-
Multi-step Knowledge Retrieval and Inference over Unstructured Data
Authors:
Aditya Kalyanpur,
Kailash Saravanakumar,
Victor Barres,
CJ McFate,
Lori Moon,
Nati Seifu,
Maksim Eremeev,
Jose Barrera,
Eric Brown,
David Ferrucci
Abstract:
The advent of Large Language Models (LLMs) and Generative AI has revolutionized natural language applications across various domains. However, high-stakes decision-making tasks in fields such as medical, legal and finance require a level of precision, comprehensiveness, and logical consistency that pure LLM or Retrieval-Augmented-Generation (RAG) approaches often fail to deliver. At Elemental Cogn…
▽ More
The advent of Large Language Models (LLMs) and Generative AI has revolutionized natural language applications across various domains. However, high-stakes decision-making tasks in fields such as medical, legal and finance require a level of precision, comprehensiveness, and logical consistency that pure LLM or Retrieval-Augmented-Generation (RAG) approaches often fail to deliver. At Elemental Cognition (EC), we have developed a neuro-symbolic AI platform to tackle these problems. The platform integrates fine-tuned LLMs for knowledge extraction and alignment with a robust symbolic reasoning engine for logical inference, planning and interactive constraint solving. We describe Cora, a Collaborative Research Assistant built on this platform, that is designed to perform complex research and discovery tasks in high-stakes domains. This paper discusses the multi-step inference challenges inherent in such domains, critiques the limitations of existing LLM-based methods, and demonstrates how Cora's neuro-symbolic approach effectively addresses these issues. We provide an overview of the system architecture, key algorithms for knowledge extraction and formal reasoning, and present preliminary evaluation results that highlight Cora's superior performance compared to well-known LLM and RAG baselines.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
The Lattice Overparametrization Paradigm for the Machine Learning of Lattice Operators
Authors:
Diego Marcondes,
Junior Barrera
Abstract:
The machine learning of lattice operators has three possible bottlenecks. From a statistical standpoint, it is necessary to design a constrained class of operators based on prior information with low bias, and low complexity relative to the sample size. From a computational perspective, there should be an efficient algorithm to minimize an empirical error over the class. From an understanding poin…
▽ More
The machine learning of lattice operators has three possible bottlenecks. From a statistical standpoint, it is necessary to design a constrained class of operators based on prior information with low bias, and low complexity relative to the sample size. From a computational perspective, there should be an efficient algorithm to minimize an empirical error over the class. From an understanding point of view, the properties of the learned operator need to be derived, so its behavior can be theoretically understood. The statistical bottleneck can be overcome due to the rich literature about the representation of lattice operators, but there is no general learning algorithm for them. In this paper, we discuss a learning paradigm in which, by overparametrizing a class via elements in a lattice, an algorithm for minimizing functions in a lattice is applied to learn. We present the stochastic lattice descent algorithm as a general algorithm to learn on constrained classes of operators as long as a lattice overparametrization of it is fixed, and we discuss previous works which are proves of concept. Moreover, if there are algorithms to compute the basis of an operator from its overparametrization, then its properties can be deduced and the understanding bottleneck is also overcome. This learning paradigm has three properties that modern methods based on neural networks lack: control, transparency and interpretability. Nowadays, there is an increasing demand for methods with these characteristics, and we believe that mathematical morphology is in a unique position to supply them. The lattice overparametrization paradigm could be a missing piece for it to achieve its full potential within modern machine learning.
△ Less
Submitted 26 January, 2024; v1 submitted 10 October, 2023;
originally announced October 2023.
-
An Algorithm to Train Unrestricted Sequential Discrete Morphological Neural Networks
Authors:
Diego Marcondes,
Mariana Feldman,
Junior Barrera
Abstract:
There have been attempts to insert mathematical morphology (MM) operators into convolutional neural networks (CNN), and the most successful endeavor to date has been the morphological neural networks (MNN). Although MNN have performed better than CNN in solving some problems, they inherit their black-box nature. Furthermore, in the case of binary images, they are approximations that loose the Bool…
▽ More
There have been attempts to insert mathematical morphology (MM) operators into convolutional neural networks (CNN), and the most successful endeavor to date has been the morphological neural networks (MNN). Although MNN have performed better than CNN in solving some problems, they inherit their black-box nature. Furthermore, in the case of binary images, they are approximations that loose the Boolean lattice structure of MM operators and, thus, it is not possible to represent a specific class of W-operators with desired properties. In a recent work, we proposed the Discrete Morphological Neural Networks (DMNN) for binary image transformation to represent specific classes of W-operators and estimate them via machine learning. We also proposed a stochastic lattice descent algorithm (SLDA) to learn the parameters of Canonical Discrete Morphological Neural Networks (CDMNN), whose architecture is composed only of operators that can be decomposed as the supremum, infimum, and complement of erosions and dilations. In this paper, we propose an algorithm to learn unrestricted sequential DMNN, whose architecture is given by the composition of general W-operators. We illustrate the algorithm in a practical example.
△ Less
Submitted 2 February, 2024; v1 submitted 6 October, 2023;
originally announced October 2023.
-
Discrete Morphological Neural Networks
Authors:
Diego Marcondes,
Junior Barrera
Abstract:
A classical approach to designing binary image operators is Mathematical Morphology (MM). We propose the Discrete Morphological Neural Networks (DMNN) for binary image analysis to represent W-operators and estimate them via machine learning. A DMNN architecture, which is represented by a Morphological Computational Graph, is designed as in the classical heuristic design of morphological operators,…
▽ More
A classical approach to designing binary image operators is Mathematical Morphology (MM). We propose the Discrete Morphological Neural Networks (DMNN) for binary image analysis to represent W-operators and estimate them via machine learning. A DMNN architecture, which is represented by a Morphological Computational Graph, is designed as in the classical heuristic design of morphological operators, in which the designer should combine a set of MM operators and Boolean operations based on prior information and theoretical knowledge. Then, once the architecture is fixed, instead of adjusting its parameters (i.e., structural elements or maximal intervals) by hand, we propose a lattice descent algorithm (LDA) to train these parameters based on a sample of input and output images under the usual machine learning approach. We also propose a stochastic version of the LDA that is more efficient, is scalable and can obtain small error in practical problems. The class represented by a DMNN can be quite general or specialized according to expected properties of the target operator, i.e., prior information, and the semantic expressed by algebraic properties of classes of operators is a differential relative to other methods. The main contribution of this paper is the merger of the two main paradigms for designing morphological operators: classical heuristic design and automatic design via machine learning. As a proof-of-concept, we apply the DMNN to recognize the boundary of digits with noise, and we discuss many topics for future research.
△ Less
Submitted 8 February, 2024; v1 submitted 1 September, 2023;
originally announced September 2023.
-
The role of prior information and computational power in Machine Learning
Authors:
Diego Marcondes,
Adilson Simonis,
Junior Barrera
Abstract:
Science consists on conceiving hypotheses, confronting them with empirical evidence, and kee** only hypotheses which have not yet been falsified. Under deductive reasoning they are conceived in view of a theory and confronted with empirical evidence in an attempt to falsify it, and under inductive reasoning they are conceived based on observation, confronted with empirical evidence and a theory…
▽ More
Science consists on conceiving hypotheses, confronting them with empirical evidence, and kee** only hypotheses which have not yet been falsified. Under deductive reasoning they are conceived in view of a theory and confronted with empirical evidence in an attempt to falsify it, and under inductive reasoning they are conceived based on observation, confronted with empirical evidence and a theory is established based on the not falsified hypotheses. When the hypotheses testing can be performed with quantitative data, the confrontation can be achieved with Machine Learning methods, whose quality is highly dependent on the hypotheses' complexity, hence on the proper insertion of prior information into the set of hypotheses seeking to decrease its complexity without loosing good hypotheses. However, Machine Learning tools have been applied under the pragmatic view of instrumentalism, which is concerned only with the performance of the methods and not with the understanding of their behavior, leading to methods which are not fully understood. In this context, we discuss how prior information and computational power can be employed to solve a learning problem, but while prior information and a careful design of the hypotheses space has as advantage the interpretability of the results, employing high computational power has the advantage of a higher performance. We discuss why learning methods which combine both should work better from an understanding and performance perspective, arguing in favor of basic theoretical research on Machine Learning, in special about how properties of classifiers may be identified in parameters of modern learning models.
△ Less
Submitted 31 October, 2022;
originally announced November 2022.
-
High-Order Mesh Morphing for Boundary and Interface Fitting to Implicit Geometries
Authors:
Jorge-Luis Barrera,
Tzanio Kolev,
Ketan Mittal,
Vladimir Tomov
Abstract:
We propose a method that morphs high-orger meshes such that their boundaries and interfaces coincide/align with implicitly defined geometries. Our focus is particularly on the case when the target surface is prescribed as the zero isocontour of a smooth discrete function. Common examples of this scenario include using level set functions to represent material interfaces in multimaterial configurat…
▽ More
We propose a method that morphs high-orger meshes such that their boundaries and interfaces coincide/align with implicitly defined geometries. Our focus is particularly on the case when the target surface is prescribed as the zero isocontour of a smooth discrete function. Common examples of this scenario include using level set functions to represent material interfaces in multimaterial configurations, and evolving geometries in shape and topology optimization. The proposed method formulates the mesh optimization problem as a variational minimization of the sum of a chosen mesh-quality metric using the Target-Matrix Optimization Paradigm (TMOP) and a penalty term that weakly forces the selected faces of the mesh to align with the target surface. The distinct features of the method are use of a source mesh to represent the level set function with sufficient accuracy, and adaptive strategies for setting the penalization weight and selecting the faces of the mesh to be fit to the target isocontour of the level set field. We demonstrate that the proposed method is robust for generating boundary- and interface-fitted meshes for curvilinear domains using different element types in 2D and 3D.
△ Less
Submitted 6 February, 2023; v1 submitted 9 August, 2022;
originally announced August 2022.
-
Learning the hypotheses space from data through a U-curve algorithm
Authors:
Diego Marcondes,
Adilson Simonis,
Junior Barrera
Abstract:
This paper proposes a data-driven systematic, consistent and non-exhaustive approach to Model Selection, that is an extension of the classical agnostic PAC learning model. In this approach, learning problems are modeled not only by a hypothesis space $\mathcal{H}$, but also by a Learning Space $\mathbb{L}(\mathcal{H})$, a poset of subspaces of $\mathcal{H}$, which covers $\mathcal{H}$ and satisfie…
▽ More
This paper proposes a data-driven systematic, consistent and non-exhaustive approach to Model Selection, that is an extension of the classical agnostic PAC learning model. In this approach, learning problems are modeled not only by a hypothesis space $\mathcal{H}$, but also by a Learning Space $\mathbb{L}(\mathcal{H})$, a poset of subspaces of $\mathcal{H}$, which covers $\mathcal{H}$ and satisfies a property regarding the VC dimension of related subspaces, that is a suitable algebraic search space for Model Selection algorithms. Our main contributions are a data-driven general learning algorithm to perform implicitly regularized Model Selection on $\mathbb{L}(\mathcal{H})$ and a framework under which one can, theoretically, better estimate a target hypothesis with a given sample size by properly modeling $\mathbb{L}(\mathcal{H})$ and employing high computational power. A remarkable consequence of this approach are conditions under which a non-exhaustive search of $\mathbb{L}(\mathcal{H})$ can return an optimal solution. The results of this paper lead to a practical property of Machine Learning, that the lack of experimental data may be mitigated by a high computational capacity. In a context of continuous popularization of computational power, this property may help understand why Machine Learning has become so important, even where data is expensive and hard to get.
△ Less
Submitted 8 October, 2021; v1 submitted 8 September, 2021;
originally announced September 2021.
-
Exact reliability optimization for series-parallel graphs using convex envelopes
Authors:
Javiera Barrera,
Eduardo Moreno,
Gonzalo Muñoz,
Pablo Romero
Abstract:
Given its wide spectrum of applications, the classical problem of all-terminal network reliability evaluation remains a highly relevant problem in network design.
The associated optimization problem -- to find a network with the best possible reliability under multiple constraints -- presents an even more complex challenge, which has been addressed in the scientific literature but usually under…
▽ More
Given its wide spectrum of applications, the classical problem of all-terminal network reliability evaluation remains a highly relevant problem in network design.
The associated optimization problem -- to find a network with the best possible reliability under multiple constraints -- presents an even more complex challenge, which has been addressed in the scientific literature but usually under strong assumptions over failures probabilities and/or the network topology.
In this work, we propose a novel reliability optimization framework for network design with failures probabilities that are independent but not necessarily identical. We leverage the linear-time evaluation procedure for network reliability in the series-parallel graphs of Satyanarayana and Wood(1985) to formulate the reliability optimization problem as a mixed-integer nonlinear optimization problem. To solve this nonconvex problem, we use classical convex envelopes of bilinear functions, introduce custom cutting planes, and propose a new family of convex envelopes for expressions that appear in the evaluation of network reliability. Furthermore, we exploit the refinements produced by spatial branch-and-bound to locally strengthen our convex relaxations. Our experiments show that, using our framework, one can efficiently obtain optimal solutions in challenging instances of this problem.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Convex envelopes for ray-concave functions
Authors:
Javiera Barrera,
Eduardo Moreno,
Gonzalo Muñoz
Abstract:
Convexification based on convex envelopes is ubiquitous in the non-linear optimization literature. Thanks to considerable efforts of the optimization community for decades, we are able to compute the convex envelopes of a considerable number of functions that appear in practice, and thus obtain tight and tractable approximations to challenging problems. We contribute to this line of work by consid…
▽ More
Convexification based on convex envelopes is ubiquitous in the non-linear optimization literature. Thanks to considerable efforts of the optimization community for decades, we are able to compute the convex envelopes of a considerable number of functions that appear in practice, and thus obtain tight and tractable approximations to challenging problems. We contribute to this line of work by considering a family of functions that, to the best of our knowledge, has not been considered before in the literature. We call this family ray-concave functions. We show sufficient conditions that allow us to easily compute closed-form expressions for the convex envelope of ray-concave functions over arbitrary polytopes. With these tools, we are able to provide new perspectives to previously known convex envelopes and derive a previously unknown convex envelope for a function that arises in probability contexts.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Minimum Feature Size Control in Level Set Topology Optimization via Density Fields
Authors:
Jorge L. Barrera,
Markus J. Geiss,
Kurt Maute
Abstract:
A level set topology optimization approach that uses an auxiliary density field to nucleate holes during the optimization process and achieves minimum feature size control in optimized designs is explored. The level set field determines the solid-void interface, and the density field describes the distribution of a fictitious porous material using the solid isotropic material with penalization. Th…
▽ More
A level set topology optimization approach that uses an auxiliary density field to nucleate holes during the optimization process and achieves minimum feature size control in optimized designs is explored. The level set field determines the solid-void interface, and the density field describes the distribution of a fictitious porous material using the solid isotropic material with penalization. These fields are governed by two sets of independent optimization variables which are initially coupled using a penalty for hole nucleation. The strength of the density field penalization and projection are gradually increased through the optimization process to promote a 0-1 density distribution. This treatment of the density field combined with a second penalty that regulates the evolution of the density field in the void phase, mitigate the appearance of small design features. The minimum feature size of optimized designs is controlled by the radius of the linear filter applied to the density optimization variables. The structural response is predicted by the extended finite element method, the sensitivities by the adjoint method, and the optimization variables are updated by a gradient-based optimization algorithm. Numerical examples investigate the robustness of this approach with respect to algorithmic parameters and mesh refinement. The results show the applicability of the combined density level set topology optimization approach for both optimal hole nucleation and for minimum feature size control in 2D and 3D. This comes, however, at the cost of a more advanced problem formulation and additional computational cost due to an increased number of optimization variables.
△ Less
Submitted 28 March, 2021; v1 submitted 26 March, 2021;
originally announced March 2021.
-
Ambiguous phase assignment of discretized 3D geometries in topology optimization
Authors:
Jorge L. Barrera,
Kurt Maute
Abstract:
Level set-based immersed boundary techniques operate on nonconforming meshes while providing a crisp definition of interface and external boundaries. In such techniques, an isocontour of a level set field interpolated from nodal level set values defines a problem's geometry. If the interface is explicitly tracked, the intersected elements are typically divided into sub-elements to which a phase ne…
▽ More
Level set-based immersed boundary techniques operate on nonconforming meshes while providing a crisp definition of interface and external boundaries. In such techniques, an isocontour of a level set field interpolated from nodal level set values defines a problem's geometry. If the interface is explicitly tracked, the intersected elements are typically divided into sub-elements to which a phase needs to be assigned. Due to loss of information in the discretization of the level set field, certain geometrical configurations allow for ambiguous phase assignment of sub-elements, and thus ambiguous definition of the interface. The study presented here focuses on analyzing these topological ambiguities in embedded geometries constructed from discretized level set fields on hexahedral meshes. The analysis is performed on three-dimensional problems where several intersection configurations can significantly affect the problem's topology. This is in contrast to two-dimensional problems where ambiguous topological features exist only in one intersection configuration and identifying and resolving them is straightforward. A set of rules that resolve these ambiguities for two-phase problems is proposed, and algorithms for their implementations are provided. The influence of these rules on the evolution of the geometry in the optimization process is investigated with linear elastic topology optimization problems. These problems are solved by an explicit level set topology optimization framework that uses the extended finite element method to predict physical responses. This study shows that the choice of a rule to resolve topological features can result in drastically different final geometries. However, for the problems studied in this paper, the performances of the optimized design do not differ.
△ Less
Submitted 20 February, 2020;
originally announced February 2020.
-
Criptocurrencies, Fiat Money, Blockchains and Databases
Authors:
Jorge Barrera
Abstract:
Two taxonomies of money that include cryptocurrencies are analyzed. A definition of the term cryptocurrency is given and a taxonomy of them is presented, based on how its price is fixed. The characteristics of the use of current fiat money and the operation of two-level banking systems are discussed. Cryptocurrencies are compared with fiat money and the aspects in which the latter cannot be overco…
▽ More
Two taxonomies of money that include cryptocurrencies are analyzed. A definition of the term cryptocurrency is given and a taxonomy of them is presented, based on how its price is fixed. The characteristics of the use of current fiat money and the operation of two-level banking systems are discussed. Cryptocurrencies are compared with fiat money and the aspects in which the latter cannot be overcome are indicated. The characteristics of blockchains and databases are described. The possible cases of use of both technologies are compared, and it is noted that blockchains, in addition to cryptocurrencies and certain records, have not yet shown their usefulness, while databases constitute the foundation of most of the automated systems in operation.
△ Less
Submitted 4 February, 2020;
originally announced February 2020.
-
Learning the Hypotheses Space from data Part II: Convergence and Feasibility
Authors:
Diego Marcondes,
Adilson Simonis,
Junior Barrera
Abstract:
In part \textit{I} we proposed a structure for a general Hypotheses Space $\mathcal{H}$, the Learning Space $\mathbb{L}(\mathcal{H})$, which can be employed to avoid \textit{overfitting} when estimating in a complex space with relative shortage of examples. Also, we presented the U-curve property, which can be taken advantage of in order to select a Hypotheses Space without exhaustively searching…
▽ More
In part \textit{I} we proposed a structure for a general Hypotheses Space $\mathcal{H}$, the Learning Space $\mathbb{L}(\mathcal{H})$, which can be employed to avoid \textit{overfitting} when estimating in a complex space with relative shortage of examples. Also, we presented the U-curve property, which can be taken advantage of in order to select a Hypotheses Space without exhaustively searching $\mathbb{L}(\mathcal{H})$. In this paper, we carry further our agenda, by showing the consistency of a model selection framework based on Learning Spaces, in which one selects from data the Hypotheses Space on which to learn. The method developed in this paper adds to the state-of-the-art in model selection, by extending Vapnik-Chervonenkis Theory to \textit{random} Hypotheses Spaces, i.e., Hypotheses Spaces learned from data. In this framework, one estimates a random subspace $\hat{\mathcal{M}} \in \mathbb{L}(\mathcal{H})$ which converges with probability one to a target Hypotheses Space $\mathcal{M}^{\star} \in \mathbb{L}(\mathcal{H})$ with desired properties. As the convergence implies asymptotic unbiased estimators, we have a consistent framework for model selection, showing that it is feasible to learn the Hypotheses Space from data. Furthermore, we show that the generalization errors of learning on $\hat{\mathcal{M}}$ are lesser than those we commit when learning on $\mathcal{H}$, so it is more efficient to learn on a subspace learned from data.
△ Less
Submitted 10 September, 2021; v1 submitted 30 January, 2020;
originally announced January 2020.
-
Learning the Hypotheses Space from data: Learning Space and U-curve Property
Authors:
Diego Marcondes,
Adilson Simonis,
Junior Barrera
Abstract:
This paper presents an extension of the classical agnostic PAC learning model in which learning problems are modelled not only by a Hypothesis Space $\mathcal{H}$, but also by a Learning Space $\mathbb{L}(\mathcal{H})$, which is a cover of $\mathcal{H}$, constrained by a VC-dimension property, that is a suitable domain for Model Selection algorithms. Our main contribution is a data driven general…
▽ More
This paper presents an extension of the classical agnostic PAC learning model in which learning problems are modelled not only by a Hypothesis Space $\mathcal{H}$, but also by a Learning Space $\mathbb{L}(\mathcal{H})$, which is a cover of $\mathcal{H}$, constrained by a VC-dimension property, that is a suitable domain for Model Selection algorithms. Our main contribution is a data driven general learning algorithm to perform regularized Model Selection on $\mathbb{L}(\mathcal{H})$. A remarkable, formally proved, consequence of this approach are conditions on $\mathbb{L}(\mathcal{H})$ and on the loss function that lead to estimated out-of-sample error surfaces which are true U-curves on $\mathbb{L}(\mathcal{H})$ chains, enabling a more efficient search on $\mathbb{L}(\mathcal{H})$. To our knowledge, this is the first rigorous result asserting that a non exhaustive search of a family of candidate models can return an optimal solution. In this new framework, an U-curve optimization algorithm becomes a natural component of Model Selection, hence of learning algorithms. The abstract general framework proposed here may have important implications on modern learning models and on areas such as Neural Architecture Search.
△ Less
Submitted 10 September, 2021; v1 submitted 26 January, 2020;
originally announced January 2020.
-
Hole Seeding in Level Set Topology Optimization via Density Fields
Authors:
Jorge L. Barrera,
Markus J. Geiss,
Kurt Maute
Abstract:
Two approaches that use a density field for seeding holes in level set topology optimization are proposed. In these approaches, the level set field describes the material-void interface while the density field describes the material distribution within the material phase. Both fields are optimized simultaneously by coupling them through either a single abstract design variable field or a penalty t…
▽ More
Two approaches that use a density field for seeding holes in level set topology optimization are proposed. In these approaches, the level set field describes the material-void interface while the density field describes the material distribution within the material phase. Both fields are optimized simultaneously by coupling them through either a single abstract design variable field or a penalty term introduced into the objective function. These approaches eliminate drawbacks of level set topology optimization methods that rely on seeding the initial design domain with a large number of holes. Instead, the proposed approaches insert holes during the optimization process where beneficial. The dependency of the optimization results on the initial hole pattern is reduced, and the computational costs are lowered by kee** the number of elements intersected by the material interface at a minimum. In comparison to level set methods that use topological derivatives to seed small holes at distinct steps in the optimization process, the proposed approaches introduce holes continuously during the optimization process, with the hole size and shape being optimized for the particular design problem. The proposed approaches are studied using the extended finite element method for spatial discretization, and the solid isotropic material with penalization for material interpolation using fictitious densities. Their robustness with respect to algorithmic parameters, dependency on the density penalization, and performance are examined through 2D and 3D benchmark linear elastic numerical examples, and a geometrically complex mass minimization with stress constraint design problem.
△ Less
Submitted 24 September, 2019;
originally announced September 2019.
-
Limit distributions of the upper order statistics for the Lévy-frailty Marshall-Olkin distribution
Authors:
Javiera Barrera,
Guido Lagos
Abstract:
The Marshall-Olkin (MO) distribution has been considered a key model in reliability theory and in risk analysis, where it is used to model the lifetimes of dependent components or entities of a system and dependency is induced by "shocks" that hit one or more components at a time. Of particular interest is the Lévy-frailty subfamily of the Marshall-Olkin (LFMO) distribution, since it has few param…
▽ More
The Marshall-Olkin (MO) distribution has been considered a key model in reliability theory and in risk analysis, where it is used to model the lifetimes of dependent components or entities of a system and dependency is induced by "shocks" that hit one or more components at a time. Of particular interest is the Lévy-frailty subfamily of the Marshall-Olkin (LFMO) distribution, since it has few parameters and because the nontrivial dependency structure is driven by an underlying Lévy subordinator process. The main contribution of our work is that we derive the precise asymptotic behavior of the upper order statistics of the LFMO distribution. More specifically, we consider a sequence of $n$ univariate random variables jointly distributed as a multivariate LFMO distribution and analyze the order statistics of the sequence as $n$ grows. Our main result states that if the underlying Lévy subordinator is in the normal domain of attraction of a stable distribution with index of stability $α$ then, after certain logarithmic centering and scaling, the upper order statistics converge in distribution to a stable distribution if $α>1$ or a simple transformation of it if $α\leq1$. Our result is especially useful in network reliability and systemic risk, when modeling the lifetimes of components in a system using the LFMO distribution, as it allows to understand the behavior of systems that rely on its last working components. Our result can also give easily computable confidence intervals for these components, provided that a proper convergence analysis is carried out first.
△ Less
Submitted 21 May, 2019; v1 submitted 14 November, 2018;
originally announced November 2018.
-
Feature Selection based on the Local Lift Dependence Scale
Authors:
Diego Marcondes,
Adilson Simonis,
Junior Barrera
Abstract:
This paper uses a classical approach to feature selection: minimization of a cost function applied on estimated joint distributions. However, the search space in which such minimization is performed is extended. In the original formulation, the search space is the Boolean lattice of features sets (BLFS), while, in the present formulation, it is a collection of Boolean lattices of ordered pairs (fe…
▽ More
This paper uses a classical approach to feature selection: minimization of a cost function applied on estimated joint distributions. However, the search space in which such minimization is performed is extended. In the original formulation, the search space is the Boolean lattice of features sets (BLFS), while, in the present formulation, it is a collection of Boolean lattices of ordered pairs (features, associated value) (CBLOP), indexed by the elements of the BLFS. In this approach, we may not only select the features that are most related to a variable Y, but also select the values of the features that most influence the variable or that are most prone to have a specific value of Y. A local formulation of Shanon's mutual information is applied on a CBLOP to select features, namely, the Local Lift Dependence Scale, an scale for measuring variable dependence in multiple resolutions. The main contribution of this paper is to define and apply this local measure, which permits to analyse local properties of joint distributions that are neglected by the classical Shanon's global measure. The proposed approach is applied to a dataset consisting of student performances on a university entrance exam, as well as on undergraduate courses. The approach is also applied to two datasets of the UCI Machine Learning Repository.
△ Less
Submitted 18 December, 2017; v1 submitted 11 November, 2017;
originally announced November 2017.
-
A decomposition algorithm for computing income taxes with pass-through entities and its application to the Chilean case
Authors:
Javiera Barrera,
Eduardo Moreno,
Sebastian Varas
Abstract:
Income tax systems with pass-through entities transfer a firm's incomes to the shareholders, which are taxed individually. In 2014, a Chilean tax reform introduced this type of entity and changed to an accrual basis that distributes incomes (but not losses) to shareholders. A crucial step for the Chilean taxation authority is to compute the final income of each individual, given the complex networ…
▽ More
Income tax systems with pass-through entities transfer a firm's incomes to the shareholders, which are taxed individually. In 2014, a Chilean tax reform introduced this type of entity and changed to an accrual basis that distributes incomes (but not losses) to shareholders. A crucial step for the Chilean taxation authority is to compute the final income of each individual, given the complex network of corporations and companies, usually including cycles between them. In this paper, we show the mathematical conceptualization and the solution to the problem, proving that there is only one way to distribute incomes to taxpayers. Using the theory of absorbing Markov chains, we define a mathematical model for computing the taxable incomes of each taxpayer, and we propose a decomposition algorithm for this problem. This allows us to compute the solution accurately and with the efficient use of computational resources. Finally, we present some characteristics of the Chilean taxpayers' network and computational results of the algorithm using this network.
△ Less
Submitted 13 September, 2016;
originally announced November 2016.
-
The U-curve optimization problem: improvements on the original algorithm and time complexity analysis
Authors:
Marcelo S. Reis,
Carlos E. Ferreira,
Junior Barrera
Abstract:
The U-curve optimization problem is characterized by a decomposable in U-shaped curves cost function over the chains of a Boolean lattice. This problem can be applied to model the classical feature selection problem in Machine Learning. Recently, the U-Curve algorithm was proposed to give optimal solutions to the U-curve problem. In this article, we point out that the U-Curve algorithm is in fact…
▽ More
The U-curve optimization problem is characterized by a decomposable in U-shaped curves cost function over the chains of a Boolean lattice. This problem can be applied to model the classical feature selection problem in Machine Learning. Recently, the U-Curve algorithm was proposed to give optimal solutions to the U-curve problem. In this article, we point out that the U-Curve algorithm is in fact suboptimal, and introduce the U-Curve-Search (UCS) algorithm, which is actually optimal. We also present the results of optimal and suboptimal experiments, in which UCS is compared with the UBB optimal branch-and-bound algorithm and the SFFS heuristic, respectively. We show that, in both experiments, $\proc{UCS}$ had a better performance than its competitor. Finally, we analyze the obtained results and point out improvements on UCS that might enhance the performance of this algorithm.
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Bounds for left and right window cutoffs
Authors:
Javiera Barrera,
Bernard Ycart
Abstract:
The location and width of the time window in which a sequence of processes converges to equilibrum are given under conditions of exponential convergence. The location depends on the side: the left-window and right window cutoffs may have different locations. Bounds on the distance to equilibrium are given for both sides. Examples prove that the bounds are tight.
The location and width of the time window in which a sequence of processes converges to equilibrum are given under conditions of exponential convergence. The location depends on the side: the left-window and right window cutoffs may have different locations. Bounds on the distance to equilibrium are given for both sides. Examples prove that the bounds are tight.
△ Less
Submitted 2 October, 2013;
originally announced October 2013.
-
Joint Access Point Selection and Power Allocation for Uplink Wireless Networks
Authors:
Mingyi Hong,
Alfredo Garcia,
Jorge Barrera,
Stephen G. Wilson
Abstract:
We consider the distributed uplink resource allocation problem in a multi-carrier wireless network with multiple access points (APs). Each mobile user can optimize its own transmission rate by selecting a suitable AP and by controlling its transmit power. Our objective is to devise suitable algorithms by which mobile users can jointly perform these tasks in a distributed manner. Our approach relie…
▽ More
We consider the distributed uplink resource allocation problem in a multi-carrier wireless network with multiple access points (APs). Each mobile user can optimize its own transmission rate by selecting a suitable AP and by controlling its transmit power. Our objective is to devise suitable algorithms by which mobile users can jointly perform these tasks in a distributed manner. Our approach relies on a game theoretic formulation of the joint power control and AP selection problem. In the proposed game, each user is a player with an associated strategy containing a discrete variable (the AP selection decision) and a continuous vector (the power allocation among multiple channels). We provide characterizations of the Nash Equilibrium of the proposed game, and present a set of novel algorithms that allow the users to efficiently optimize their rates. Finally, we study the properties of the proposed algorithms as well as their performance via extensive simulations.
△ Less
Submitted 18 July, 2012;
originally announced July 2012.
-
An iterative feature selection method for GRNs inference by exploring topological properties
Authors:
Fabrício Martins Lopes,
David C. Martins-Jr,
Junior Barrera,
Roberto M. Cesar-Jr
Abstract:
An important problem in bioinformatics is the inference of gene regulatory networks (GRN) from temporal expression profiles. In general, the main limitations faced by GRN inference methods is the small number of samples with huge dimensionalities and the noisy nature of the expression measurements. In face of these limitations, alternatives are needed to get better accuracy on the GRNs inference p…
▽ More
An important problem in bioinformatics is the inference of gene regulatory networks (GRN) from temporal expression profiles. In general, the main limitations faced by GRN inference methods is the small number of samples with huge dimensionalities and the noisy nature of the expression measurements. In face of these limitations, alternatives are needed to get better accuracy on the GRNs inference problem. This work addresses this problem by presenting an alternative feature selection method that applies prior knowledge on its search strategy, called SFFS-BA. The proposed search strategy is based on the Sequential Floating Forward Selection (SFFS) algorithm, with the inclusion of a scale-free (Barabási-Albert) topology information in order to guide the search process to improve inference. The proposed algorithm explores the scale-free property by pruning the search space and using a power law as a weight for reducing it. In this way, the search space traversed by the SFFS-BA method combines a breadth-first search when the number of combinations is small (<k> <= 2) with a depth-first search when the number of combinations becomes explosive (<k> >= 3), being guided by the scale-free prior information. Experimental results show that the SFFS-BA provides a better inference similarities than SFS and SFFS, kee** the robustness of the SFS and SFFS methods, thus presenting very good results.
△ Less
Submitted 25 July, 2011;
originally announced July 2011.
-
Distributed Uplink Resource Allocation in Cognitive Radio Networks -- Part II: Equilibria and Algorithms for Joint Access Point Selection and Power Allocation
Authors:
Mingyi Hong,
Alfredo Garcia,
Jorge Barrera
Abstract:
In the first part of this paper, we have studied solely the spectrum sharing aspect of the above problem, and proposed algorithms for the CUs in the single AP network to efficiently share the spectrum. In this second part of the paper, we build upon our previous understanding of the single AP network, and formulate the joint spectrum decision and spectrum sharing problem in a multiple AP network i…
▽ More
In the first part of this paper, we have studied solely the spectrum sharing aspect of the above problem, and proposed algorithms for the CUs in the single AP network to efficiently share the spectrum. In this second part of the paper, we build upon our previous understanding of the single AP network, and formulate the joint spectrum decision and spectrum sharing problem in a multiple AP network into a non-cooperative game, in which the feasible strategy of a player contains a discrete variable (the AP/spectrum decision) and a continuous vector (the power allocation among multiple channels). The structure of the game is hence very different from most non-cooperative spectrum management game proposed in the literature. We provide characterization of the Nash Equilibrium (NE) of this game, and present a set of novel algorithms that allow the CUs to distributively and efficiently select the suitable AP and share the channels with other CUs. Finally, we study the properties of the proposed algorithms as well as their performance via extensive simulations.
△ Less
Submitted 10 February, 2011; v1 submitted 9 February, 2011;
originally announced February 2011.
-
Abrupt Convergence and Escape Behavior for Birth and Death Chains
Authors:
Javiera Barrera,
Olivier Bertoncini,
Roberto Fernández
Abstract:
We link two phenomena concerning the asymptotical behavior of stochastic processes: (i) abrupt convergence or cut-off phenomenon, and (ii) the escape behavior usually associated to exit from metastability. The former is characterized by convergence at asymptotically deterministic times, while the convergence times for the latter are exponentially distributed. We compare and study both phenomena…
▽ More
We link two phenomena concerning the asymptotical behavior of stochastic processes: (i) abrupt convergence or cut-off phenomenon, and (ii) the escape behavior usually associated to exit from metastability. The former is characterized by convergence at asymptotically deterministic times, while the convergence times for the latter are exponentially distributed. We compare and study both phenomena for discrete-time birth-and-death chains on Z with drift towards zero. In particular, this includes energy-driven evolutions with energy functions in the form of a single well. Under suitable drift hypotheses, we show that there is both an abrupt convergence towards zero and escape behavior in the other direction. Furthermore, as the evolutions are reversible, the law of the final escape trajectory coincides with the time reverse of the law of cut-off paths. Thus, for evolutions defined by one-dimensional energy wells with sufficiently steep walls, cut-off and escape behavior are related by time inversion.
△ Less
Submitted 10 March, 2009;
originally announced March 2009.
-
A branch-and-bound feature selection algorithm for U-shaped cost functions
Authors:
Marcelo Ris,
Junior Barrera,
David C. Martins Jr
Abstract:
This paper presents the formulation of a combinatorial optimization problem with the following characteristics: i.the search space is the power set of a finite set structured as a Boolean lattice; ii.the cost function forms a U-shaped curve when applied to any lattice chain. This formulation applies for feature selection in the context of pattern recognition. The known approaches for this proble…
▽ More
This paper presents the formulation of a combinatorial optimization problem with the following characteristics: i.the search space is the power set of a finite set structured as a Boolean lattice; ii.the cost function forms a U-shaped curve when applied to any lattice chain. This formulation applies for feature selection in the context of pattern recognition. The known approaches for this problem are branch-and-bound algorithms and heuristics, that explore partially the search space. Branch-and-bound algorithms are equivalent to the full search, while heuristics are not. This paper presents a branch-and-bound algorithm that differs from the others known by exploring the lattice structure and the U-shaped chain curves of the search space. The main contribution of this paper is the architecture of this algorithm that is based on the representation and exploration of the search space by new lattice properties proven here. Several experiments, with well known public data, indicate the superiority of the proposed method to SFFS, which is a popular heuristic that gives good results in very short computational time. In all experiments, the proposed method got better or equal results in similar or even smaller computational time.
△ Less
Submitted 30 October, 2008;
originally announced October 2008.
-
The limiting move-to-front search-cost in law of large numbers asymptotic regimes
Authors:
Javiera Barrera,
Joaquín Fontbona
Abstract:
We explicitly compute the limiting transient distribution of the search-cost in the move-to-front Markov chain when the number of objects tends to infinity, for general families of deterministic or random request rates. Our techniques are based on a "law of large numbers for random partitions," a scaling limit that allows us to exactly compute limiting expectation of empirical functionals of the r…
▽ More
We explicitly compute the limiting transient distribution of the search-cost in the move-to-front Markov chain when the number of objects tends to infinity, for general families of deterministic or random request rates. Our techniques are based on a "law of large numbers for random partitions," a scaling limit that allows us to exactly compute limiting expectation of empirical functionals of the request probabilities of objects. In particular, we show that the limiting search-cost can be split at an explicit deterministic threshold into one random variable in equilibrium, and a second one related to the initial ordering of the list. Our results ensure the stability of the limiting search-cost under general perturbations of the request probabilities. We provide the description of the limiting transient behavior in several examples where only the stationary regime is known, and discuss the range of validity of our scaling limit.
△ Less
Submitted 28 September, 2010; v1 submitted 28 November, 2006;
originally announced November 2006.
-
The Weakness of the Scientific Assessments: A Praise of Silence
Authors:
Jose Carlos Bermejo Barrera
Abstract:
This article aims to show the weakness of the current scientific assessments, based on a set of contradictory pseudo-axioms. The six pseudo-axioms are deeply analysed. From the analysis are derived several conclusions. In spite of the serious efforts of the scientists to establish a ranking of honors in order to get funds or to control the academic and higher education institutions, the Science…
▽ More
This article aims to show the weakness of the current scientific assessments, based on a set of contradictory pseudo-axioms. The six pseudo-axioms are deeply analysed. From the analysis are derived several conclusions. In spite of the serious efforts of the scientists to establish a ranking of honors in order to get funds or to control the academic and higher education institutions, the Science doesn't exists in itself, but different kinds of knowledge. Therefore, the scientists don't control the Science; they are mere experts in a field of knowledge, which could be expressed in many valid ways. This variety determines the existence of many models of academic curricula, based on heterogeneous ways of valuation that change along the History.
△ Less
Submitted 24 February, 2006;
originally announced February 2006.
-
Limiting search cost distribution for the move-to-front rule with random request probabilities
Authors:
Javiera Barrera,
Thierry Huillet,
Christian Paroissin
Abstract:
Consider a list of $n$ files whose popularities are random. These files are updated according to the move-to-front rule and we consider the induced Markov chain at equilibrium. We give the exact limiting distribution of the search-cost per item as $n$ tends to infinity. Some examples are supplied.
Consider a list of $n$ files whose popularities are random. These files are updated according to the move-to-front rule and we consider the induced Markov chain at equilibrium. We give the exact limiting distribution of the search-cost per item as $n$ tends to infinity. Some examples are supplied.
△ Less
Submitted 17 June, 2005;
originally announced June 2005.
-
The Design and Architecture of the Microsoft Cluster Service -- A Practical Approach to High-Availability and Scalability
Authors:
Werner Vogels,
Dan Dumitriu,
Ken Birman,
Rod Gamache,
Mike Massa,
Rob Short,
John Vert,
Joe Barrera
Abstract:
Microsoft Cluster Service (MSCS) extends the Win-dows NT operating system to support high-availability services. The goal is to offer an execution environment where off-the-shelf server applications can continue to operate, even in the presence of node failures. Later ver-sions of MSCS will provide scalability via a node and application management system that allows applications to scale to hund…
▽ More
Microsoft Cluster Service (MSCS) extends the Win-dows NT operating system to support high-availability services. The goal is to offer an execution environment where off-the-shelf server applications can continue to operate, even in the presence of node failures. Later ver-sions of MSCS will provide scalability via a node and application management system that allows applications to scale to hundreds of nodes. This paper provides a de-tailed description of the MSCS architecture and the de-sign decisions that have driven the implementation of the service. The paper also describes how some major appli-cations use the MSCS features, and describes features added to make it easier to implement and manage fault-tolerant applications on MSCS.
△ Less
Submitted 2 September, 1998;
originally announced September 1998.