-art performance on graph-structured data across numerous domains. Their underlying ability to represent nodes as summaries of their vicinities has proven effective for homophilous graphs in particular, in which same-type nodes tend to connect. On heterophilous graphs, in which different-type nodes are likely connected, GNNs perform less consistentl…
▽ More
Graph Neural Networks (GNNs) achieve state-of-the-art performance on graph-structured data across numerous domains. Their underlying ability to represent nodes as summaries of their vicinities has proven effective for homophilous graphs in particular, in which same-type nodes tend to connect. On heterophilous graphs, in which different-type nodes are likely connected, GNNs perform less consistently, as neighborhood information might be less representative or even misleading. On the other hand, GNN performance is not inferior on all heterophilous graphs, and there is a lack of understanding of what other graph properties affect GNN performance.
In this work, we highlight the limitations of the widely used homophily ratio and the recent Cross-Class Neighborhood Similarity (CCNS) metric in estimating GNN performance. To overcome these limitations, we introduce 2-hop Neighbor Class Similarity (2NCS), a new quantitative graph structural property that correlates with GNN performance more strongly and consistently than alternative metrics. 2NCS considers two-hop neighborhoods as a theoretically derived consequence of the two-step label propagation process governing GCN's training-inference process. Experiments on one synthetic and eight real-world graph datasets confirm consistent improvements over existing metrics in estimating the accuracy of GCN- and GAT-based architectures on the node classification task.
△ Less
Submitted 26 December, 2022;
originally announced December 2022.
-
Methods and Tools for the Management of Renewable Energy Communities: the ComER project
Authors:
Anna Rita Di Fazio,
Arturo Losi,
Mario Russo,
Filippo Cacace,
Francesco Conte,
Giulio Iannello,
Gianluca Natrella,
Matteo Saviozzi
Abstract:
Renewable Energy Communities (RECs) have been officially introduced into the European legislation through the Clean Energy for all Europeans package. A REC is defined as an association of citizens, commercial activities, enterprises, and local authorities that own small-scale power plants based on Renewable Energy Sources (RESs). The community has the objective of maximizing the share of renewable…
▽ More
Renewable Energy Communities (RECs) have been officially introduced into the European legislation through the Clean Energy for all Europeans package. A REC is defined as an association of citizens, commercial activities, enterprises, and local authorities that own small-scale power plants based on Renewable Energy Sources (RESs). The community has the objective of maximizing the share of renewable energy, i.e. the self-consumption of the energy generated by the community RES power plants and to generally optimize the use of electrical energy. This paper describes the ComER project, developed by the University of Cassino and the Campus Bio-Medico University of Rome. The project focuses on the main technical problems to face for the realization of a REC. The principal objective is to develop methods and tools necessary for the management and control of RECs. In particular, this paper describes the rules established for RECs in the Italian legislations, the organization of the ComER project, the adopted solutions and the first obtained results.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
Prophet Inequalities via the Expected Competitive Ratio
Authors:
Tomer Ezra,
Stefano Leonardi,
Rebecca Reiffenhäuser,
Matteo Russo,
Alexandros Tsigonias-Dimitriadis
Abstract:
We consider prophet inequalities under downward-closed constraints. In this problem, a decision-maker makes immediate and irrevocable choices on arriving elements, subject to constraints. Traditionally, performance is compared to the expected offline optimum, called the \textit{Ratio of Expectations} (RoE). However, RoE has limitations as it only guarantees the average performance compared to the…
▽ More
We consider prophet inequalities under downward-closed constraints. In this problem, a decision-maker makes immediate and irrevocable choices on arriving elements, subject to constraints. Traditionally, performance is compared to the expected offline optimum, called the \textit{Ratio of Expectations} (RoE). However, RoE has limitations as it only guarantees the average performance compared to the optimum, and might perform poorly against the realized ex-post optimal value. We study an alternative performance measure, the \textit{Expected Ratio} (EoR), namely the expectation of the ratio between algorithm's and prophet's value. EoR offers robust guarantees, e.g., a constant EoR implies achieving a constant fraction of the offline optimum with constant probability. For the special case of single-choice problems the EoR coincides with the well-studied notion of probability of selecting the maximum. However, the EoR naturally generalizes the probability of selecting the maximum for combinatorial constraints, which are the main focus of this paper. Specifically, we establish two reductions: for every constraint, RoE and the EoR are at most a constant factor apart. Additionally, we show that the EoR is a stronger benchmark than the RoE in that, for every instance (constraint and distribution), the RoE is at least a constant fraction of the EoR, but not vice versa. Both these reductions imply a wealth of EoR results in multiple settings where RoE results are known.
△ Less
Submitted 6 October, 2023; v1 submitted 7 July, 2022;
originally announced July 2022.
-
Active TLS Stack Fingerprinting: Characterizing TLS Server Deployments at Scale
Authors:
Markus Sosnowski,
Johannes Zirngibl,
Patrick Sattler,
Georg Carle,
Claas Grohnfeldt,
Michele Russo,
Daniele Sgandurra
Abstract:
Active measurements can be used to collect server characteristics on a large scale. This kind of metadata can help discovering hidden relations and commonalities among server deployments offering new possibilities to cluster and classify them. As an example, identifying a previously-unknown cybercriminal infrastructures can be a valuable source for cyber-threat intelligence. We propose herein an a…
▽ More
Active measurements can be used to collect server characteristics on a large scale. This kind of metadata can help discovering hidden relations and commonalities among server deployments offering new possibilities to cluster and classify them. As an example, identifying a previously-unknown cybercriminal infrastructures can be a valuable source for cyber-threat intelligence. We propose herein an active measurement-based methodology for acquiring Transport Layer Security (TLS) metadata from servers and leverage it for their fingerprinting. Our fingerprints capture the characteristic behavior of the TLS stack primarily caused by the implementation, configuration, and hardware support of the underlying server. Using an empirical optimization strategy that maximizes information gain from every handshake to minimize measurement costs, we generated 10 general-purpose Client Hellos used as scanning probes to create a large database of TLS configurations used for classifying servers. We fingerprinted 28 million servers from the Alexa and Majestic toplists and two Command and Control (C2) blocklists over a period of 30 weeks with weekly snapshots as foundation for two long-term case studies: classification of Content Delivery Network and C2 servers. The proposed methodology shows a precision of more than 99 % and enables a stable identification of new servers over time. This study describes a new opportunity for active measurements to provide valuable insights into the Internet that can be used in security-relevant use cases.
△ Less
Submitted 30 August, 2023; v1 submitted 27 June, 2022;
originally announced June 2022.
-
A novel multi-layer modular approach for real-time fuzzy-identification of gravitational-wave signals
Authors:
Francesco Pio Barone,
Daniele Dell'Aquila,
Marco Russo
Abstract:
Advanced LIGO and Advanced Virgo ground-based interferometers are instruments capable to detect gravitational wave signals exploiting advanced laser interferometry techniques. The underlying data analysis task consists in identifying specific patterns in noisy timeseries, but it is made extremely complex by the incredibly small amplitude of the target signals. In this scenario, the development of…
▽ More
Advanced LIGO and Advanced Virgo ground-based interferometers are instruments capable to detect gravitational wave signals exploiting advanced laser interferometry techniques. The underlying data analysis task consists in identifying specific patterns in noisy timeseries, but it is made extremely complex by the incredibly small amplitude of the target signals. In this scenario, the development of effective gravitational wave detection algorithms is crucial. We propose a novel layered framework for real-time detection of gravitational waves inspired by speech processing techniques and, in the present implementation, based on a state-of-the-art machine learning approach involving a hybridization of genetic programming and neural networks. The key aspects of the newly proposed framework are: the well structured, layered approach, and the low computational complexity. The paper describes the basic concepts of the framework and the derivation of the first three layers. Even if the layers are based on models derived using a machine learning approach, the proposed layered structure has a universal nature. Compared to more complex approaches, such as convolutional neural networks, which comprise a parameter set of several tens of MB and were tested exclusively for fixed length data samples, our framework has lower accuracy (e.g., it identifies 45% of low signal-to-noise-ration gravitational wave signals, against 65% of the state-of-the-art, at a false alarm probability of $10^{-2}$), but has a much lower computational complexity and a higher degree of modularity. Furthermore, the exploitation of short-term features makes the results of the new framework virtually independent against time-position of gravitational wave signals, simplifying its future exploitation in real-time multi-layer pipelines for gravitational-wave detection with new generation interferometers.
△ Less
Submitted 16 December, 2023; v1 submitted 13 June, 2022;
originally announced June 2022.
-
Modeling Heavy-Ion Fusion Cross Section Data via a Novel Artificial Intelligence Approach
Authors:
Daniele Dell'Aquila,
Brunilde Gnoffo,
Ivano Lombardo,
Francesco Porto,
Marco Russo
Abstract:
We perform a comprehensive analysis of complete fusion cross section data with the aim to derive, in a completely data-driven way, a model suitable to predict the integrated cross section of the fusion between light to medium mass nuclei at above barrier energies. To this end, we adopted a novel artificial intelligence approach, based on a hybridization of genetic programming and artificial neural…
▽ More
We perform a comprehensive analysis of complete fusion cross section data with the aim to derive, in a completely data-driven way, a model suitable to predict the integrated cross section of the fusion between light to medium mass nuclei at above barrier energies. To this end, we adopted a novel artificial intelligence approach, based on a hybridization of genetic programming and artificial neural networks, capable to derive an analytical model for the description of experimental data. The approach enables, for the first time, to perform a global search for computationally simple models over several variables and a considerable body of nuclear data. The derived phenomenological formula can serve to reproduce the trend of fusion cross section for a large variety of light to intermediate mass collision systems in an energy domain ranging approximately from the Coulomb barrier to the onset of multi-fragmentation phenomena.
△ Less
Submitted 19 March, 2022;
originally announced March 2022.
-
Filtered integration rules for finite Hilbert transforms
Authors:
D. Occorsio,
M. G. Russo,
W. Themistoclakis
Abstract:
A product quadrature rule, based on the filtered de la Vallée Poussin polynomial approximation, is proposed for evaluating the finite Hilbert transform in [-1; 1]. Convergence results are stated in weighted uniform norm for functions belonging to suitable Besov type subspaces. Several numerical tests are provided, also comparing the rule with other formulas known in literature.
A product quadrature rule, based on the filtered de la Vallée Poussin polynomial approximation, is proposed for evaluating the finite Hilbert transform in [-1; 1]. Convergence results are stated in weighted uniform norm for functions belonging to suitable Besov type subspaces. Several numerical tests are provided, also comparing the rule with other formulas known in literature.
△ Less
Submitted 22 September, 2021;
originally announced September 2021.
-
Dynamic modeling of the Italians' attitude towards Covid-19
Authors:
Emanuele Aliverti,
Massimilano Russo
Abstract:
We analyze repeated cross-sectional survey data collected by the Institute of Global Health Innovation, to characterize the perception and behavior of the Italian population during the Covid-19 pandemic, focusing on the period that spans from April to November 2020. To accomplish this goal, we propose a Bayesian dynamic latent-class regression model, that accounts for the effect of sampling bias i…
▽ More
We analyze repeated cross-sectional survey data collected by the Institute of Global Health Innovation, to characterize the perception and behavior of the Italian population during the Covid-19 pandemic, focusing on the period that spans from April to November 2020. To accomplish this goal, we propose a Bayesian dynamic latent-class regression model, that accounts for the effect of sampling bias including survey weights into the likelihood function. According to the proposed approach, attitudes towards Covid-19 are described via three ideal behaviors that are fixed over time, corresponding to different degrees of compliance with spread-preventive measures. The overall tendency toward a specific profile dynamically changes across survey waves via a latent Gaussian process regression, that adjusts for subject-specific covariates. We illustrate the dynamic evolution of Italians' behaviors during the pandemic, providing insights on how the proportion of ideal behaviors has varied during the phases of the lockdown, while measuring the effect of age, sex, region and employment of the respondents on the attitude toward Covid-19.
△ Less
Submitted 20 June, 2022; v1 submitted 2 August, 2021;
originally announced August 2021.
-
Range Minimum Queries in Minimal Space
Authors:
Luís M. S. Russo
Abstract:
We consider the problem of computing a sequence of range minimum queries. We assume a sequence of commands that contains values and queries. Our goal is to quickly determine the minimum value that exists between the current position and a previous position $i$. Range minimum queries are used as a sub-routine of several algorithms, namely related to string processing. We propose a data structure th…
▽ More
We consider the problem of computing a sequence of range minimum queries. We assume a sequence of commands that contains values and queries. Our goal is to quickly determine the minimum value that exists between the current position and a previous position $i$. Range minimum queries are used as a sub-routine of several algorithms, namely related to string processing. We propose a data structure that can process these commands sequences. We obtain efficient results for several variations of the problem, in particular we obtain $O(1)$ time per command for the offline version and $O(α(n))$ amortized time for the online version, where $α(n)$ is the inverse Ackermann function and $n$ the number of values in the sequence. This data structure also has very small space requirements, namely $O(\ell)$ where $\ell$ is the maximum number active $i$ positions. We implemented our data structure and show that it is competitive against existing alternatives. We obtain comparable command processing time, in the nano second range, and much smaller space requirements.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Stratified stochastic variational inference for high-dimensional network factor model
Authors:
Emanuele Aliverti,
Massimiliano Russo
Abstract:
There has been considerable recent interest in Bayesian modeling of high-dimensional networks via latent space approaches. When the number of nodes increases, estimation based on Markov Chain Monte Carlo can be extremely slow and show poor mixing, thereby motivating research on alternative algorithms that scale well in high-dimensional settings. In this article, we focus on the latent factor model…
▽ More
There has been considerable recent interest in Bayesian modeling of high-dimensional networks via latent space approaches. When the number of nodes increases, estimation based on Markov Chain Monte Carlo can be extremely slow and show poor mixing, thereby motivating research on alternative algorithms that scale well in high-dimensional settings. In this article, we focus on the latent factor model, a widely used approach for latent space modeling of network data. We develop scalable algorithms to conduct approximate Bayesian inference via stochastic optimization. Leveraging sparse representations of network data, the proposed algorithms show massive computational and storage benefits, and allow to conduct inference in settings with thousands of nodes.
△ Less
Submitted 27 May, 2022; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Small Longest Tandem Scattered Subsequences
Authors:
Luís M. S. Russo,
Alexandre P. Francisco
Abstract:
We consider the problem of identifying tandem scattered subsequences within a string. Our algorithm identifies a longest subsequence which occurs twice without overlap in a string. This algorithm is based on the Hunt-Szymanski algorithm, therefore its performance improves if the string is not self similar. This occurs naturally on strings over large alphabets. Our algorithm relies on new results f…
▽ More
We consider the problem of identifying tandem scattered subsequences within a string. Our algorithm identifies a longest subsequence which occurs twice without overlap in a string. This algorithm is based on the Hunt-Szymanski algorithm, therefore its performance improves if the string is not self similar. This occurs naturally on strings over large alphabets. Our algorithm relies on new results for data structures that support dynamic longest increasing sub-sequences. In the process we also obtain improved algorithms for the decremental string comparison problem.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Hardness of Modern Games
Authors:
Diogo M. Costa,
Alexandre P. Francisco,
Luís M. S. Russo
Abstract:
We consider the complexity properties of modern puzzle games, Hexiom, Cut the Rope and Back to Bed. The complexity of games plays an important role in the type of experience they provide to players. Back to Bed is shown to be PSPACE-Hard and the first two are shown to be NP-Hard. These results give further insight into the structure of these games and the resulting constructions may be useful in f…
▽ More
We consider the complexity properties of modern puzzle games, Hexiom, Cut the Rope and Back to Bed. The complexity of games plays an important role in the type of experience they provide to players. Back to Bed is shown to be PSPACE-Hard and the first two are shown to be NP-Hard. These results give further insight into the structure of these games and the resulting constructions may be useful in further complexity studies.
△ Less
Submitted 21 May, 2020;
originally announced May 2020.
-
Sparsifying Parity-Check Matrices
Authors:
Luís M. S. Russo,
Tobias Dietz,
José Rui Figueira,
Alexandre P. Francisco,
Stefan Ruzika
Abstract:
Parity check matrices (PCMs) are used to define linear error correcting codes and ensure reliable information transmission over noisy channels. The set of codewords of such a code is the null space of this binary matrix.
We consider the problem of minimizing the number of one-entries in parity-check matrices. In the maximum-likelihood (ML) decoding method, the number of ones in PCMs is directly…
▽ More
Parity check matrices (PCMs) are used to define linear error correcting codes and ensure reliable information transmission over noisy channels. The set of codewords of such a code is the null space of this binary matrix.
We consider the problem of minimizing the number of one-entries in parity-check matrices. In the maximum-likelihood (ML) decoding method, the number of ones in PCMs is directly related to the time required to decode messages. We propose a simple matrix row manipulation heuristic which alters the PCM, but not the code itself. We apply simulated annealing and greedy local searches to obtain PCMs with a small number of one entries quickly, i.e. in a couple of minutes or hours when using mainstream hardware. The resulting matrices provide faster ML decoding procedures, especially for large codes.
△ Less
Submitted 8 May, 2020;
originally announced May 2020.
-
Incremental Multiple Longest Common Sub-Sequences
Authors:
Luís M. S. Russo,
Alexandre P. Francisco,
Tatiana Rocher
Abstract:
We consider the problem of updating the information about multiple longest common sub-sequences. This kind of sub-sequences is used to highlight information that is shared across several information sequences, therefore it is extensively used namely in bioinformatics and computational genomics. In this paper we propose a way to maintain this information when the underlying sequences are subject to…
▽ More
We consider the problem of updating the information about multiple longest common sub-sequences. This kind of sub-sequences is used to highlight information that is shared across several information sequences, therefore it is extensively used namely in bioinformatics and computational genomics. In this paper we propose a way to maintain this information when the underlying sequences are subject to modifications, namely when letters are added and removed from the extremes of the sequence. Experimentally our data structure obtains significant improvements over the state of the art.
△ Less
Submitted 6 May, 2020;
originally announced May 2020.
-
Automatic classification of nuclear physics data via a Constrained Evolutionary Clustering approach
Authors:
D. Dell'Aquila,
M. Russo
Abstract:
This paper presents an automatic method for data classification in nuclear physics experiments based on evolutionary computing and vector quantization. The major novelties of our approach are the fully automatic mechanism and the use of analytical models to provide physics constraints, yielding to a fast and physically reliable classification with nearly-zero human supervision. Our method is succe…
▽ More
This paper presents an automatic method for data classification in nuclear physics experiments based on evolutionary computing and vector quantization. The major novelties of our approach are the fully automatic mechanism and the use of analytical models to provide physics constraints, yielding to a fast and physically reliable classification with nearly-zero human supervision. Our method is successfully validated by using experimental data produced by stacks of semiconducting detectors. The resulting classification is highly satisfactory for all explored cases and is particularly robust to noise. The algorithm is suitable to be integrated in the online and offline analysis programs of existing large complexity detection arrays for the study of nucleus-nucleus collisions at low and intermediate energies.
△ Less
Submitted 27 April, 2020;
originally announced April 2020.
-
Approximating Optimal Bidirectional Macro Schemes
Authors:
Luís M. S. Russo,
Ana D. Correia,
Gonzalo Navarro,
Alexandre P. Francisco
Abstract:
Lempel-Ziv is an easy-to-compute member of a wide family of so-called macro schemes; it restricts pointers to go in one direction only. Optimal bidirectional macro schemes are NP-complete to find, but they may provide much better compression on highly repetitive sequences. We consider the problem of approximating optimal bidirectional macro schemes. We describe a simulated annealing algorithm that…
▽ More
Lempel-Ziv is an easy-to-compute member of a wide family of so-called macro schemes; it restricts pointers to go in one direction only. Optimal bidirectional macro schemes are NP-complete to find, but they may provide much better compression on highly repetitive sequences. We consider the problem of approximating optimal bidirectional macro schemes. We describe a simulated annealing algorithm that usually converges quickly. Moreover, in some cases, we obtain bidirectional macro schemes that are provably a 2-approximation of the optimal. We test our algorithm on a number of artificial repetitive texts and verify that it is efficient in practice and outperforms Lempel-Ziv, sometimes by a wide margin.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
On dynamic succinct graph representations
Authors:
Miguel E. Coimbra,
Alexandre P. Francisco,
Luís M. S. Russo,
Guillermo de Bernardo,
Susana Ladra,
Gonzalo Navarro
Abstract:
We address the problem of representing dynamic graphs using $k^2$-trees. The $k^2$-tree data structure is one of the succinct data structures proposed for representing static graphs, and binary relations in general. It relies on compact representations of bit vectors. Hence, by relying on compact representations of dynamic bit vectors, we can also represent dynamic graphs. In this paper we follow…
▽ More
We address the problem of representing dynamic graphs using $k^2$-trees. The $k^2$-tree data structure is one of the succinct data structures proposed for representing static graphs, and binary relations in general. It relies on compact representations of bit vectors. Hence, by relying on compact representations of dynamic bit vectors, we can also represent dynamic graphs. In this paper we follow instead the ideas by Munro {\em et al.}, and we present an alternative implementation for representing dynamic graphs using $k^2$-trees. Our experimental results show that this new implementation is competitive in practice.
△ Less
Submitted 6 December, 2019; v1 submitted 8 November, 2019;
originally announced November 2019.
-
Complete photonic band gaps in 3D foams
Authors:
Ilham Maimouni,
Maryam Morvaridi,
Maria Russo,
Gianluc Lui,
Konstantin Morozov,
Janine Cossy,
Marian Florescu,
Matthieu Labousse,
Patrick Tabeling
Abstract:
To-date, despite remarkable applications in optoelectronics and tremendous amount of theoretical, computational and experimental efforts, there is no technological pathway enabling the fabrication of 3D photonic band gaps in the visible range. The resolution of advanced 3D printing technology does not allow to fabricate such materials and the current silica-based nanofabrication approaches do not…
▽ More
To-date, despite remarkable applications in optoelectronics and tremendous amount of theoretical, computational and experimental efforts, there is no technological pathway enabling the fabrication of 3D photonic band gaps in the visible range. The resolution of advanced 3D printing technology does not allow to fabricate such materials and the current silica-based nanofabrication approaches do not permit the structuring of the desired optical material. Materials based on colloidal self-assembly of polymer spheres open 3D complete band gaps in the infrared range, but, owing to their critical index, not in the visible range. More complex systems, based on oriented tetrahedrons, are still prospected. Here we show, numerically, that FCC foams (Kepler structure) open a 3D complete band gap with a critical index of 2.80, thus compatible with the use of rutile TiO2. We produce monodisperse solid Kepler foams including thousands of pores, down to 10 um, and present a technological pathway, based on standard technologies, enabling the downsizing of such foams down to 400 nm, a size enabling the opening of a complete band gap centered at 500 nm.
△ Less
Submitted 22 October, 2019;
originally announced October 2019.
-
Dark matter search in a Beam-Dump eXperiment (BDX) at Jefferson Lab -- 2018 update to PR12-16-001
Authors:
M. Battaglieri,
A. Bersani,
G. Bracco,
B. Caiffi,
A. Celentano,
R. De Vita,
L. Marsicano,
P. Musico,
F. Panza,
M. Ripani,
E. Santopinto,
M. Taiuti,
V. Bellini,
M. Bondi',
P. Castorina,
M. De Napoli,
A. Italiano,
V. Kuznetzov,
E. Leonora,
F. Mammoliti,
N. Randazzo,
L. Re,
G. Russo,
M. Russo,
A. Shahinyan
, et al. (100 additional authors not shown)
Abstract:
This document complements and completes what was submitted last year to PAC45 as an update to the proposal PR12-16-001 "Dark matter search in a Beam-Dump eXperiment (BDX)" at Jefferson Lab submitted to JLab-PAC44 in 2016. Following the suggestions contained in the PAC45 report, in coordination with the lab, we ran a test to assess the beam-related backgrounds and validate the simulation framework…
▽ More
This document complements and completes what was submitted last year to PAC45 as an update to the proposal PR12-16-001 "Dark matter search in a Beam-Dump eXperiment (BDX)" at Jefferson Lab submitted to JLab-PAC44 in 2016. Following the suggestions contained in the PAC45 report, in coordination with the lab, we ran a test to assess the beam-related backgrounds and validate the simulation framework used to design the BDX experiment. Using a common Monte Carlo framework for the test and the proposed experiment, we optimized the selection cuts to maximize the reach considering simultaneously the signal, cosmic-ray background (assessed in Catania test with BDX-Proto) and beam-related backgrounds (irreducible NC and CC neutrino interactions as determined by simulation). Our results confirmed what was presented in the original proposal: with 285 days of a parasitic run at 65 $μ$A (corresponding to $10^{22}$ EOT) the BDX experiment will lower the exclusion limits in the case of no signal by one to two orders of magnitude in the parameter space of dark-matter coupling versus mass.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
Poisoning Attacks with Generative Adversarial Nets
Authors:
Luis Muñoz-González,
Bjarne Pfitzner,
Matteo Russo,
Javier Carnerero-Cano,
Emil C. Lupu
Abstract:
Machine learning algorithms are vulnerable to poisoning attacks: An adversary can inject malicious points in the training dataset to influence the learning process and degrade the algorithm's performance. Optimal poisoning attacks have already been proposed to evaluate worst-case scenarios, modelling attacks as a bi-level optimization problem. Solving these problems is computationally demanding an…
▽ More
Machine learning algorithms are vulnerable to poisoning attacks: An adversary can inject malicious points in the training dataset to influence the learning process and degrade the algorithm's performance. Optimal poisoning attacks have already been proposed to evaluate worst-case scenarios, modelling attacks as a bi-level optimization problem. Solving these problems is computationally demanding and has limited applicability for some models such as deep networks. In this paper we introduce a novel generative model to craft systematic poisoning attacks against machine learning classifiers generating adversarial training examples, i.e. samples that look like genuine data points but that degrade the classifier's accuracy when used for training. We propose a Generative Adversarial Net with three components: generator, discriminator, and the target classifier. This approach allows us to model naturally the detectability constrains that can be expected in realistic attacks and to identify the regions of the underlying data distribution that can be more vulnerable to data poisoning. Our experimental evaluation shows the effectiveness of our attack to compromise machine learning classifiers, including deep networks.
△ Less
Submitted 25 September, 2019; v1 submitted 18 June, 2019;
originally announced June 2019.
-
Order-Preserving Pattern Matching Indeterminate Strings
Authors:
Diogo Costa,
Luís M. S. Russo,
Rui Henriques,
Hideo Bannai,
Alexandre P. Francisco
Abstract:
Given an indeterminate string pattern $p$ and an indeterminate string text $t$, the problem of order-preserving pattern matching with character uncertainties ($μ$OPPM) is to find all substrings of $t$ that satisfy one of the possible orderings defined by $p$. When the text and pattern are determinate strings, we are in the presence of the well-studied exact order-preserving pattern matching (OPPM)…
▽ More
Given an indeterminate string pattern $p$ and an indeterminate string text $t$, the problem of order-preserving pattern matching with character uncertainties ($μ$OPPM) is to find all substrings of $t$ that satisfy one of the possible orderings defined by $p$. When the text and pattern are determinate strings, we are in the presence of the well-studied exact order-preserving pattern matching (OPPM) problem with diverse applications on time series analysis. Despite its relevance, the exact OPPM problem suffers from two major drawbacks: 1) the inability to deal with indetermination in the text, thus preventing the analysis of noisy time series; and 2) the inability to deal with indetermination in the pattern, thus imposing the strict satisfaction of the orders among all pattern positions. This paper provides the first polynomial algorithm to answer the $μ$OPPM problem when indetermination is observed on the pattern or text. Given two strings with length $m$ and $O(r)$ uncertain characters per string position, we show that the $μ$OPPM problem can be solved in $O(mr\lg r)$ time when one string is indeterminate and $r\in\mathbb{N}^+$. Mappings into satisfiability problems are provided when indetermination is observed on both the pattern and the text, and results concerning the general problem complexity are presented as well, with $μ$OPPM problem proved to be NP-hard in general.
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Multivariate mixed membership modeling: Inferring domain-specific risk profiles
Authors:
Massimiliano Russo,
Burton H. Singer,
David B. Dunson
Abstract:
Characterizing the shared memberships of individuals in a classification scheme poses severe interpretability issues, even when using a moderate number of classes (say 4). Mixed membership models quantify this phenomenon, but they typically focus on goodness-of-fit more than on interpretable inference. To achieve a good numerical fit, these models may in fact require many extreme profiles, making…
▽ More
Characterizing the shared memberships of individuals in a classification scheme poses severe interpretability issues, even when using a moderate number of classes (say 4). Mixed membership models quantify this phenomenon, but they typically focus on goodness-of-fit more than on interpretable inference. To achieve a good numerical fit, these models may in fact require many extreme profiles, making the results difficult to interpret. We introduce a new class of multivariate mixed membership models that, when variables can be partitioned into subject-matter based domains, can provide a good fit to the data using fewer profiles than standard formulations. The proposed model explicitly accounts for the blocks of variables corresponding to the distinct domains along with a cross-domain correlation structure, which provides new information about shared membership of individuals in a complex classification scheme. We specify a multivariate logistic normal distribution for the membership vectors, which allows easy introduction of auxiliary information leveraging a latent multivariate logistic regression. A Bayesian approach to inference, relying on Pólya gamma data augmentation, facilitates efficient posterior computation via Markov Chain Monte Carlo. We apply this methodology to a spatially explicit study of malaria risk over time on the Brazilian Amazon frontier.
△ Less
Submitted 31 December, 2020; v1 submitted 16 January, 2019;
originally announced January 2019.
-
Linking and Cutting Spanning Trees
Authors:
Luís M. S. Russo,
Andreia Sofia Teixeira,
Alexandre P Francisco
Abstract:
We consider the problem of uniformly generating a spanning tree, of a connected undirected graph. This process is useful to compute statistics, namely for phylogenetic trees. We describe a Markov chain for producing these trees. For cycle graphs we prove that this approach significantly outperforms existing algorithms. For general graphs we obtain no analytical bounds, but experimental results sho…
▽ More
We consider the problem of uniformly generating a spanning tree, of a connected undirected graph. This process is useful to compute statistics, namely for phylogenetic trees. We describe a Markov chain for producing these trees. For cycle graphs we prove that this approach significantly outperforms existing algorithms. For general graphs we obtain no analytical bounds, but experimental results show that the chain still converges quickly. This yields an efficient algorithm, also due to the use of proper fast data structures. To bound the mixing time of the chain we describe a coupling, which we analyse for cycle graphs and simulate for other graphs.
△ Less
Submitted 7 July, 2020; v1 submitted 21 January, 2018;
originally announced January 2018.
-
Cartesian trees and Lyndon trees
Authors:
Maxime Crochemore,
Luis M. S. Russo
Abstract:
The article describes the structural and algorithmic relations between Cartesian trees and Lyndon Trees. This leads to a uniform presentation of the Lyndon table of a word corresponding to the Next Nearest Smaller table of a sequence of numbers. It shows how to efficiently compute runs, that is, maximal periodicities occurring in a word.
The article describes the structural and algorithmic relations between Cartesian trees and Lyndon Trees. This leads to a uniform presentation of the Lyndon table of a word corresponding to the Next Nearest Smaller table of a sequence of numbers. It shows how to efficiently compute runs, that is, maximal periodicities occurring in a word.
△ Less
Submitted 23 December, 2017;
originally announced December 2017.