-
Phase transitions in debt recycling
Authors:
Sabrina Aufiero,
Preben Forer,
Pierpaolo Vivo,
Fabio Caccioli,
Silvia Bartolucci
Abstract:
Debt recycling is an aggressive equity extraction strategy that potentially permits faster repayment of a mortgage. While equity progressively builds up as the mortgage is repaid monthly, mortgage holders may obtain another loan they could use to invest on a risky asset. The wealth produced by a successful investment is then used to repay the mortgage faster. The strategy is riskier than a standar…
▽ More
Debt recycling is an aggressive equity extraction strategy that potentially permits faster repayment of a mortgage. While equity progressively builds up as the mortgage is repaid monthly, mortgage holders may obtain another loan they could use to invest on a risky asset. The wealth produced by a successful investment is then used to repay the mortgage faster. The strategy is riskier than a standard repayment plan since fluctuations in the house market and investment's volatility may also lead to a fast default, as both the mortgage and the liquidity loan are secured against the same good. The general conditions of the mortgage holder and the outside market under which debt recycling may be recommended or discouraged have not been fully investigated. In this paper, to evaluate the effectiveness of traditional monthly mortgage repayment versus debt recycling strategies, we build a dynamical model of debt recycling and study the time evolution of equity and mortgage balance as a function of loan-to-value ratio, house market performance, and return of the risky investment. We find that the model has a rich behavior as a function of its main parameters, showing strongly and weakly successful phases - where the mortgage is eventually repaid faster and slower than the standard monthly repayment strategy, respectively - a default phase where the equity locked in the house vanishes before the mortgage is repaid, signalling a failure of the debt recycling strategy, and a permanent re-mortgaging phase - where further investment funds from the lender are continuously secured, but the mortgage is never fully repaid. The strategy's effectiveness is found to be highly sensitive to the initial mortgage-to-equity ratio, the monthly amount of scheduled repayments, and the economic parameters at the outset. The analytical results are corroborated with numerical simulations with excellent agreement.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
HLOB -- Information Persistence and Structure in Limit Order Books
Authors:
Antonio Briola,
Silvia Bartolucci,
Tomaso Aste
Abstract:
We introduce a novel large-scale deep learning model for Limit Order Book mid-price changes forecasting, and we name it `HLOB'. This architecture (i) exploits the information encoded by an Information Filtering Network, namely the Triangulated Maximally Filtered Graph, to unveil deeper and non-trivial dependency structures among volume levels; and (ii) guarantees deterministic design choices to ha…
▽ More
We introduce a novel large-scale deep learning model for Limit Order Book mid-price changes forecasting, and we name it `HLOB'. This architecture (i) exploits the information encoded by an Information Filtering Network, namely the Triangulated Maximally Filtered Graph, to unveil deeper and non-trivial dependency structures among volume levels; and (ii) guarantees deterministic design choices to handle the complexity of the underlying system by drawing inspiration from the groundbreaking class of Homological Convolutional Neural Networks. We test our model against 9 state-of-the-art deep learning alternatives on 3 real-world Limit Order Book datasets, each including 15 stocks traded on the NASDAQ exchange, and we systematically characterize the scenarios where HLOB outperforms state-of-the-art architectures. Our approach sheds new light on the spatial distribution of information in Limit Order Books and on its degradation over increasing prediction horizons, narrowing the gap between microstructural modeling and deep learning-based forecasting in high-frequency financial markets.
△ Less
Submitted 4 June, 2024; v1 submitted 29 May, 2024;
originally announced May 2024.
-
Deep Limit Order Book Forecasting
Authors:
Antonio Briola,
Silvia Bartolucci,
Tomaso Aste
Abstract:
We exploit cutting-edge deep learning methodologies to explore the predictability of high-frequency Limit Order Book mid-price changes for a heterogeneous set of stocks traded on the NASDAQ exchange. In so doing, we release `LOBFrame', an open-source code base to efficiently process large-scale Limit Order Book data and quantitatively assess state-of-the-art deep learning models' forecasting capab…
▽ More
We exploit cutting-edge deep learning methodologies to explore the predictability of high-frequency Limit Order Book mid-price changes for a heterogeneous set of stocks traded on the NASDAQ exchange. In so doing, we release `LOBFrame', an open-source code base to efficiently process large-scale Limit Order Book data and quantitatively assess state-of-the-art deep learning models' forecasting capabilities. Our results are twofold. We demonstrate that the stocks' microstructural characteristics influence the efficacy of deep learning methods and that their high forecasting power does not necessarily correspond to actionable trading signals. We argue that traditional machine learning metrics fail to adequately assess the quality of forecasts in the Limit Order Book context. As an alternative, we propose an innovative operational framework that evaluates predictions' practicality by focusing on the probability of accurately forecasting complete transactions. This work offers academics and practitioners an avenue to make informed and robust decisions on the application of deep learning techniques, their scope and limitations, effectively exploiting emergent statistical properties of the Limit Order Book.
△ Less
Submitted 4 June, 2024; v1 submitted 14 March, 2024;
originally announced March 2024.
-
Distribution of centrality measures on undirected random networks via cavity method
Authors:
Silvia Bartolucci,
Francesco Caravelli,
Fabio Caccioli,
Pierpaolo Vivo
Abstract:
The Katz centrality of a node in a complex network is a measure of the node's importance as far as the flow of information across the network is concerned. For ensembles of locally tree-like and undirected random graphs, this observable is a random variable. Its full probability distribution is of interest but difficult to handle analytically because of its "global" character and its definition in…
▽ More
The Katz centrality of a node in a complex network is a measure of the node's importance as far as the flow of information across the network is concerned. For ensembles of locally tree-like and undirected random graphs, this observable is a random variable. Its full probability distribution is of interest but difficult to handle analytically because of its "global" character and its definition in terms of a matrix inverse. Leveraging a fast Gaussian Belief Propagation-cavity algorithm to solve linear systems on a tree-like structure, we show that (i) the Katz centrality of a single instance can be computed recursively in a very fast way, and (ii) the probability $P(K)$ that a random node in the ensemble of undirected random graphs has centrality $K$ satisfies a set of recursive distributional equations, which can be analytically characterized and efficiently solved using a population dynamics algorithm. We test our solution on ensembles of Erdős-Rényi and scale-free networks in the locally tree-like regime, with excellent agreement. The distributions display a crossover between multimodality and unimodality as the mean degree increases, where distinct peaks correspond to the contribution to the centrality coming from nodes of different degrees. We also provide an approximate formula based on a rank-$1$ projection that works well if the network is not too sparse, and we argue that an extension of our method could be efficiently extended to tackle analytical distributions of other centrality measures such as PageRank for directed networks in a transparent and user-friendly way.
△ Less
Submitted 16 February, 2024;
originally announced February 2024.
-
DApps Ecosystems: Map** the Network Structure of Smart Contract Interactions
Authors:
Sabrina Aufiero,
Giacomo Ibba,
Silvia Bartolucci,
Giuseppe Destefanis,
Rumyana Neykova,
Marco Ortu
Abstract:
In recent years, decentralized applications (dApps) built on blockchain platforms such as Ethereum and coded in languages such as Solidity, have gained attention for their potential to disrupt traditional centralized systems. Despite their rapid adoption, limited research has been conducted to understand the underlying code structure of these applications. In particular, each dApp is composed of m…
▽ More
In recent years, decentralized applications (dApps) built on blockchain platforms such as Ethereum and coded in languages such as Solidity, have gained attention for their potential to disrupt traditional centralized systems. Despite their rapid adoption, limited research has been conducted to understand the underlying code structure of these applications. In particular, each dApp is composed of multiple smart contracts, each containing a number of functions that can be called to trigger a specific event, e.g., a token transfer. In this paper, we reconstruct and analyse the network of contracts and functions calls within the dApp, which is helpful to unveil vulnerabilities that can be exploited by malicious attackers. We show how decentralization is architecturally implemented, identifying common development patterns and anomalies that could influence the system's robustness and efficiency. We find a consistent network structure characterized by modular, self-sufficient contracts and a complex web of function interactions, indicating common coding practices across the blockchain community. Critically, a small number of key functions within each dApp play a pivotal role in maintaining network connectivity, making them potential targets for cyber attacks and highlighting the need for robust security measures.
△ Less
Submitted 3 January, 2024;
originally announced January 2024.
-
MindTheDApp: A Toolchain for Complex Network-Driven Structural Analysis of Ethereum-based Decentralised Applications
Authors:
Giacomo Ibba,
Sabrina Aufiero,
Silvia Bartolucci,
Rumyana Neykova,
Marco Ortu,
Roberto Tonelli,
Giuseppe Destefanis
Abstract:
This paper presents MindTheDApp, a toolchain designed specifically for the structural analysis of Ethereum-based Decentralized Applications (DApps), with a distinct focus on a complex network-driven approach. Unlike existing tools, our toolchain combines the power of ANTLR4 and Abstract Syntax Tree (AST) traversal techniques to transform the architecture and interactions within smart contracts int…
▽ More
This paper presents MindTheDApp, a toolchain designed specifically for the structural analysis of Ethereum-based Decentralized Applications (DApps), with a distinct focus on a complex network-driven approach. Unlike existing tools, our toolchain combines the power of ANTLR4 and Abstract Syntax Tree (AST) traversal techniques to transform the architecture and interactions within smart contracts into a specialized bipartite graph. This enables advanced network analytics to highlight operational efficiencies within the DApp's architecture.
The bipartite graph generated by the proposed tool comprises two sets of nodes: one representing smart contracts, interfaces, and libraries, and the other including functions, events, and modifiers. Edges in the graph connect functions to smart contracts they interact with, offering a granular view of interdependencies and execution flow within the DApp. This network-centric approach allows researchers and practitioners to apply complex network theory in understanding the robustness, adaptability, and intricacies of decentralized systems.
Our work contributes to the enhancement of security in smart contracts by allowing the visualisation of the network, and it provides a deep understanding of the architecture and operational logic within DApps. Given the growing importance of smart contracts in the blockchain ecosystem and the emerging application of complex network theory in technology, our toolchain offers a timely contribution to both academic research and practical applications in the field of blockchain technology.
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
Homological Convolutional Neural Networks
Authors:
Antonio Briola,
Yuanrong Wang,
Silvia Bartolucci,
Tomaso Aste
Abstract:
Deep learning methods have demonstrated outstanding performances on classification and regression tasks on homogeneous data types (e.g., image, audio, and text data). However, tabular data still pose a challenge, with classic machine learning approaches being often computationally cheaper and equally effective than increasingly complex deep learning architectures. The challenge arises from the fac…
▽ More
Deep learning methods have demonstrated outstanding performances on classification and regression tasks on homogeneous data types (e.g., image, audio, and text data). However, tabular data still pose a challenge, with classic machine learning approaches being often computationally cheaper and equally effective than increasingly complex deep learning architectures. The challenge arises from the fact that, in tabular data, the correlation among features is weaker than the one from spatial or semantic relationships in images or natural language, and the dependency structures need to be modeled without any prior information. In this work, we propose a novel deep learning architecture that exploits the data structural organization through topologically constrained network representations to gain relational information from sparse tabular inputs. The resulting model leverages the power of convolution and is centered on a limited number of concepts from network topology to guarantee: (i) a data-centric and deterministic building pipeline; (ii) a high level of interpretability over the inference process; and (iii) an adequate room for scalability. We test our model on 18 benchmark datasets against 5 classic machine learning and 3 deep learning models, demonstrating that our approach reaches state-of-the-art performances on these challenging datasets. The code to reproduce all our experiments is provided at https://github.com/FinancialComputingUCL/HomologicalCNN.
△ Less
Submitted 14 November, 2023; v1 submitted 26 August, 2023;
originally announced August 2023.
-
A Preliminary Analysis on the Code Generation Capabilities of GPT-3.5 and Bard AI Models for Java Functions
Authors:
Giuseppe Destefanis,
Silvia Bartolucci,
Marco Ortu
Abstract:
This paper evaluates the capability of two state-of-the-art artificial intelligence (AI) models, GPT-3.5 and Bard, in generating Java code given a function description. We sourced the descriptions from CodingBat.com, a popular online platform that provides practice problems to learn programming. We compared the Java code generated by both models based on correctness, verified through the platform'…
▽ More
This paper evaluates the capability of two state-of-the-art artificial intelligence (AI) models, GPT-3.5 and Bard, in generating Java code given a function description. We sourced the descriptions from CodingBat.com, a popular online platform that provides practice problems to learn programming. We compared the Java code generated by both models based on correctness, verified through the platform's own test cases. The results indicate clear differences in the capabilities of the two models. GPT-3.5 demonstrated superior performance, generating correct code for approximately 90.6% of the function descriptions, whereas Bard produced correct code for 53.1% of the functions. While both models exhibited strengths and weaknesses, these findings suggest potential avenues for the development and refinement of more advanced AI-assisted code generation tools. The study underlines the potential of AI in automating and supporting aspects of software development, although further research is required to fully realize this potential.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Correlation between upstreamness and downstreamness in random global value chains
Authors:
Silvia Bartolucci,
Fabio Caccioli,
Francesco Caravelli,
Pierpaolo Vivo
Abstract:
This paper is concerned with upstreamness and downstreamness of industries and countries in global value chains. Upstreamness and downstreamness measure respectively the average distance of an industrial sector from final consumption and from primary inputs, and they are computed from based on the most used global Input-Output tables databases, e.g., the World Input-Output Database (WIOD). Recentl…
▽ More
This paper is concerned with upstreamness and downstreamness of industries and countries in global value chains. Upstreamness and downstreamness measure respectively the average distance of an industrial sector from final consumption and from primary inputs, and they are computed from based on the most used global Input-Output tables databases, e.g., the World Input-Output Database (WIOD). Recently, Antràs and Chor reported a puzzling and counter-intuitive finding in data from the period 1995-2011, namely that (at country level) upstreamness appears to be positively correlated with downstreamness, with a correlation slope close to $+1$. This effect is stable over time and across countries, and it has been confirmed and validated by later analyses. We first analyze a simple model of random Input/Output tables, and we show that, under minimal and realistic structural assumptions, there is a natural positive correlation emerging between upstreamness and downstreamness of the same industrial sector/country, with correlation slope equal to $+1$. This effect is robust against changes in the randomness of the entries of the I/O table and different aggregation protocols. Secondly, we perform experiments by randomly reshuffling the entries of the empirical I/O table where these puzzling correlations are detected, in such a way that the global structural constraints are preserved. Again, we find that the upstreamness and downstreamness of the same industrial sector/country are positively correlated with slope close to $+1$, even though the random reshuffling has destroyed any underlying economic information about inter-sectorial connections and trends. Our results strongly suggest that the empirically observed puzzling correlation may rather be a necessary consequence of the few structural constraints that Input/Output tables must meet.
△ Less
Submitted 16 February, 2024; v1 submitted 12 March, 2023;
originally announced March 2023.
-
Cryptocurrency co-investment network: token returns reflect investment patterns
Authors:
Luca Mungo,
Silvia Bartolucci,
Laura Alessandretti
Abstract:
Since the introduction of Bitcoin in 2009, the dramatic and unsteady evolution of the cryptocurrency market has also been driven by large investments by traditional and cryptocurrency-focused hedge funds. Notwithstanding their critical role, our understanding of the relationship between institutional investments and the evolution of the cryptocurrency market has remained limited, also due to the l…
▽ More
Since the introduction of Bitcoin in 2009, the dramatic and unsteady evolution of the cryptocurrency market has also been driven by large investments by traditional and cryptocurrency-focused hedge funds. Notwithstanding their critical role, our understanding of the relationship between institutional investments and the evolution of the cryptocurrency market has remained limited, also due to the lack of comprehensive data describing investments over time. In this study, we present a quantitative study of cryptocurrency institutional investments based on a dataset collected for 1324 currencies in the period between 2014 and 2022 from Crunchbase, one of the largest platforms gathering business information. We show that the evolution of the cryptocurrency market capitalization is highly correlated with the size of institutional investments, thus confirming their important role. Further, we find that the market is dominated by the presence of a group of prominent investors who tend to specialise by focusing on particular technologies. Finally, studying the co-investment network of currencies that share common investors, we show that assets with shared investors tend to be characterized by similar market behavior. Our work sheds light on the role played by institutional investors and provides a basis for further research on their influence in the cryptocurrency ecosystem.
△ Less
Submitted 10 January, 2023; v1 submitted 5 January, 2023;
originally announced January 2023.
-
Switch networks for photonic fusion-based quantum computing
Authors:
Sara Bartolucci,
Patrick Birchall,
Damien Bonneau,
Hugo Cable,
Mercedes Gimeno-Segovia,
Konrad Kieling,
Naomi Nickerson,
Terry Rudolph,
Chris Sparrow
Abstract:
Fusion-based quantum computing (FBQC) offers a powerful approach to building a fault-tolerant universal quantum computer using photonic components -- single-photon sources, linear-optical circuits, single-photon detectors, and optical switching with feedforward control. Both individual optical switches and sophisticated switch networks are needed where it is necessary to perform operations conditi…
▽ More
Fusion-based quantum computing (FBQC) offers a powerful approach to building a fault-tolerant universal quantum computer using photonic components -- single-photon sources, linear-optical circuits, single-photon detectors, and optical switching with feedforward control. Both individual optical switches and sophisticated switch networks are needed where it is necessary to perform operations conditionally, using feedforward of previous photon-detection outcomes, within the lifetime of remaining photons. Most visibly, feedforward switching is required for fault-tolerant operations at the level of logical qubits, which are needed in turn for useful quantum algorithms. However, switch networks are also required for multiplexing ("muxing") stages that are needed for generating specific small entangled resource states, where it is used to boost the probabilities for allocating quantum states to fusion gates and other operations -- a task which dominates the footprint of photonic FBQC. Despite their importance, limited attention has been paid to exploring possible designs of switch networks in this setting. Here we present a wide range of new techniques and schemes which enable major improvements in terms of muxing efficiency and reductions in hardware requirements. Since the use of photonic switching heavily impacts qubit losses and errors, our schemes are constructed with low switch depth. They also exploit specific features of linear-optical circuits which are commonly used to generate entanglement in proposed quantum computing and quantum network schemes.
△ Less
Submitted 28 September, 2021;
originally announced September 2021.
-
Creation of Entangled Photonic States Using Linear Optics
Authors:
Sara Bartolucci,
Patrick M. Birchall,
Mercedes Gimeno-Segovia,
Eric Johnston,
Konrad Kieling,
Mihir Pant,
Terry Rudolph,
Jake Smith,
Chris Sparrow,
Mihai D. Vidrighin
Abstract:
Using only linear optical elements, the creation of dual-rail photonic entangled states is inherently probabilistic. Known entanglement generation schemes have low success probabilities, requiring large-scale multiplexing to achieve near-deterministic operation of quantum information processing protocols. In this paper, we introduce multiple techniques and methods to generate photonic entangled st…
▽ More
Using only linear optical elements, the creation of dual-rail photonic entangled states is inherently probabilistic. Known entanglement generation schemes have low success probabilities, requiring large-scale multiplexing to achieve near-deterministic operation of quantum information processing protocols. In this paper, we introduce multiple techniques and methods to generate photonic entangled states with high probability, which have the potential to reduce the footprint of Linear Optical Quantum Computing (LOQC) architectures drastically. Most notably, we are showing how to improve Bell state preparation from four single photons to up to p=2/3, boost Type-I fusion to 75% with a dual-rail Bell state ancilla and improve Type-II fusion beyond the limits of Bell state discrimination.
△ Less
Submitted 25 June, 2021;
originally announced June 2021.
-
"Spectrally gapped" random walks on networks: a Mean First Passage Time formula
Authors:
Silvia Bartolucci,
Fabio Caccioli,
Francesco Caravelli,
Pierpaolo Vivo
Abstract:
We derive an approximate but explicit formula for the Mean First Passage Time of a random walker between a source and a target node of a directed and weighted network. The formula does not require any matrix inversion, and it takes as only input the transition probabilities into the target node. It is derived from the calculation of the average resolvent of a deformed ensemble of random sub-stocha…
▽ More
We derive an approximate but explicit formula for the Mean First Passage Time of a random walker between a source and a target node of a directed and weighted network. The formula does not require any matrix inversion, and it takes as only input the transition probabilities into the target node. It is derived from the calculation of the average resolvent of a deformed ensemble of random sub-stochastic matrices $H=\langle H\rangle +δH$, with $\langle H\rangle$ rank-$1$ and non-negative. The accuracy of the formula depends on the spectral gap of the reduced transition matrix, and it is tested numerically on several instances of (weighted) networks away from the high sparsity regime, with an excellent agreement.
△ Less
Submitted 17 August, 2021; v1 submitted 4 June, 2021;
originally announced June 2021.
-
On Technical Trading and Social Media Indicators in Cryptocurrencies' Price Classification Through Deep Learning
Authors:
Marco Ortu,
Nicola Uras,
Claudio Conversano,
Giuseppe Destefanis,
Silvia Bartolucci
Abstract:
This work aims to analyse the predictability of price movements of cryptocurrencies on both hourly and daily data observed from January 2017 to January 2021, using deep learning algorithms. For our experiments, we used three sets of features: technical, trading and social media indicators, considering a restricted model of only technical indicators and an unrestricted model with technical, trading…
▽ More
This work aims to analyse the predictability of price movements of cryptocurrencies on both hourly and daily data observed from January 2017 to January 2021, using deep learning algorithms. For our experiments, we used three sets of features: technical, trading and social media indicators, considering a restricted model of only technical indicators and an unrestricted model with technical, trading and social media indicators. We verified whether the consideration of trading and social media indicators, along with the classic technical variables (such as price's returns), leads to a significative improvement in the prediction of cryptocurrencies price's changes. We conducted the study on the two highest cryptocurrencies in volume and value (at the time of the study): Bitcoin and Ethereum. We implemented four different machine learning algorithms typically used in time-series classification problems: Multi Layers Perceptron (MLP), Convolutional Neural Network (CNN), Long Short Term Memory (LSTM) neural network and Attention Long Short Term Memory (ALSTM). We devised the experiments using the advanced bootstrap technique to consider the variance problem on test samples, which allowed us to evaluate a more reliable estimate of the model's performance. Furthermore, the Grid Search technique was used to find the best hyperparameters values for each implemented algorithm. The study shows that, based on the hourly frequency results, the unrestricted model outperforms the restricted one. The addition of the trading indicators to the classic technical indicators improves the accuracy of Bitcoin and Ethereum price's changes prediction, with an increase of accuracy from a range of 51-55% for the restricted model, to 67-84% for the unrestricted model.
△ Less
Submitted 17 February, 2021; v1 submitted 13 February, 2021;
originally announced February 2021.
-
Fusion-based quantum computation
Authors:
Sara Bartolucci,
Patrick Birchall,
Hector Bombin,
Hugo Cable,
Chris Dawson,
Mercedes Gimeno-Segovia,
Eric Johnston,
Konrad Kieling,
Naomi Nickerson,
Mihir Pant,
Fernando Pastawski,
Terry Rudolph,
Chris Sparrow
Abstract:
We introduce fusion-based quantum computing (FBQC) - a model of universal quantum computation in which entangling measurements, called fusions, are performed on the qubits of small constant-sized entangled resource states. We introduce a stabilizer formalism for analyzing fault tolerance and computation in these schemes. This framework naturally captures the error structure that arises in certain…
▽ More
We introduce fusion-based quantum computing (FBQC) - a model of universal quantum computation in which entangling measurements, called fusions, are performed on the qubits of small constant-sized entangled resource states. We introduce a stabilizer formalism for analyzing fault tolerance and computation in these schemes. This framework naturally captures the error structure that arises in certain physical systems for quantum computing, such as photonics. FBQC can offer significant architectural simplifications, enabling hardware made up of many identical modules, requiring an extremely low depth of operations on each physical qubit and reducing classical processing requirements. We present two pedagogical examples of fault-tolerant schemes constructed in this framework and numerically evaluate their threshold under a hardware agnostic fusion error model including both erasure and Pauli error. We also study an error model of linear optical quantum computing with probabilistic fusion and photon loss. In FBQC the non-determinism of fusion is directly dealt with by the quantum error correction protocol, along with other errors. We find that tailoring the fault-tolerance framework to the physical system allows the scheme to have a higher threshold than schemes reported in literature. We present a ballistic scheme which can tolerate a 10.4% probability of suffering photon loss in each fusion.
△ Less
Submitted 22 January, 2021;
originally announced January 2021.
-
Upstreamness and downstreamness in input-output analysis from local and aggregate information
Authors:
Silvia Bartolucci,
Fabio Caccioli,
Francesco Caravelli,
Pierpaolo Vivo
Abstract:
Ranking sectors and countries within global value chains is of paramount importance to estimate risks and forecast growth in large economies. However, this task is often non-trivial due to the lack of complete and accurate information on the flows of money and goods between sectors and countries, which are encoded in Input-Output (I-O) tables. In this work, we show that an accurate estimation of t…
▽ More
Ranking sectors and countries within global value chains is of paramount importance to estimate risks and forecast growth in large economies. However, this task is often non-trivial due to the lack of complete and accurate information on the flows of money and goods between sectors and countries, which are encoded in Input-Output (I-O) tables. In this work, we show that an accurate estimation of the role played by sectors and countries in supply chain networks can be achieved without full knowledge of the I-O tables, but only relying on local and aggregate information, e.g., the total intermediate demand per sector. Our method, based on a rank-$1$ approximation to the I-O table, shows consistently good performance in reconstructing rankings (i.e., upstreamness and downstreamness measures for countries and sectors) when tested on empirical data from the World Input-Output Database. Moreover, we connect the accuracy of our approximate framework with the spectral properties of the I-O tables, which ordinarily exhibit relatively large spectral gaps. Our approach provides a fast and analytical tractable framework to rank constituents of a complex economy without the need of matrix inversions and the knowledge of finer intersectorial details.
△ Less
Submitted 6 February, 2024; v1 submitted 14 September, 2020;
originally announced September 2020.
-
Ranking influential nodes in networks from partial information
Authors:
Silvia Bartolucci,
Fabio Caccioli,
Francesco Caravelli,
Pierpaolo Vivo
Abstract:
Many complex systems exhibit a natural hierarchy in which elements can be ranked according to a notion of "influence". While the complete and accurate knowledge of the interactions between constituents is ordinarily required for the computation of nodes' influence, using a low-rank approximation we show that in a variety of contexts local information about the neighborhoods of nodes is enough to r…
▽ More
Many complex systems exhibit a natural hierarchy in which elements can be ranked according to a notion of "influence". While the complete and accurate knowledge of the interactions between constituents is ordinarily required for the computation of nodes' influence, using a low-rank approximation we show that in a variety of contexts local information about the neighborhoods of nodes is enough to reliably estimate how influential they are, without the need to infer or reconstruct the whole map of interactions. Our framework is successful in approximating with high accuracy different incarnations of influence in systems as diverse as the WWW PageRank, trophic levels of ecosystems, upstreamness of industrial sectors in complex economies, and centrality measures of social networks, as long as the underlying network is not exceedingly sparse. We also discuss the implications of this "emerging locality" on the approximate calculation of non-linear network observables.
△ Less
Submitted 8 November, 2022; v1 submitted 14 September, 2020;
originally announced September 2020.
-
A percolation model for the emergence of the Bitcoin Lightning Network
Authors:
Silvia Bartolucci,
Fabio Caccioli,
Pierpaolo Vivo
Abstract:
The Lightning Network is a so-called second-layer technology built on top of the Bitcoin blockchain to provide "off-chain" fast payment channels between users, which means that not all transactions are settled and stored on the main blockchain. In this paper, we model the emergence of the Lightning Network as a (bond) percolation process and we explore how the distributional properties of the volu…
▽ More
The Lightning Network is a so-called second-layer technology built on top of the Bitcoin blockchain to provide "off-chain" fast payment channels between users, which means that not all transactions are settled and stored on the main blockchain. In this paper, we model the emergence of the Lightning Network as a (bond) percolation process and we explore how the distributional properties of the volume and size of transactions per user may impact its feasibility. The agents are all able to reciprocally transfer Bitcoins using the main blockchain and also - if economically convenient - to open a channel on the Lightning Network and transact "off chain". We base our approach on fitness-dependent network models: as in real life, a Lightning channel is opened with a probability that depends on the "fitness" of the concurring nodes, which in turn depends on wealth and volume of transactions. The emergence of a connected component is studied numerically and analytically as a function of the parameters, and the phase transition separating regions in the phase space where the Lightning Network is sustainable or not is elucidated. We characterize the phase diagram determining the minimal volume of transactions that would make the Lightning Network sustainable for a given level of fees or, alternatively, the maximal cost the Lightning ecosystem may impose for a given average volume of transactions. The model includes parameters that could be in principle estimated from publicly available data once the evolution of the Lighting Network will have reached a stationary operable state, and is fairly robust against different choices of the distributions of parameters and fitness kernels.
△ Less
Submitted 7 December, 2019;
originally announced December 2019.
-
A Model of the Optimal Selection of Crypto Assets
Authors:
Silvia Bartolucci,
Andrei Kirilenko
Abstract:
We propose a modelling framework for the optimal selection of crypto assets. Crypto assets differ by two essential features: security (technological) and stability (governance). Investors make choices over crypto assets similarly to how they make choices by using a recommender app: the app presents each investor with a pair of crypto assets with certain security-stability characteristics to be com…
▽ More
We propose a modelling framework for the optimal selection of crypto assets. Crypto assets differ by two essential features: security (technological) and stability (governance). Investors make choices over crypto assets similarly to how they make choices by using a recommender app: the app presents each investor with a pair of crypto assets with certain security-stability characteristics to be compared. Each investor submits its preference for adopting one of the two assets to the app. The app, in turn, provides a recommendation on whether the proposed adoption is sensible given the assets' essential features, information about the adoption choices of all other investors, and expected future economic benefits of adoption. Investors continue making their adoption choices over all pairs of crypto assets until their expected future economic benefits can no longer be improved upon. This constitutes an optimal selection decision. We simulate optimal selection decisions considering the behaviour of different types of investors, driven by their attitudes towards assets' features. We find a variety of possible emergent outcomes for the investments in the crypto-ecosystem and the future adoption of the crypto assets.
△ Less
Submitted 23 June, 2019;
originally announced June 2019.
-
SHARVOT: secret SHARe-based VOTing on the blockchain
Authors:
Silvia Bartolucci,
Pauline Bernat,
Daniel Joseph
Abstract:
Recently, there has been a growing interest in using online technologies to design protocols for secure electronic voting. The main challenges include vote privacy and anonymity, ballot irrevocability and transparency throughout the vote counting process. The introduction of the blockchain as a basis for cryptocurrency protocols, provides for the exploitation of the immutability and transparency p…
▽ More
Recently, there has been a growing interest in using online technologies to design protocols for secure electronic voting. The main challenges include vote privacy and anonymity, ballot irrevocability and transparency throughout the vote counting process. The introduction of the blockchain as a basis for cryptocurrency protocols, provides for the exploitation of the immutability and transparency properties of these distributed ledgers.
In this paper, we discuss possible uses of the blockchain technology to implement a secure and fair voting system. In particular, we introduce a secret share-based voting system on the blockchain, the so-called SHARVOT protocol. Our solution uses Shamir's Secret Sharing to enable on-chain, i.e. within the transactions script, votes submission and winning candidate determination. The protocol is also using a shuffling technique, Circle Shuffle, to de-link voters from their submissions.
△ Less
Submitted 13 March, 2018;
originally announced March 2018.
-
Physical-depth architectural requirements for generating universal photonic cluster states
Authors:
Sam Morley-Short,
Sara Bartolucci,
Mercedes Gimeno-Segovia,
Pete Shadbolt,
Hugo Cable,
Terry Rudolph
Abstract:
Most leading proposals for linear-optical quantum computing (LOQC) use cluster states, which act as a universal resource for measurement-based (one-way) quantum computation (MBQC). In ballistic approaches to LOQC, cluster states are generated passively from small entangled resource states using so-called fusion operations. Results from percolation theory have previously been used to argue that uni…
▽ More
Most leading proposals for linear-optical quantum computing (LOQC) use cluster states, which act as a universal resource for measurement-based (one-way) quantum computation (MBQC). In ballistic approaches to LOQC, cluster states are generated passively from small entangled resource states using so-called fusion operations. Results from percolation theory have previously been used to argue that universal cluster states can be generated in the ballistic approach using schemes which exceed the critical threshold for percolation, but these results consider cluster states with unbounded size. Here we consider how successful percolation can be maintained using a physical architecture with fixed physical depth, assuming that the cluster state is continuously generated and measured, and therefore that only a finite portion of it is visible at any one point in time. We show that universal LOQC can be implemented using a constant-size device with modest physical depth, and that percolation can be exploited using simple pathfinding strategies without the need for high-complexity algorithms.
△ Less
Submitted 16 November, 2017; v1 submitted 22 June, 2017;
originally announced June 2017.
-
The role of idiotypic interactions in the adaptive immune system: a belief-propagation approach
Authors:
Silvia Bartolucci,
Alexander Mozeika,
Alessia Annibale
Abstract:
In this work we use belief-propagation techniques to study the equilibrium behaviour of a minimal model for the immune system comprising interacting T and B clones. We investigate the effect of the so-called idiotypic interactions among complementary B clones on the system's activation. Our result shows that B-B interactions increase the system's resilience to noise, making clonal activation more…
▽ More
In this work we use belief-propagation techniques to study the equilibrium behaviour of a minimal model for the immune system comprising interacting T and B clones. We investigate the effect of the so-called idiotypic interactions among complementary B clones on the system's activation. Our result shows that B-B interactions increase the system's resilience to noise, making clonal activation more stable, while increasing the cross-talk between different clones. We derive analytically the noise level at which a B clone gets activated, in the absence of cross-talk, and find that this increases with the strength of idiotypic interactions and with the number of T cells signalling the B clone. We also derive, analytically and numerically, via population dynamics, the critical line where clonal cross-talk arises. Our approach allows us to derive the B clone size distribution, which can be experimentally measured and gives important information about the adaptive immune system response to antigens and vaccination.
△ Less
Submitted 4 May, 2016;
originally announced May 2016.
-
A dynamical model of the adaptive immune system: effects of cells promiscuity, antigens and B-B interactions
Authors:
Silvia Bartolucci,
Alessia Annibale
Abstract:
We analyse a minimal model for the primary response in the adaptive immune system comprising three different players: antigens, T and B cells. We assume B-T interactions to be diluted and sampled locally from heterogeneous degree distributions, which mimic B cells receptors' promiscuity. We derive dynamical equations for the order parameters quantifying the B cells activation and study the nature…
▽ More
We analyse a minimal model for the primary response in the adaptive immune system comprising three different players: antigens, T and B cells. We assume B-T interactions to be diluted and sampled locally from heterogeneous degree distributions, which mimic B cells receptors' promiscuity. We derive dynamical equations for the order parameters quantifying the B cells activation and study the nature and stability of the stationary solutions using linear stability analysis and Monte Carlo simulations.The system's behaviour is studied in different scaling regimes of the number of B cells, dilution in the interactions and number of antigens. Our analysis shows that: (i) B cells activation depends on the number of receptors in such a way that cells with an insufficient number of triggered receptors cannot be activated; (ii) idiotypic (i.e. B-B) interactions enhance parallel activation of multiple clones, improving the system's ability to fight different pathogens in parallel; (iii) the higher the fraction of antigens within the host the harder is for the system to sustain parallel signalling to B cells, crucial for the homeostatic control of cell numbers.
△ Less
Submitted 14 May, 2015;
originally announced May 2015.
-
Associative networks with diluted patterns: dynamical analysis at low and medium load
Authors:
Silvia Bartolucci,
Alessia Annibale
Abstract:
In this work we solve the dynamics of pattern diluted associative networks, evolving via sequential Glauber update. We derive dynamical equations for the order parameters, that quantify the simultaneous pattern recall of the system, and analyse the nature and stability of the stationary solutions by means of linear stability analysis as well as Monte Carlo simulations. We investigate the parallel…
▽ More
In this work we solve the dynamics of pattern diluted associative networks, evolving via sequential Glauber update. We derive dynamical equations for the order parameters, that quantify the simultaneous pattern recall of the system, and analyse the nature and stability of the stationary solutions by means of linear stability analysis as well as Monte Carlo simulations. We investigate the parallel retrieval capabilities of the system in different regions of the phase space, in particular in the low and medium storage regimes and for finite and extreme pattern dilution. Results show that in the absence of patterns cross-talk, all patterns are recalled symmetrically for any temperature below criticality, while in the presence of pattern cross-talk, symmetric retrieval becomes unstable as temperature is lowered and a hierarchical retrieval takes over. The shape of the hierarchical retrieval occurring at zero temperature is provided. The parallel retrieval capabilities of the network are seen to degrade gracefully in the regime of strong interference, but they are not destroyed.
△ Less
Submitted 10 May, 2014;
originally announced May 2014.
-
Parallel processing in immune networks
Authors:
Elena Agliari,
Adriano Barra,
Silvia Bartolucci,
Andrea Galluzzi,
Francesco Guerra,
Francesco Moauro
Abstract:
In this work we adopt a statistical mechanics approach to investigate basic, systemic features exhibited by adaptive immune systems. The lymphocyte network made by B-cells and T-cells is modeled by a bipartite spin-glass, where, following biological prescriptions, links connecting B-cells and T-cells are sparse. Interestingly, the dilution performed on links is shown to make the system able to orc…
▽ More
In this work we adopt a statistical mechanics approach to investigate basic, systemic features exhibited by adaptive immune systems. The lymphocyte network made by B-cells and T-cells is modeled by a bipartite spin-glass, where, following biological prescriptions, links connecting B-cells and T-cells are sparse. Interestingly, the dilution performed on links is shown to make the system able to orchestrate parallel strategies to fight several pathogens at the same time; this multitasking capability constitutes a remarkable, key property of immune systems as multiple antigens are always present within the host. We also define the stochastic process ruling the temporal evolution of lymphocyte activity, and show its relaxation toward an equilibrium measure allowing statistical mechanics investigations. Analytical results are compared with Monte Carlo simulations and signal-to-noise outcomes showing overall excellent agreement. Finally, within our model, a rationale for the experimentally well-evidenced correlation between lymphocytosis and autoimmunity is achieved; this sheds further light on the systemic features exhibited by immune networks.
△ Less
Submitted 22 March, 2013; v1 submitted 25 February, 2012;
originally announced February 2012.