-
VEC-SBM: Optimal Community Detection with Vectorial Edges Covariates
Authors:
Guillaume Braun,
Masashi Sugiyama
Abstract:
Social networks are often associated with rich side information, such as texts and images. While numerous methods have been developed to identify communities from pairwise interactions, they usually ignore such side information. In this work, we study an extension of the Stochastic Block Model (SBM), a widely used statistical framework for community detection, that integrates vectorial edges covar…
▽ More
Social networks are often associated with rich side information, such as texts and images. While numerous methods have been developed to identify communities from pairwise interactions, they usually ignore such side information. In this work, we study an extension of the Stochastic Block Model (SBM), a widely used statistical framework for community detection, that integrates vectorial edges covariates: the Vectorial Edges Covariates Stochastic Block Model (VEC-SBM). We propose a novel algorithm based on iterative refinement techniques and show that it optimally recovers the latent communities under the VEC-SBM. Furthermore, we rigorously assess the added value of leveraging edge's side information in the community detection process. We complement our theoretical results with numerical experiments on synthetic and semi-synthetic data.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Strong Consistency Guarantees for Clustering High-Dimensional Bipartite Graphs with the Spectral Method
Authors:
Guillaume Braun
Abstract:
In this work, we focus on the Bipartite Stochastic Block Model (BiSBM), a popular model for bipartite graphs with a community structure. We consider the high dimensional setting where the number $n_1$ of type I nodes is far smaller than the number $n_2$ of type II nodes. The recent work of Braun and Tyagi (2022) established a sufficient and necessary condition on the sparsity level $p_{max}$ of th…
▽ More
In this work, we focus on the Bipartite Stochastic Block Model (BiSBM), a popular model for bipartite graphs with a community structure. We consider the high dimensional setting where the number $n_1$ of type I nodes is far smaller than the number $n_2$ of type II nodes. The recent work of Braun and Tyagi (2022) established a sufficient and necessary condition on the sparsity level $p_{max}$ of the bipartite graph to be able to recover the latent partition of type I nodes. They proposed an iterative method that extends the one proposed by Ndaoud et al. (2022) to achieve this goal. Their method requires a good enough initialization, usually obtained by a spectral method, but empirical results showed that the refinement algorithm doesn't improve much the performance of the spectral method. This suggests that the spectral achieves exact recovery in the same regime as the refinement method. We show that it is indeed the case by providing new entrywise bounds on the eigenvectors of the similarity matrix used by the spectral method. Our analysis extend the framework of Lei (2019) that only applies to symmetric matrices with limited dependencies. As an important technical step, we also derive an improved concentration inequality for similarity matrices.
△ Less
Submitted 24 August, 2023; v1 submitted 13 April, 2023;
originally announced April 2023.
-
Alternating Linear Minimization: Revisiting von Neumann's alternating projections
Authors:
Gábor Braun,
Sebastian Pokutta,
Robert Weismantel
Abstract:
In 1933 von Neumann proved a beautiful result that one can approximate a point in the intersection of two convex sets by alternating projections, i.e., successively projecting on one set and then the other. This algorithm assumes that one has access to projection operators for both sets. In this note, we consider the much weaker setup where we have only access to linear minimization oracles over t…
▽ More
In 1933 von Neumann proved a beautiful result that one can approximate a point in the intersection of two convex sets by alternating projections, i.e., successively projecting on one set and then the other. This algorithm assumes that one has access to projection operators for both sets. In this note, we consider the much weaker setup where we have only access to linear minimization oracles over the convex sets and present an algorithm to find a point in the intersection of two convex sets.
△ Less
Submitted 17 February, 2023; v1 submitted 6 December, 2022;
originally announced December 2022.
-
Conditional Gradient Methods
Authors:
Gábor Braun,
Alejandro Carderera,
Cyrille W. Combettes,
Hamed Hassani,
Amin Karbasi,
Aryan Mokhtari,
Sebastian Pokutta
Abstract:
The purpose of this survey is to serve both as a gentle introduction and a coherent overview of state-of-the-art Frank--Wolfe algorithms, also called conditional gradient algorithms, for function minimization. These algorithms are especially useful in convex optimization when linear optimization is cheaper than projections.
The selection of the material has been guided by the principle of highli…
▽ More
The purpose of this survey is to serve both as a gentle introduction and a coherent overview of state-of-the-art Frank--Wolfe algorithms, also called conditional gradient algorithms, for function minimization. These algorithms are especially useful in convex optimization when linear optimization is cheaper than projections.
The selection of the material has been guided by the principle of highlighting crucial ideas as well as presenting new approaches that we believe might become important in the future, with ample citations even of old works imperative in the development of newer methods. Yet, our selection is sometimes biased, and need not reflect consensus of the research community, and we have certainly missed recent important contributions. After all the research area of Frank--Wolfe is very active, making it a moving target. We apologize sincerely in advance for any such distortions and we fully acknowledge: We stand on the shoulder of giants.
△ Less
Submitted 27 July, 2023; v1 submitted 25 November, 2022;
originally announced November 2022.
-
Minimax Optimal Clustering of Bipartite Graphs with a Generalized Power Method
Authors:
Guillaume Braun,
Hemant Tyagi
Abstract:
Clustering bipartite graphs is a fundamental task in network analysis. In the high-dimensional regime where the number of rows $n_1$ and the number of columns $n_2$ of the associated adjacency matrix are of different order, existing methods derived from the ones used for symmetric graphs can come with sub-optimal guarantees. Due to increasing number of applications for bipartite graphs in the high…
▽ More
Clustering bipartite graphs is a fundamental task in network analysis. In the high-dimensional regime where the number of rows $n_1$ and the number of columns $n_2$ of the associated adjacency matrix are of different order, existing methods derived from the ones used for symmetric graphs can come with sub-optimal guarantees. Due to increasing number of applications for bipartite graphs in the high dimensional regime, it is of fundamental importance to design optimal algorithms for this setting. The recent work of Ndaoud et al. (2022) improves the existing upper-bound for the misclustering rate in the special case where the columns (resp. rows) can be partitioned into $L = 2$ (resp. $K = 2$) communities. Unfortunately, their algorithm cannot be extended to the more general setting where $K \neq L \geq 2$. We overcome this limitation by introducing a new algorithm based on the power method. We derive conditions for exact recovery in the general setting where $K \neq L \geq 2$, and show that it recovers the result in Ndaoud et al. (2022). We also derive a minimax lower bound on the misclustering error when $K = L$ under a symmetric version of our model, which matches the corresponding upper bound up to a factor depending on $K$.
△ Less
Submitted 27 February, 2023; v1 submitted 24 May, 2022;
originally announced May 2022.
-
Seeded graph matching for the correlated Gaussian Wigner model via the projected power method
Authors:
Ernesto Araya,
Guillaume Braun,
Hemant Tyagi
Abstract:
In the \emph{graph matching} problem we observe two graphs $G,H$ and the goal is to find an assignment (or matching) between their vertices such that some measure of edge agreement is maximized. We assume in this work that the observed pair $G,H$ has been drawn from the Correlated Gaussian Wigner (CGW) model -- a popular model for correlated weighted graphs -- where the entries of the adjacency ma…
▽ More
In the \emph{graph matching} problem we observe two graphs $G,H$ and the goal is to find an assignment (or matching) between their vertices such that some measure of edge agreement is maximized. We assume in this work that the observed pair $G,H$ has been drawn from the Correlated Gaussian Wigner (CGW) model -- a popular model for correlated weighted graphs -- where the entries of the adjacency matrices of $G$ and $H$ are independent Gaussians and each edge of $G$ is correlated with one edge of $H$ (determined by the unknown matching) with the edge correlation described by a parameter $σ\in [0,1)$. In this paper, we analyse the performance of the \emph{projected power method} (PPM) as a \emph{seeded} graph matching algorithm where we are given an initial partially correct matching (called the seed) as side information. We prove that if the seed is close enough to the ground-truth matching, then with high probability, PPM iteratively improves the seed and recovers the ground-truth matching (either partially or exactly) in $\mathcal{O}(\log n)$ iterations. Our results prove that PPM works even in regimes of constant $σ$, thus extending the analysis in (Mao et al. 2023) for the sparse Correlated Erdos-Renyi(CER) model to the (dense) CGW model. As a byproduct of our analysis, we see that the PPM framework generalizes some of the state-of-art algorithms for seeded graph matching. We support and complement our theoretical findings with numerical experiments on synthetic data.
△ Less
Submitted 5 May, 2024; v1 submitted 8 April, 2022;
originally announced April 2022.
-
An iterative clustering algorithm for the Contextual Stochastic Block Model with optimality guarantees
Authors:
Guillaume Braun,
Hemant Tyagi,
Christophe Biernacki
Abstract:
Real-world networks often come with side information that can help to improve the performance of network analysis tasks such as clustering. Despite a large number of empirical and theoretical studies conducted on network clustering methods during the past decade, the added value of side information and the methods used to incorporate it optimally in clustering algorithms are relatively less unders…
▽ More
Real-world networks often come with side information that can help to improve the performance of network analysis tasks such as clustering. Despite a large number of empirical and theoretical studies conducted on network clustering methods during the past decade, the added value of side information and the methods used to incorporate it optimally in clustering algorithms are relatively less understood. We propose a new iterative algorithm to cluster networks with side information for nodes (in the form of covariates) and show that our algorithm is optimal under the Contextual Symmetric Stochastic Block Model. Our algorithm can be applied to general Contextual Stochastic Block Models and avoids hyperparameter tuning in contrast to previously proposed methods. We confirm our theoretical results on synthetic data experiments where our algorithm significantly outperforms other methods, and show that it can also be applied to signed graphs. Finally we demonstrate the practical interest of our method on real data.
△ Less
Submitted 28 July, 2022; v1 submitted 20 December, 2021;
originally announced December 2021.
-
Boolean percolation on digraphs and random exchange processes
Authors:
Georg Braun
Abstract:
We study, in a general graph-theoretic formulation, a long-range percolation model introduced by Lamperti. For various underlying directed graphs, we discuss connections between this model and random exchange processes. We clarify, for $n \in \mathbb{N}$, under which conditions the lattices $\mathbb{N}_0^n$ and $\mathbb{Z}^n$ are essentially covered in this model. Moreover, for all $n \geq 2$, we…
▽ More
We study, in a general graph-theoretic formulation, a long-range percolation model introduced by Lamperti. For various underlying directed graphs, we discuss connections between this model and random exchange processes. We clarify, for $n \in \mathbb{N}$, under which conditions the lattices $\mathbb{N}_0^n$ and $\mathbb{Z}^n$ are essentially covered in this model. Moreover, for all $n \geq 2$, we establish that it is impossible to cover the directed $n$-ary tree in our model.
△ Less
Submitted 1 January, 2022; v1 submitted 8 November, 2021;
originally announced November 2021.
-
Clustering multilayer graphs with missing nodes
Authors:
Guillaume Braun,
Hemant Tyagi,
Christophe Biernacki
Abstract:
Relationship between agents can be conveniently represented by graphs. When these relationships have different modalities, they are better modelled by multilayer graphs where each layer is associated with one modality. Such graphs arise naturally in many contexts including biological and social networks. Clustering is a fundamental problem in network analysis where the goal is to regroup nodes wit…
▽ More
Relationship between agents can be conveniently represented by graphs. When these relationships have different modalities, they are better modelled by multilayer graphs where each layer is associated with one modality. Such graphs arise naturally in many contexts including biological and social networks. Clustering is a fundamental problem in network analysis where the goal is to regroup nodes with similar connectivity profiles. In the past decade, various clustering methods have been extended from the unilayer setting to multilayer graphs in order to incorporate the information provided by each layer. While most existing works assume - rather restrictively - that all layers share the same set of nodes, we propose a new framework that allows for layers to be defined on different sets of nodes. In particular, the nodes not recorded in a layer are treated as missing. Within this paradigm, we investigate several generalizations of well-known clustering methods in the complete setting to the incomplete one and prove some consistency results under the Multi-Layer Stochastic Block Model assumption. Our theoretical results are complemented by thorough numerical comparisons between our proposed algorithms on synthetic data, and also on real datasets, thus highlighting the promising behaviour of our methods in various settings.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.
-
Dual Prices for Frank--Wolfe Algorithms
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
In this note we observe that for constrained convex minimization problems $\min_{x \in P}f(x)$ over a polytope $P$, dual prices for the linear program $\min_{z \in P} \nabla f(x) z$ obtained from linearization at approximately optimal solutions $x$ have a similar interpretation of rate of change in optimal value as for linear programming, providing a convex form of sensitivity analysis. This is of…
▽ More
In this note we observe that for constrained convex minimization problems $\min_{x \in P}f(x)$ over a polytope $P$, dual prices for the linear program $\min_{z \in P} \nabla f(x) z$ obtained from linearization at approximately optimal solutions $x$ have a similar interpretation of rate of change in optimal value as for linear programming, providing a convex form of sensitivity analysis. This is of particular interest for Frank--Wolfe algorithms (also called conditional gradients), forming an important class of first-order methods, where a basic building block is linear minimization of gradients of $f$ over $P$, which in most implementations already compute the dual prices as a by-product.
△ Less
Submitted 5 February, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Automated Reasoning in Temporal DL-Lite
Authors:
Sabiha Tahrat,
German Braun,
Alessandro Artale,
Marco Gario,
Ana Ozaki
Abstract:
This paper investigates the feasibility of automated reasoning over temporal DL-Lite (TDL-Lite) knowledge bases (KBs). We test the usage of off-the-shelf LTL reasoners to check satisfiability of TDL-Lite KBs. In particular, we test the robustness and the scalability of reasoners when dealing with TDL-Lite TBoxes paired with a temporal ABox. We conduct various experiments to analyse the performance…
▽ More
This paper investigates the feasibility of automated reasoning over temporal DL-Lite (TDL-Lite) knowledge bases (KBs). We test the usage of off-the-shelf LTL reasoners to check satisfiability of TDL-Lite KBs. In particular, we test the robustness and the scalability of reasoners when dealing with TDL-Lite TBoxes paired with a temporal ABox. We conduct various experiments to analyse the performance of different reasoners by randomly generating TDL-Lite KBs and then measuring the running time and the size of the translations. Furthermore, in an effort to make the usage of TDL-Lite KBs a reality, we present a fully fledged tool with a graphical interface to design them. Our interface is based on conceptual modelling principles and it is integrated with our translation tool and a temporal reasoner.
△ Less
Submitted 17 August, 2020;
originally announced August 2020.
-
On Supercritical Branching Processes with Emigration
Authors:
Georg Braun
Abstract:
We study supercritical branching processes under the influence of an i.i.d. emigration component. We provide conditions, under which the lifetime of the process is finite respectively has a finite expectation. A new version of the Kesten-Stigum theorem is obtained and the extinction probability for a large initial population size is related to the tail behaviour of the emigration.
We study supercritical branching processes under the influence of an i.i.d. emigration component. We provide conditions, under which the lifetime of the process is finite respectively has a finite expectation. A new version of the Kesten-Stigum theorem is obtained and the extinction probability for a large initial population size is related to the tail behaviour of the emigration.
△ Less
Submitted 12 August, 2020;
originally announced August 2020.
-
On the Growth of a Ballistic Deposition Model on Finite Graphs
Authors:
Georg Braun
Abstract:
We revisit a ballistic deposition process introduced by Atar, Athreya and Kang. Let $\mathcal{G}=(V,E)$ be a finite connected graph. We choose independently and uniformly vertices in $\mathcal{G}$. If a vertex $x$ is chosen and the previous height configuration is given by $h=(h_y)_{y \in V} \in \mathbb{N}_0^V$, the height $h_x$ is replaced by \[ \tilde{h}_x := 1 + \max_{y \sim x} h_y. \] We study…
▽ More
We revisit a ballistic deposition process introduced by Atar, Athreya and Kang. Let $\mathcal{G}=(V,E)$ be a finite connected graph. We choose independently and uniformly vertices in $\mathcal{G}$. If a vertex $x$ is chosen and the previous height configuration is given by $h=(h_y)_{y \in V} \in \mathbb{N}_0^V$, the height $h_x$ is replaced by \[ \tilde{h}_x := 1 + \max_{y \sim x} h_y. \] We study asymptotic properties of this growth model. We determine the asymptotic growth parameter $γ(\mathcal{G} )$ for some graphs and prove a central limit theorem for the fluctuations around $γ( \mathcal{G})$. We also give a new graph-theoretic interpretation of an inequality obtained by Atar et al..
△ Less
Submitted 27 January, 2020;
originally announced January 2020.
-
Decompositions of torsion-free abelian groups
Authors:
Gabor Braun. Phill Schultz,
Lutz Struengmann
Abstract:
It is known that every torsion-free abelian group of finite rank has a maximal completely decomposable summand that is unique up to isomorphism. We show that groups of infinite rank need not have maximal completely decomposable summands, but when they do, this summand is unique up to isomorphism.
It is known that every torsion-free abelian group of finite rank has a maximal completely decomposable summand that is unique up to isomorphism. We show that groups of infinite rank need not have maximal completely decomposable summands, but when they do, this summand is unique up to isomorphism.
△ Less
Submitted 22 October, 2018;
originally announced October 2018.
-
Blended Conditional Gradients: the unconditioning of conditional gradients
Authors:
Gábor Braun,
Sebastian Pokutta,
Dan Tu,
Stephen Wright
Abstract:
We present a blended conditional gradient approach for minimizing a smooth convex function over a polytope P, combining the Frank--Wolfe algorithm (also called conditional gradient) with gradient-based steps, different from away steps and pairwise steps, but still achieving linear convergence for strongly convex functions, along with good practical performance. Our approach retains all favorable p…
▽ More
We present a blended conditional gradient approach for minimizing a smooth convex function over a polytope P, combining the Frank--Wolfe algorithm (also called conditional gradient) with gradient-based steps, different from away steps and pairwise steps, but still achieving linear convergence for strongly convex functions, along with good practical performance. Our approach retains all favorable properties of conditional gradient algorithms, notably avoidance of projections onto P and maintenance of iterates as sparse convex combinations of a limited number of extreme points of P. The algorithm is lazy, making use of inexpensive inexact solutions of the linear programming subproblem that characterizes the conditional gradient approach. It decreases measures of optimality (primal and dual gaps) rapidly, both in the number of iterations and in wall-clock time, outperforming even the lazy conditional gradient algorithms of [arXiv:1410.8816]. We also present a streamlined version of the algorithm for the probability simplex.
△ Less
Submitted 31 May, 2019; v1 submitted 18 May, 2018;
originally announced May 2018.
-
Lazifying Conditional Gradient Algorithms
Authors:
Gábor Braun,
Sebastian Pokutta,
Daniel Zink
Abstract:
Conditional gradient algorithms (also often called Frank-Wolfe algorithms) are popular due to their simplicity of only requiring a linear optimization oracle and more recently they also gained significant traction for online learning. While simple in principle, in many cases the actual implementation of the linear optimization oracle is costly. We show a general method to lazify various conditiona…
▽ More
Conditional gradient algorithms (also often called Frank-Wolfe algorithms) are popular due to their simplicity of only requiring a linear optimization oracle and more recently they also gained significant traction for online learning. While simple in principle, in many cases the actual implementation of the linear optimization oracle is costly. We show a general method to lazify various conditional gradient algorithms, which in actual computations leads to several orders of magnitude of speedup in wall-clock time. This is achieved by using a faster separation oracle instead of a linear optimization oracle, relying only on few linear optimization oracle calls.
△ Less
Submitted 5 September, 2018; v1 submitted 17 October, 2016;
originally announced October 2016.
-
An efficient high-probability algorithm for Linear Bandits
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
For the linear bandit problem, we extend the analysis of algorithm CombEXP from [R. Combes, M. S. Talebi Mazraeh Shahi, A. Proutiere, and M. Lelarge. Combinatorial bandits revisited. In C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett, editors, Advances in Neural Information Processing Systems 28, pages 2116--2124. Curran Associates, Inc., 2015. URL http://papers.nips.cc/paper/583…
▽ More
For the linear bandit problem, we extend the analysis of algorithm CombEXP from [R. Combes, M. S. Talebi Mazraeh Shahi, A. Proutiere, and M. Lelarge. Combinatorial bandits revisited. In C. Cortes, N. D. Lawrence, D. D. Lee, M. Sugiyama, and R. Garnett, editors, Advances in Neural Information Processing Systems 28, pages 2116--2124. Curran Associates, Inc., 2015. URL http://papers.nips.cc/paper/5831-combinatorial-bandits-revisited.pdf] to the high-probability case against adaptive adversaries, allowing actions to come from an arbitrary polytope. We prove a high-probability regret of \(O(T^{2/3})\) for time horizon \(T\). While this bound is weaker than the optimal \(O(\sqrt{T})\) bound achieved by GeometricHedge in [P. L. Bartlett, V. Dani, T. Hayes, S. Kakade, A. Rakhlin, and A. Tewari. High-probability regret bounds for bandit online linear optimization. In 21th Annual Conference on Learning Theory (COLT 2008), July 2008. http://eprints.qut.edu.au/45706/1/30-Bartlett.pdf], CombEXP is computationally efficient, requiring only an efficient linear optimization oracle over the convex hull of the actions.
△ Less
Submitted 13 October, 2016; v1 submitted 6 October, 2016;
originally announced October 2016.
-
Strong reductions for extended formulations
Authors:
Gábor Braun,
Sebastian Pokutta,
Aurko Roy
Abstract:
We generalize the reduction mechanism for linear programming problems and semidefinite programming problems from [arXiv:1410.8816] in two ways 1) relaxing the requirement of affineness and 2) extending to fractional optimization problems. As applications we provide several new LP-hardness and SDP-hardness results, e.g., for the SparsestCut problem, the BalancedSeparator problem, the MaxCut problem…
▽ More
We generalize the reduction mechanism for linear programming problems and semidefinite programming problems from [arXiv:1410.8816] in two ways 1) relaxing the requirement of affineness and 2) extending to fractional optimization problems. As applications we provide several new LP-hardness and SDP-hardness results, e.g., for the SparsestCut problem, the BalancedSeparator problem, the MaxCut problem and the Matching problem on 3-regular graphs. We also provide a new, very strong Lasserre integrality gap result for the IndependentSet problem, which is strictly greater than the best known LP approximation, showing that the Lasserre hierarchy does not always provide the tightest SDP relaxation.
△ Less
Submitted 23 February, 2016; v1 submitted 15 December, 2015;
originally announced December 2015.
-
An information diffusion Fano inequality
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
In this note, we present an information diffusion inequality derived from an elementary argument, which gives rise to a very general Fano-type inequality. The latter unifies and generalizes the distance-based Fano inequality and the continuous Fano inequality established in [Corollary 1, Propositions 1 and 2, arXiv:1311.2669v2], as well as the generalized Fano inequality in [Equation following (10…
▽ More
In this note, we present an information diffusion inequality derived from an elementary argument, which gives rise to a very general Fano-type inequality. The latter unifies and generalizes the distance-based Fano inequality and the continuous Fano inequality established in [Corollary 1, Propositions 1 and 2, arXiv:1311.2669v2], as well as the generalized Fano inequality in [Equation following (10); T. S. Han and S. Verdú. Generalizing the Fano inequality. IEEE Transactions on Information Theory, 40(4):1247-1251, July 1994].
△ Less
Submitted 21 April, 2015;
originally announced April 2015.
-
The matching problem has no small symmetric SDP
Authors:
Gábor Braun,
Jonah Brown-Cohen,
Arefin Huq,
Sebastian Pokutta,
Prasad Raghavendra,
Aurko Roy,
Benjamin Weitz,
Daniel Zink
Abstract:
Yannakakis showed that the matching problem does not have a small symmetric linear program. Rothvoß recently proved that any, not necessarily symmetric, linear program also has exponential size. It is natural to ask whether the matching problem can be expressed compactly in a framework such as semidefinite programming (SDP) that is more powerful than linear programming but still allows efficient o…
▽ More
Yannakakis showed that the matching problem does not have a small symmetric linear program. Rothvoß recently proved that any, not necessarily symmetric, linear program also has exponential size. It is natural to ask whether the matching problem can be expressed compactly in a framework such as semidefinite programming (SDP) that is more powerful than linear programming but still allows efficient optimization. We answer this question negatively for symmetric SDPs: any symmetric SDP for the matching problem has exponential size.
We also show that an O(k)-round Lasserre SDP relaxation for the metric traveling salesperson problem yields at least as good an approximation as any symmetric SDP relaxation of size $n^k$.
The key technical ingredient underlying both these results is an upper bound on the degree needed to derive polynomial identities that hold over the space of matchings or traveling salesperson tours.
△ Less
Submitted 30 November, 2016; v1 submitted 2 April, 2015;
originally announced April 2015.
-
Affine reductions for LPs and SDPs
Authors:
Gábor Braun,
Sebastian Pokutta,
Daniel Zink
Abstract:
We define a reduction mechanism for LP and SDP formulations that degrades approximation factors in a controlled fashion. Our reduction mechanism is a minor restriction of classical reductions establishing inapproximability in the context of PCP theorems. As a consequence we establish strong linear programming inapproximability (for LPs with a polynomial number of constraints) for many problems. In…
▽ More
We define a reduction mechanism for LP and SDP formulations that degrades approximation factors in a controlled fashion. Our reduction mechanism is a minor restriction of classical reductions establishing inapproximability in the context of PCP theorems. As a consequence we establish strong linear programming inapproximability (for LPs with a polynomial number of constraints) for many problems. In particular we obtain a $3/2-\varepsilon$ inapproximability for VertexCover answering an open question in [arXiv:1309.0563] and we answer a weak version of our sparse graph conjecture posed in [arXiv:1311.4001] showing an inapproximability factor of $1/2+\varepsilon$ for bounded degree IndependentSet. In the case of SDPs, we obtain inapproximability results for these problems relative to the SDP-inapproximability of MaxCUT. Moreover, using our reduction framework we are able to reproduce various results for CSPs from [arXiv:1309.0563] via simple reductions from Max-2-XOR.
△ Less
Submitted 19 January, 2016; v1 submitted 31 October, 2014;
originally announced October 2014.
-
Lower Bounds on the Oracle Complexity of Nonsmooth Convex Optimization via Information Theory
Authors:
Gábor Braun,
Cristóbal Guzmán,
Sebastian Pokutta
Abstract:
We present an information-theoretic approach to lower bound the oracle complexity of nonsmooth black box convex optimization, unifying previous lower bounding techniques by identifying a combinatorial problem, namely string guessing, as a single source of hardness. As a measure of complexity we use distributional oracle complexity, which subsumes randomized oracle complexity as well as worst-case…
▽ More
We present an information-theoretic approach to lower bound the oracle complexity of nonsmooth black box convex optimization, unifying previous lower bounding techniques by identifying a combinatorial problem, namely string guessing, as a single source of hardness. As a measure of complexity we use distributional oracle complexity, which subsumes randomized oracle complexity as well as worst-case oracle complexity. We obtain strong lower bounds on distributional oracle complexity for the box $[-1,1]^n$, as well as for the $L^p$-ball for $p \geq 1$ (for both low-scale and large-scale regimes), matching worst-case upper bounds, and hence we close the gap between distributional complexity, and in particular, randomized complexity, and worst-case complexity. Furthermore, the bounds remain essentially the same for high-probability and bounded-error oracle complexity, and even for combination of the two, i.e., bounded-error high-probability oracle complexity. This considerably extends the applicability of known bounds.
△ Less
Submitted 7 July, 2023; v1 submitted 19 July, 2014;
originally announced July 2014.
-
Info-Greedy sequential adaptive compressed sensing
Authors:
Gabor Braun,
Sebastian Pokutta,
Yao Xie
Abstract:
We present an information-theoretic framework for sequential adaptive compressed sensing, Info-Greedy Sensing, where measurements are chosen to maximize the extracted information conditioned on the previous measurements. We show that the widely used bisection approach is Info-Greedy for a family of $k$-sparse signals by connecting compressed sensing and blackbox complexity of sequential query algo…
▽ More
We present an information-theoretic framework for sequential adaptive compressed sensing, Info-Greedy Sensing, where measurements are chosen to maximize the extracted information conditioned on the previous measurements. We show that the widely used bisection approach is Info-Greedy for a family of $k$-sparse signals by connecting compressed sensing and blackbox complexity of sequential query algorithms, and present Info-Greedy algorithms for Gaussian and Gaussian Mixture Model (GMM) signals, as well as ways to design sparse Info-Greedy measurements. Numerical examples demonstrate the good performance of the proposed algorithms using simulated and real data: Info-Greedy Sensing shows significant improvement over random projection for signals with sparse and low-rank covariance matrices, and adaptivity brings robustness when there is a mismatch between the assumed and the true distributions.
△ Less
Submitted 2 February, 2015; v1 submitted 2 July, 2014;
originally announced July 2014.
-
The matching polytope does not admit fully-polynomial size relaxation schemes
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
The groundbreaking work of Rothvoß [arxiv:1311.2369] established that every linear program expressing the matching polytope has an exponential number of inequalities (formally, the matching polytope has exponential extension complexity). We generalize this result by deriving strong bounds on the polyhedral inapproximability of the matching polytope: for fixed $0 < \varepsilon < 1$, every polyhedra…
▽ More
The groundbreaking work of Rothvoß [arxiv:1311.2369] established that every linear program expressing the matching polytope has an exponential number of inequalities (formally, the matching polytope has exponential extension complexity). We generalize this result by deriving strong bounds on the polyhedral inapproximability of the matching polytope: for fixed $0 < \varepsilon < 1$, every polyhedral $(1 + \varepsilon / n)$-approximation requires an exponential number of inequalities, where $n$ is the number of vertices. This is sharp given the well-known $ρ$-approximation of size $O(\binom{n}{ρ/(ρ-1)})$ provided by the odd-sets of size up to $ρ/(ρ-1)$. Thus matching is the first problem in $P$, whose natural linear encoding does not admit a fully polynomial-size relaxation scheme (the polyhedral equivalent of an FPTAS), which provides a sharp separation from the polynomial-size relaxation scheme obtained e.g., via constant-sized odd-sets mentioned above.
Our approach reuses ideas from Rothvoß [arxiv:1311.2369], however the main lower bounding technique is different. While the original proof is based on the hyperplane separation bound (also called the rectangle corruption bound), we employ the information-theoretic notion of common information as introduced in Braun and Pokutta [http://eccc.hpi-web.de/report/2013/056/], which allows to analyze perturbations of slack matrices. It turns out that the high extension complexity for the matching polytope stem from the same source of hardness as for the correlation polytope: a direct sum structure.
△ Less
Submitted 5 August, 2015; v1 submitted 26 March, 2014;
originally announced March 2014.
-
Average case polyhedral complexity of the maximum stable set problem
Authors:
Gábor Braun,
Samuel Fiorini,
Sebastian Pokutta
Abstract:
We study the minimum number of constraints needed to formulate random instances of the maximum stable set problem via linear programs (LPs), in two distinct models. In the uniform model, the constraints of the LP are not allowed to depend on the input graph, which should be encoded solely in the objective function. There we prove a $2^{Ω(n/ \log n)}$ lower bound with probability at least…
▽ More
We study the minimum number of constraints needed to formulate random instances of the maximum stable set problem via linear programs (LPs), in two distinct models. In the uniform model, the constraints of the LP are not allowed to depend on the input graph, which should be encoded solely in the objective function. There we prove a $2^{Ω(n/ \log n)}$ lower bound with probability at least $1 - 2^{-2^n}$ for every LP that is exact for a randomly selected set of instances; each graph on at most n vertices being selected independently with probability $p \geq 2^{-\binom{n/4}{2}+n}$. In the non-uniform model, the constraints of the LP may depend on the input graph, but we allow weights on the vertices. The input graph is sampled according to the G(n, p) model. There we obtain upper and lower bounds holding with high probability for various ranges of p. We obtain a super-polynomial lower bound all the way from $p = Ω(\log^{6+\varepsilon} / n)$ to $p = o (1 / \log n)$. Our upper bound is close to this as there is only an essentially quadratic gap in the exponent, which currently also exists in the worst-case model. Finally, we state a conjecture that would close this gap, both in the average-case and worst-case models.
△ Less
Submitted 2 March, 2016; v1 submitted 15 November, 2013;
originally announced November 2013.
-
A short proof for the polyhedrality of the Chvátal-Gomory closure of a compact convex set
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
Recently Schrijver's open problem, whether the Chvátal--Gomory closure of an irrational polytope is polyhedral was answered independently in the affirmative by Dadush, Dey, and Vielma (even for arbitrarily compact convex set) as well as by Dunkel and Schulz. We present a very short, easily accesible proof that the Chvátal--Gomory closure of a compact convex set is a polytope.
Recently Schrijver's open problem, whether the Chvátal--Gomory closure of an irrational polytope is polyhedral was answered independently in the affirmative by Dadush, Dey, and Vielma (even for arbitrarily compact convex set) as well as by Dunkel and Schulz. We present a very short, easily accesible proof that the Chvátal--Gomory closure of a compact convex set is a polytope.
△ Less
Submitted 16 May, 2014; v1 submitted 20 July, 2012;
originally announced July 2012.
-
An algebraic approach to symmetric extended formulations
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
Extended formulations are an important tool to obtain small (even compact) formulations of polytopes by representing them as projections of higher dimensional ones. It is an important question whether a polytope admits a small extended formulation, i.e., one involving only a polynomial number of inequalities in its dimension. For the case of symmetric extended formulations (i.e., preserving the sy…
▽ More
Extended formulations are an important tool to obtain small (even compact) formulations of polytopes by representing them as projections of higher dimensional ones. It is an important question whether a polytope admits a small extended formulation, i.e., one involving only a polynomial number of inequalities in its dimension. For the case of symmetric extended formulations (i.e., preserving the symmetries of the polytope) Yannakakis established a powerful technique to derive lower bounds and rule out small formulations. We rephrase the technique of Yannakakis in a group-theoretic framework. This provides a different perspective on symmetric extensions and considerably simplifies several lower bound constructions.
△ Less
Submitted 27 June, 2012;
originally announced June 2012.
-
Approximation Limits of Linear Programs (Beyond Hierarchies)
Authors:
Gábor Braun,
Samuel Fiorini,
Sebastian Pokutta,
David Steurer
Abstract:
We develop a framework for approximation limits of polynomial-size linear programs from lower bounds on the nonnegative ranks of suitably defined matrices. This framework yields unconditional impossibility results that are applicable to any linear program as opposed to only programs generated by hierarchies. Using our framework, we prove that O(n^{1/2-eps})-approximations for CLIQUE require linear…
▽ More
We develop a framework for approximation limits of polynomial-size linear programs from lower bounds on the nonnegative ranks of suitably defined matrices. This framework yields unconditional impossibility results that are applicable to any linear program as opposed to only programs generated by hierarchies. Using our framework, we prove that O(n^{1/2-eps})-approximations for CLIQUE require linear programs of size 2^{n^Ω(eps)}. (This lower bound applies to linear programs using a certain encoding of CLIQUE as a linear optimization problem.) Moreover, we establish a similar result for approximations of semidefinite programs by linear programs. Our main ingredient is a quantitative improvement of Razborov's rectangle corruption lemma for the high error regime, which gives strong lower bounds on the nonnegative rank of certain perturbations of the unique disjointness matrix.
△ Less
Submitted 16 May, 2014; v1 submitted 4 April, 2012;
originally announced April 2012.
-
Investigating the Effectiveness of the Tutorials in Introductory Physics in Multiple Instructional Settings
Authors:
C. Slezak,
K. M. Koenig,
R. J. Endorf,
G. A. Braun
Abstract:
This paper examines the educational impact of the implementation of "Changes in Energy and Momentum" from the Tutorials in Introductory Physics in five different instructional settings. These settings include (1) a completely computer-based learning environment and (2) use of cooperative learning groups with varying levels of instructor support. Pre- and post-tests provide evidence that a computer…
▽ More
This paper examines the educational impact of the implementation of "Changes in Energy and Momentum" from the Tutorials in Introductory Physics in five different instructional settings. These settings include (1) a completely computer-based learning environment and (2) use of cooperative learning groups with varying levels of instructor support. Pre- and post-tests provide evidence that a computer-based implementation falls significantly short of classroom implementations which involve both collaborative learning groups and interactions with a teaching assistance. Other findings provide insight into the importance of certain elements of instructor training and the appropriate use of the tutorial as an initial introduction to a new concept.
△ Less
Submitted 30 September, 2011;
originally announced October 2011.
-
Rigid abelian groups and the probabilistic method
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
The construction of torsion-free abelian groups with prescribed endomorphism rings starting with Corner's seminal work is a well-studied subject in the theory of abelian groups. Usually these construction work by adding elements from a (topological) completion in order to get rid of (kill) unwanted homomorphisms. The critical part is to actually prove that every unwanted homomorphism can be killed…
▽ More
The construction of torsion-free abelian groups with prescribed endomorphism rings starting with Corner's seminal work is a well-studied subject in the theory of abelian groups. Usually these construction work by adding elements from a (topological) completion in order to get rid of (kill) unwanted homomorphisms. The critical part is to actually prove that every unwanted homomorphism can be killed by adding a suitable element. We will demonstrate that some of those constructions can be significantly simplified by choosing the elements at random. As a result, the endomorphism ring will be almost surely prescribed, i.e., with probability one.
△ Less
Submitted 12 July, 2011;
originally announced July 2011.
-
Border bases and order ideals: a polyhedral characterization
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
Border bases arise as a canonical generalization of Gröbner bases. We provide a polyhedral characterization of all order ideals (and hence border bases) that are supported by a zero-dimensional ideal: order ideals that support a border basis correspond one-to-one to integral points of the order ideal polytope. In particular, we establish a crucial connection between the ideal and its combinatorial…
▽ More
Border bases arise as a canonical generalization of Gröbner bases. We provide a polyhedral characterization of all order ideals (and hence border bases) that are supported by a zero-dimensional ideal: order ideals that support a border basis correspond one-to-one to integral points of the order ideal polytope. In particular, we establish a crucial connection between the ideal and its combinatorial structure. Based on this characterization we adapt the classical border basis algorithm to allow for computing border bases for arbitrary order ideals, which are independent of term orderings. We also show that finding a maximum weight order ideal that supports a border basis is NP-hard, and that the convex hull of admissible order ideals has no polynomial polyhedral description.
△ Less
Submitted 24 November, 2015; v1 submitted 8 December, 2009;
originally announced December 2009.
-
A polyhedral approach to computing border bases
Authors:
Gábor Braun,
Sebastian Pokutta
Abstract:
Border bases can be considered to be the natural extension of Gröbner bases that have several advantages. Unfortunately, to date the classical border basis algorithm relies on (degree-compatible) term orderings and implicitly on reduced Gröbner bases. We adapt the classical border basis algorithm to allow for calculating border bases for arbitrary degree-compatible order ideals, which is \emph{i…
▽ More
Border bases can be considered to be the natural extension of Gröbner bases that have several advantages. Unfortunately, to date the classical border basis algorithm relies on (degree-compatible) term orderings and implicitly on reduced Gröbner bases. We adapt the classical border basis algorithm to allow for calculating border bases for arbitrary degree-compatible order ideals, which is \emph{independent} from term orderings. Moreover, the algorithm also supports calculating degree-compatible order ideals with \emph{preference} on contained elements, even though finding a preferred order ideal is NP-hard. Effectively we retain degree-compatibility only to successively extend our computation degree-by-degree. The adaptation is based on our polyhedral characterization: order ideals that support a border basis correspond one-to-one to integral points of the order ideal polytope. This establishes a crucial connection between the ideal and the combinatorial structure of the associated factor spaces.
△ Less
Submitted 5 February, 2010; v1 submitted 4 November, 2009;
originally announced November 2009.
-
Geometry of splice-quotient singularities
Authors:
Gábor Braun
Abstract:
We obtain a new important basic result on splice-quotient singularities in an elegant combinatorial-geometric way: every level of the divisorial filtration of the ring of functions is generated by monomials of the defining coordinate functions. The elegant way is the language of of line bundles based on Okuma's description of the function ring of the universal abelian cover. As an easy applicati…
▽ More
We obtain a new important basic result on splice-quotient singularities in an elegant combinatorial-geometric way: every level of the divisorial filtration of the ring of functions is generated by monomials of the defining coordinate functions. The elegant way is the language of of line bundles based on Okuma's description of the function ring of the universal abelian cover. As an easy application, we obtain a new proof of the End Curve Theorem of Neumann and Wahl.
△ Less
Submitted 23 December, 2008;
originally announced December 2008.
-
Surgery formula for Seiberg--Witten invariants of negative definite plumbed 3-manifolds
Authors:
Gabor Braun,
Andras Nemethi
Abstract:
We derive a cut-and-paste surgery formula of Seiberg--Witten invariants for negative definite plumbed rational homology 3-spheres. It is similar to (and motivated by) Okuma's recursion formula [arXiv:math.AG/0610464, 4.5] targeting analytic invariants of splice quotient singularities. The two formulas combined provide automatically a proof of the equivariant version [arXiv:math.AG/0310084, 5.2(b…
▽ More
We derive a cut-and-paste surgery formula of Seiberg--Witten invariants for negative definite plumbed rational homology 3-spheres. It is similar to (and motivated by) Okuma's recursion formula [arXiv:math.AG/0610464, 4.5] targeting analytic invariants of splice quotient singularities. The two formulas combined provide automatically a proof of the equivariant version [arXiv:math.AG/0310084, 5.2(b)] of the `Seiberg--Witten invariant conjecture' [arXiv:math.AG/0111298] for these singularities.
△ Less
Submitted 20 November, 2008; v1 submitted 24 April, 2007;
originally announced April 2007.
-
Invariants of Newton non-degenerate surface singularities
Authors:
Gabor Braun,
Andras Nemethi
Abstract:
We recover the Newton diagram (modulo a natural ambiguity) from the link for any surface hypersurface singularity with non-degenerate Newton principal part whose link is a rational homology sphere. As a corollary, we show that the link determines the embedded topological type, the Milnor fibration, and the multiplicity of such a germ. This proves (even a stronger version of) Zariski's Conjecture…
▽ More
We recover the Newton diagram (modulo a natural ambiguity) from the link for any surface hypersurface singularity with non-degenerate Newton principal part whose link is a rational homology sphere. As a corollary, we show that the link determines the embedded topological type, the Milnor fibration, and the multiplicity of such a germ. This proves (even a stronger version of) Zariski's Conjecture about the multiplicity for such a singularity.
△ Less
Submitted 21 February, 2007; v1 submitted 4 September, 2006;
originally announced September 2006.
-
On Superspace Chern-Simons-like Terms
Authors:
Philip C. Argyres,
Adel M. Awad,
Gregory A. Braun,
F. Paul Esposito
Abstract:
We search for superspace Chern-Simons-like higher-derivative terms in the low energy effective actions of supersymmetric theories in four dimensions. Superspace Chern-Simons-like terms are those gauge-invariant terms which cannot be written solely in terms of field strength superfields and covariant derivatives, but in which a gauge potential superfield appears explicitly. We find one class of s…
▽ More
We search for superspace Chern-Simons-like higher-derivative terms in the low energy effective actions of supersymmetric theories in four dimensions. Superspace Chern-Simons-like terms are those gauge-invariant terms which cannot be written solely in terms of field strength superfields and covariant derivatives, but in which a gauge potential superfield appears explicitly. We find one class of such four-derivative terms with N=2 supersymmetry which, though locally on the Coulomb branch can be written solely in terms of field strengths, globally cannot be. These terms are classified by certain Dolbeault cohomology classes on the moduli space. We include a discussion of other examples of terms in the effective action involving global obstructions on the Coulomb branch.
△ Less
Submitted 10 December, 2004; v1 submitted 7 November, 2004;
originally announced November 2004.
-
The cobordism class of the multiple points of immersions
Authors:
Gábor Braun
Abstract:
Let f: M -> N be an even codimensional immersion between smooth manifolds. We derive an explicit formula for the Pontrjagin numbers and signature of the multiple point manifolds in terms of singular cohomology of M and N, the maps induced between these by f and the characteristic classes of the normal bundle.
The main trick is to solve a recursion in cohomology by the use of (generalized) form…
▽ More
Let f: M -> N be an even codimensional immersion between smooth manifolds. We derive an explicit formula for the Pontrjagin numbers and signature of the multiple point manifolds in terms of singular cohomology of M and N, the maps induced between these by f and the characteristic classes of the normal bundle.
The main trick is to solve a recursion in cohomology by the use of (generalized) formal power series.
△ Less
Submitted 31 May, 2006; v1 submitted 29 September, 2004;
originally announced September 2004.
-
Characterization of matrix types of ultramatricial algebras
Authors:
Gábor Braun
Abstract:
A dimension group is a partially ordered countable group such that (1) every finite subset is contained in an ordered subgroup which is a finite direct power of Z and (2) the group has an order unit i.e. a positive element u such that every group element is smaller than a multiple of u. For every subgroup H of the multiplicatice groups of the positive rational numbers a dimension group is constr…
▽ More
A dimension group is a partially ordered countable group such that (1) every finite subset is contained in an ordered subgroup which is a finite direct power of Z and (2) the group has an order unit i.e. a positive element u such that every group element is smaller than a multiple of u. For every subgroup H of the multiplicatice groups of the positive rational numbers a dimension group is constructed whose order-preserving automorphism group is H and H acts on an order unit by multiplication as rational numbers. This implies that for every equivalence relation on the positive integers for which n and m are equivalent if and only if nk and mk are equivalent, there is a ring over which the ring of n times n matrices and the ring of m times m matrices are equivalent if and only if n and m are equivalent.
△ Less
Submitted 21 July, 2005; v1 submitted 15 June, 2004;
originally announced June 2004.
-
Higher-Derivative Terms in N=2 SUSY Effective Actions
Authors:
Philip C. Argyres,
Adel M. Awad,
Gregory A. Braun,
F. Paul Esposito
Abstract:
Harmonic superspace can be used to construct higher derivative terms in N=2 supersymmetric effective actions despite the infinite redundancy in their description due to the infinite number of auxiliary fields. We are able to write down all of the 3- and 4-derivative terms on the Higgs, Coulomb, and mixed branches, modulo the possible existence of superspace Chern-Simons-like terms, which we disc…
▽ More
Harmonic superspace can be used to construct higher derivative terms in N=2 supersymmetric effective actions despite the infinite redundancy in their description due to the infinite number of auxiliary fields. We are able to write down all of the 3- and 4-derivative terms on the Higgs, Coulomb, and mixed branches, modulo the possible existence of superspace Chern-Simons-like terms, which we discuss. Many of the terms we find are holomorphic, and at least one is shown to not receive quantum corrections.
△ Less
Submitted 25 February, 2004;
originally announced February 2004.
-
A proof of Higgins' conjecture
Authors:
Gabor Braun
Abstract:
Let f: G=* G(i) -> B=* B(i) be a group homomorphism between free products of groups. Suppose that G(i)f=B(i) of all i. Let H be a subgroup of G such that Hf=B. Then H decomposes into a free product H=*H(i) with H(i)f=B(i). Furthermore, H(i) decomposes into a free product of a free group and the intersection of H(i) with some conjugate of G(i).
Higgins conjectured this in 1971 and now we prove…
▽ More
Let f: G=* G(i) -> B=* B(i) be a group homomorphism between free products of groups. Suppose that G(i)f=B(i) of all i. Let H be a subgroup of G such that Hf=B. Then H decomposes into a free product H=*H(i) with H(i)f=B(i). Furthermore, H(i) decomposes into a free product of a free group and the intersection of H(i) with some conjugate of G(i).
Higgins conjectured this in 1971 and now we prove it.
△ Less
Submitted 5 September, 2004; v1 submitted 6 December, 2003;
originally announced December 2003.
-
Higher-Derivative Terms in N=2 Supersymmetric Effective Actions
Authors:
Philip C. Argyres,
Adel M. Awad,
Gregory A. Braun,
F. Paul Esposito
Abstract:
We show how to systematically construct higher-derivative terms in effective actions in harmonic superspace despite the infinite redundancy in their description due to the infinite number of auxiliary fields. Making an assumption about the absence of certain superspace Chern-Simons-like terms involving vector multiplets, we write all 3- and 4-derivative terms on Higgs, Coulomb, and mixed branche…
▽ More
We show how to systematically construct higher-derivative terms in effective actions in harmonic superspace despite the infinite redundancy in their description due to the infinite number of auxiliary fields. Making an assumption about the absence of certain superspace Chern-Simons-like terms involving vector multiplets, we write all 3- and 4-derivative terms on Higgs, Coulomb, and mixed branches. Among these terms are several with only holomorphic dependence on fields, and at least one satisfies a non-renormalization theorem. These holomorphic terms include a novel 3-derivative term on mixed branches given as an integral over 3/4 of superspace. As an illustration of our method, we search for Wess-Zumino terms in the low energy effective action of N=2 supersymmetric QCD. We show that such terms occur only on mixed branches. We also present an argument showing that the combination of space-time locality with supersymmetry implies locality in the anticommuting superspace coordinates of for unconstrained superfields.
△ Less
Submitted 8 July, 2003; v1 submitted 12 June, 2003;
originally announced June 2003.
-
F1 - An Eight Channel Time-to-Digital Converter Chip for High Rate Experiments
Authors:
G. Braun,
H. Fischer,
J. Franz,
A. Grunemaier,
F. H. Heinsius,
L. Hennig,
K. Konigsmann,
M. Niebuhr,
M. Schierloh,
T. Schmidt,
H. Schmitt,
H. J. Urban
Abstract:
A new TDC chip has been developed for the COMPASS experiment at CERN. The resulting ASIC offers an unprecedented degree of flexibility and functionality. Its capability to handle highest hit and trigger input rates as well as its low power consumption makes it an ideal tool for future collider and fixed target experiments. First front-end boards equipped with the F1 chip have been used recently…
▽ More
A new TDC chip has been developed for the COMPASS experiment at CERN. The resulting ASIC offers an unprecedented degree of flexibility and functionality. Its capability to handle highest hit and trigger input rates as well as its low power consumption makes it an ideal tool for future collider and fixed target experiments. First front-end boards equipped with the F1 chip have been used recently at testbeam experiments at CERN. A functional description and specification for this new TDC chip is presented.
△ Less
Submitted 6 November, 1999;
originally announced November 1999.
-
TDC Chip and Readout Driver Developments for COMPASS and LHC-Experiments
Authors:
G. Braun,
H. Fischer,
J. Franz,
A. Grunemaier,
F. H. Heinsius,
K. Konigsmann,
M. Schierloh,
T. Schmidt,
H. Schmitt,
H. J. Urban
Abstract:
A new TDC-chip is under development for the COMPASS experiment at CERN. The ASIC, which exploits the 0.6 micrometer CMOS sea-of-gate technology, will allow high resolution time measurements with digitization of 75 ps, and an unprecedented degree of flexibility accompanied by high rate capability and low power consumption. Preliminary specifications of this new TDC chip are presented.
Furthermo…
▽ More
A new TDC-chip is under development for the COMPASS experiment at CERN. The ASIC, which exploits the 0.6 micrometer CMOS sea-of-gate technology, will allow high resolution time measurements with digitization of 75 ps, and an unprecedented degree of flexibility accompanied by high rate capability and low power consumption. Preliminary specifications of this new TDC chip are presented.
Furthermore a FPGA based readout-driver and buffer-module as an interface between the front-end of the COMPASS detector systems and an optical S-LINK is in development. The same module serves also as remote fan-out for the COMPASS trigger distribution and time synchronization system. This readout-driver monitors the trigger and data flow to and from front-ends. In addition, a specific data buffer structure and sophisticated data flow control is used to pursue local pre-event building. At start-up the module controls all necessary front-end initializations.
△ Less
Submitted 30 October, 1998;
originally announced October 1998.