-
Disentangling the Effects of Structure and Lone-Pair Electrons in the Lattice Dynamics of Halide Perovskites
Authors:
Sebastián Caicedo-Dávila,
Adi Cohen,
Silvia G. Motti,
Masahiko Isobe,
Kyle M. McCall,
Manuel Grumet,
Maksym V. Kovalenko,
Omer Yaffe,
Laura M. Herz,
Douglas H. Fabini,
David A. Egger
Abstract:
Metal halide perovskites have shown great performance as solar energy materials, but their outstanding optoelectronic properties are paired with unusually strong anharmonic effects. It has been proposed that this intriguing combination of properties derives from the "lone pair" 6$s^2$ electron configuration of the Pb$^{2+}$ cations, and associated weak pseudo-Jahn-Teller effect, but the precise im…
▽ More
Metal halide perovskites have shown great performance as solar energy materials, but their outstanding optoelectronic properties are paired with unusually strong anharmonic effects. It has been proposed that this intriguing combination of properties derives from the "lone pair" 6$s^2$ electron configuration of the Pb$^{2+}$ cations, and associated weak pseudo-Jahn-Teller effect, but the precise impact of this chemical feature remains unclear. Here we show that in fact an $ns^2$ electron configuration is not a prerequisite for the strong anharmonicity and low-energy lattice dynamics encountered in this class of materials. We combine X-ray diffraction, infrared and Raman spectroscopies, and first-principles molecular dynamics calculations to directly contrast the lattice dynamics of CsSrBr$_3$ with those of CsPbBr$_3$, two compounds which bear close structural similarity but with the former lacking the propensity to form lone pairs on the 5$s^0$ octahedral cation. We exploit low-frequency diffusive Raman scattering, nominally symmetry-forbidden in the cubic phase, as a fingerprint to detect anharmonicity and reveal that low-frequency tilting occurs irrespective of octahedral cation electron configuration. This work highlights the key role of structure in perovskite lattice dynamics, providing important design rules for the emerging class of soft perovskite semiconductors for optoelectronic and light-harvesting devices.
△ Less
Submitted 29 January, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
Learning Personalized Alignment for Evaluating Open-ended Text Generation
Authors:
Danqing Wang,
Kevin Yang,
Hanlin Zhu,
Xiaomeng Yang,
Andrew Cohen,
Lei Li,
Yuandong Tian
Abstract:
With rapid progress made in language qualities such as fluency and consistency via large language models (LLMs), there has been increasing interest in assessing alignment with diverse human preferences. Traditional metrics heavily rely on lexical similarity with human-written references and have been observed to suffer from a poor correlation with human evaluation. Furthermore, they ignore the div…
▽ More
With rapid progress made in language qualities such as fluency and consistency via large language models (LLMs), there has been increasing interest in assessing alignment with diverse human preferences. Traditional metrics heavily rely on lexical similarity with human-written references and have been observed to suffer from a poor correlation with human evaluation. Furthermore, they ignore the diverse preferences of humans, a key aspect in evaluating open-ended tasks like story generation. Inspired by these challenges, we introduce an interpretable open-ended evaluation framework PerSE to assess the alignment with a specific human preference. It is tuned to deduce the specific preference from a given personal profile and evaluate the alignment between the generation and the personal preference. PerSE also explains its assessment by a detailed comment or several fine-grained scores. This enhances its interpretability, making it more suitable to tailor a personalized generation. Our 13B LLaMA-2-based PerSE shows a 15.8% increase in Kendall correlation and a 13.7% rise in accuracy on zero-shot reviewers compared to GPT-4. It also outperforms GPT-4 by 46.01% in the Kendall correlation on new domains, indicating its transferability.
△ Less
Submitted 19 June, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
Don't throw away your value model! Generating more preferable text with Value-Guided Monte-Carlo Tree Search decoding
Authors:
Jiacheng Liu,
Andrew Cohen,
Ramakanth Pasunuru,
Ye** Choi,
Hannaneh Hajishirzi,
Asli Celikyilmaz
Abstract:
Inference-time search algorithms such as Monte-Carlo Tree Search (MCTS) may seem unnecessary when generating natural language text based on state-of-the-art reinforcement learning such as Proximal Policy Optimization (PPO). In this paper, we demonstrate that it is possible to get extra mileage out of PPO by integrating MCTS on top. The key idea is not to throw out the value network, a byproduct of…
▽ More
Inference-time search algorithms such as Monte-Carlo Tree Search (MCTS) may seem unnecessary when generating natural language text based on state-of-the-art reinforcement learning such as Proximal Policy Optimization (PPO). In this paper, we demonstrate that it is possible to get extra mileage out of PPO by integrating MCTS on top. The key idea is not to throw out the value network, a byproduct of PPO training for evaluating partial output sequences, when decoding text out of the policy network. More concretely, we present a novel value-guided decoding algorithm called PPO-MCTS, which can integrate the value network from PPO to work closely with the policy network during inference-time generation. Compared to prior approaches based on MCTS for controlled text generation, the key strength of our approach is to reduce the fundamental mismatch of the scoring mechanisms of the partial outputs between training and test. Evaluation on four text generation tasks demonstrate that PPO-MCTS greatly improves the preferability of generated text compared to the standard practice of using only the PPO policy. Our results demonstrate the promise of search algorithms even on top of the aligned language models from PPO, and the under-explored benefit of the value network.
△ Less
Submitted 2 April, 2024; v1 submitted 26 September, 2023;
originally announced September 2023.
-
Introducing DictaLM -- A Large Generative Language Model for Modern Hebrew
Authors:
Shaltiel Shmidman,
Avi Shmidman,
Amir David Nissan Cohen,
Moshe Koppel
Abstract:
We present DictaLM, a large-scale language model tailored for Modern Hebrew. Boasting 7B parameters, this model is predominantly trained on Hebrew-centric data. As a commitment to promoting research and development in the Hebrew language, we release both the foundation model and the instruct-tuned model under a Creative Commons license. Concurrently, we introduce DictaLM-Rab, another foundation mo…
▽ More
We present DictaLM, a large-scale language model tailored for Modern Hebrew. Boasting 7B parameters, this model is predominantly trained on Hebrew-centric data. As a commitment to promoting research and development in the Hebrew language, we release both the foundation model and the instruct-tuned model under a Creative Commons license. Concurrently, we introduce DictaLM-Rab, another foundation model geared towards Rabbinic/Historical Hebrew. These foundation models serve as ideal starting points for fine-tuning various Hebrew-specific tasks, such as instruction, Q&A, sentiment analysis, and more. This release represents a preliminary step, offering an initial Hebrew LLM model for the Hebrew NLP community to experiment with.
△ Less
Submitted 25 September, 2023;
originally announced September 2023.
-
Multidimensional well-being of US households at a fine spatial scale using fused household surveys: fusionACS
Authors:
Kevin Ummel,
Miguel Poblete-Cazenave,
Karthik Akkiraju,
Nick Graetz,
Hero Ashman,
Cora Kingdon,
Steven Herrera Tenorio,
Aaryaman "Sunny" Singhal,
Daniel Aldana Cohen,
Narasimha D. Rao
Abstract:
Social science often relies on surveys of households and individuals. Dozens of such surveys are regularly administered by the U.S. government. However, they field independent, unconnected samples with specialized questions, limiting research questions to those that can be answered by a single survey. The fusionACS project seeks to integrate data from multiple U.S. household surveys by statistical…
▽ More
Social science often relies on surveys of households and individuals. Dozens of such surveys are regularly administered by the U.S. government. However, they field independent, unconnected samples with specialized questions, limiting research questions to those that can be answered by a single survey. The fusionACS project seeks to integrate data from multiple U.S. household surveys by statistically "fusing" variables from "donor" surveys onto American Community Survey (ACS) microdata. This results in an integrated microdataset of household attributes and well-being dimensions that can be analyzed to address research questions in ways that are not currently possible. The presented data comprise the fusion onto the ACS of select donor variables from the Residential Energy Consumption Survey (RECS) of 2015, the National Household Transportation Survey (NHTS) of 2017, the American Housing Survey (AHS) of 2019, and the Consumer Expenditure Survey - Interview (CEI) for the years 2015-2019. The underlying statistical techniques are included in an open-source $R$ package, fusionModel, that provides generic tools for the creation, analysis, and validation of fused microdata.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
CRYPTO-MINE: Cryptanalysis via Mutual Information Neural Estimation
Authors:
Benjamin D. Kim,
Vipindev Adat Vasudevan,
Jongchan Woo,
Alejandro Cohen,
Rafael G. L. D'Oliveira,
Thomas Stahlbuhk,
Muriel Médard
Abstract:
The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography…
▽ More
The use of Mutual Information (MI) as a measure to evaluate the efficiency of cryptosystems has an extensive history. However, estimating MI between unknown random variables in a high-dimensional space is challenging. Recent advances in machine learning have enabled progress in estimating MI using neural networks. This work presents a novel application of MI estimation in the field of cryptography. We propose applying this methodology directly to estimate the MI between plaintext and ciphertext in a chosen plaintext attack. The leaked information, if any, from the encryption could potentially be exploited by adversaries to compromise the computational security of the cryptosystem. We evaluate the efficiency of our approach by empirically analyzing multiple encryption schemes and baseline approaches. Furthermore, we extend the analysis to novel network coding-based cryptosystems that provide individual secrecy and study the relationship between information leakage and input distribution.
△ Less
Submitted 18 September, 2023; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Learning to Explore Indoor Environments using Autonomous Micro Aerial Vehicles
Authors:
Yuezhan Tao,
Eran Iceland,
Beiming Li,
Elchanan Zwecher,
Uri Heinemann,
Avraham Cohen,
Amir Avni,
Oren Gal,
Ariel Barel,
Vijay Kumar
Abstract:
In this paper, we address the challenge of exploring unknown indoor aerial environments using autonomous aerial robots with Size Weight and Power (SWaP) constraints. The SWaP constraints induce limits on mission time requiring efficiency in exploration. We present a novel exploration framework that uses Deep Learning (DL) to predict the most likely indoor map given the previous observations, and D…
▽ More
In this paper, we address the challenge of exploring unknown indoor aerial environments using autonomous aerial robots with Size Weight and Power (SWaP) constraints. The SWaP constraints induce limits on mission time requiring efficiency in exploration. We present a novel exploration framework that uses Deep Learning (DL) to predict the most likely indoor map given the previous observations, and Deep Reinforcement Learning (DRL) for exploration, designed to run on modern SWaP constraints neural processors. The DL-based map predictor provides a prediction of the occupancy of the unseen environment while the DRL-based planner determines the best navigation goals that can be safely reached to provide the most information. The two modules are tightly coupled and run onboard allowing the vehicle to safely map an unknown environment. Extensive experimental and simulation results show that our approach surpasses state-of-the-art methods by 50-60% in efficiency, which we measure by the fraction of the explored space as a function of the length of the trajectory traveled.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
The Past, Present, and Future of the Brain Imaging Data Structure (BIDS)
Authors:
Russell A. Poldrack,
Christopher J. Markiewicz,
Stefan Appelhoff,
Yoni K. Ashar,
Tibor Auer,
Sylvain Baillet,
Shashank Bansal,
Leandro Beltrachini,
Christian G. Benar,
Giacomo Bertazzoli,
Suyash Bhogawar,
Ross W. Blair,
Marta Bortoletto,
Mathieu Boudreau,
Teon L. Brooks,
Vince D. Calhoun,
Filippo Maria Castelli,
Patricia Clement,
Alexander L Cohen,
Julien Cohen-Adad,
Sasha D'Ambrosio,
Gilles de Hollander,
María de la iglesia-Vayá,
Alejandro de la Vega,
Arnaud Delorme
, et al. (89 additional authors not shown)
Abstract:
The Brain Imaging Data Structure (BIDS) is a community-driven standard for the organization of data and metadata from a growing range of neuroscience modalities. This paper is meant as a history of how the standard has developed and grown over time. We outline the principles behind the project, the mechanisms by which it has been extended, and some of the challenges being addressed as it evolves.…
▽ More
The Brain Imaging Data Structure (BIDS) is a community-driven standard for the organization of data and metadata from a growing range of neuroscience modalities. This paper is meant as a history of how the standard has developed and grown over time. We outline the principles behind the project, the mechanisms by which it has been extended, and some of the challenges being addressed as it evolves. We also discuss the lessons learned through the project, with the aim of enabling researchers in other domains to learn from the success of BIDS.
△ Less
Submitted 8 January, 2024; v1 submitted 11 September, 2023;
originally announced September 2023.
-
Rate-Optimal Policy Optimization for Linear Markov Decision Processes
Authors:
Uri Sherman,
Alon Cohen,
Tomer Koren,
Yishay Mansour
Abstract:
We study regret minimization in online episodic linear Markov Decision Processes, and obtain rate-optimal $\widetilde O (\sqrt K)$ regret where $K$ denotes the number of episodes. Our work is the first to establish the optimal (w.r.t.~$K$) rate of convergence in the stochastic setting with bandit feedback using a policy optimization based approach, and the first to establish the optimal (w.r.t.~…
▽ More
We study regret minimization in online episodic linear Markov Decision Processes, and obtain rate-optimal $\widetilde O (\sqrt K)$ regret where $K$ denotes the number of episodes. Our work is the first to establish the optimal (w.r.t.~$K$) rate of convergence in the stochastic setting with bandit feedback using a policy optimization based approach, and the first to establish the optimal (w.r.t.~$K$) rate in the adversarial setup with full information feedback, for which no algorithm with an optimal rate guarantee is currently known.
△ Less
Submitted 16 May, 2024; v1 submitted 28 August, 2023;
originally announced August 2023.
-
APART: Diverse Skill Discovery using All Pairs with Ascending Reward and DropouT
Authors:
Hadar Schreiber Galler,
Tom Zahavy,
Guillaume Desjardins,
Alon Cohen
Abstract:
We study diverse skill discovery in reward-free environments, aiming to discover all possible skills in simple grid-world environments where prior methods have struggled to succeed. This problem is formulated as mutual training of skills using an intrinsic reward and a discriminator trained to predict a skill given its trajectory. Our initial solution replaces the standard one-vs-all (softmax) dis…
▽ More
We study diverse skill discovery in reward-free environments, aiming to discover all possible skills in simple grid-world environments where prior methods have struggled to succeed. This problem is formulated as mutual training of skills using an intrinsic reward and a discriminator trained to predict a skill given its trajectory. Our initial solution replaces the standard one-vs-all (softmax) discriminator with a one-vs-one (all pairs) discriminator and combines it with a novel intrinsic reward function and a dropout regularization technique. The combined approach is named APART: Diverse Skill Discovery using All Pairs with Ascending Reward and Dropout. We demonstrate that APART discovers all the possible skills in grid worlds with remarkably fewer samples than previous works. Motivated by the empirical success of APART, we further investigate an even simpler algorithm that achieves maximum skills by altering VIC, rescaling its intrinsic reward, and tuning the temperature of its softmax discriminator. We believe our findings shed light on the crucial factors underlying success of skill discovery algorithms in reinforcement learning.
△ Less
Submitted 24 August, 2023;
originally announced August 2023.
-
Energy gap of the even-denominator fractional quantum Hall state in bilayer graphene
Authors:
Alexandre Assouline,
Taige Wang,
Haoxin Zhou,
Liam A. Cohen,
Fangyuan Yang,
Ruining Zhang,
Takashi Taniguchi,
Kenji Watanabe,
Roger S. K. Mong,
Michael P. Zaletel,
Andrea F. Young
Abstract:
Bernal bilayer graphene hosts even denominator fractional quantum Hall states thought to be described by a Pfaffian wave function with nonabelian quasiparticle excitations. Here we report the quantitative determination of fractional quantum Hall energy gaps in bilayer graphene using both thermally activated transport and by direct measurement of the chemical potential. We find a transport activati…
▽ More
Bernal bilayer graphene hosts even denominator fractional quantum Hall states thought to be described by a Pfaffian wave function with nonabelian quasiparticle excitations. Here we report the quantitative determination of fractional quantum Hall energy gaps in bilayer graphene using both thermally activated transport and by direct measurement of the chemical potential. We find a transport activation gap of 5.1K at B = 12T for a half-filled N=1 Landau level, consistent with density matrix renormalization group calculations for the Pfaffian state. However, the measured thermodynamic gap of 11.6K is smaller than theoretical expectations for the clean limit by approximately a factor of two. We analyze the chemical potential data near fractional filling within a simplified model of a Wigner crystal of fractional quasiparticles with long-wavelength disorder, explaining this discrepancy. Our results quantitatively establish bilayer graphene as a robust platform for probing the non-Abelian anyons expected to arise as the elementary excitations of the even-denominator state.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
CERMET: Coding for Energy Reduction with Multiple Encryption Techniques -- $It's\ easy\ being\ green$
Authors:
Jongchan Woo,
Vipindev Adat Vasudevan,
Benjamin Kim,
Alejandro Cohen,
Rafael G. L. D'Oliveira,
Thomas Stahlbuhk,
Muriel Médard
Abstract:
This paper presents CERMET, an energy-efficient hardware architecture designed for hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction with network coding to provide both information-theoretic and computational security while reducing energy consumption per bit. This paper introduces the hardware architecture for the system and explores various optimizations to en…
▽ More
This paper presents CERMET, an energy-efficient hardware architecture designed for hardware-constrained cryptosystems. CERMET employs a base cryptosystem in conjunction with network coding to provide both information-theoretic and computational security while reducing energy consumption per bit. This paper introduces the hardware architecture for the system and explores various optimizations to enhance its performance. The universality of the approach is demonstrated by designing the architecture to accommodate both asymmetric and symmetric cryptosystems. The analysis reveals that the benefits of this proposed approach are multifold, reducing energy per bit and area without compromising security or throughput. The optimized hardware architectures can achieve below 1 pJ/bit operations for AES-256. Furthermore, for a public key cryptosystem based on Elliptic Curve Cryptography (ECC), a remarkable 14.6X reduction in energy per bit and a 9.3X reduction in area are observed, bringing it to less than 1 nJ/bit.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
A new upper bound for the Heilbronn triangle problem
Authors:
Alex Cohen,
Cosmin Pohoata,
Dmitrii Zakharov
Abstract:
For sufficiently large $n$, we show that in every configuration of $n$ points chosen inside the unit square there exists a triangle of area less than $n^{-8/7-1/2000}$. This improves upon a result of Komlós, Pintz and Szemerédi from 1982. Our approach establishes new connections between the Heilbronn triangle problem and various themes in incidence geometry and projection theory which are closely…
▽ More
For sufficiently large $n$, we show that in every configuration of $n$ points chosen inside the unit square there exists a triangle of area less than $n^{-8/7-1/2000}$. This improves upon a result of Komlós, Pintz and Szemerédi from 1982. Our approach establishes new connections between the Heilbronn triangle problem and various themes in incidence geometry and projection theory which are closely related to the discretized sum-product phenomenon.
△ Less
Submitted 29 May, 2023;
originally announced May 2023.
-
Description-Based Text Similarity
Authors:
Shauli Ravfogel,
Valentina Pyatkin,
Amir DN Cohen,
Avshalom Manevich,
Yoav Goldberg
Abstract:
Identifying texts with a given semantics is central for many information seeking scenarios. Similarity search over vector embeddings appear to be central to this ability, yet the similarity reflected in current text embeddings is corpus-driven, and is inconsistent and sub-optimal for many use cases. What, then, is a good notion of similarity for effective retrieval of text?
We identify the need…
▽ More
Identifying texts with a given semantics is central for many information seeking scenarios. Similarity search over vector embeddings appear to be central to this ability, yet the similarity reflected in current text embeddings is corpus-driven, and is inconsistent and sub-optimal for many use cases. What, then, is a good notion of similarity for effective retrieval of text?
We identify the need to search for texts based on abstract descriptions of their content, and the corresponding notion of \emph{description based similarity}. We demonstrate the inadequacy of current text embeddings and propose an alternative model that significantly improves when used in standard nearest neighbor search. The model is trained using positive and negative pairs sourced through prompting a LLM, demonstrating how data from LLMs can be used for creating new capabilities not immediately possible using the original model.
△ Less
Submitted 26 April, 2024; v1 submitted 21 May, 2023;
originally announced May 2023.
-
Fractal uncertainty in higher dimensions
Authors:
Alex Cohen
Abstract:
We prove that if a fractal set in $\mathbb{R}^d$ avoids lines in a certain quantitative sense, which we call line porosity, then it has a fractal uncertainty principle. The main ingredient is a new higher dimensional Beurling-Malliavin multiplier theorem.
We prove that if a fractal set in $\mathbb{R}^d$ avoids lines in a certain quantitative sense, which we call line porosity, then it has a fractal uncertainty principle. The main ingredient is a new higher dimensional Beurling-Malliavin multiplier theorem.
△ Less
Submitted 8 May, 2023;
originally announced May 2023.
-
What is missing in autonomous discovery: Open challenges for the community
Authors:
Phillip M. Maffettone,
Pascal Friederich,
Sterling G. Baird,
Ben Blaiszik,
Keith A. Brown,
Stuart I. Campbell,
Orion A. Cohen,
Tantum Collins,
Rebecca L. Davis,
Ian T. Foster,
Navid Haghmoradi,
Mark Hereld,
Nicole Jung,
Ha-Kyung Kwon,
Gabriella Pizzuto,
Jacob Rintamaki,
Casper Steinmann,
Luca Torresi,
Shi**g Sun
Abstract:
Self-driving labs (SDLs) leverage combinations of artificial intelligence, automation, and advanced computing to accelerate scientific discovery. The promise of this field has given rise to a rich community of passionate scientists, engineers, and social scientists, as evidenced by the development of the Acceleration Consortium and recent Accelerate Conference. Despite its strengths, this rapidly…
▽ More
Self-driving labs (SDLs) leverage combinations of artificial intelligence, automation, and advanced computing to accelerate scientific discovery. The promise of this field has given rise to a rich community of passionate scientists, engineers, and social scientists, as evidenced by the development of the Acceleration Consortium and recent Accelerate Conference. Despite its strengths, this rapidly develo** field presents numerous opportunities for growth, challenges to overcome, and potential risks of which to remain aware. This community perspective builds on a discourse instantiated during the first Accelerate Conference, and looks to the future of self-driving labs with a tempered optimism. Incorporating input from academia, government, and industry, we briefly describe the current status of self-driving labs, then turn our attention to barriers, opportunities, and a vision for what is possible. Our field is delivering solutions in technology and infrastructure, artificial intelligence and knowledge generation, and education and workforce development. In the spirit of community, we intend for this work to foster discussion and drive best practices as our field grows.
△ Less
Submitted 2 May, 2023; v1 submitted 21 April, 2023;
originally announced April 2023.
-
Reduced order modeling for elliptic problems with high contrast diffusion coefficients
Authors:
Albert Cohen,
Matthieu Dolbeault,
Agustin Somacal,
Wolfgang Dahmen
Abstract:
We consider the parametric elliptic PDE $-{\rm div} (a(y)\nabla u)=f$ on a spatial domain $Ω$, with $a(y)$ a scalar piecewise constant diffusion coefficient taking any positive values $y=(y_1, \dots, y_d)\in ]0,\infty[^d$ on fixed subdomains $Ω_1,\dots,Ω_d$. This problem is not uniformly elliptic as the contrast $κ(y)=\frac{\max y_j}{\min y_j}$ can be arbitrarily high, contrarily to the Uniform El…
▽ More
We consider the parametric elliptic PDE $-{\rm div} (a(y)\nabla u)=f$ on a spatial domain $Ω$, with $a(y)$ a scalar piecewise constant diffusion coefficient taking any positive values $y=(y_1, \dots, y_d)\in ]0,\infty[^d$ on fixed subdomains $Ω_1,\dots,Ω_d$. This problem is not uniformly elliptic as the contrast $κ(y)=\frac{\max y_j}{\min y_j}$ can be arbitrarily high, contrarily to the Uniform Ellipticity Assumption (UEA) that is commonly made on parametric elliptic PDEs. Based on local polynomial approximations in the $y$ variable, we construct local and global reduced model spaces $V_n$ of moderate dimension $n$ that approximate uniformly well all solutions $u(y)$. Since the solution $u(y)$ blows as $y\to 0$, the solution manifold is not a compact set and does not have finite $n$-width. Therefore, our results for approximation by such spaces are formulated in terms of relative $H^1_0$-projection error, that is, after normalization by $\|u(y)\|_{H^1_0}$. We prove that this relative error decays exponentially with $n$, yet exhibiting the curse of dimensionality as the number $d$ of subdomains grows. We also show similar rates for the Galerkin projection despite the fact that high contrast is well-known to deteriorate the multiplicative constant when applying Cea's lemma. We finally establish uniform estimates in relative error for the state estimation and parameter estimation inverse problems, when $y$ is unknown and a limited number of linear measurements $\ell_i(u)$ are observed. A key ingredient in our construction and analysis is the study of the convergence of $u(y)$ to limit solutions when some of the parameters $y_j$ tend to infinity.
△ Less
Submitted 21 April, 2023;
originally announced April 2023.
-
Spiking at the edge
Authors:
Colin Scheibner,
Hillel Ori,
Adam E. Cohen,
Vincenzo Vitelli
Abstract:
Excitable media, ranging from bioelectric tissues and chemical oscillators to forest fires and competing populations, are nonlinear, spatially extended systems capable of spiking. Most investigations of excitable media consider situations where the amplifying and suppressing forces necessary for spiking coexist at every point in space. In this case, spiking requires a fine-tuned ratio between loca…
▽ More
Excitable media, ranging from bioelectric tissues and chemical oscillators to forest fires and competing populations, are nonlinear, spatially extended systems capable of spiking. Most investigations of excitable media consider situations where the amplifying and suppressing forces necessary for spiking coexist at every point in space. In this case, spiking requires a fine-tuned ratio between local amplification and suppression strengths. But, in Nature and engineered systems, these forces can be segregated in space, forming structures like interfaces and boundaries. Here, we show how boundaries can generate and protect spiking if the reacting components can spread out: even arbitrarily weak diffusion can cause spiking at the edge between two non-excitable media. This edge spiking is a robust phenomenon that can occur even if the ratio between amplification and suppression does not allow spiking when the two sides are homogeneously mixed. We analytically derive a spiking phase diagram that depends on two parameters: (i) the ratio between the system size and the characteristic diffusive length-scale, and (ii) the ratio between the amplification and suppression strengths. Our analysis explains recent experimental observations of action potentials at the interface between two non-excitable bioelectric tissues. Beyond electrophysiology, we highlight how edge spiking emerges in predator-prey dynamics and in oscillating chemical reactions. Our findings provide a theoretical blueprint for a class of interfacial excitations in reaction-diffusion systems, with potential implications for spatially controlled chemical reactions, nonlinear waveguides and neuromorphic computation, as well as spiking instabilities, such as cardiac arrhythmias, that naturally occur in heterogeneous biological media.
△ Less
Submitted 14 April, 2023;
originally announced April 2023.
-
The James Webb Space Telescope Mission
Authors:
Jonathan P. Gardner,
John C. Mather,
Randy Abbott,
James S. Abell,
Mark Abernathy,
Faith E. Abney,
John G. Abraham,
Roberto Abraham,
Yasin M. Abul-Huda,
Scott Acton,
Cynthia K. Adams,
Evan Adams,
David S. Adler,
Maarten Adriaensen,
Jonathan Albert Aguilar,
Mansoor Ahmed,
Nasif S. Ahmed,
Tanjira Ahmed,
Rüdeger Albat,
Loïc Albert,
Stacey Alberts,
David Aldridge,
Mary Marsha Allen,
Shaune S. Allen,
Martin Altenburg
, et al. (983 additional authors not shown)
Abstract:
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astrono…
▽ More
Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least $4m$. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the $6.5m$ James Webb Space Telescope. A generation of astronomers will celebrate their accomplishments for the life of the mission, potentially as long as 20 years, and beyond. This report and the scientific discoveries that follow are extended thank-you notes to the 20,000 team members. The telescope is working perfectly, with much better image quality than expected. In this and accompanying papers, we give a brief history, describe the observatory, outline its objectives and current observing program, and discuss the inventions and people who made it possible. We cite detailed reports on the design and the measured performance on orbit.
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
Impact of cross-section uncertainties on supernova neutrino spectral parameter fitting in the Deep Underground Neutrino Experiment
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson,
D. A. Andrade
, et al. (1294 additional authors not shown)
Abstract:
A primary goal of the upcoming Deep Underground Neutrino Experiment (DUNE) is to measure the $\mathcal{O}(10)$ MeV neutrinos produced by a Galactic core-collapse supernova if one should occur during the lifetime of the experiment. The liquid-argon-based detectors planned for DUNE are expected to be uniquely sensitive to the $ν_e$ component of the supernova flux, enabling a wide variety of physics…
▽ More
A primary goal of the upcoming Deep Underground Neutrino Experiment (DUNE) is to measure the $\mathcal{O}(10)$ MeV neutrinos produced by a Galactic core-collapse supernova if one should occur during the lifetime of the experiment. The liquid-argon-based detectors planned for DUNE are expected to be uniquely sensitive to the $ν_e$ component of the supernova flux, enabling a wide variety of physics and astrophysics measurements. A key requirement for a correct interpretation of these measurements is a good understanding of the energy-dependent total cross section $σ(E_ν)$ for charged-current $ν_e$ absorption on argon. In the context of a simulated extraction of supernova $ν_e$ spectral parameters from a toy analysis, we investigate the impact of $σ(E_ν)$ modeling uncertainties on DUNE's supernova neutrino physics sensitivity for the first time. We find that the currently large theoretical uncertainties on $σ(E_ν)$ must be substantially reduced before the $ν_e$ flux parameters can be extracted reliably: in the absence of external constraints, a measurement of the integrated neutrino luminosity with less than 10\% bias with DUNE requires $σ(E_ν)$ to be known to about 5%. The neutrino spectral shape parameters can be known to better than 10% for a 20% uncertainty on the cross-section scale, although they will be sensitive to uncertainties on the shape of $σ(E_ν)$. A direct measurement of low-energy $ν_e$-argon scattering would be invaluable for improving the theoretical precision to the needed level.
△ Less
Submitted 7 July, 2023; v1 submitted 29 March, 2023;
originally announced March 2023.
-
Every real-rooted exponential polynomial is the restriction of a Lee-Yang polynomial
Authors:
Lior Alon,
Alex Cohen,
Cynthia Vinzant
Abstract:
A Lee-Yang polynomial $ p(z_{1},\ldots,z_{n}) $ is a polynomial that has no zeros in the polydisc $ \mathbb{D}^{n} $ and its inverse $ (\mathbb{C}\setminus\overline{\mathbb{D}})^{n} $. We show that any real-rooted exponential polynomial of the form $f(x) = \sum_{j=0}^s c_j e^{λ_j x}$ can be written as the restriction of a Lee-Yang polynomial to a positive line in the torus. Together with previous…
▽ More
A Lee-Yang polynomial $ p(z_{1},\ldots,z_{n}) $ is a polynomial that has no zeros in the polydisc $ \mathbb{D}^{n} $ and its inverse $ (\mathbb{C}\setminus\overline{\mathbb{D}})^{n} $. We show that any real-rooted exponential polynomial of the form $f(x) = \sum_{j=0}^s c_j e^{λ_j x}$ can be written as the restriction of a Lee-Yang polynomial to a positive line in the torus. Together with previous work by Olevskii and Ulanovskii, this implies that the Kurasov-Sarnak construction of $ \mathbb{N} $-valued Fourier quasicrystals from stable polynomials comprises every possible $ \mathbb{N} $-valued Fourier quasicrystal.
△ Less
Submitted 10 March, 2023; v1 submitted 6 March, 2023;
originally announced March 2023.
-
Efficient Rate Optimal Regret for Adversarial Contextual MDPs Using Online Function Approximation
Authors:
Orin Levy,
Alon Cohen,
Asaf Cassel,
Yishay Mansour
Abstract:
We present the OMG-CMDP! algorithm for regret minimization in adversarial Contextual MDPs. The algorithm operates under the minimal assumptions of realizable function class and access to online least squares and log loss regression oracles. Our algorithm is efficient (assuming efficient online regression oracles), simple and robust to approximation errors. It enjoys an…
▽ More
We present the OMG-CMDP! algorithm for regret minimization in adversarial Contextual MDPs. The algorithm operates under the minimal assumptions of realizable function class and access to online least squares and log loss regression oracles. Our algorithm is efficient (assuming efficient online regression oracles), simple and robust to approximation errors. It enjoys an $\widetilde{O}(H^{2.5} \sqrt{ T|S||A| ( \mathcal{R}(\mathcal{O}) + H \log(δ^{-1}) )})$ regret guarantee, with $T$ being the number of episodes, $S$ the state space, $A$ the action space, $H$ the horizon and $\mathcal{R}(\mathcal{O}) = \mathcal{R}(\mathcal{O}_{\mathrm{sq}}^\mathcal{F}) + \mathcal{R}(\mathcal{O}_{\mathrm{log}}^\mathcal{P})$ is the sum of the regression oracles' regret, used to approximate the context-dependent rewards and dynamics, respectively. To the best of our knowledge, our algorithm is the first efficient rate optimal regret minimization algorithm for adversarial CMDPs that operates under the minimal standard assumption of online function approximation.
△ Less
Submitted 14 August, 2023; v1 submitted 2 March, 2023;
originally announced March 2023.
-
Optimizing Jastrow factors for the transcorrelated method
Authors:
J. Philip Haupt,
Seyed Mohammadreza Hosseini,
Pablo Lopez Rios,
Werner Dobrautz,
Aron Cohen,
Ali Alavi
Abstract:
We investigate the optimization of flexible tailored real-space Jastrow factors for use in the transcorrelated (TC) method in combination with highly accurate quantum chemistry methods such as initiator full configuration interaction quantum Monte Carlo (FCIQMC). Jastrow factors obtained by minimizing the variance of the TC reference energy are found to yield better, more consistent results than t…
▽ More
We investigate the optimization of flexible tailored real-space Jastrow factors for use in the transcorrelated (TC) method in combination with highly accurate quantum chemistry methods such as initiator full configuration interaction quantum Monte Carlo (FCIQMC). Jastrow factors obtained by minimizing the variance of the TC reference energy are found to yield better, more consistent results than those obtained by minimizing the variational energy. We compute all-electron atomization energies for the challenging first-row molecules C2 , CN, N2 , and O2 and find that the TC method yields chemically accurate results using only the cc-pVTZ basis set, roughly matching the accuracy of non-TC calculations with the much larger cc-pV5Z basis set. We also investigate an approximation in which pure three-body excitations are neglected from the TC-FCIQMC dynamics, saving storage and computational cost, and show that it affects relative energies negligibly. Our results demonstrate that the combination of tailored real-space Jastrow factors with the multi-configurational TC-FCIQMC method provides a route to obtaining chemical accuracy using modest basis sets, obviating the need for basis-set extrapolation and composite techniques.
△ Less
Submitted 12 May, 2023; v1 submitted 27 February, 2023;
originally announced February 2023.
-
Solving PDEs with Incomplete Information
Authors:
Peter Binev,
Andrea Bonito,
Albert Cohen,
Wolfgang Dahmen,
Ronald DeVore,
Guergana Petrova
Abstract:
We consider the problem of numerically approximating the solutions to a partial differential equation (PDE) when there is insufficient information to determine a unique solution. Our main example is the Poisson boundary value problem, when the boundary data is unknown and instead one observes finitely many linear measurements of the solution. We view this setting as an optimal recovery problem and…
▽ More
We consider the problem of numerically approximating the solutions to a partial differential equation (PDE) when there is insufficient information to determine a unique solution. Our main example is the Poisson boundary value problem, when the boundary data is unknown and instead one observes finitely many linear measurements of the solution. We view this setting as an optimal recovery problem and develop theory and numerical algorithms for its solution. The main vehicle employed is the derivation and approximation of the Riesz representers of these functionals with respect to relevant Hilbert spaces of harmonic functions.
△ Less
Submitted 20 December, 2023; v1 submitted 13 January, 2023;
originally announced January 2023.
-
Sample-efficient Surrogate Model for Frequency Response of Linear PDEs using Self-Attentive Complex Polynomials
Authors:
Andrew Cohen,
Wei** Dou,
Jiang Zhu,
Slawomir Koziel,
Peter Renner,
Jan-Ove Mattsson,
Xiaomeng Yang,
Beidi Chen,
Kevin Stone,
Yuandong Tian
Abstract:
Linear Partial Differential Equations (PDEs) govern the spatial-temporal dynamics of physical systems that are essential to building modern technology. When working with linear PDEs, designing a physical system for a specific outcome is difficult and costly due to slow and expensive explicit simulation of PDEs and the highly nonlinear relationship between a system's configuration and its behavior.…
▽ More
Linear Partial Differential Equations (PDEs) govern the spatial-temporal dynamics of physical systems that are essential to building modern technology. When working with linear PDEs, designing a physical system for a specific outcome is difficult and costly due to slow and expensive explicit simulation of PDEs and the highly nonlinear relationship between a system's configuration and its behavior. In this work, we prove a parametric form that certain physical quantities in the Fourier domain must obey in linear PDEs, named the CZP (Constant-Zeros-Poles) framework. Applying CZP to antenna design, an industrial application using linear PDEs (i.e., Maxwell's equations), we derive a sample-efficient parametric surrogate model that directly predicts its scattering coefficients without explicit numerical PDE simulation. Combined with a novel image-based antenna representation and an attention-based neural network architecture, CZP outperforms baselines by 10% to 25% in terms of test loss and also is able to find 2D antenna designs verifiable by commercial software with $33\%$ greater success than baselines, when coupled with sequential search techniques like reinforcement learning.
△ Less
Submitted 2 February, 2023; v1 submitted 6 January, 2023;
originally announced January 2023.
-
Learning-based Optimal Admission Control in a Single Server Queuing System
Authors:
Asaf Cohen,
Vijay G. Subramanian,
Yili Zhang
Abstract:
We consider a long-term average profit maximizing admission control problem in an M/M/1 queuing system with unknown service and arrival rates. With a fixed reward collected upon service completion and a cost per unit of time enforced on customers waiting in the queue, a dispatcher decides upon arrivals whether to admit the arriving customer or not based on the full history of observations of the q…
▽ More
We consider a long-term average profit maximizing admission control problem in an M/M/1 queuing system with unknown service and arrival rates. With a fixed reward collected upon service completion and a cost per unit of time enforced on customers waiting in the queue, a dispatcher decides upon arrivals whether to admit the arriving customer or not based on the full history of observations of the queue-length of the system. (Naor 1969, Econometrica) showed that if all the parameters of the model are known, then it is optimal to use a static threshold policy -- admit if the queue-length is less than a predetermined threshold and otherwise not. We propose a learning-based dispatching algorithm and characterize its regret with respect to optimal dispatch policies for the full information model of Naor (1969). We show that the algorithm achieves an $O(1)$ regret when all optimal thresholds with full information are non-zero, and achieves an $O(\ln^{1+ε}(N))$ regret for any specified $ε>0$, in the case that an optimal threshold with full information is $0$ (i.e., an optimal policy is to reject all arrivals), where $N$ is the number of arrivals.
△ Less
Submitted 23 November, 2023; v1 submitted 21 December, 2022;
originally announced December 2022.
-
Highly-parallelized simulation of a pixelated LArTPC on a GPU
Authors:
DUNE Collaboration,
A. Abed Abud,
B. Abi,
R. Acciarri,
M. A. Acero,
M. R. Adames,
G. Adamov,
M. Adamowski,
D. Adams,
M. Adinolfi,
C. Adriano,
A. Aduszkiewicz,
J. Aguilar,
Z. Ahmad,
J. Ahmed,
B. Aimard,
F. Akbar,
K. Allison,
S. Alonso Monsalve,
M. Alrashed,
C. Alt,
A. Alton,
R. Alvarez,
P. Amedo,
J. Anderson
, et al. (1282 additional authors not shown)
Abstract:
The rapid development of general-purpose computing on graphics processing units (GPGPU) is allowing the implementation of highly-parallelized Monte Carlo simulation chains for particle physics experiments. This technique is particularly suitable for the simulation of a pixelated charge readout for time projection chambers, given the large number of channels that this technology employs. Here we pr…
▽ More
The rapid development of general-purpose computing on graphics processing units (GPGPU) is allowing the implementation of highly-parallelized Monte Carlo simulation chains for particle physics experiments. This technique is particularly suitable for the simulation of a pixelated charge readout for time projection chambers, given the large number of channels that this technology employs. Here we present the first implementation of a full microphysical simulator of a liquid argon time projection chamber (LArTPC) equipped with light readout and pixelated charge readout, developed for the DUNE Near Detector. The software is implemented with an end-to-end set of GPU-optimized algorithms. The algorithms have been written in Python and translated into CUDA kernels using Numba, a just-in-time compiler for a subset of Python and NumPy instructions. The GPU implementation achieves a speed up of four orders of magnitude compared with the equivalent CPU version. The simulation of the current induced on $10^3$ pixels takes around 1 ms on the GPU, compared with approximately 10 s on the CPU. The results of the simulation are compared against data from a pixel-readout LArTPC prototype.
△ Less
Submitted 28 February, 2023; v1 submitted 19 December, 2022;
originally announced December 2022.
-
Perfectly Covert Communication with a Reflective Panel
Authors:
Or Elimelech,
Asaf Cohen
Abstract:
This work considers the problem of \emph{perfect} covert communication in wireless networks. Specifically, harnessing an Intelligent Reflecting Surface (IRS), we turn our attention to schemes that allow the transmitter to completely hide the communication, with \emph{zero energy} at the unwanted listener (Willie) and hence zero probability of detection. Applications of such schemes go beyond simpl…
▽ More
This work considers the problem of \emph{perfect} covert communication in wireless networks. Specifically, harnessing an Intelligent Reflecting Surface (IRS), we turn our attention to schemes that allow the transmitter to completely hide the communication, with \emph{zero energy} at the unwanted listener (Willie) and hence zero probability of detection. Applications of such schemes go beyond simple covertness, as we prevent detectability or decoding even when the codebook, timings, and channel characteristics are known to Willie. We define perfect covertness, give a necessary and sufficient condition for it in IRS-assisted communication, and define the optimization problem. For two IRS elements, we analyze the probability of finding a solution and derive its closed form. We then investigate the problem of more than two IRS elements by analyzing the probability of such a zero-detection solution. We prove that this probability converges to $1$ as the number of elements tends to infinity. We provide an iterative algorithm to find a perfectly covert solution and prove its convergence. The results are also supported by simulations, showing that a small amount of IRS elements allows for a positive rate at the legitimate user yet with zero probability of detection at an unwanted listener.
△ Less
Submitted 27 January, 2024; v1 submitted 18 December, 2022;
originally announced December 2022.
-
Biomedical image analysis competitions: The state of current participation practice
Authors:
Matthias Eisenmann,
Annika Reinke,
Vivienn Weru,
Minu Dietlinde Tizabi,
Fabian Isensee,
Tim J. Adler,
Patrick Godau,
Veronika Cheplygina,
Michal Kozubek,
Sharib Ali,
Anubha Gupta,
Jan Kybic,
Alison Noble,
Carlos Ortiz de Solórzano,
Samiksha Pachade,
Caroline Petitjean,
Daniel Sage,
Donglai Wei,
Elizabeth Wilden,
Deepak Alapatt,
Vincent Andrearczyk,
Ujjwal Baid,
Spyridon Bakas,
Niranjan Balu,
Sophia Bano
, et al. (331 additional authors not shown)
Abstract:
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,…
▽ More
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis, we designed an international survey that was issued to all participants of challenges conducted in conjunction with the IEEE ISBI 2021 and MICCAI 2021 conferences (80 competitions in total). The survey covered participants' expertise and working environments, their chosen strategies, as well as algorithm characteristics. A median of 72% challenge participants took part in the survey. According to our results, knowledge exchange was the primary incentive (70%) for participation, while the reception of prize money played only a minor role (16%). While a median of 80 working hours was spent on method development, a large portion of participants stated that they did not have enough time for method development (32%). 25% perceived the infrastructure to be a bottleneck. Overall, 94% of all solutions were deep learning-based. Of these, 84% were based on standard architectures. 43% of the respondents reported that the data samples (e.g., images) were too large to be processed at once. This was most commonly addressed by patch-based training (69%), downsampling (37%), and solving 3D analysis tasks as a series of 2D tasks. K-fold cross-validation on the training set was performed by only 37% of the participants and only 50% of the participants performed ensembling based on multiple identical models (61%) or heterogeneous models (39%). 48% of the respondents applied postprocessing steps.
△ Less
Submitted 12 September, 2023; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Mind The Edge: Refining Depth Edges in Sparsely-Supervised Monocular Depth Estimation
Authors:
Lior Talker,
Aviad Cohen,
Erez Yosef,
Alexandra Dana,
Michael Dinerstein
Abstract:
Monocular Depth Estimation (MDE) is a fundamental problem in computer vision with numerous applications. Recently, LIDAR-supervised methods have achieved remarkable per-pixel depth accuracy in outdoor scenes. However, significant errors are typically found in the proximity of depth discontinuities, i.e., depth edges, which often hinder the performance of depth-dependent applications that are sensi…
▽ More
Monocular Depth Estimation (MDE) is a fundamental problem in computer vision with numerous applications. Recently, LIDAR-supervised methods have achieved remarkable per-pixel depth accuracy in outdoor scenes. However, significant errors are typically found in the proximity of depth discontinuities, i.e., depth edges, which often hinder the performance of depth-dependent applications that are sensitive to such inaccuracies, e.g., novel view synthesis and augmented reality. Since direct supervision for the location of depth edges is typically unavailable in sparse LIDAR-based scenes, encouraging the MDE model to produce correct depth edges is not straightforward. To the best of our knowledge this paper is the first attempt to address the depth edges issue for LIDAR-supervised scenes. In this work we propose to learn to detect the location of depth edges from densely-supervised synthetic data, and use it to generate supervision for the depth edges in the MDE training. To quantitatively evaluate our approach, and due to the lack of depth edges GT in LIDAR-based scenes, we manually annotated subsets of the KITTI and the DDAD datasets with depth edges ground truth. We demonstrate significant gains in the accuracy of the depth edges with comparable per-pixel depth accuracy on several challenging datasets. Code and datasets are available at \url{https://github.com/liortalker/MindTheEdge}.
△ Less
Submitted 3 April, 2024; v1 submitted 10 December, 2022;
originally announced December 2022.
-
Universal chiral Luttinger liquid behavior in a graphene fractional quantum Hall point contact
Authors:
Liam A. Cohen,
Noah L. Samuelson,
Taige Wang,
Takashi Taniguchi,
Kenji Watanabe,
Michael P. Zaletel,
Andrea F. Young
Abstract:
One dimensional conductors are described by Luttinger liquid theory, which predicts a power-law suppression of the density of states near the Fermi level. The scaling exponent is non-universal in the general case, but is predicted to be quantized for the chiral edge states of the fractional quantum Hall effect. Here, we report conductance measurements across a point contact linking integer and fra…
▽ More
One dimensional conductors are described by Luttinger liquid theory, which predicts a power-law suppression of the density of states near the Fermi level. The scaling exponent is non-universal in the general case, but is predicted to be quantized for the chiral edge states of the fractional quantum Hall effect. Here, we report conductance measurements across a point contact linking integer and fractional quantum Hall edge states. At weak coupling, we observe the predicted universal quadratic scaling with temperature and voltage. At strong coupling, the conductance saturates to e^2/2h, arising from perfect Andreev reflection of fractionalized quasi-particles at the point contact. We use the strong coupling physics to realize a nearly dissipationless DC voltage step-up transformer, whose gain of 3/2 arises directly from topological fractionalization of electrical charge.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Covertly Controlling a Linear System
Authors:
Barak Amihood,
Asaf Cohen
Abstract:
Consider the problem of covertly controlling a linear system. In this problem, Alice desires to control (stabilize or change the behavior of) a linear system, while kee** an observer, Willie, unable to decide if the system is indeed being controlled or not.
We formally define the problem, under a model where Willie can only observe the system's output. Focusing on AR(1) systems, we show that w…
▽ More
Consider the problem of covertly controlling a linear system. In this problem, Alice desires to control (stabilize or change the behavior of) a linear system, while kee** an observer, Willie, unable to decide if the system is indeed being controlled or not.
We formally define the problem, under a model where Willie can only observe the system's output. Focusing on AR(1) systems, we show that when Willie observes the system's output through a clean channel, an inherently unstable linear system can not be covertly stabilized. However, an inherently stable linear system can be covertly controlled, in the sense of covertly changing its parameter or resetting its memory. Moreover, we give positive and negative results for two important controllers: a minimal-information controller, where Alice is allowed to use only $1$ bit per sample, and a maximal-information controller, where Alice is allowed to view the real-valued output. Unlike covert communication, where the trade-off is between rate and covertness, the results reveal an interesting \emph{three--fold} trade--off in covert control: the amount of information used by the controller, control performance and covertness.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Eluder-based Regret for Stochastic Contextual MDPs
Authors:
Orin Levy,
Asaf Cassel,
Alon Cohen,
Yishay Mansour
Abstract:
We present the E-UC$^3$RL algorithm for regret minimization in Stochastic Contextual Markov Decision Processes (CMDPs). The algorithm operates under the minimal assumptions of realizable function class and access to \emph{offline} least squares and log loss regression oracles. Our algorithm is efficient (assuming efficient offline regression oracles) and enjoys a regret guarantee of…
▽ More
We present the E-UC$^3$RL algorithm for regret minimization in Stochastic Contextual Markov Decision Processes (CMDPs). The algorithm operates under the minimal assumptions of realizable function class and access to \emph{offline} least squares and log loss regression oracles. Our algorithm is efficient (assuming efficient offline regression oracles) and enjoys a regret guarantee of $ \widetilde{O}(H^3 \sqrt{T |S| |A|d_{\mathrm{E}}(\mathcal{P}) \log (|\mathcal{F}| |\mathcal{P}|/ δ) )}) , $ with $T$ being the number of episodes, $S$ the state space, $A$ the action space, $H$ the horizon, $\mathcal{P}$ and $\mathcal{F}$ are finite function classes used to approximate the context-dependent dynamics and rewards, respectively, and $d_{\mathrm{E}}(\mathcal{P})$ is the Eluder dimension of $\mathcal{P}$ w.r.t the Hellinger distance. To the best of our knowledge, our algorithm is the first efficient and rate-optimal regret minimization algorithm for CMDPs that operates under the general offline function approximation setting. In addition, we extend the Eluder dimension to general bounded metrics which may be of separate interest.
△ Less
Submitted 29 May, 2024; v1 submitted 27 November, 2022;
originally announced November 2022.
-
Compressed IF-TEM: Time Encoding Analog-To-Digital Compression
Authors:
Saar Tarnopolsky,
Hila Naaman,
Yonina C. Eldar,
Alejandro Cohen
Abstract:
An integrate-and-fire time-encoding-machine (IF-TEM) is an energy-efficient asynchronous sampler. Utilizing the IF-TEM sampler for bandlimited signals, we introduce designs for time encoding and decoding with analog compression prior to the quantization phase. Before the quantizer, efficient analog compression is conducted based on the stationarity of the encoded signal, which is a fundamental cha…
▽ More
An integrate-and-fire time-encoding-machine (IF-TEM) is an energy-efficient asynchronous sampler. Utilizing the IF-TEM sampler for bandlimited signals, we introduce designs for time encoding and decoding with analog compression prior to the quantization phase. Before the quantizer, efficient analog compression is conducted based on the stationarity of the encoded signal, which is a fundamental characteristic of IF-TEM processing. Low-bit-rate reconstruction is achieved by subdividing the known IF-TEM dynamic range into tighter windows, which can be either fixed size or dynamically changed, and detecting in which window the sample resides. We demonstrate empirically that employing the same number of samples and up to 7% additional bits than the conventional IF-TEM results in a 5-20dB improvement in MSE. Fixing the reconstruction MSE target and the number of samples, using the compressed IF-TEM enables the use of 1-2 fewer bits compared to the classical IF-TEM.
△ Less
Submitted 1 November, 2022; v1 submitted 31 October, 2022;
originally announced October 2022.
-
Control, Confidentiality, and the Right to be Forgotten
Authors:
Aloni Cohen,
Adam Smith,
Marika Swanberg,
Prashant Nalini Vasudevan
Abstract:
Recent digital rights frameworks give users the right to delete their data from systems that store and process their personal information (e.g., the "right to be forgotten" in the GDPR). How should deletion be formalized in complex systems that interact with many users and store derivative information? We argue that prior approaches fall short. Definitions of machine unlearning Cao and Yang [2015]…
▽ More
Recent digital rights frameworks give users the right to delete their data from systems that store and process their personal information (e.g., the "right to be forgotten" in the GDPR). How should deletion be formalized in complex systems that interact with many users and store derivative information? We argue that prior approaches fall short. Definitions of machine unlearning Cao and Yang [2015] are too narrowly scoped and do not apply to general interactive settings. The natural approach of deletion-as-confidentiality Garg et al. [2020] is too restrictive: by requiring secrecy of deleted data, it rules out social functionalities. We propose a new formalism: deletion-as-control. It allows users' data to be freely used before deletion, while also imposing a meaningful requirement after deletion--thereby giving users more control. Deletion-as-control provides new ways of achieving deletion in diverse settings. We apply it to social functionalities, and give a new unified view of various machine unlearning definitions from the literature. This is done by way of a new adaptive generalization of history independence. Deletion-as-control also provides a new approach to the goal of machine unlearning, that is, to maintaining a model while honoring users' deletion requests. We show that publishing a sequence of updated models that are differentially private under continual release satisfies deletion-as-control. The accuracy of such an algorithm does not depend on the number of deleted points, in contrast to the machine unlearning literature.
△ Less
Submitted 4 December, 2023; v1 submitted 14 October, 2022;
originally announced October 2022.
-
A neural network approach to high-dimensional optimal switching problems with jumps in energy markets
Authors:
Erhan Bayraktar,
Asaf Cohen,
April Nellis
Abstract:
We develop a backward-in-time machine learning algorithm that uses a sequence of neural networks to solve optimal switching problems in energy production, where electricity and fossil fuel prices are subject to stochastic jumps. We then apply this algorithm to a variety of energy scheduling problems, including novel high-dimensional energy production problems. Our experimental results demonstrate…
▽ More
We develop a backward-in-time machine learning algorithm that uses a sequence of neural networks to solve optimal switching problems in energy production, where electricity and fossil fuel prices are subject to stochastic jumps. We then apply this algorithm to a variety of energy scheduling problems, including novel high-dimensional energy production problems. Our experimental results demonstrate that the algorithm performs with accuracy and experiences linear to sub-linear slowdowns as dimension increases, demonstrating the value of the algorithm for solving high-dimensional switching problems.
△ Less
Submitted 16 September, 2023; v1 submitted 6 October, 2022;
originally announced October 2022.
-
Order-optimal Joint Transmission and Identification in Massive Multi-User MIMO via Group Testing
Authors:
George Vershinin,
Asaf Cohen,
Omer Gurewitz
Abstract:
The number of wireless devices which are connected to a single Wireless Local Area Network continues to grow each year. As a result, the orchestration of so many devices becomes a daunting, resource--consuming task, especially when the resources available at the single access point are limited, and it is hard to anticipate which devices will request access at any given time. On the other hand, the…
▽ More
The number of wireless devices which are connected to a single Wireless Local Area Network continues to grow each year. As a result, the orchestration of so many devices becomes a daunting, resource--consuming task, especially when the resources available at the single access point are limited, and it is hard to anticipate which devices will request access at any given time. On the other hand, the number of antennas on both the devices and the access point grows as well, facilitating advanced joint scheduling and coding techniques.
In this paper, we leverage the large number of antennas and suggest a massive multiple-user multiple-input-multiple-output (MU-MIMO) scheme using sparse coding based on Group Testing (GT) principles. The scheme allows for a small subset of devices to transmit simultaneously, without a preceding scheduling phase or coordination, thus reducing overhead and complexity.
Specifically, we show that out of a population of \(N\) devices, it is possible to jointly identify and decode \(K\) devices, unknown in advance, simultaneously and without any scheduling. The scheme utilizes minimal knowledge of channel state, uses an efficient (in both run-time and space) decoding algorithm, and requires \(O(K\log N\mathcal{M})\) antennas, where \(\mathcal{M}\) is the number of messages per device. In fact, we prove that this scheme is order--optimal in the number of users and messages.
This is done by deriving sufficient conditions for a vanishing error probability (a direct result), bounding the minimal number of antennas necessary for any such scheme (a converse result), and showing that these results are asymptotically tight.
△ Less
Submitted 18 January, 2023; v1 submitted 2 October, 2022;
originally announced October 2022.
-
Nonlinear approximation spaces for inverse problems
Authors:
Albert Cohen,
Matthieu Dolbeault,
Olga Mula,
Agustin Somacal
Abstract:
This paper is concerned with the ubiquitous inverse problem of recovering an unknown function u from finitely many measurements possibly affected by noise. In recent years, inversion methods based on linear approximation spaces were introduced in [MPPY15, BCDDPW17] with certified recovery bounds. It is however known that linear spaces become ineffective for approximating simple and relevant famili…
▽ More
This paper is concerned with the ubiquitous inverse problem of recovering an unknown function u from finitely many measurements possibly affected by noise. In recent years, inversion methods based on linear approximation spaces were introduced in [MPPY15, BCDDPW17] with certified recovery bounds. It is however known that linear spaces become ineffective for approximating simple and relevant families of functions, such as piecewise smooth functions that typically occur in hyperbolic PDEs (shocks) or images (edges). For such families, nonlinear spaces [Devore98] are known to significantly improve the approximation performance. The first contribution of this paper is to provide with certified recovery bounds for inversion procedures based on nonlinear approximation spaces. The second contribution is the application of this framework to the recovery of general bidimensional shapes from cell-average data. We also discuss how the application of our results to n-term approximation relates to classical results in compressed sensing.
△ Less
Submitted 5 October, 2022; v1 submitted 19 September, 2022;
originally announced September 2022.
-
FlEC: Enhancing QUIC with application-tailored reliability mechanisms
Authors:
François Michel,
Alejandro Cohen,
Derya Malak,
Quentin De Coninck,
Muriel Médard,
Olivier Bonaventure
Abstract:
Packet losses are common events in today's networks. They usually result in longer delivery times for application data since retransmissions are the de facto technique to recover from such losses. Retransmissions is a good strategy for many applications but it may lead to poor performance with latency-sensitive applications compared to network coding. Although different types of network coding tec…
▽ More
Packet losses are common events in today's networks. They usually result in longer delivery times for application data since retransmissions are the de facto technique to recover from such losses. Retransmissions is a good strategy for many applications but it may lead to poor performance with latency-sensitive applications compared to network coding. Although different types of network coding techniques have been proposed to reduce the impact of losses by transmitting redundant information, they are not widely used. Some niche applications include their own variant of Forward Erasure Correction (FEC) techniques, but there is no generic protocol that enables many applications to easily use them. We close this gap by designing, implementing and evaluating a new Flexible Erasure Correction (FlEC) framework inside the newly standardized QUIC protocol. With FlEC, an application can easily select the reliability mechanism that meets its requirements, from pure retransmissions to various forms of FEC. We consider three different use cases: $(i)$ bulk data transfer, $(ii)$ file transfers with restricted buffers and $(iii)$ delay-constrained messages. We demonstrate that modern transport protocols such as QUIC may benefit from application knowledge by leveraging this knowledge in FlEC to provide better loss recovery and stream scheduling. Our evaluation over a wide range of scenarios shows that the FlEC framework outperforms the standard QUIC reliability mechanisms from a latency viewpoint.
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
Absolute Security in High-Frequency Wireless Links
Authors:
Alejandro Cohen,
Rafael G. L. D'Oliveira,
Chia-Yi Yeh,
Hichem Guerboukha,
Rabi Shrestha,
Zhaoji Fang,
Edward Knightly,
Muriel Médard,
Daniel M. Mittleman
Abstract:
Security against eavesdrop** is one of the key concerns in the design of any communication system. Many common considerations of the security of a wireless communication channel rely on comparing the signal level measured by Bob (the intended receiver) to that accessible to Eve (an eavesdropper). Frameworks such as Wyner's wiretap model ensure the security of a link, in an average sense, when Bo…
▽ More
Security against eavesdrop** is one of the key concerns in the design of any communication system. Many common considerations of the security of a wireless communication channel rely on comparing the signal level measured by Bob (the intended receiver) to that accessible to Eve (an eavesdropper). Frameworks such as Wyner's wiretap model ensure the security of a link, in an average sense, when Bob's signal-to-noise ratio exceeds Eve's. Unfortunately, because these guarantees rely on statistical assumptions about noise, Eve can still occasionally succeed in decoding information. The goal of achieving exactly zero probability of intercept over an engineered region of the broadcast sector, which we term absolute security, remains elusive. Here, we describe the first architecture for a wireless link which provides absolute security. Our approach relies on the inherent properties of broadband and high-gain antennas, and is therefore ideally suited for implementation in millimeter-wave and terahertz wireless systems, where such antennas will generally be employed. We exploit spatial minima of the antenna pattern at different frequencies, the union of which defines a wide region where Eve is guaranteed to fail regardless of her computational capabilities, and regardless of the noise in the channels. Unlike conventional zero-forcing beam forming methods, we show that, for realistic assumptions about the antenna configuration and power budget, this absolute security guarantee can be achieved over most possible eavesdropper locations. Since we use relatively simple frequency-multiplexed coding, together with the underlying physics of a diffracting aperture, this idea is broadly applicable in many contexts.
△ Less
Submitted 11 August, 2022;
originally announced August 2022.
-
sparsegl: An R Package for Estimating Sparse Group Lasso
Authors:
Xiaoxuan Liang,
Aaron Cohen,
Anibal Solón Heinsfeld,
Franco Pestilli,
Daniel J. McDonald
Abstract:
The sparse group lasso is a high-dimensional regression technique that is useful for problems whose predictors have a naturally grouped structure and where sparsity is encouraged at both the group and individual predictor level. In this paper we discuss a new R package for computing such regularized models. The intention is to provide highly optimized solution routines enabling analysis of very la…
▽ More
The sparse group lasso is a high-dimensional regression technique that is useful for problems whose predictors have a naturally grouped structure and where sparsity is encouraged at both the group and individual predictor level. In this paper we discuss a new R package for computing such regularized models. The intention is to provide highly optimized solution routines enabling analysis of very large datasets, especially in the context of sparse design matrices.
△ Less
Submitted 30 October, 2023; v1 submitted 4 August, 2022;
originally announced August 2022.
-
Can the Government Compel Decryption? Don't Trust -- Verify
Authors:
Aloni Cohen,
Sarah Scheffler,
Mayank Varia
Abstract:
If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we propose a new approach to the foregone conclusion doctrine from Fisher v US that governs the answer to this question. The Holy Grail of this line of work would be a framework for reasoning about whether the testimony implicit in any action…
▽ More
If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we propose a new approach to the foregone conclusion doctrine from Fisher v US that governs the answer to this question. The Holy Grail of this line of work would be a framework for reasoning about whether the testimony implicit in any action is already known to the government. In this paper we attempt something narrower. We introduce a framework for specifying actions for which all implicit testimony is, constructively, a foregone conclusion. Our approach is centered around placing the burden of proof on the government to demonstrate that it is not "rely[ing] on the truthtelling" of the respondent.
Building on original legal analysis and using precise computer science formalisms, we propose demonstrability as a new central concept for describing compelled acts. We additionally provide a language for whether a compelled action meaningfully entails the respondent to perform in a manner that is 'as good as' the government's desired goal. Then, we apply our definitions to analyze the compellability of several cryptographic primitives including decryption, multifactor authentication, commitment schemes, and hash functions. In particular, our framework reaches a novel conclusion about compelled decryption in the setting that the encryption scheme is deniable: the government can compel but the respondent is free to use any password of her choice.
△ Less
Submitted 9 September, 2022; v1 submitted 4 August, 2022;
originally announced August 2022.
-
Distributed Computations with Layered Resolution
Authors:
Homa Esfahanizadeh,
Alejandro Cohen,
Muriel Médard,
Shlomo Shamai
Abstract:
Modern computationally-heavy applications are often time-sensitive, demanding distributed strategies to accelerate them. On the other hand, distributed computing suffers from the bottleneck of slow workers in practice. Distributed coded computing is an attractive solution that adds redundancy such that a subset of distributed computations suffices to obtain the final result. However, the final res…
▽ More
Modern computationally-heavy applications are often time-sensitive, demanding distributed strategies to accelerate them. On the other hand, distributed computing suffers from the bottleneck of slow workers in practice. Distributed coded computing is an attractive solution that adds redundancy such that a subset of distributed computations suffices to obtain the final result. However, the final result is still either obtained within a desired time or not, and for the latter, the resources that are spent are wasted. In this paper, we introduce the novel concept of layered-resolution distributed coded computations such that lower resolutions of the final result are obtained from collective results of the workers -- at an earlier stage than the final result. This innovation makes it possible to have more effective deadline-based systems, since even if a computational job is terminated because of timing, an approximated version of the final result can be released. Based on our theoretical and empirical results, the average execution delay for the first resolution is notably smaller than the one for the final resolution. Moreover, the probability of meeting a deadline is one for the first resolution in a setting where the final resolution exceeds the deadline almost all the time, reducing the success rate of the systems with no layering.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
Energizing charged particles by an orbit instability in a slowly rotating magnetic field
Authors:
E. Palmerduca,
H. Qin,
S. A. Cohen
Abstract:
The stability of charged particle motion in a uniform magnetic field with an added spatially uniform transverse rotating magnetic field (RMF) is studied analytically. It is found that the stability diagram of a single-particle's orbit depends critically on the chosen boundary conditions. We show that for many boundary conditions and wide regions in the parameter space, RMFs oscillating far below t…
▽ More
The stability of charged particle motion in a uniform magnetic field with an added spatially uniform transverse rotating magnetic field (RMF) is studied analytically. It is found that the stability diagram of a single-particle's orbit depends critically on the chosen boundary conditions. We show that for many boundary conditions and wide regions in the parameter space, RMFs oscillating far below the cyclotron frequency can cause linear instabilities in the motion which break $μ$-invariance and energize particles. Such energization may appear at odds with the adiabatic invariance of $μ$; however, adiabatic invariance is an asymptotic result, and does not preclude such heating by magnetic fields oscillating at slow frequencies. This mechanism may contribute to heating in the edge plasma of field-reversed configurations (FRCs) in rotamak-FRC experiments. Furthermore, these RMF-driven instabilities may significantly enhance azimuthal current drive during the formation of FRCs in such devices.
△ Less
Submitted 13 October, 2022; v1 submitted 27 July, 2022;
originally announced July 2022.
-
Quantum-inspired variational algorithms for partial differential equations: Application to financial derivative pricing
Authors:
Tianchen Zhao,
Chuhao Sun,
Asaf Cohen,
James Stokes,
Shravan Veerapaneni
Abstract:
Variational quantum Monte Carlo (VMC) combined with neural-network quantum states offers a novel angle of attack on the curse-of-dimensionality encountered in a particular class of partial differential equations (PDEs); namely, the real- and imaginary time-dependent Schrödinger equation. In this paper, we present a simple generalization of VMC applicable to arbitrary time-dependent PDEs, showcasin…
▽ More
Variational quantum Monte Carlo (VMC) combined with neural-network quantum states offers a novel angle of attack on the curse-of-dimensionality encountered in a particular class of partial differential equations (PDEs); namely, the real- and imaginary time-dependent Schrödinger equation. In this paper, we present a simple generalization of VMC applicable to arbitrary time-dependent PDEs, showcasing the technique in the multi-asset Black-Scholes PDE for pricing European options contingent on many correlated underlying assets.
△ Less
Submitted 21 July, 2022;
originally announced July 2022.
-
PlaneSDF-based Change Detection for Long-term Dense Map**
Authors:
Jiahui Fu,
Chengyuan Lin,
Yuichi Taguchi,
Andrea Cohen,
Yifu Zhang,
Stephen Mylabathula,
John J. Leonard
Abstract:
The ability to process environment maps across multiple sessions is critical for robots operating over extended periods of time. Specifically, it is desirable for autonomous agents to detect changes amongst maps of different sessions so as to gain a conflict-free understanding of the current environment. In this paper, we look into the problem of change detection based on a novel map representatio…
▽ More
The ability to process environment maps across multiple sessions is critical for robots operating over extended periods of time. Specifically, it is desirable for autonomous agents to detect changes amongst maps of different sessions so as to gain a conflict-free understanding of the current environment. In this paper, we look into the problem of change detection based on a novel map representation, dubbed Plane Signed Distance Fields (PlaneSDF), where dense maps are represented as a collection of planes and their associated geometric components in SDF volumes. Given point clouds of the source and target scenes, we propose a three-step PlaneSDF-based change detection approach: (1) PlaneSDF volumes are instantiated within each scene and registered across scenes using plane poses; 2D height maps and object maps are extracted per volume via height projection and connected component analysis. (2) Height maps are compared and intersected with the object map to produce a 2D change location mask for changed object candidates in the source scene. (3) 3D geometric validation is performed using SDF-derived features per object candidate for change mask refinement. We evaluate our approach on both synthetic and real-world datasets and demonstrate its effectiveness via the task of changed object detection. Supplementary video: https://youtu.be/oh-MQPWTwZI
△ Less
Submitted 5 October, 2022; v1 submitted 17 July, 2022;
originally announced July 2022.
-
Fractal uncertainty for discrete 2D Cantor sets
Authors:
Alex Cohen
Abstract:
We prove that a Cantor set in $\mathbb{Z}_N \times \mathbb{Z}_N$ has a fractal uncertainty principle if and only if it does not contain a pair of orthogonal lines. The key ingredient in our proof is a quantitative form of Lang's conjecture in number theory due to Ruppert and Beukers & Smyth. Our theorem answers a question of Dyatlov and has applications to open quantum maps.
We prove that a Cantor set in $\mathbb{Z}_N \times \mathbb{Z}_N$ has a fractal uncertainty principle if and only if it does not contain a pair of orthogonal lines. The key ingredient in our proof is a quantitative form of Lang's conjecture in number theory due to Ruppert and Beukers & Smyth. Our theorem answers a question of Dyatlov and has applications to open quantum maps.
△ Less
Submitted 20 October, 2022; v1 submitted 28 June, 2022;
originally announced June 2022.
-
Plagiarism deterrence for introductory programming
Authors:
Simon J. Cohen,
Michael J. Martin,
Chance A. Shipley,
Abhishek Kumar,
Andrew R. Cohen
Abstract:
Plagiarism in introductory programming courses is an enormous challenge for both students and institutions. For students, relying on the work of others too early in their academic development can make it impossible to acquire necessary skills for independent success in the future. For institutions, widespread student cheating can dilute the quality of the educational experience being offered. Curr…
▽ More
Plagiarism in introductory programming courses is an enormous challenge for both students and institutions. For students, relying on the work of others too early in their academic development can make it impossible to acquire necessary skills for independent success in the future. For institutions, widespread student cheating can dilute the quality of the educational experience being offered. Currently available solutions consider only pairwise comparisons between student submissions and focus on punitive deterrence. Our approach instead relies on a class-wide statistical characterization that can be clearly and securely shared with students via an intuitive new p-value representing independence of student effort. A pairwise, compression-based similarity detection algorithm captures relationships between assignments more accurately. An automated deterrence system is used to warn students that their behavior is being closely monitored. High-confidence instances are made directly available for instructor review using our open-source toolkit. An unbiased scoring system aids students and the instructor in understanding true independence of effort. Preliminary results indicate that the system can provide meaningful measurements of independence from week one, improving the efficacy of technical education.
△ Less
Submitted 6 June, 2022;
originally announced June 2022.
-
Rate-Optimal Online Convex Optimization in Adaptive Linear Control
Authors:
Asaf Cassel,
Alon Cohen,
Tomer Koren
Abstract:
We consider the problem of controlling an unknown linear dynamical system under adversarially changing convex costs and full feedback of both the state and cost function. We present the first computationally-efficient algorithm that attains an optimal $\smash{\sqrt{T}}$-regret rate compared to the best stabilizing linear controller in hindsight, while avoiding stringent assumptions on the costs su…
▽ More
We consider the problem of controlling an unknown linear dynamical system under adversarially changing convex costs and full feedback of both the state and cost function. We present the first computationally-efficient algorithm that attains an optimal $\smash{\sqrt{T}}$-regret rate compared to the best stabilizing linear controller in hindsight, while avoiding stringent assumptions on the costs such as strong convexity. Our approach is based on a careful design of non-convex lower confidence bounds for the online costs, and uses a novel technique for computationally-efficient regret minimization of these bounds that leverages their particular non-convex structure.
△ Less
Submitted 3 June, 2022;
originally announced June 2022.
-
Schrodinger dynamics and Berry phase of undulatory locomotion
Authors:
Alexander E. Cohen,
Alasdair D. Hastewell,
Sreeparna Pradhan,
Steven W. Flavell,
Jorn Dunkel
Abstract:
Spectral mode representations play an essential role in various areas of physics, from quantum mechanics to fluid turbulence, but they are not yet extensively used to characterize and describe the behavioral dynamics of living systems. Here, we show that mode-based linear models inferred from experimental live-imaging data can provide an accurate low-dimensional description of undulatory locomotio…
▽ More
Spectral mode representations play an essential role in various areas of physics, from quantum mechanics to fluid turbulence, but they are not yet extensively used to characterize and describe the behavioral dynamics of living systems. Here, we show that mode-based linear models inferred from experimental live-imaging data can provide an accurate low-dimensional description of undulatory locomotion in worms, centipedes, robots, and snakes. By incorporating physical symmetries and known biological constraints into the dynamical model, we find that the shape dynamics are generically governed by Schrodinger equations in mode space. The eigenstates of the effective biophysical Hamiltonians and their adiabatic variations enable the efficient classification and differentiation of locomotion behaviors in natural, simulated, and robotic organisms using Grassmann distances and Berry phases. While our analysis focuses on a widely studied class of biophysical locomotion phenomena, the underlying approach generalizes to other physical or living systems that permit a mode representation subject to geometric shape constraints.
△ Less
Submitted 14 April, 2023; v1 submitted 21 May, 2022;
originally announced May 2022.