-
Still-Moving: Customized Video Generation without Customized Video Data
Authors:
Hila Chefer,
Shiran Zada,
Roni Paiss,
Ariel Ephrat,
Omer Tov,
Michael Rubinstein,
Lior Wolf,
Tali Dekel,
Tomer Michaeli,
Inbar Mosseri
Abstract:
Customizing text-to-image (T2I) models has seen tremendous progress recently, particularly in areas such as personalization, stylization, and conditional generation. However, expanding this progress to video generation is still in its infancy, primarily due to the lack of customized video data. In this work, we introduce Still-Moving, a novel generic framework for customizing a text-to-video (T2V)…
▽ More
Customizing text-to-image (T2I) models has seen tremendous progress recently, particularly in areas such as personalization, stylization, and conditional generation. However, expanding this progress to video generation is still in its infancy, primarily due to the lack of customized video data. In this work, we introduce Still-Moving, a novel generic framework for customizing a text-to-video (T2V) model, without requiring any customized video data. The framework applies to the prominent T2V design where the video model is built over a text-to-image (T2I) model (e.g., via inflation). We assume access to a customized version of the T2I model, trained only on still image data (e.g., using DreamBooth or StyleDrop). Naively plugging in the weights of the customized T2I model into the T2V model often leads to significant artifacts or insufficient adherence to the customization data. To overcome this issue, we train lightweight $\textit{Spatial Adapters}$ that adjust the features produced by the injected T2I layers. Importantly, our adapters are trained on $\textit{"frozen videos"}$ (i.e., repeated images), constructed from image samples generated by the customized T2I model. This training is facilitated by a novel $\textit{Motion Adapter}$ module, which allows us to train on such static videos while preserving the motion prior of the video model. At test time, we remove the Motion Adapter modules and leave in only the trained Spatial Adapters. This restores the motion prior of the T2V model while adhering to the spatial prior of the customized T2I model. We demonstrate the effectiveness of our approach on diverse tasks including personalized, stylized, and conditional generation. In all evaluated scenarios, our method seamlessly integrates the spatial prior of the customized T2I model with a motion prior supplied by the T2V model.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Simultaneous Polarization Conversion and Anomalous Reflection with Anisotropic Printed-Circuit-Board (PCB) Metagratings
Authors:
Sharon Elad,
Ariel Epstein
Abstract:
We present a semianalytical synthesis scheme for designing realistic printed-circuit-board- (PCB) based metagratings (MGs), capable of simultaneous beam steering and polarization conversion. These low-profile structures, comprised of sparse periodic arrangements of subwavelength polarizable particles (meta-atoms), oriented by insightful analytical models leading to fabrication-ready designs, have…
▽ More
We present a semianalytical synthesis scheme for designing realistic printed-circuit-board- (PCB) based metagratings (MGs), capable of simultaneous beam steering and polarization conversion. These low-profile structures, comprised of sparse periodic arrangements of subwavelength polarizable particles (meta-atoms), oriented by insightful analytical models leading to fabrication-ready designs, have gained growing interest in recent years, demonstrating exceptional diffraction engineering capabilities with very high efficiencies. Herein, to facilitate cross-polarization coupling, we introduce a tilted dogbone meta-atom, going beyond the popular vertical (loaded wire) or recently proposed horizontal (dipole) configurations used in common PCB MG manifestations at microwaves, strictly susceptible to either transverse electric (TE) or transverse magnetic (TM) fields, respectively. As shown, the anisotropy introduced by the in-plane rotation of the dogbones, integrated into the MG analytical model in the form of a rotated dipole line, serves as an additional degree of freedom that can be leveraged to nonlocally manipulate the polarization and trajectory of the incident fields. Verified experimentally, the resultant semianalytical synthesis framework enables valuable physical insights, opening the door to integration of efficient anisotropic MGs in applications requiring both polarization and wavefront control, such as satellite, radar and advanced antenna systems.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
Age of Information Versions: a Semantic View of Markov Source Monitoring
Authors:
Mehrdad Salimnejad,
Marios Kountouris,
Anthony Ephremides,
Nikolaos Pappas
Abstract:
We consider the problem of real-time remote monitoring of a two-state Markov process, where a sensor observes the state of the source and makes a decision on whether to transmit the status updates over an unreliable channel or not. We introduce a modified randomized stationary sampling and transmission policy where the decision to perform sampling occurs probabilistically depending on the current…
▽ More
We consider the problem of real-time remote monitoring of a two-state Markov process, where a sensor observes the state of the source and makes a decision on whether to transmit the status updates over an unreliable channel or not. We introduce a modified randomized stationary sampling and transmission policy where the decision to perform sampling occurs probabilistically depending on the current state of the source and whether the system was in a sync state during the previous time slot or not. We then propose two new performance metrics, coined the Version Innovation Age (VIA) and the Age of Incorrect Version (AoIV) and analyze their performance under the modified randomized stationary and other state-of-the-art sampling and transmission policies. Specifically, we derive closed-form expressions for the distribution and the average of VIA, AoIV, and Age of Incorrect Information (AoII) under these policies. Furthermore, we formulate and solve three constrained optimization problems. The first optimization problem aims to minimize the average VIA subject to constraints on the time-averaged sampling cost and time-averaged reconstruction error. In the second and third problems, the objective is to minimize the average AoIV and AoII, respectively, while considering a constraint on the time-averaged sampling cost. Finally, we compare the performance of various sampling and transmission policies and identify the conditions under which each policy outperforms the others in optimizing the proposed metrics.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Retraining with Predicted Hard Labels Provably Increases Model Accuracy
Authors:
Rudrajit Das,
Inderjit S. Dhillon,
Alessandro Epasto,
Adel Javanmard,
Jieming Mao,
Vahab Mirrokni,
Sujay Sanghavi,
Peilin Zhong
Abstract:
The performance of a model trained with \textit{noisy labels} is often improved by simply \textit{retraining} the model with its own predicted \textit{hard} labels (i.e., $1$/$0$ labels). Yet, a detailed theoretical characterization of this phenomenon is lacking. In this paper, we theoretically analyze retraining in a linearly separable setting with randomly corrupted labels given to us and prove…
▽ More
The performance of a model trained with \textit{noisy labels} is often improved by simply \textit{retraining} the model with its own predicted \textit{hard} labels (i.e., $1$/$0$ labels). Yet, a detailed theoretical characterization of this phenomenon is lacking. In this paper, we theoretically analyze retraining in a linearly separable setting with randomly corrupted labels given to us and prove that retraining can improve the population accuracy obtained by initially training with the given (noisy) labels. To the best of our knowledge, this is the first such theoretical result. Retraining finds application in improving training with label differential privacy (DP) which involves training with noisy labels. We empirically show that retraining selectively on the samples for which the predicted label matches the given label significantly improves label DP training at \textit{no extra privacy cost}; we call this \textit{consensus-based retraining}. For e.g., when training ResNet-18 on CIFAR-100 with $ε=3$ label DP, we obtain $6.4\%$ improvement in accuracy with consensus-based retraining.
△ Less
Submitted 17 June, 2024;
originally announced June 2024.
-
Perturb-and-Project: Differentially Private Similarities and Marginals
Authors:
Vincent Cohen-Addad,
Tommaso d'Orsi,
Alessandro Epasto,
Vahab Mirrokni,
Peilin Zhong
Abstract:
We revisit the input perturbations framework for differential privacy where noise is added to the input $A\in \mathcal{S}$ and the result is then projected back to the space of admissible datasets $\mathcal{S}$. Through this framework, we first design novel efficient algorithms to privately release pair-wise cosine similarities. Second, we derive a novel algorithm to compute $k$-way marginal queri…
▽ More
We revisit the input perturbations framework for differential privacy where noise is added to the input $A\in \mathcal{S}$ and the result is then projected back to the space of admissible datasets $\mathcal{S}$. Through this framework, we first design novel efficient algorithms to privately release pair-wise cosine similarities. Second, we derive a novel algorithm to compute $k$-way marginal queries over $n$ features. Prior work could achieve comparable guarantees only for $k$ even. Furthermore, we extend our results to $t$-sparse datasets, where our efficient algorithms yields novel, stronger guarantees whenever $t\le n^{5/6}/\log n\,.$ Finally, we provide a theoretical perspective on why \textit{fast} input perturbation algorithms works well in practice. The key technical ingredients behind our results are tight sum-of-squares certificates upper bounding the Gaussian complexity of sets of solutions.
△ Less
Submitted 7 June, 2024;
originally announced June 2024.
-
Variable-Length Stop-Feedback Coding for Minimum Age of Incorrect Information
Authors:
Konstantinos Bountrogiannis,
Ioannis Papoutsidakis,
Anthony Ephremides,
Panagiotis Tsakalides,
George Tzagkarakis
Abstract:
The Age of Incorrect Information (AoII) is studied within the context of remote monitoring a Markov source using variable-length stop-feedback (VLSF) coding. Leveraging recent results on the non-asymptotic channel coding rate, we consider sources with small cardinality, where feedback is non-instantaneous as the transmitted information and feedback message have comparable lengths. We focus on the…
▽ More
The Age of Incorrect Information (AoII) is studied within the context of remote monitoring a Markov source using variable-length stop-feedback (VLSF) coding. Leveraging recent results on the non-asymptotic channel coding rate, we consider sources with small cardinality, where feedback is non-instantaneous as the transmitted information and feedback message have comparable lengths. We focus on the feedback sequence, i.e. the times of feedback transmissions, and derive AoII-optimal and delay-optimal feedback sequences. Our results showcase the impact of the feedback sequence on the AoII, revealing that a lower average delay does not necessarily correspond to a lower average AoII. We discuss the implications of our findings and suggest directions for coding scheme design.
△ Less
Submitted 30 April, 2024; v1 submitted 1 April, 2024;
originally announced April 2024.
-
Understanding the Impact of Long-Term Memory on Self-Disclosure with Large Language Model-Driven Chatbots for Public Health Intervention
Authors:
Eunkyung Jo,
Yuin Jeong,
SoHyun Park,
Daniel A. Epstein,
Young-Ho Kim
Abstract:
Recent large language models (LLMs) offer the potential to support public health monitoring by facilitating health disclosure through open-ended conversations but rarely preserve the knowledge gained about individuals across repeated interactions. Augmenting LLMs with long-term memory (LTM) presents an opportunity to improve engagement and self-disclosure, but we lack an understanding of how LTM i…
▽ More
Recent large language models (LLMs) offer the potential to support public health monitoring by facilitating health disclosure through open-ended conversations but rarely preserve the knowledge gained about individuals across repeated interactions. Augmenting LLMs with long-term memory (LTM) presents an opportunity to improve engagement and self-disclosure, but we lack an understanding of how LTM impacts people's interaction with LLM-driven chatbots in public health interventions. We examine the case of CareCall -- an LLM-driven voice chatbot with LTM -- through the analysis of 1,252 call logs and interviews with nine users. We found that LTM enhanced health disclosure and fostered positive perceptions of the chatbot by offering familiarity. However, we also observed challenges in promoting self-disclosure through LTM, particularly around addressing chronic health conditions and privacy concerns. We discuss considerations for LTM integration in LLM-driven chatbots for public health monitoring, including carefully deciding what topics need to be remembered in light of public health goals.
△ Less
Submitted 17 February, 2024;
originally announced February 2024.
-
A Scalable Algorithm for Individually Fair K-means Clustering
Authors:
MohammadHossein Bateni,
Vincent Cohen-Addad,
Alessandro Epasto,
Silvio Lattanzi
Abstract:
We present a scalable algorithm for the individually fair ($p$, $k$)-clustering problem introduced by Jung et al. and Mahabadi et al. Given $n$ points $P$ in a metric space, let $δ(x)$ for $x\in P$ be the radius of the smallest ball around $x$ containing at least $n / k$ points. A clustering is then called individually fair if it has centers within distance $δ(x)$ of $x$ for each $x\in P$. While g…
▽ More
We present a scalable algorithm for the individually fair ($p$, $k$)-clustering problem introduced by Jung et al. and Mahabadi et al. Given $n$ points $P$ in a metric space, let $δ(x)$ for $x\in P$ be the radius of the smallest ball around $x$ containing at least $n / k$ points. A clustering is then called individually fair if it has centers within distance $δ(x)$ of $x$ for each $x\in P$. While good approximation algorithms are known for this problem no efficient practical algorithms with good theoretical guarantees have been presented. We design the first fast local-search algorithm that runs in ~$O(nk^2)$ time and obtains a bicriteria $(O(1), 6)$ approximation. Then we show empirically that not only is our algorithm much faster than prior work, but it also produces lower-cost solutions.
△ Less
Submitted 9 February, 2024;
originally announced February 2024.
-
Version Innovation Age and Age of Incorrect Version for Monitoring Markovian Sources
Authors:
Mehrdad Salimnejad,
Marios Kountouris,
Anthony Ephremides,
Nikolaos Pappas
Abstract:
In this paper, we propose two new performance metrics, coined the Version Innovation Age (VIA) and the Age of Incorrect Version (AoIV) for real-time monitoring of a two-state Markov process over an unreliable channel. We analyze their performance under the change-aware, semantics-aware, and randomized stationary sampling and transmission policies. We derive closed-form expressions for the distribu…
▽ More
In this paper, we propose two new performance metrics, coined the Version Innovation Age (VIA) and the Age of Incorrect Version (AoIV) for real-time monitoring of a two-state Markov process over an unreliable channel. We analyze their performance under the change-aware, semantics-aware, and randomized stationary sampling and transmission policies. We derive closed-form expressions for the distribution and the average of VIA, AoIV, and AoII for these policies. We then formulate and solve an optimization problem to minimize the average VIA, subject to constraints on the time-averaged sampling cost and time-averaged reconstruction error. Finally, we compare the performance of various sampling and transmission policies and identify the conditions under which each policy outperforms the others in optimizing the proposed metrics.
△ Less
Submitted 31 January, 2024;
originally announced January 2024.
-
Age of Actuated Information and Age of Actuation in a Data-Caching Energy Harvesting Actuator
Authors:
Ali Nikkhah,
Anthony Ephremides,
Nikolaos Pappas
Abstract:
In this paper, we introduce two metrics, namely, age of actuation (AoA) and age of actuated information (AoAI), within a discrete-time system model that integrates data caching and energy harvesting (EH). AoA evaluates the timeliness of actions irrespective of the age of the information, while AoAI considers the freshness of the utilized data packet. We use Markov Chain analysis to model the syste…
▽ More
In this paper, we introduce two metrics, namely, age of actuation (AoA) and age of actuated information (AoAI), within a discrete-time system model that integrates data caching and energy harvesting (EH). AoA evaluates the timeliness of actions irrespective of the age of the information, while AoAI considers the freshness of the utilized data packet. We use Markov Chain analysis to model the system's evolution. Furthermore, we employ three-dimensional Markov Chain analysis to characterize the stationary distributions for AoA and AoAI and calculate their average values. Our findings from the analysis, validated by simulations, show that while AoAI consistently decreases with increased data and energy packet arrival rates, AoA presents a more complex behavior, with potential increases under conditions of limited data or energy resources. These metrics go towards the semantics of information and goal-oriented communications since they consider the timeliness of utilizing the information to perform an action.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
Lumiere: A Space-Time Diffusion Model for Video Generation
Authors:
Omer Bar-Tal,
Hila Chefer,
Omer Tov,
Charles Herrmann,
Roni Paiss,
Shiran Zada,
Ariel Ephrat,
Junhwa Hur,
Guanghui Liu,
Amit Raj,
Yuanzhen Li,
Michael Rubinstein,
Tomer Michaeli,
Oliver Wang,
Deqing Sun,
Tali Dekel,
Inbar Mosseri
Abstract:
We introduce Lumiere -- a text-to-video diffusion model designed for synthesizing videos that portray realistic, diverse and coherent motion -- a pivotal challenge in video synthesis. To this end, we introduce a Space-Time U-Net architecture that generates the entire temporal duration of the video at once, through a single pass in the model. This is in contrast to existing video models which synth…
▽ More
We introduce Lumiere -- a text-to-video diffusion model designed for synthesizing videos that portray realistic, diverse and coherent motion -- a pivotal challenge in video synthesis. To this end, we introduce a Space-Time U-Net architecture that generates the entire temporal duration of the video at once, through a single pass in the model. This is in contrast to existing video models which synthesize distant keyframes followed by temporal super-resolution -- an approach that inherently makes global temporal consistency difficult to achieve. By deploying both spatial and (importantly) temporal down- and up-sampling and leveraging a pre-trained text-to-image diffusion model, our model learns to directly generate a full-frame-rate, low-resolution video by processing it in multiple space-time scales. We demonstrate state-of-the-art text-to-video generation results, and show that our design easily facilitates a wide range of content creation tasks and video editing applications, including image-to-video, video inpainting, and stylized generation.
△ Less
Submitted 5 February, 2024; v1 submitted 23 January, 2024;
originally announced January 2024.
-
Age of Actuation and Timeliness: Semantics in a Wireless Power Transfer System
Authors:
Ali Nikkhah,
Anthony Ephremides,
Nikolaos Pappas
Abstract:
In this paper, we investigate a model relevant to semantics-aware goal-oriented communications, and we propose a new metric that incorporates the utilization of information in addition to its timelines. Specifically, we consider the transmission of observations from an external process to a battery-powered receiver through status updates. These updates inform the receiver about the process status…
▽ More
In this paper, we investigate a model relevant to semantics-aware goal-oriented communications, and we propose a new metric that incorporates the utilization of information in addition to its timelines. Specifically, we consider the transmission of observations from an external process to a battery-powered receiver through status updates. These updates inform the receiver about the process status and enable actuation if sufficient energy is available to achieve a goal. We focus on a wireless power transfer (WPT) model, where the receiver receives energy from a dedicated power transmitter and occasionally from the data transmitter when they share a common channel. We analyze the Age of Information (AoI) and propose a new metric, the \textit{Age of Actuation (AoA), which is relevant when the receiver utilizes the status updates to perform actions in a timely manner}. We provide analytical characterizations of the average AoA and the violation probability of the AoA, demonstrating that AoA generalizes AoI. Moreover, we introduce and analytically characterize the \textit{Probability of Missing Actuation (PoMA)}; this metric becomes relevant also \textit{to quantify the incurred cost of a missed action}. We formulate unconstrained and constrained optimization problems for all the metrics and present numerical evaluations of our analytical results. This proposed set of metrics goes beyond the traditional timeliness metrics since the synergy of different flows is now considered.
△ Less
Submitted 21 December, 2023;
originally announced December 2023.
-
Pulsed voltage cold atmospheric plasma jet and gold nanoparticles enhance cytotoxic anticancer effect
Authors:
I. Schweigert,
M. Biryukov,
A. Polyakova,
N. Krychkova,
E. Gorbunova,
A. Epanchintseva,
I. Pyshnaya,
Dm. Zakrevsky,
E. Milakhina,
O. Koval
Abstract:
Efficient and biologically safe mode of cold atmospheric plasma jet (CAPJ) is crucial for the development of CAPJ-based anticancer therapy. In the experiment and numerical simulations, by changing the pulse duration of a positive-pulsed voltage, we found the optimal CAPJ mode with regular streamer propagation. CAPJ regimes with a maximum discharge current at a temperature T<42 C substantially supp…
▽ More
Efficient and biologically safe mode of cold atmospheric plasma jet (CAPJ) is crucial for the development of CAPJ-based anticancer therapy. In the experiment and numerical simulations, by changing the pulse duration of a positive-pulsed voltage, we found the optimal CAPJ mode with regular streamer propagation. CAPJ regimes with a maximum discharge current at a temperature T<42 C substantially suppressed the viability of cancer cells. To enhance cell killing, gold nanoparticles (NPs) were added to the cells before and after the CAPJ exposure. Combination of CAPJ, generated with positive pulsed voltage, and gold nanoparticles decreased viability of NCI-H23 epithelial-like lung adenocarcinoma, A549 lung adenocarcinoma, BrCCh4e-134 breast adenocarcinoma and uMel1 uveal melanoma cells. Polyethylene glycol-modified nanoparticles with attached fluorescent label were used to visualize the uptake of NPs. We demonstrated that NPs efficiently entered the cells when were added to the cells just before CAPJ exposure or up to two hours afterwards. The efficiency ofNPs penetration into cells positively correlated with the induced cytotoxic effect: it was maximal when NPs was added to cells right before or immediately after CAPJ exposure. Summarizing, the treatment with optimal CAPJ modes in combination with modified NPs, bearing the cancer-addressed molecules and therapeutics may be next strategy of strengthening the CAPJ-based antitumor approaches.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Measurement of the pion form factor with CMD-3 detector and its implication to the hadronic contribution to muon (g-2)
Authors:
CMD-3 Collaboration,
:,
F. V. Ignatov,
R. R. Akhmetshin,
A. N. Amirkhanov,
A. V. Anisenkov,
V. M. Aulchenko,
N. S. Bashtovoy,
D. E. Berkaev,
A. E. Bondar,
A. V. Bragin,
S. I. Eidelman,
D. A. Epifanov,
L. B. Epshteyn,
A. L. Erofeev,
G. V. Fedotovich,
A. O. Gorkovenko,
F. J. Grancagnolo,
A. A. Grebenuk,
S. S. Gribanov,
D. N. Grigoriev,
V. L. Ivanov,
S. V. Karpov,
A. S. Kasaev,
V. F. Kazanin
, et al. (44 additional authors not shown)
Abstract:
The cross section of the process $e^+e^-\toπ^+π^-$ has been measured in the center-of-mass energy range from 0.32 to 1.2 GeV with the CMD-3 detector at the electron-positron collider VEPP-2000. The measurement is based on an integrated luminosity of about 88 pb$^{-1}$, of which 62 pb$^{-1}$ represent a complete dataset collected by CMD-3 at center-of-mass energies below 1 GeV. In the dominant regi…
▽ More
The cross section of the process $e^+e^-\toπ^+π^-$ has been measured in the center-of-mass energy range from 0.32 to 1.2 GeV with the CMD-3 detector at the electron-positron collider VEPP-2000. The measurement is based on an integrated luminosity of about 88 pb$^{-1}$, of which 62 pb$^{-1}$ represent a complete dataset collected by CMD-3 at center-of-mass energies below 1 GeV. In the dominant region near the $ρ$ resonance a systematic uncertainty of 0.7% was achieved. The implications of the presented results for the evaluation of the hadronic contribution to the anomalous magnetic moment of the muon are discussed.
△ Less
Submitted 5 June, 2024; v1 submitted 22 September, 2023;
originally announced September 2023.
-
Generalized Huygens' condition as the fulcrum of planar nonlocal omnidirectional transparency: from meta-atoms to metasurfaces
Authors:
Amit Shaham,
Ariel Epstein
Abstract:
Fresnel reflection has been known for centuries to fundamentally impede efficient transmittance across planar interfaces, especially at grazing incidence. Herein, we present the generalized Huygens' condition (GHC) to resolve such intricacies in metasurface (MS) designs and allow omnidirectional transparency. Compared to common numerical antireflective-coating approaches, our analytical framework…
▽ More
Fresnel reflection has been known for centuries to fundamentally impede efficient transmittance across planar interfaces, especially at grazing incidence. Herein, we present the generalized Huygens' condition (GHC) to resolve such intricacies in metasurface (MS) designs and allow omnidirectional transparency. Compared to common numerical antireflective-coating approaches, our analytical framework yields surprisingly simple closed form conditions, carefully leveraging the natural nonlocal mechanisms endowed in planar electromagnetic structures. At the meta-atom level, we meet the GHC by balancing traditional tangential susceptibilities of Huygens' MSs with their unconventional normal counterparts; the latter facilitates the key requisite of vanishing backscattering at the challenging grazing incidence scenario. At the MS level, we sheerly utilize this central insight to engineer realistic all-angle transparent printed-circuit-board (PCB) cascaded admittance sheets. Thoroughly validated in simulation and experiment, this universal GHC demonstrates a resourceful venue for practical implementation of advanced nonlocal devices, e.g., flat optical components, optical analog computers, and spaceplates.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
Community College Articulation Agreement Websites: Students' Suggestions for New Academic Advising Software Features
Authors:
David V. Nguyen,
Shayan Doroudi,
Daniel A. Epstein
Abstract:
Articulation agreements provide more transparency about how community college courses will transfer and fulfill university requirements. However, the literature displays conflicting results on whether articulation agreements improve transfer-related outcomes; perhaps one contributor to these conflicting research results is the subpar user experience of articulation agreement reports and the websit…
▽ More
Articulation agreements provide more transparency about how community college courses will transfer and fulfill university requirements. However, the literature displays conflicting results on whether articulation agreements improve transfer-related outcomes; perhaps one contributor to these conflicting research results is the subpar user experience of articulation agreement reports and the websites that host them. Accordingly, we surveyed and interviewed California community college transfer students to gather their suggestions for new academic-advising-related software features for the ASSIST website. ASSIST is California's official centralized repository of articulation agreement reports between public California community colleges and universities. We analyzed the open-ended survey and interview data using structural coding and thematic analysis. We identified four themes around students' software feature suggestions for ASSIST: (a) features that automate laborious academic advising tasks, (b) features to reduce ambiguity with articulation agreements, (c) features to mitigate mistakes in term-by-term course planning, and (d) features to facilitate online advising from advisors and student peers.
△ Less
Submitted 8 July, 2024; v1 submitted 28 August, 2023;
originally announced August 2023.
-
Relaxations and Exact Solutions to Quantum Max Cut via the Algebraic Structure of Swap Operators
Authors:
Adam Bene Watts,
Anirban Chowdhury,
Aidan Epperly,
J. William Helton,
Igor Klep
Abstract:
The Quantum Max Cut (QMC) problem has emerged as a test-problem for designing approximation algorithms for local Hamiltonian problems. In this paper we attack this problem using the algebraic structure of QMC, in particular the relationship between the quantum max cut Hamiltonian and the representation theory of the symmetric group.
The first major contribution of this paper is an extension of n…
▽ More
The Quantum Max Cut (QMC) problem has emerged as a test-problem for designing approximation algorithms for local Hamiltonian problems. In this paper we attack this problem using the algebraic structure of QMC, in particular the relationship between the quantum max cut Hamiltonian and the representation theory of the symmetric group.
The first major contribution of this paper is an extension of non-commutative Sum of Squares (ncSoS) optimization techniques to give a new hierarchy of relaxations to Quantum Max Cut. The hierarchy we present is based on optimizations over polynomials in the qubit swap operators. This is in contrast to the "standard" quantum Lasserre Hierarchy, which is based on polynomials expressed in terms of the Pauli matrices. To prove correctness of this hierarchy, we exploit a finite presentation of the algebra generated by the qubit swap operators. This presentation allows for the use of computer algebraic techniques to manipulate and simplify polynomials written in terms of the swap operators, and may be of independent interest. Surprisingly, we find that level-2 of this new hierarchy is numerically exact (up to tolerance 10^(-7)) on all QMC instances with uniform edge weights on graphs with at most 8 vertices.
The second major contribution of this paper is a polynomial-time algorithm that computes (in exact arithmetic) the maximum eigenvalue of the QMC Hamiltonian for certain graphs, including graphs that can be "decomposed" as a signed combination of cliques. A special case of the latter are complete bipartite graphs with uniform edge-weights, for which exact solutions are known from the work of Lieb and Mattis. Our methods, which use representation theory of the symmetric group, can be seen as a generalization of the Lieb-Mattis result.
△ Less
Submitted 24 April, 2024; v1 submitted 28 July, 2023;
originally announced July 2023.
-
Differentially Private Clustering in Data Streams
Authors:
Alessandro Epasto,
Tamalika Mukherjee,
Peilin Zhong
Abstract:
The streaming model is an abstraction of computing over massive data streams, which is a popular way of dealing with large-scale modern data analysis. In this model, there is a stream of data points, one after the other. A streaming algorithm is only allowed one pass over the data stream, and the goal is to perform some analysis during the stream while using as small space as possible. Clustering…
▽ More
The streaming model is an abstraction of computing over massive data streams, which is a popular way of dealing with large-scale modern data analysis. In this model, there is a stream of data points, one after the other. A streaming algorithm is only allowed one pass over the data stream, and the goal is to perform some analysis during the stream while using as small space as possible. Clustering problems (such as $k$-means and $k$-median) are fundamental unsupervised machine learning primitives, and streaming clustering algorithms have been extensively studied in the past. However, since data privacy becomes a central concern in many real-world applications, non-private clustering algorithms are not applicable in many scenarios.
In this work, we provide the first differentially private streaming algorithms for $k$-means and $k$-median clustering of $d$-dimensional Euclidean data points over a stream with length at most $T$ using $poly(k,d,\log(T))$ space to achieve a constant multiplicative error and a $poly(k,d,\log(T))$ additive error. In particular, we present a differentially private streaming clustering framework which only requires an offline DP coreset or clustering algorithm as a blackbox. By plugging in existing results from DP clustering Ghazi, Kumar, Manurangsi 2020 and Kaplan, Stemmer 2018, we achieve (1) a $(1+γ)$-multiplicative approximation with $\tilde{O}_γ(poly(k,d,\log(T)))$ space for any $γ>0$, and the additive error is $poly(k,d,\log(T))$ or (2) an $O(1)$-multiplicative approximation with $\tilde{O}(k^{1.5} \cdot poly(d,\log(T)))$ space and $poly(k,d,\log(T))$ additive error. In addition, our algorithmic framework is also differentially private under the continual release setting, i.e., the union of outputs of our algorithms at every timestamp is always differentially private.
△ Less
Submitted 7 January, 2024; v1 submitted 14 July, 2023;
originally announced July 2023.
-
Optimal Academic Plan Derived from Articulation Agreements: A Preliminary Experiment on Human-Generated and (Hypothetical) Algorithm-Generated Academic Plans
Authors:
David V. Nguyen,
Shayan Doroudi,
Daniel A. Epstein
Abstract:
Objective: Community college students typically submit transfer applications to multiple universities. However, each university may have differing lower-division major requirements in order to transfer. Accordingly, our study examined one pain point users may have with ASSIST, which is California's official statewide database of articulation agreements. That pain point is cross-referencing multipl…
▽ More
Objective: Community college students typically submit transfer applications to multiple universities. However, each university may have differing lower-division major requirements in order to transfer. Accordingly, our study examined one pain point users may have with ASSIST, which is California's official statewide database of articulation agreements. That pain point is cross-referencing multiple articulation agreements to manually develop an optimal academic plan. Optimal is defined as the minimal set of community college courses that satisfy all the transfer requirements for the multiple universities a student is preparing to apply to. Methods: To address that pain point, we designed a low-fidelity prototype that lists the minimal set of community college courses that a hypothetical optimization algorithm would output based on the user's selected articulation agreements. 24 California college students were tasked with creating an optimal academic plan using either ASSIST (which requires manual optimization) or the optimization prototype (which already provides the minimal set of classes). Results: Experiment participants assigned to use the prototype had less optimality mistakes in their academic plan, were faster in creating their plan, and provided higher usability ratings compared to the ASSIST users. All differences were statistically significant (p < 0.05) and had large effect sizes (d > 0.8). Conclusions: Our preliminary experiment suggests manually develo** optimal academic plans can be error prone and that algorithm-generated academic plans can potentially reduce unnecessary excess community college credits. However, future research needs to move beyond our proof of value of a hypothetical optimization algorithm and towards actually implementing an algorithm.
△ Less
Submitted 30 April, 2024; v1 submitted 10 July, 2023;
originally announced July 2023.
-
To Re-transmit or Not to Re-transmit for Freshness
Authors:
Subhankar Banerjee,
Sennur Ulukus,
Anthony Ephremides
Abstract:
We consider a time slotted communication network with a base station (BS) and a user. At each time slot a fresh update packet arrives at the BS with probability $p>0$. When the BS transmits an update packet for the first time, it goes through with a success probability of $q_1$. In all subsequent re-transmissions, the packet goes through with a success probability of $q_2$ where $q_2>q_1$, due to…
▽ More
We consider a time slotted communication network with a base station (BS) and a user. At each time slot a fresh update packet arrives at the BS with probability $p>0$. When the BS transmits an update packet for the first time, it goes through with a success probability of $q_1$. In all subsequent re-transmissions, the packet goes through with a success probability of $q_2$ where $q_2>q_1$, due to the accumulation of observations at the receiver used to decode the packet. When the packet goes through the first time, the age of the user drops to 1, while when the packet goes through in subsequent transmissions, the age of the user drops to the age of the packet since its generation. Thus, when the BS is in the process of re-transmitting an old packet, if it receives a new packet, it has to decide whether to re-transmit the old packet with higher probability of successful transmission but resulting in higher age, or to transmit the new packet which will result in a lower age upon successful reception but this will happen with lower probability. In this paper, we provide an optimal algorithm to solve this problem.
△ Less
Submitted 17 May, 2023;
originally announced May 2023.
-
Measuring Re-identification Risk
Authors:
CJ Carey,
Travis Dick,
Alessandro Epasto,
Adel Javanmard,
Josh Karlin,
Shankar Kumar,
Andres Munoz Medina,
Vahab Mirrokni,
Gabriel Henrique Nunes,
Sergei Vassilvitskii,
Peilin Zhong
Abstract:
Compact user representations (such as embeddings) form the backbone of personalization services. In this work, we present a new theoretical framework to measure re-identification risk in such user representations. Our framework, based on hypothesis testing, formally bounds the probability that an attacker may be able to obtain the identity of a user from their representation. As an application, we…
▽ More
Compact user representations (such as embeddings) form the backbone of personalization services. In this work, we present a new theoretical framework to measure re-identification risk in such user representations. Our framework, based on hypothesis testing, formally bounds the probability that an attacker may be able to obtain the identity of a user from their representation. As an application, we show how our framework is general enough to model important real-world applications such as the Chrome's Topics API for interest-based advertising. We complement our theoretical bounds by showing provably good attack algorithms for re-identification that we use to estimate the re-identification risk in the Topics API. We believe this work provides a rigorous and interpretable notion of re-identification risk and a framework to measure it that can be used to inform real-world applications.
△ Less
Submitted 31 July, 2023; v1 submitted 12 April, 2023;
originally announced April 2023.
-
Age of Incorrect Information With Hybrid ARQ Under a Resource Constraint for N-ary Symmetric Markov Sources
Authors:
Konstantinos Bountrogiannis,
Anthony Ephremides,
Panagiotis Tsakalides,
George Tzagkarakis
Abstract:
The Age of Incorrect Information (AoII) is a recently proposed metric for real-time remote monitoring systems. In particular, AoII measures the time the information at the monitor is incorrect, weighted by the magnitude of this incorrectness, thereby combining the notions of freshness and distortion. This paper addresses the definition of an AoII-optimal transmission policy in a discrete-time comm…
▽ More
The Age of Incorrect Information (AoII) is a recently proposed metric for real-time remote monitoring systems. In particular, AoII measures the time the information at the monitor is incorrect, weighted by the magnitude of this incorrectness, thereby combining the notions of freshness and distortion. This paper addresses the definition of an AoII-optimal transmission policy in a discrete-time communication scheme with a resource constraint and a hybrid automatic repeat request (HARQ) protocol. Considering an $N$-ary symmetric Markov source, the problem is formulated as an infinite-horizon average-cost constrained Markov decision process (CMDP). The source model is characterized by the cardinality of the state space and the probability of staying at the same state. Interestingly, it is proved that under some conditions, the optimal transmission policy is to never transmit. This reveals that there exists a region of the source dynamics where communication is inadequate in reducing the AoII. Elsewhere, there exists an optimal transmission policy, which is a randomized mixture of two discrete threshold-based policies that randomize at one state. The optimal threshold and the randomization component are derived analytically. Numerical results illustrate the impact of source dynamics, channel conditions, and resource constraints on the average AoII.
△ Less
Submitted 25 October, 2023; v1 submitted 31 March, 2023;
originally announced March 2023.
-
Experiential Futures In-the-wild to Inform Policy Design
Authors:
Camilo Sanchez,
Felix A. Epp
Abstract:
As technological innovation continues to shape our world at an accelerating pace, policy makers struggle to keep up with the unintended consequences of these new technologies. To address this policy-novelty gap, Responsible Research Innovation (RRI) has been proposed as a way to drive science and technology innovation towards socially desirable goals. This work suggests a more active HCI's positio…
▽ More
As technological innovation continues to shape our world at an accelerating pace, policy makers struggle to keep up with the unintended consequences of these new technologies. To address this policy-novelty gap, Responsible Research Innovation (RRI) has been proposed as a way to drive science and technology innovation towards socially desirable goals. This work suggests a more active HCI's position in the materialisation of pluralistic future visions and emphasizes the engagement between policy design and HCI for more agile and responsive evaluation environments. It calls for both fields to engage in questioning which and how futures are constructed, who they are benefiting, and how the findings of these interventions are interpreted towards other futures.
△ Less
Submitted 24 March, 2023;
originally announced March 2023.
-
Semianalytically Designed Dual Polarized Printed-Circuit-Board (PCB) Metagratings
Authors:
Yuval Shklarsh,
Ariel Epstein
Abstract:
Metagratings (MGs), sparse (periodic) composites of subwavelength polarizable particles (meta-atoms), have demonstrated highly efficient diffraction engineering capabilities via meticulous tailoring of the interaction between individual scatterers. To date, MGs at microwave frequencies have mostly been devised for either transverse electric (TE) or transverse magnetic (TM) polarized scenarios, whi…
▽ More
Metagratings (MGs), sparse (periodic) composites of subwavelength polarizable particles (meta-atoms), have demonstrated highly efficient diffraction engineering capabilities via meticulous tailoring of the interaction between individual scatterers. To date, MGs at microwave frequencies have mostly been devised for either transverse electric (TE) or transverse magnetic (TM) polarized scenarios, which limits their use in many practical applications. Herein, we bridge this gap and present a comprehensive semianalytical design method for dual-polarized MGs with a separable response for TE and TM waves. First, by relating a printed circuit board (PCB) compatible array of dog-bone elements with the canonical dipole line analytical model, we establish a meta-atom for TM-polarized MGs, featuring negligible interaction with TE waves. Subsequently, we integrate the proposed configuration with a systematic synthesis scheme to implement a TM beam splitter MG, harnessing the equivalent dipole line model to resolve analytically the optimal meta-atom coordinates and dog-bone polarizability, without resorting to full-wave optimization. Finally, we show that a dual-polarized MG beam splitter can be conveniently synthesized correspondingly, combining the TM-polarized structure as is with previously reported TE-polarized MG designs. This work paves a clear path towards integration of sparse, semianlaytically synthesized, efficient MGs in practical dual-polarized communication and imaging applications.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Age of Actuation in a Wireless Power Transfer System
Authors:
Ali Nikkhah,
Anthony Ephremides,
Nikolaos Pappas
Abstract:
In this paper, we study a model relevant to semantics-aware goal-oriented communications. More specifically, observations from an external process are transmitted through status updates to a battery-powered receiver. From these updates, the receiver is informed about the status of the process and if there is sufficient energy, uses them to perform an actuation to achieve a goal. We consider a wire…
▽ More
In this paper, we study a model relevant to semantics-aware goal-oriented communications. More specifically, observations from an external process are transmitted through status updates to a battery-powered receiver. From these updates, the receiver is informed about the status of the process and if there is sufficient energy, uses them to perform an actuation to achieve a goal. We consider a wireless power transfer model where the destination receives energy from a dedicated power transmitter and occasionally from the data transmitter. We provide the analysis for the Age of Information (AoI). Furthermore, we propose a new metric, namely the \textit{Age of Actuation (AoA) which is relevant when the receiver utilizes the status updates to perform actions in a timely manner}. We analytically characterize the AoA and we show that is a more general metric than AoI. We provide the optimization problems for both metrics, and we numerically evaluate our analytical results.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Teaching CLIP to Count to Ten
Authors:
Roni Paiss,
Ariel Ephrat,
Omer Tov,
Shiran Zada,
Inbar Mosseri,
Michal Irani,
Tali Dekel
Abstract:
Large vision-language models (VLMs), such as CLIP, learn rich joint image-text representations, facilitating advances in numerous downstream tasks, including zero-shot classification and text-to-image generation. Nevertheless, existing VLMs exhibit a prominent well-documented limitation - they fail to encapsulate compositional concepts such as counting. We introduce a simple yet effective method t…
▽ More
Large vision-language models (VLMs), such as CLIP, learn rich joint image-text representations, facilitating advances in numerous downstream tasks, including zero-shot classification and text-to-image generation. Nevertheless, existing VLMs exhibit a prominent well-documented limitation - they fail to encapsulate compositional concepts such as counting. We introduce a simple yet effective method to improve the quantitative understanding of VLMs, while maintaining their overall performance on common benchmarks. Specifically, we propose a new counting-contrastive loss used to finetune a pre-trained VLM in tandem with its original objective. Our counting loss is deployed over automatically-created counterfactual examples, each consisting of an image and a caption containing an incorrect object count. For example, an image depicting three dogs is paired with the caption "Six dogs playing in the yard". Our loss encourages discrimination between the correct caption and its counterfactual variant which serves as a hard negative example. To the best of our knowledge, this work is the first to extend CLIP's capabilities to object counting. Furthermore, we introduce "CountBench" - a new image-text counting benchmark for evaluating a model's understanding of object counting. We demonstrate a significant improvement over state-of-the-art baseline models on this task. Finally, we leverage our count-aware CLIP model for image retrieval and text-conditioned image generation, demonstrating that our model can produce specific counts of objects more reliably than existing ones.
△ Less
Submitted 23 February, 2023;
originally announced February 2023.
-
Measurement of the $e^+e^-\toπ^+π^-$ cross section from threshold to 1.2 GeV with the CMD-3 detector
Authors:
CMD-3 Collaboration,
:,
F. V. Ignatov,
R. R. Akhmetshin,
A. N. Amirkhanov,
A. V. Anisenkov,
V. M. Aulchenko,
N. S. Bashtovoy,
D. E. Berkaev,
A. E. Bondar,
A. V. Bragin,
S. I. Eidelman,
D. A. Epifanov,
L. B. Epshteyn,
A. L. Erofeev,
G. V. Fedotovich,
A. O. Gorkovenko,
F. J. Grancagnolo,
A. A. Grebenuk,
S. S. Gribanov,
D. N. Grigoriev,
V. L. Ivanov,
S. V. Karpov,
A. S. Kasaev,
V. F. Kazanin
, et al. (44 additional authors not shown)
Abstract:
The cross section of the process $e^+e^-\toπ^+π^-$ has been measured in the center of mass energy range from 0.32 to 1.2 GeV with the CMD-3 detector at the electron-positron collider VEPP-2000. The measurement is based on a full dataset collected below 1 GeV during three data taking seasons, corresponding to an integrated luminosity of about 62 pb$^{-1}$. In the dominant $ρ$-resonance region, a sy…
▽ More
The cross section of the process $e^+e^-\toπ^+π^-$ has been measured in the center of mass energy range from 0.32 to 1.2 GeV with the CMD-3 detector at the electron-positron collider VEPP-2000. The measurement is based on a full dataset collected below 1 GeV during three data taking seasons, corresponding to an integrated luminosity of about 62 pb$^{-1}$. In the dominant $ρ$-resonance region, a systematic uncertainty of 0.7% has been reached. At energies around $φ$-resonance the $π^+π^-$ production cross section was measured for the first time with high beam energy resolution. The forward-backward charge asymmetry in the $π^+π^-$ production has also been measured. It shows a strong deviation from the theoretical prediction based on the conventional scalar quantum electrodynamics framework, and it is in good agreement with the generalized vector-meson-dominance and dispersive-based predictions. The impact of the presented results on the evaluation of the hadronic contribution to the anomalous magnetic moment of muon is discussed.
△ Less
Submitted 5 June, 2024; v1 submitted 17 February, 2023;
originally announced February 2023.
-
Derandomized Novelty Detection with FDR Control via Conformal E-values
Authors:
Meshi Bashari,
Amir Epstein,
Yaniv Romano,
Matteo Sesia
Abstract:
Conformal inference provides a general distribution-free method to rigorously calibrate the output of any machine learning algorithm for novelty detection. While this approach has many strengths, it has the limitation of being randomized, in the sense that it may lead to different results when analyzing twice the same data, and this can hinder the interpretation of any findings. We propose to make…
▽ More
Conformal inference provides a general distribution-free method to rigorously calibrate the output of any machine learning algorithm for novelty detection. While this approach has many strengths, it has the limitation of being randomized, in the sense that it may lead to different results when analyzing twice the same data, and this can hinder the interpretation of any findings. We propose to make conformal inferences more stable by leveraging suitable conformal e-values instead of p-values to quantify statistical significance. This solution allows the evidence gathered from multiple analyses of the same data to be aggregated effectively while provably controlling the false discovery rate. Further, we show that the proposed method can reduce randomness without much loss of power compared to standard conformal inference, partly thanks to an innovative way of weighting conformal e-values based on additional side information carefully extracted from the same data. Simulations with synthetic and real data confirm this solution can be effective at eliminating random noise in the inferences obtained with state-of-the-art alternative techniques, sometimes also leading to higher power.
△ Less
Submitted 23 October, 2023; v1 submitted 14 February, 2023;
originally announced February 2023.
-
Differentially-Private Hierarchical Clustering with Provable Approximation Guarantees
Authors:
Jacob Imola,
Alessandro Epasto,
Mohammad Mahdian,
Vincent Cohen-Addad,
Vahab Mirrokni
Abstract:
Hierarchical Clustering is a popular unsupervised machine learning method with decades of history and numerous applications. We initiate the study of differentially private approximation algorithms for hierarchical clustering under the rigorous framework introduced by (Dasgupta, 2016). We show strong lower bounds for the problem: that any $ε$-DP algorithm must exhibit $O(|V|^2/ ε)$-additive error…
▽ More
Hierarchical Clustering is a popular unsupervised machine learning method with decades of history and numerous applications. We initiate the study of differentially private approximation algorithms for hierarchical clustering under the rigorous framework introduced by (Dasgupta, 2016). We show strong lower bounds for the problem: that any $ε$-DP algorithm must exhibit $O(|V|^2/ ε)$-additive error for an input dataset $V$. Then, we exhibit a polynomial-time approximation algorithm with $O(|V|^{2.5}/ ε)$-additive error, and an exponential-time algorithm that meets the lower bound. To overcome the lower bound, we focus on the stochastic block model, a popular model of graphs, and, with a separation assumption on the blocks, propose a private $1+o(1)$ approximation algorithm which also recovers the blocks exactly. Finally, we perform an empirical study of our algorithms and validate their performance.
△ Less
Submitted 23 May, 2023; v1 submitted 31 January, 2023;
originally announced February 2023.
-
Minimizing Age of Incorrect Information over a Channel with Random Delay
Authors:
Yutao Chen,
Anthony Ephremides
Abstract:
We consider a transmitter-receiver pair in a slotted-time system. The transmitter observes a dynamic source and sends updates to a remote receiver through an error-free communication channel that suffers a random delay. We consider two cases. In the first case, the update is guaranteed to be delivered within a certain number of time slots. In the second case, the update is immediately discarded on…
▽ More
We consider a transmitter-receiver pair in a slotted-time system. The transmitter observes a dynamic source and sends updates to a remote receiver through an error-free communication channel that suffers a random delay. We consider two cases. In the first case, the update is guaranteed to be delivered within a certain number of time slots. In the second case, the update is immediately discarded once the transmission time exceeds a predetermined value. The receiver estimates the state of the dynamic source using the received updates. In this paper, we adopt the Age of Incorrect Information (AoII) as the performance metric and investigate the problem of optimizing the transmitter's action in each time slot to minimize AoII. We first characterize the optimization problem using the Markov decision process and investigate the performance of the threshold policy, under which the transmitter transmits updates only when the transmission is allowed and the AoII exceeds the threshold $τ$. By delving into the characteristics of the system evolution, we precisely compute the expected AoII achieved by the threshold policy using the Markov chain. Then, we prove that the optimal policy exists and provide a computable relative value iteration algorithm to estimate the optimal policy. Furthermore, by leveraging the policy improvement theorem, we theoretically prove that, under an easily verifiable condition, the optimal policy is the threshold policy with $τ=1$. Finally, numerical results are presented to highlight the performance of the optimal policy.
△ Less
Submitted 20 February, 2023; v1 submitted 15 January, 2023;
originally announced January 2023.
-
Differentially Private Continual Releases of Streaming Frequency Moment Estimations
Authors:
Alessandro Epasto,
Jieming Mao,
Andres Munoz Medina,
Vahab Mirrokni,
Sergei Vassilvitskii,
Peilin Zhong
Abstract:
The streaming model of computation is a popular approach for working with large-scale data. In this setting, there is a stream of items and the goal is to compute the desired quantities (usually data statistics) while making a single pass through the stream and using as little space as possible.
Motivated by the importance of data privacy, we develop differentially private streaming algorithms u…
▽ More
The streaming model of computation is a popular approach for working with large-scale data. In this setting, there is a stream of items and the goal is to compute the desired quantities (usually data statistics) while making a single pass through the stream and using as little space as possible.
Motivated by the importance of data privacy, we develop differentially private streaming algorithms under the continual release setting, where the union of outputs of the algorithm at every timestamp must be differentially private. Specifically, we study the fundamental $\ell_p$ $(p\in [0,+\infty))$ frequency moment estimation problem under this setting, and give an $\varepsilon$-DP algorithm that achieves $(1+η)$-relative approximation $(\forall η\in(0,1))$ with $\mathrm{poly}\log(Tn)$ additive error and uses $\mathrm{poly}\log(Tn)\cdot \max(1, n^{1-2/p})$ space, where $T$ is the length of the stream and $n$ is the size of the universe of elements. Our space is near optimal up to poly-logarithmic factors even in the non-private setting.
To obtain our results, we first reduce several primitives under the differentially private continual release model, such as counting distinct elements, heavy hitters and counting low frequency elements, to the simpler, counting/summing problems in the same setting. Based on these primitives, we develop a differentially private continual release level set estimation approach to address the $\ell_p$ frequency moment estimation problem.
We also provide a simple extension of our results to the harder sliding window model, where the statistics must be maintained over the past $W$ data items.
△ Less
Submitted 13 January, 2023;
originally announced January 2023.
-
Private estimation algorithms for stochastic block models and mixture models
Authors:
Hongjie Chen,
Vincent Cohen-Addad,
Tommaso d'Orsi,
Alessandro Epasto,
Jacob Imola,
David Steurer,
Stefan Tiegel
Abstract:
We introduce general tools for designing efficient private estimation algorithms, in the high-dimensional settings, whose statistical guarantees almost match those of the best known non-private algorithms. To illustrate our techniques, we consider two problems: recovery of stochastic block models and learning mixtures of spherical Gaussians. For the former, we present the first efficient $(ε, δ)$-…
▽ More
We introduce general tools for designing efficient private estimation algorithms, in the high-dimensional settings, whose statistical guarantees almost match those of the best known non-private algorithms. To illustrate our techniques, we consider two problems: recovery of stochastic block models and learning mixtures of spherical Gaussians. For the former, we present the first efficient $(ε, δ)$-differentially private algorithm for both weak recovery and exact recovery. Previously known algorithms achieving comparable guarantees required quasi-polynomial time. For the latter, we design an $(ε, δ)$-differentially private algorithm that recovers the centers of the $k$-mixture when the minimum separation is at least $ O(k^{1/t}\sqrt{t})$. For all choices of $t$, this algorithm requires sample complexity $n\geq k^{O(1)}d^{O(t)}$ and time complexity $(nd)^{O(t)}$. Prior work required minimum separation at least $O(\sqrt{k})$ as well as an explicit upper bound on the Euclidean norm of the centers.
△ Less
Submitted 15 November, 2023; v1 submitted 11 January, 2023;
originally announced January 2023.
-
Minimizing the Age of Information Over an Erasure Channel for Random Packet Arrivals With a Storage Option at the Transmitter
Authors:
Subhankar Banerjee,
Sennur Ulukus,
Anthony Ephremides
Abstract:
We consider a time slotted communication system consisting of a base station (BS) and a user. At each time slot an update packet arrives at the BS with probability $p$, and the BS successfully transmits the update packet with probability $q$ over an erasure channel. We assume that the BS has a unit size buffer where it can store an update packet upon paying a storage cost $c$. There is a trade-off…
▽ More
We consider a time slotted communication system consisting of a base station (BS) and a user. At each time slot an update packet arrives at the BS with probability $p$, and the BS successfully transmits the update packet with probability $q$ over an erasure channel. We assume that the BS has a unit size buffer where it can store an update packet upon paying a storage cost $c$. There is a trade-off between the age of information and the storage cost. We formulate this trade-off as a Markov decision process and find an optimal switching type storage policy.
△ Less
Submitted 10 January, 2023;
originally announced January 2023.
-
Age of Information of a Power Constrained Scheduler in the Presence of a Power Constrained Adversary
Authors:
Subhankar Banerjee,
Sennur Ulukus,
Anthony Ephremides
Abstract:
We consider a time slotted communication network consisting of a base station (BS), an adversary, $N$ users and $N_s$ communication channels. Both the BS and the adversary have average power constraints and the probability of successful transmission of an update packet depends on the transmission power of the BS and the blocking power of the adversary. We provide a universal lower bound for the av…
▽ More
We consider a time slotted communication network consisting of a base station (BS), an adversary, $N$ users and $N_s$ communication channels. Both the BS and the adversary have average power constraints and the probability of successful transmission of an update packet depends on the transmission power of the BS and the blocking power of the adversary. We provide a universal lower bound for the average age for this communication network. We prove that the uniform scheduling algorithm with any feasible transmission power choosing policy is $4$ optimal; and the max-age user choosing policy is $2$ optimal. In the second part of the paper, we consider the setting where the BS chooses a transmission policy and the adversary chooses a blocking policy from the set of randomized stationary policies. We show that the Nash equilibrium point may or may not exist for this communication network. We find special cases where the Nash equilibrium always exists.
△ Less
Submitted 3 January, 2023;
originally announced January 2023.
-
Analysis of Age of Incorrect Information under Generic Transmission Delay
Authors:
Yutao Chen,
Anthony Ephremides
Abstract:
This paper investigates the Age of Incorrect Information (AoII) in a communication system whose channel suffers a random delay. We consider a slotted-time system where a transmitter observes a dynamic source and decides when to send updates to a remote receiver through the communication channel. The threshold policy, under which the transmitter initiates transmission only when the AoII exceeds the…
▽ More
This paper investigates the Age of Incorrect Information (AoII) in a communication system whose channel suffers a random delay. We consider a slotted-time system where a transmitter observes a dynamic source and decides when to send updates to a remote receiver through the communication channel. The threshold policy, under which the transmitter initiates transmission only when the AoII exceeds the threshold, governs the transmitter's decision. In this paper, we analyze and calculate the performance of the threshold policy in terms of the achieved AoII. Using the Markov chain to characterize the system evolution, the expected AoII can be obtained precisely by solving a system of linear equations whose size is finite and depends on the threshold. We also give closed-form expressions of the expected AoII under two particular thresholds. Finally, calculation results show that there are better strategies than the transmitter constantly transmitting new updates.
△ Less
Submitted 27 February, 2023; v1 submitted 29 December, 2022;
originally announced December 2022.
-
Matrix Extreme Points and Free extreme points of Free spectrahedra
Authors:
Aidan Epperly,
Eric Evert,
J. William Helton,
Igor Klep
Abstract:
A spectrahedron is a convex set defined by a linear matrix inequality, i.e., the set of all $x \in \mathbb{R}^g$ such that \[ L_A(x) = I + A_1 x_1 + A_2 x_2 + \dots + A_g x_g \succeq 0 \] for some symmetric matrices $A_1,\ldots,A_g$. This can be extended to matrix spaces by taking $X$ to be a tuple of real symmetric matrices of any size and using the Kronecker product…
▽ More
A spectrahedron is a convex set defined by a linear matrix inequality, i.e., the set of all $x \in \mathbb{R}^g$ such that \[ L_A(x) = I + A_1 x_1 + A_2 x_2 + \dots + A_g x_g \succeq 0 \] for some symmetric matrices $A_1,\ldots,A_g$. This can be extended to matrix spaces by taking $X$ to be a tuple of real symmetric matrices of any size and using the Kronecker product $$L_A(X) = I_n \otimes I_d + A_1 \otimes X_1 + A_2 \otimes X_2 + \dots + A_g \otimes X_g.$$ The solution set of $L_A (X) \succeq 0$ is called a \textit{free spectrahedron}. Free spectrahedra are important in systems engineering, operator algebras, and the theory of matrix convex sets. Matrix and free extreme points of free spectrahedra are of particular interest. While many authors have studied matrix and free extreme points of free spectrahedra, it has until now been unknown if these two types of extreme points are actually different. The results of this paper fall into three categories: theoretical, algorithmic, and experimental. Firstly, we prove the existence of matrix extreme points of free spectrahedra that are not free extreme. This is done by producing exact examples of matrix extreme points that are not free extreme. We also show that if the $A_i$ are $2 \times 2$ matrices, then matrix and free extreme points coincide. Secondly, we detail methods for constructing matrix extreme points of free spectrahedra that are not free extreme, both exactly and numerically. We also show how a recent result due to Kriel (Complex Anal.~Oper.~Theory 2019) can be used to efficiently test whether a point is matrix extreme. Thirdly, we provide evidence that a substantial number of matrix extreme points of free spectrahedra are not free extreme. Numerical work in another direction shows how to effectively write a given tuple in a free spectrahedron as a matrix convex combination of its free extreme points.
△ Less
Submitted 29 November, 2022;
originally announced December 2022.
-
BERT for Long Documents: A Case Study of Automated ICD Coding
Authors:
Arash Afkanpour,
Shabir Adeel,
Hansenclever Bassani,
Arkady Epshteyn,
Hongbo Fan,
Isaac Jones,
Mahan Malihi,
Adrian Nauth,
Raj Sinha,
Sanjana Woonna,
Shiva Zamani,
Elli Kanal,
Mikhail Fomitchev,
Donny Cheung
Abstract:
Transformer models have achieved great success across many NLP problems. However, previous studies in automated ICD coding concluded that these models fail to outperform some of the earlier solutions such as CNN-based models. In this paper we challenge this conclusion. We present a simple and scalable method to process long text with the existing transformer models such as BERT. We show that this…
▽ More
Transformer models have achieved great success across many NLP problems. However, previous studies in automated ICD coding concluded that these models fail to outperform some of the earlier solutions such as CNN-based models. In this paper we challenge this conclusion. We present a simple and scalable method to process long text with the existing transformer models such as BERT. We show that this method significantly improves the previous results reported for transformer models in ICD coding, and is able to outperform one of the prominent CNN-based methods.
△ Less
Submitted 4 November, 2022;
originally announced November 2022.
-
Preempting to Minimize Age of Incorrect Information under Transmission Delay
Authors:
Yutao Chen,
Anthony Ephremides
Abstract:
We study the problem of optimizing the decisions of a preemptively capable transmitter to minimize the Age of Incorrect Information (AoII) when the communication channel has a random delay. We consider a slotted-time system where a transmitter observes a Markovian source and makes decisions based on the system status. In each time slot, the transmitter decides whether to preempt or skip when the c…
▽ More
We study the problem of optimizing the decisions of a preemptively capable transmitter to minimize the Age of Incorrect Information (AoII) when the communication channel has a random delay. We consider a slotted-time system where a transmitter observes a Markovian source and makes decisions based on the system status. In each time slot, the transmitter decides whether to preempt or skip when the channel is busy. When the channel is idle, the transmitter decides whether to send a new update. A remote receiver estimates the state of the Markovian source based on the update it receives. We consider a generic transmission delay and assume that the transmission delay is independent and identically distributed for each update. This paper aims to optimize the transmitter's decision in each time slot to minimize the AoII with generic time penalty functions. To this end, we first use the Markov decision process to formulate the optimization problem and derive the analytical expressions of the expected AoIIs achieved by two canonical preemptive policies. Then, we prove the existence of the optimal policy and provide a feasible value iteration algorithm to approximate the optimal policy. However, the value iteration algorithm will be computationally expensive if we want considerable confidence in the approximation. Therefore, we analyze the system characteristics under two canonical delay distributions and theoretically obtain the corresponding optimal policies using the policy improvement theorem. Finally, numerical results are presented to illustrate the performance improvements brought about by the preemption capability.
△ Less
Submitted 20 February, 2023; v1 submitted 28 September, 2022;
originally announced September 2022.
-
Broad-Angle Multichannel Metagrating Diffusers
Authors:
Yarden Yashno,
Ariel Epstein
Abstract:
We present a semianalytical scheme for the design of broad-angle multichannel metagratings (MG), sparse periodic arrangements of loaded conducting strips (meta-atoms), embedded in a multilayer printed circuit board configuration. By judicious choice of periodicity and angles of incidence, scattering off such a MG can be described via a multi-port network, where the input and output ports correspon…
▽ More
We present a semianalytical scheme for the design of broad-angle multichannel metagratings (MG), sparse periodic arrangements of loaded conducting strips (meta-atoms), embedded in a multilayer printed circuit board configuration. By judicious choice of periodicity and angles of incidence, scattering off such a MG can be described via a multi-port network, where the input and output ports correspond to different illumination and reflection directions associated with the same set of propagating Floquet-Bloch modes. Since each of these possible scattering scenarios can be modelled analytically, constraints can be conveniently applied on the modal reflection coefficients (scattering matrix entries) to yield a diffusive response, which, when resolved, produce the required MG geometry. We show that by demanding a symmetric MG configuration, the number of independent S parameters can be dramatically reduced, enabling satisfaction of multiple such constraints using a single sparse MG. Without any full-wave optimization, this procedure results in a fabrication-ready layout of a multichannel MG, enabling retroreflection suppression and diffusive scattering from numerous angles of incidence simultaneously. This concept, verified experimentally via a five-channel prototype, offers an innovative solution to both monostatic and bistatic radar cross section reduction, avoiding design and implementation challenges associated with dense metasurfaces used for this purpose.
△ Less
Submitted 6 September, 2022;
originally announced September 2022.
-
Revisiting Piggyback Prototy**: Examining Benefits and Tradeoffs in Extending Existing Social Computing Systems
Authors:
Daniel A. Epstein,
Fannie Liu,
Andrés Monroy-Hernández,
Dennis Wang
Abstract:
The CSCW community has a history of designing, implementing, and evaluating novel social interactions in technology, but the process requires significant technical effort for uncertain value. We discuss the opportunities and applications of "piggyback prototy**", building and evaluating new ideas for social computing on top of existing ones, expanding on its potential to contribute design recomm…
▽ More
The CSCW community has a history of designing, implementing, and evaluating novel social interactions in technology, but the process requires significant technical effort for uncertain value. We discuss the opportunities and applications of "piggyback prototy**", building and evaluating new ideas for social computing on top of existing ones, expanding on its potential to contribute design recommendations. Drawing on about 50 papers which use the method, we critically examine the intellectual and technical benefits it provides, such as ecological validity and leveraging well-tested features, as well as research-product and ethical tensions it imposes, such as limits to customization and violation of participant privacy. We discuss considerations for future researchers deciding whether to use piggyback prototy** and point to new research agendas which can reduce the burden of implementing the method.
△ Less
Submitted 23 September, 2022; v1 submitted 10 August, 2022;
originally announced August 2022.
-
Differentially Private Graph Learning via Sensitivity-Bounded Personalized PageRank
Authors:
Alessandro Epasto,
Vahab Mirrokni,
Bryan Perozzi,
Anton Tsitsulin,
Peilin Zhong
Abstract:
Personalized PageRank (PPR) is a fundamental tool in unsupervised learning of graph representations such as node ranking, labeling, and graph embedding. However, while data privacy is one of the most important recent concerns, existing PPR algorithms are not designed to protect user privacy. PPR is highly sensitive to the input graph edges: the difference of only one edge may cause a big change in…
▽ More
Personalized PageRank (PPR) is a fundamental tool in unsupervised learning of graph representations such as node ranking, labeling, and graph embedding. However, while data privacy is one of the most important recent concerns, existing PPR algorithms are not designed to protect user privacy. PPR is highly sensitive to the input graph edges: the difference of only one edge may cause a big change in the PPR vector, potentially leaking private user data.
In this work, we propose an algorithm which outputs an approximate PPR and has provably bounded sensitivity to input edges. In addition, we prove that our algorithm achieves similar accuracy to non-private algorithms when the input graph has large degrees. Our sensitivity-bounded PPR directly implies private algorithms for several tools of graph learning, such as, differentially private (DP) PPR ranking, DP node classification, and DP node embedding. To complement our theoretical analysis, we also empirically verify the practical performances of our algorithms.
△ Less
Submitted 14 February, 2024; v1 submitted 14 July, 2022;
originally announced July 2022.
-
Smooth Anonymity for Sparse Graphs
Authors:
Alessandro Epasto,
Hossein Esfandiari,
Vahab Mirrokni,
Andres Munoz Medina
Abstract:
When working with user data providing well-defined privacy guarantees is paramount. In this work, we aim to manipulate and share an entire sparse dataset with a third party privately. In fact, differential privacy has emerged as the gold standard of privacy, however, when it comes to sharing sparse datasets, e.g. sparse networks, as one of our main results, we prove that \emph{any} differentially…
▽ More
When working with user data providing well-defined privacy guarantees is paramount. In this work, we aim to manipulate and share an entire sparse dataset with a third party privately. In fact, differential privacy has emerged as the gold standard of privacy, however, when it comes to sharing sparse datasets, e.g. sparse networks, as one of our main results, we prove that \emph{any} differentially private mechanism that maintains a reasonable similarity with the initial dataset is doomed to have a very weak privacy guarantee. In such situations, we need to look into other privacy notions such as $k$-anonymity. In this work, we consider a variation of $k$-anonymity, which we call smooth-$k$-anonymity, and design simple large-scale algorithms that efficiently provide smooth-$k$-anonymity. We further perform an empirical evaluation to back our theoretical guarantees and show that our algorithm improves the performance in downstream machine learning tasks on anonymized data.
△ Less
Submitted 14 May, 2024; v1 submitted 13 July, 2022;
originally announced July 2022.
-
Minimizing Age of Incorrect Information in the Presence of Timeout
Authors:
Yutao Chen,
Anthony Ephremides
Abstract:
We consider a slotted-time system with a transmitter-receiver pair. In the system, a transmitter observes a dynamic source and sends updates to a remote receiver through a communication channel. We assume that the channel is error-free but suffers a random delay. Moreover, when an update has been transmitted for too long, the transmission will be terminated immediately, and the update will be disc…
▽ More
We consider a slotted-time system with a transmitter-receiver pair. In the system, a transmitter observes a dynamic source and sends updates to a remote receiver through a communication channel. We assume that the channel is error-free but suffers a random delay. Moreover, when an update has been transmitted for too long, the transmission will be terminated immediately, and the update will be discarded. We assume the maximum transmission time is predetermined and is not controlled by the transmitter. The receiver will maintain estimates of the current state of the dynamic source using the received updates. In this paper, we adopt the Age of Incorrect Information (AoII) as the performance metric and investigate the problem of optimizing the transmitter's action in each time slot to minimize AoII. We first characterize the optimization problem using Markov Decision Process and evaluate the performance of some canonical transmission policies. Then, by leveraging the policy improvement theorem, we prove that, under a simple and easy-to-verify condition, the optimal policy for the transmitter is the one that initiates a transmission whenever the channel is idle and AoII is not zero. Lastly, we take the case where the transmission time is geometrically distributed as an example. For this example, we verify the condition numerically and provide numerical results that highlight the performance of the optimal policy.
△ Less
Submitted 17 January, 2023; v1 submitted 6 July, 2022;
originally announced July 2022.
-
Large-Period Multichannel Metagratings For Broad-Angle Absorption
Authors:
Yarden Yashno,
Ariel Epstein
Abstract:
We present an alternative scheme for obtaining effective power dissipation in planar composites, extending the recently proposed concept of metagrating (MGs), sparse arrangements of polarizable particles (meta-atoms), to realize multifunctional absorbers. In contrast to typical metasurface solutions, where periodicities are limited to half of a wavelength at most to avoid high-order Floquet-Bloch…
▽ More
We present an alternative scheme for obtaining effective power dissipation in planar composites, extending the recently proposed concept of metagrating (MGs), sparse arrangements of polarizable particles (meta-atoms), to realize multifunctional absorbers. In contrast to typical metasurface solutions, where periodicities are limited to half of a wavelength at most to avoid high-order Floquet-Bloch modes, we purposely consider large-period MGs, relying on their proven ability to effectively mitigate spurious scattering. The absorption process is thus implemented via precise engineering of the mutual coupling between numerous individual scatterers fitting in the enlarged period, with these additional degrees of freedom further utilized to enforce the perfect absorption conditions for multiple excitation angles simultaneously. The resultant devices, utilizing a standard printed circuit board configuration obtained semianalytically while featuring relaxed fabrication demands, exhibit high absorption across a wide angular range, useful for radar cross section reduction and energy harvesting applications.
△ Less
Submitted 20 June, 2022;
originally announced June 2022.
-
Scalable Differentially Private Clustering via Hierarchically Separated Trees
Authors:
Vincent Cohen-Addad,
Alessandro Epasto,
Silvio Lattanzi,
Vahab Mirrokni,
Andres Munoz,
David Saulpic,
Chris Schwiegelshohn,
Sergei Vassilvitskii
Abstract:
We study the private $k$-median and $k$-means clustering problem in $d$ dimensional Euclidean space. By leveraging tree embeddings, we give an efficient and easy to implement algorithm, that is empirically competitive with state of the art non private methods. We prove that our method computes a solution with cost at most $O(d^{3/2}\log n)\cdot OPT + O(k d^2 \log^2 n / ε^2)$, where $ε$ is the priv…
▽ More
We study the private $k$-median and $k$-means clustering problem in $d$ dimensional Euclidean space. By leveraging tree embeddings, we give an efficient and easy to implement algorithm, that is empirically competitive with state of the art non private methods. We prove that our method computes a solution with cost at most $O(d^{3/2}\log n)\cdot OPT + O(k d^2 \log^2 n / ε^2)$, where $ε$ is the privacy guarantee. (The dimension term, $d$, can be replaced with $O(\log k)$ using standard dimension reduction techniques.) Although the worst-case guarantee is worse than that of state of the art private clustering methods, the algorithm we propose is practical, runs in near-linear, $\tilde{O}(nkd)$, time and scales to tens of millions of points. We also show that our method is amenable to parallelization in large-scale distributed computing environments. In particular we show that our private algorithms can be implemented in logarithmic number of MPC rounds in the sublinear memory regime. Finally, we complement our theoretical analysis with an empirical evaluation demonstrating the algorithm's efficiency and accuracy in comparison to other privacy clustering baselines.
△ Less
Submitted 17 June, 2022;
originally announced June 2022.
-
Metagrating-Assisted High-Directivity Sparse Antenna Arrays For Scanning Applications
Authors:
Yaniv Kerzhner,
Ariel Epstein
Abstract:
We present an analytical scheme for designing metagrating-enhanced sparse antenna arrays. Unlike previous work, the proposed method does not involve time-consuming cost function optimizations, complex structural manipulations on the active array or demanding computational capabilities. Instead, it merely requires the integration of a passive metagrating (MG) superstrate, a planar periodic arrangem…
▽ More
We present an analytical scheme for designing metagrating-enhanced sparse antenna arrays. Unlike previous work, the proposed method does not involve time-consuming cost function optimizations, complex structural manipulations on the active array or demanding computational capabilities. Instead, it merely requires the integration of a passive metagrating (MG) superstrate, a planar periodic arrangement of subwavelength capacitively-loaded wires (meta-atoms), synthesized conveniently via a semianalytical procedure to guarantee suppression of grating lobes in the sparse configuration. Correspondingly, we extend previous formulations to enable excitation of the MG by the active array elements, deriving analytical relations connecting the passive and active element distribution and electrical properties with the scattered fields, eventually allowing resolution of the detailed device configuration leading to optimal directivity. Importantly, considering typical active array applications, the semianalytical synthesis scheme is further developed to take full advantage of the various degrees of freedom in the system, harnessing them to support scanning in a wide range of extreme angles while maintaining a single directive beam. The resultant methodology, verified in simulations to work well also for large finite arrays, offers an original path for mitigating grating lobes in sparse arrays with scanning capabilities, yielding a complete printed-circuit-board compatible design without relying on full-wave optimization.
△ Less
Submitted 31 May, 2022;
originally announced June 2022.
-
Age of Incorrect Information under Delay
Authors:
Yutao Chen,
Anthony Ephremides
Abstract:
This paper investigates the problem of minimizing the Age of Incorrect Information (AoII) when the communication channel has a random delay. We consider a slotted-time system where a transmitter observes a dynamic source and decides when to send updates to a remote receiver through a channel with random delay. The receiver maintains estimates of the state of the dynamic source based on the receive…
▽ More
This paper investigates the problem of minimizing the Age of Incorrect Information (AoII) when the communication channel has a random delay. We consider a slotted-time system where a transmitter observes a dynamic source and decides when to send updates to a remote receiver through a channel with random delay. The receiver maintains estimates of the state of the dynamic source based on the received updates. In this paper, we adopt AoII as the performance metric and investigate the problem of optimizing the transmitter's action in each time slot to minimize AoII. We first characterize the considered problem using Markov Decision Process (MDP). Then, leveraging the policy improvement theorem and under an easy-to-verify condition, we prove that the optimal decision for the transmitter is to initiate a transmission whenever the channel is idle and AoII is not zero. The results apply to generic delay distribution. Lastly, we verify the condition numerically and provide the numerical results that highlight the performance of the optimal policy.
△ Less
Submitted 17 January, 2023; v1 submitted 6 March, 2022;
originally announced March 2022.
-
Adorned in Memes: Exploring the Adoption of Social Wearables in Nordic Student Culture
Authors:
Felix Anand Epp,
Anna Kantosalo,
Nehal Jain,
Andrés Lucero,
Elisa D Mekler
Abstract:
Social wearables promise to augment and enhance social interactions. However, despite two decades of HCI research on wearables, we are yet to see widespread adoption of social wearables into everyday life. More in-situ investigations into the social dynamics and cultural practices afforded by wearing interactive technology are needed to understand the drivers and barriers to adoption. To this end,…
▽ More
Social wearables promise to augment and enhance social interactions. However, despite two decades of HCI research on wearables, we are yet to see widespread adoption of social wearables into everyday life. More in-situ investigations into the social dynamics and cultural practices afforded by wearing interactive technology are needed to understand the drivers and barriers to adoption. To this end, we study social wearables in the context of Nordic student culture and the students' practice of adorning boiler suits. Through a co-creation process, we designed Digi Merkki, a personalised interactive clothing patch. In a two-week elicitation diary study, we captured how 16 students adopted Digi Merkki into their social practices. We found that Digi Merkki afforded a variety of social interaction strategies, including sharing, spamming, and stealing pictures, which supported meaning-making and community-building. Based on our findings, we articulate Memetic Expression as a strong concept for designing social wearables.
△ Less
Submitted 30 March, 2022; v1 submitted 2 March, 2022;
originally announced March 2022.
-
Multimodal Anti-Reflective Coatings for Perfecting Anomalous Reflection from Arbitrary Periodic Structures
Authors:
Sherman W. Marcus,
Vinay K. Killamsetty,
Ariel Epstein
Abstract:
Metasurfaces possess vast wave-manipulation capabilities, including reflection and refraction of a plane wave into non-standard directions. This requires meticulously-designed sub-wavelength meta-atoms in each period of the metasurface which guarantee unitary coupling to the desired Floquet-Bloch mode or, equivalently, suppression of the coupling to other modes. Herein, we propose an entirely diff…
▽ More
Metasurfaces possess vast wave-manipulation capabilities, including reflection and refraction of a plane wave into non-standard directions. This requires meticulously-designed sub-wavelength meta-atoms in each period of the metasurface which guarantee unitary coupling to the desired Floquet-Bloch mode or, equivalently, suppression of the coupling to other modes. Herein, we propose an entirely different scheme to achieve such suppression, alleviating the need to devise and realize such dense scrupulously-engineered polarizable particles. Extending the concept of anti-reflective coatings to enable simultaneous manipulation of multiple modes, we show theoretically and experimentally that a simple superstrate consisting of only several uniform dielectric layers can be modularly applied to \textit{aribtrary} periodic structures to yield perfect anomalous reflection. This multimodal anti-reflective coating (MARC), designed based on an analytical model, presents a conceptually and practically simpler paradigm for wave-control across a wide range of physical branches, from electromagnetics and acoustics to seismics and beyond.
△ Less
Submitted 13 January, 2022;
originally announced January 2022.
-
The Straw Tracking Detector for the Fermilab Muon $g-2$ Experiment
Authors:
B. T. King,
T. Albahri,
S. Al-Kilani,
D. Allspach,
D. Beckner,
A. Behnke,
T. J. V. Bowcock,
D. Boyden,
R. M. Carey,
J. Carroll,
B. C. K. Casey,
S. Charity,
R. Chislett,
M. Eads,
A. Epps,
S. B. Foster,
D. Gastler,
S. Grant,
T. Halewood-Leagas,
K. Hardin,
E. Hazen,
G. Hesketh,
D. J. Hollywood,
T. Jones,
C. Kenziora
, et al. (32 additional authors not shown)
Abstract:
The Muon $g-2$ Experiment at Fermilab uses a gaseous straw tracking detector to make detailed measurements of the stored muon beam profile, which are essential for the experiment to achieve its uncertainty goals. Positrons from muon decays spiral inward and pass through the tracking detector before striking an electromagnetic calorimeter. The tracking detector is therefore located inside the vacuu…
▽ More
The Muon $g-2$ Experiment at Fermilab uses a gaseous straw tracking detector to make detailed measurements of the stored muon beam profile, which are essential for the experiment to achieve its uncertainty goals. Positrons from muon decays spiral inward and pass through the tracking detector before striking an electromagnetic calorimeter. The tracking detector is therefore located inside the vacuum chamber in a region where the magnetic field is large and non-uniform. As such, the tracking detector must have a low leak rate to maintain a high-quality vacuum, must be non-magnetic so as not to perturb the magnetic field and, to minimize energy loss, must have a low radiation length. The performance of the tracking detector has met or surpassed the design requirements, with adequate electronic noise levels, an average straw hit resolution of $(110 \pm 20) \,μ$m, a detection efficiency of 97% or higher, and no performance degradation or signs of aging. The tracking detector's measurements result in an otherwise unachievable understanding of the muon's beam motion, particularly at early times in the experiment's measurement period when there are a significantly greater number of muons decaying. This is vital to the statistical power of the experiment, as well as facilitating the precise extraction of several systematic corrections and uncertainties. This paper describes the design, construction, testing, commissioning, and performance of the tracking detector.
△ Less
Submitted 24 February, 2022; v1 submitted 3 November, 2021;
originally announced November 2021.