Random vectors on the spin configuration of a Curie-Weiss model on Erdos-Renyi random graphs
Authors:
Dominik R. Bach
Abstract:
This article is concerned with the asymptotic behaviour of random vectors in a diluted ferromagnetic model. We consider a model introduced by Bovier & Gayrard (1993) with ferromagnetic interactions on a directed Erdős-Rényi random graph. Here, directed connections between graph nodes are uniformly drawn at random with a probability p that depends on the number of nodes N and is allowed to go to ze…
▽ More
This article is concerned with the asymptotic behaviour of random vectors in a diluted ferromagnetic model. We consider a model introduced by Bovier & Gayrard (1993) with ferromagnetic interactions on a directed Erdős-Rényi random graph. Here, directed connections between graph nodes are uniformly drawn at random with a probability p that depends on the number of nodes N and is allowed to go to zero in the limit. If $Np\longrightarrow\infty$ in this model, Bovier & Gayrard (1993) proved a law of large numbers almost surely, and Kabluchko et al. (2020) proved central limit theorems in probability. Here, we generalise these results for $β<1$ in the regime $Np\longrightarrow\infty$. We show that all those random vectors on the spin configuration that have a limiting distribution under the Curie-Weiss model converge weakly towards the same distribution under the diluted model, in probability on graph realisations. This generalises various results from the Curie-Weiss model to the diluted model. As a special case, we derive a law of large numbers and central limit theorem for two disjoint groups of spins.
△ Less
Submitted 11 January, 2024; v1 submitted 12 January, 2023;
originally announced January 2023.
Better safe than sorry: Risky function exploitation through safe optimization
Authors:
Eric Schulz,
Quentin J. M. Huys,
Dominik R. Bach,
Maarten Speekenbrink,
Andreas Krause
Abstract:
Exploration-exploitation of functions, that is learning and optimizing a map** between inputs and expected outputs, is ubiquitous to many real world situations. These situations sometimes require us to avoid certain outcomes at all cost, for example because they are poisonous, harmful, or otherwise dangerous. We test participants' behavior in scenarios in which they have to find the optimum of a…
▽ More
Exploration-exploitation of functions, that is learning and optimizing a map** between inputs and expected outputs, is ubiquitous to many real world situations. These situations sometimes require us to avoid certain outcomes at all cost, for example because they are poisonous, harmful, or otherwise dangerous. We test participants' behavior in scenarios in which they have to find the optimum of a function while at the same time avoid outputs below a certain threshold. In two experiments, we find that Safe-Optimization, a Gaussian Process-based exploration-exploitation algorithm, describes participants' behavior well and that participants seem to care firstly whether a point is safe and then try to pick the optimal point from all such safe points. This means that their trade-off between exploration and exploitation can be seen as an intelligent, approximate, and homeostasis-driven strategy.
△ Less
Submitted 14 May, 2016; v1 submitted 2 February, 2016;
originally announced February 2016.