-
Towards Human-AI Complementarity with Predictions Sets
Authors:
Giovanni De Toni,
Nastaran Okati,
Suhas Thejaswi,
Eleni Straitouri,
Manuel Gomez-Rodriguez
Abstract:
Decision support systems based on prediction sets have proven to be effective at hel** human experts solve classification tasks. Rather than providing single-label predictions, these systems provide sets of label predictions constructed using conformal prediction, namely prediction sets, and ask human experts to predict label values from these sets. In this paper, we first show that the predicti…
▽ More
Decision support systems based on prediction sets have proven to be effective at hel** human experts solve classification tasks. Rather than providing single-label predictions, these systems provide sets of label predictions constructed using conformal prediction, namely prediction sets, and ask human experts to predict label values from these sets. In this paper, we first show that the prediction sets constructed using conformal prediction are, in general, suboptimal in terms of average accuracy. Then, we show that the problem of finding the optimal prediction sets under which the human experts achieve the highest average accuracy is NP-hard. More strongly, unless P = NP, we show that the problem is hard to approximate to any factor less than the size of the label set. However, we introduce a simple and efficient greedy algorithm that, for a large class of expert models and non-conformity scores, is guaranteed to find prediction sets that provably offer equal or greater performance than those constructed using conformal prediction. Further, using a simulation study with both synthetic and real expert predictions, we demonstrate that, in practice, our greedy algorithm finds near-optimal prediction sets offering greater performance than conformal prediction.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Finding Counterfactually Optimal Action Sequences in Continuous State Spaces
Authors:
Stratis Tsirtsis,
Manuel Gomez-Rodriguez
Abstract:
Whenever a clinician reflects on the efficacy of a sequence of treatment decisions for a patient, they may try to identify critical time steps where, had they made different decisions, the patient's health would have improved. While recent methods at the intersection of causal inference and reinforcement learning promise to aid human experts, as the clinician above, to retrospectively analyze sequ…
▽ More
Whenever a clinician reflects on the efficacy of a sequence of treatment decisions for a patient, they may try to identify critical time steps where, had they made different decisions, the patient's health would have improved. While recent methods at the intersection of causal inference and reinforcement learning promise to aid human experts, as the clinician above, to retrospectively analyze sequential decision making processes, they have focused on environments with finitely many discrete states. However, in many practical applications, the state of the environment is inherently continuous in nature. In this paper, we aim to fill this gap. We start by formally characterizing a sequence of discrete actions and continuous states using finite horizon Markov decision processes and a broad class of bijective structural causal models. Building upon this characterization, we formalize the problem of finding counterfactually optimal action sequences and show that, in general, we cannot expect to solve it in polynomial time. Then, we develop a search method based on the $A^*$ algorithm that, under a natural form of Lipschitz continuity of the environment's dynamics, is guaranteed to return the optimal solution to the problem. Experiments on real clinical data show that our method is very efficient in practice, and it has the potential to offer interesting insights for sequential decision making tasks.
△ Less
Submitted 6 November, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
-
Cost allocation problems on highways with grouped users
Authors:
Marcos Gómez-Rodríguez,
Laura Davila-Pena,
Balbina Casas-Méndez
Abstract:
One of the practical applications of cooperative transferable utility games involves determining the fee structure for users of a given facility, whose construction or maintenance costs need to be recouped. In this context, certain efficiency and equity criteria guide the considered solutions. This paper analyzes how to allocate the fixed costs of a highway among its users through tolls, consideri…
▽ More
One of the practical applications of cooperative transferable utility games involves determining the fee structure for users of a given facility, whose construction or maintenance costs need to be recouped. In this context, certain efficiency and equity criteria guide the considered solutions. This paper analyzes how to allocate the fixed costs of a highway among its users through tolls, considering that different classes of vehicles or travelers utilize the service. For this purpose, we make use of generalized highway games with a priori unions that represent distinct user groups, such as frequent travelers or truckers, who, due to enhanced bargaining power, often secure reductions in their fares in real-world scenarios. In particular, the Owen value, the coalitional Tijs value, and a new value termed the Shapley-Tijs value, are axiomatically characterized. Additionally, straightforward formulations for calculating these values are provided. Finally, the proposed methodology is applied to actual traffic data from the AP-9 highway in Spain.
△ Less
Submitted 21 December, 2023; v1 submitted 19 April, 2023;
originally announced April 2023.
-
Reinforcement Learning Under Algorithmic Triage
Authors:
Eleni Straitouri,
Adish Singla,
Vahid Balazadeh Meresht,
Manuel Gomez-Rodriguez
Abstract:
Methods to learn under algorithmic triage have predominantly focused on supervised learning settings where each decision, or prediction, is independent of each other. Under algorithmic triage, a supervised learning model predicts a fraction of the instances and humans predict the remaining ones. In this work, we take a first step towards develo** reinforcement learning models that are optimized…
▽ More
Methods to learn under algorithmic triage have predominantly focused on supervised learning settings where each decision, or prediction, is independent of each other. Under algorithmic triage, a supervised learning model predicts a fraction of the instances and humans predict the remaining ones. In this work, we take a first step towards develo** reinforcement learning models that are optimized to operate under algorithmic triage. To this end, we look at the problem through the framework of options and develop a two-stage actor-critic method to learn reinforcement learning models under triage. The first stage performs offline, off-policy training using human data gathered in an environment where the human has operated on their own. The second stage performs on-policy training to account for the impact that switching may have on the human policy, which may be difficult to anticipate from the above human data. Extensive simulation experiments in a synthetic car driving task show that the machine models and the triage policies trained using our two-stage method effectively complement human policies and outperform those provided by several competitive baselines.
△ Less
Submitted 23 September, 2021;
originally announced September 2021.
-
Counterfactual Explanations in Sequential Decision Making Under Uncertainty
Authors:
Stratis Tsirtsis,
Abir De,
Manuel Gomez-Rodriguez
Abstract:
Methods to find counterfactual explanations have predominantly focused on one step decision making processes. In this work, we initiate the development of methods to find counterfactual explanations for decision making processes in which multiple, dependent actions are taken sequentially over time. We start by formally characterizing a sequence of actions and states using finite horizon Markov dec…
▽ More
Methods to find counterfactual explanations have predominantly focused on one step decision making processes. In this work, we initiate the development of methods to find counterfactual explanations for decision making processes in which multiple, dependent actions are taken sequentially over time. We start by formally characterizing a sequence of actions and states using finite horizon Markov decision processes and the Gumbel-Max structural causal model. Building upon this characterization, we formally state the problem of finding counterfactual explanations for sequential decision making processes. In our problem formulation, the counterfactual explanation specifies an alternative sequence of actions differing in at most k actions from the observed sequence that could have led the observed process realization to a better outcome. Then, we introduce a polynomial time algorithm based on dynamic programming to build a counterfactual policy that is guaranteed to always provide the optimal counterfactual explanation on every possible realization of the counterfactual environment dynamics. We validate our algorithm using both synthetic and real data from cognitive behavioral therapy and show that the counterfactual explanations our algorithm finds can provide valuable insights to enhance sequential decision making under uncertainty.
△ Less
Submitted 27 October, 2021; v1 submitted 6 July, 2021;
originally announced July 2021.
-
Group Testing under Superspreading Dynamics
Authors:
Stratis Tsirtsis,
Abir De,
Lars Lorch,
Manuel Gomez-Rodriguez
Abstract:
Testing is recommended for all close contacts of confirmed COVID-19 patients. However, existing group testing methods are oblivious to the circumstances of contagion provided by contact tracing. Here, we build upon a well-known semi-adaptive pool testing method, Dorfman's method with imperfect tests, and derive a simple group testing method based on dynamic programming that is specifically designe…
▽ More
Testing is recommended for all close contacts of confirmed COVID-19 patients. However, existing group testing methods are oblivious to the circumstances of contagion provided by contact tracing. Here, we build upon a well-known semi-adaptive pool testing method, Dorfman's method with imperfect tests, and derive a simple group testing method based on dynamic programming that is specifically designed to use the information provided by contact tracing. Experiments using a variety of reproduction numbers and dispersion levels, including those estimated in the context of the COVID-19 pandemic, show that the pools found using our method result in a significantly lower number of tests than those found using standard Dorfman's method, especially when the number of contacts of an infected individual is small. Moreover, our results show that our method can be more beneficial when the secondary infections are highly overdispersed.
△ Less
Submitted 30 June, 2021;
originally announced June 2021.
-
Differentiable Learning Under Triage
Authors:
Nastaran Okati,
Abir De,
Manuel Gomez-Rodriguez
Abstract:
Multiple lines of evidence suggest that predictive models may benefit from algorithmic triage. Under algorithmic triage, a predictive model does not predict all instances but instead defers some of them to human experts. However, the interplay between the prediction accuracy of the model and the human experts under algorithmic triage is not well understood. In this work, we start by formally chara…
▽ More
Multiple lines of evidence suggest that predictive models may benefit from algorithmic triage. Under algorithmic triage, a predictive model does not predict all instances but instead defers some of them to human experts. However, the interplay between the prediction accuracy of the model and the human experts under algorithmic triage is not well understood. In this work, we start by formally characterizing under which circumstances a predictive model may benefit from algorithmic triage. In doing so, we also demonstrate that models trained for full automation may be suboptimal under triage. Then, given any model and desired level of triage, we show that the optimal triage policy is a deterministic threshold rule in which triage decisions are derived deterministically by thresholding the difference between the model and human errors on a per-instance level. Building upon these results, we introduce a practical gradient-based algorithm that is guaranteed to find a sequence of triage policies and predictive models of increasing performance. Experiments on a wide variety of supervised learning tasks using synthetic and real data from two important applications -- content moderation and scientific discovery -- illustrate our theoretical results and show that the models and triage policies provided by our gradient-based algorithm outperform those provided by several competitive baselines.
△ Less
Submitted 18 November, 2021; v1 submitted 16 March, 2021;
originally announced March 2021.
-
Reconciling Security and Utility in Next-Generation Epidemic Risk Mitigation Systems
Authors:
Pierfrancesco Ingo,
Nichole Boufford,
Ming Cheng Jiang,
Rowan Lindsay,
Matthew Lentz,
Gilles Barthe,
Manuel Gomez-Rodriguez,
Bernhard Schölkopf,
Deepak Garg,
Peter Druschel,
Aastha Mehta
Abstract:
Epidemics like the recent COVID-19 require proactive contact tracing and epidemiological analysis to predict and subsequently contain infection transmissions. The proactive measures require large scale data collection, which simultaneously raise concerns regarding users' privacy. Digital contact tracing systems developed in response to COVID-19 either collected extensive data for effective analyti…
▽ More
Epidemics like the recent COVID-19 require proactive contact tracing and epidemiological analysis to predict and subsequently contain infection transmissions. The proactive measures require large scale data collection, which simultaneously raise concerns regarding users' privacy. Digital contact tracing systems developed in response to COVID-19 either collected extensive data for effective analytics at the cost of users' privacy or collected minimal data for the sake of user privacy but were ineffective in predicting and mitigating the epidemic risks. We present Silmarillion--in preparation for future epidemics--a system that reconciles user's privacy with rich data collection for higher utility. In Silmarillion, user devices record Bluetooth encounters with beacons installed in strategic locations. The beacons further enrich the encounters with geo-location, location type, and environment conditions at the beacon installation site. This enriched information enables detailed scientific analysis of disease parameters as well as more accurate personalized exposure risk notification. At the same time, Silmarillion provides privacy to all participants and non-participants at the same level as that guaranteed in digital and manual contact tracing. We describe the design of Silmarillion and its communication protocols that ensure user privacy and data security. We also evaluate a prototype of Silmarillion built using low-end IoT boards, showing that the power consumption and user latencies are adequately low for a practical deployment. Finally, we briefly report on a small-scale deployment within a university building as a proof-of-concept.
△ Less
Submitted 9 May, 2024; v1 submitted 16 November, 2020;
originally announced November 2020.
-
Observation of Yu-Shiba-Rusinov states in superconducting graphene
Authors:
E. Cortés-del Río,
J. L. Lado,
V. Cherkez,
P. Mallet,
J-Y. Veuillen,
J. C. Cuevas,
J. M. Gómez-Rodríguez,
J. Fernández-Rossier,
I. Brihuega
Abstract:
When magnetic atoms are inserted inside a superconductor, the superconducting order is locally depleted as a result of the antagonistic nature of magnetism and superconductivity1. Thereby, distinctive spectral features, known as Yu-Shiba-Rusinov states, appear inside the superconducting gap2-4. The search for Yu-Shiba-Rusinov states in different materials is intense, as they can be used as buildin…
▽ More
When magnetic atoms are inserted inside a superconductor, the superconducting order is locally depleted as a result of the antagonistic nature of magnetism and superconductivity1. Thereby, distinctive spectral features, known as Yu-Shiba-Rusinov states, appear inside the superconducting gap2-4. The search for Yu-Shiba-Rusinov states in different materials is intense, as they can be used as building blocks to promote Majorana modes5 suitable for topological quantum computing6. Here we report the first realization of Yu-Shiba-Rusinov states in graphene, a non-superconducting 2D material, and without the participation of magnetic atoms. We induce superconductivity in graphene by proximity effect7-9 brought by adsorbing nanometer scale superconducting Pb islands. Using scanning tunneling microscopy and spectroscopy we measure the superconducting proximity gap in graphene and we visualize Yu-Shiba-Rusinov states in graphene grain boundaries. Our results reveal the very special nature of those Yu-Shiba-Rusinov states, which extends more than 20 nm away from the grain boundaries. These observations provide the long sought experimental confirmation that graphene grain boundaries host local magnetic moments10-14 and constitute the first observation of Yu-Shiba-Rusinov states in a chemically pure system.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
Large-scale randomized experiment reveals machine learning helps people learn and remember more effectively
Authors:
Utkarsh Upadhyay,
Graham Lancashire,
Christoph Moser,
Manuel Gomez-Rodriguez
Abstract:
Machine learning has typically focused on develo** models and algorithms that would ultimately replace humans at tasks where intelligence is required. In this work, rather than replacing humans, we focus on unveiling the potential of machine learning to improve how people learn and remember factual material. To this end, we perform a large-scale randomized controlled trial with thousands of lear…
▽ More
Machine learning has typically focused on develo** models and algorithms that would ultimately replace humans at tasks where intelligence is required. In this work, rather than replacing humans, we focus on unveiling the potential of machine learning to improve how people learn and remember factual material. To this end, we perform a large-scale randomized controlled trial with thousands of learners from a popular learning app in the area of mobility. After controlling for the length and frequency of study, we find that learners whose study sessions are optimized using machine learning remember the content over $\sim$67% longer than those whose study sessions are generated using two alternative heuristics. Our randomized controlled trial also reveals that the learners whose study sessions are optimized using machine learning are $\sim$50% more likely to return to the app within 4-7 days.
△ Less
Submitted 9 October, 2020;
originally announced October 2020.
-
Atomic-scale control of graphene magnetism using hydrogen atoms
Authors:
H. González-Herrero,
J. M. Gómez-Rodríguez,
P. Mallet,
M. Moaied,
J. J. Palacios,
C. Salgado,
M. M. Ugeda,
J. Y. Veuillen,
F. Yndurain,
I. Brihuega
Abstract:
Isolated hydrogen atoms absorbed on graphene are predicted to induce magnetic moments. Here we demonstrate that the adsorption of a single hydrogen atom on graphene induces a magnetic moment characterized by a ~20 meV spin-split state at the Fermi energy. Our scanning tunneling microscopy (STM) experiments, complemented by first-principles calculations, show that such a spin-polarized state is ess…
▽ More
Isolated hydrogen atoms absorbed on graphene are predicted to induce magnetic moments. Here we demonstrate that the adsorption of a single hydrogen atom on graphene induces a magnetic moment characterized by a ~20 meV spin-split state at the Fermi energy. Our scanning tunneling microscopy (STM) experiments, complemented by first-principles calculations, show that such a spin-polarized state is essentially localized on the carbon sublattice complementary to the one where the H atom is chemisorbed. This atomically modulated spin-texture, which extends several nanometers away from the H atom, drives the direct coupling between the magnetic moments at unusually long distances. Using the STM tip to manipulate H atoms with atomic precision, we demonstrate the possibility to tailor the magnetism of selected graphene regions.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Classification Under Human Assistance
Authors:
Abir De,
Nastaran Okati,
Ali Zarezade,
Manuel Gomez-Rodriguez
Abstract:
Most supervised learning models are trained for full automation. However, their predictions are sometimes worse than those by human experts on some specific instances. Motivated by this empirical observation, our goal is to design classifiers that are optimized to operate under different automation levels. More specifically, we focus on convex margin-based classifiers and first show that the probl…
▽ More
Most supervised learning models are trained for full automation. However, their predictions are sometimes worse than those by human experts on some specific instances. Motivated by this empirical observation, our goal is to design classifiers that are optimized to operate under different automation levels. More specifically, we focus on convex margin-based classifiers and first show that the problem is NP-hard. Then, we further show that, for support vector machines, the corresponding objective function can be expressed as the difference of two functions f = g - c, where g is monotone, non-negative and γ-weakly submodular, and c is non-negative and modular. This representation allows a recently introduced deterministic greedy algorithm, as well as a more efficient randomized variant of the algorithm, to enjoy approximation guarantees at solving the problem. Experiments on synthetic and real-world data from several applications in medical diagnosis illustrate our theoretical findings and demonstrate that, under human assistance, supervised learning models trained to operate under different automation levels can outperform those trained for full automation as well as humans operating alone.
△ Less
Submitted 15 March, 2021; v1 submitted 21 June, 2020;
originally announced June 2020.
-
Quantum confinement of Dirac quasiparticles in graphene patterned with subnanometer precision
Authors:
E. Cortés-del Río,
P. Mallet,
H. González-Herrero,
J. L. Lado,
J. Fernández-Rossier,
J. M. Gómez-Rodríguez,
J-Y. Veuillen,
I. Brihuega
Abstract:
Quantum confinement of graphene Dirac-like electrons in artificially crafted nanometer structures is a long sought goal that would provide a strategy to selectively tune the electronic properties of graphene, including bandgap opening or quantization of energy levels However, creating confining structures with nanometer precision in shape, size and location, remains as an experimental challenge, b…
▽ More
Quantum confinement of graphene Dirac-like electrons in artificially crafted nanometer structures is a long sought goal that would provide a strategy to selectively tune the electronic properties of graphene, including bandgap opening or quantization of energy levels However, creating confining structures with nanometer precision in shape, size and location, remains as an experimental challenge, both for top-down and bottom-up approaches. Moreover, Klein tunneling, offering an escape route to graphene electrons, limits the efficiency of electrostatic confinement. Here, a scanning tunneling microscope (STM) is used to create graphene nanopatterns, with sub-nanometer precision, by the collective manipulation of a large number of H atoms. Individual graphene nanostructures are built at selected locations, with predetermined orientations and shapes, and with dimensions going all the way from 2 nanometers up to 1 micron. The method permits to erase and rebuild the patterns at will, and it can be implemented on different graphene substrates. STM experiments demonstrate that such graphene nanostructures confine very efficiently graphene Dirac quasiparticles, both in zero and one dimensional structures. In graphene quantum dots, perfectly defined energy band gaps up to 0.8 eV are found, that scale as the inverse of the dots linear dimension, as expected for massless Dirac fermions
△ Less
Submitted 31 May, 2020; v1 submitted 25 May, 2020;
originally announced May 2020.
-
Quantifying the Effects of Contact Tracing, Testing, and Containment Measures in the Presence of Infection Hotspots
Authors:
Lars Lorch,
Heiner Kremer,
William Trouleau,
Stratis Tsirtsis,
Aron Szanto,
Bernhard Schölkopf,
Manuel Gomez-Rodriguez
Abstract:
Multiple lines of evidence strongly suggest that infection hotspots, where a single individual infects many others, play a key role in the transmission dynamics of COVID-19. However, most of the existing epidemiological models fail to capture this aspect by neither representing the sites visited by individuals explicitly nor characterizing disease transmission as a function of individual mobility…
▽ More
Multiple lines of evidence strongly suggest that infection hotspots, where a single individual infects many others, play a key role in the transmission dynamics of COVID-19. However, most of the existing epidemiological models fail to capture this aspect by neither representing the sites visited by individuals explicitly nor characterizing disease transmission as a function of individual mobility patterns. In this work, we introduce a temporal point process modeling framework that specifically represents visits to the sites where individuals get in contact and infect each other. Under our model, the number of infections caused by an infectious individual naturally emerges to be overdispersed. Using an efficient sampling algorithm, we demonstrate how to estimate the transmission rate of infectious individuals at the sites they visit and in their households using Bayesian optimization and longitudinal case data. Simulations using fine-grained and publicly available demographic data and site locations from Bern, Switzerland showcase the flexibility of our framework. To facilitate research and analyses of other cities and regions, we release an open-source implementation of our framework.
△ Less
Submitted 10 November, 2022; v1 submitted 15 April, 2020;
originally announced April 2020.
-
Decisions, Counterfactual Explanations and Strategic Behavior
Authors:
Stratis Tsirtsis,
Manuel Gomez-Rodriguez
Abstract:
As data-driven predictive models are increasingly used to inform decisions, it has been argued that decision makers should provide explanations that help individuals understand what would have to change for these decisions to be beneficial ones. However, there has been little discussion on the possibility that individuals may use the above counterfactual explanations to invest effort strategically…
▽ More
As data-driven predictive models are increasingly used to inform decisions, it has been argued that decision makers should provide explanations that help individuals understand what would have to change for these decisions to be beneficial ones. However, there has been little discussion on the possibility that individuals may use the above counterfactual explanations to invest effort strategically and maximize their chances of receiving a beneficial decision. In this paper, our goal is to find policies and counterfactual explanations that are optimal in terms of utility in such a strategic setting. We first show that, given a pre-defined policy, the problem of finding the optimal set of counterfactual explanations is NP-hard. Then, we show that the corresponding objective is nondecreasing and satisfies submodularity and this allows a standard greedy algorithm to enjoy approximation guarantees. In addition, we further show that the problem of jointly finding both the optimal policy and set of counterfactual explanations reduces to maximizing a non-monotone submodular function. As a result, we can use a recent randomized algorithm to solve the problem, which also offers approximation guarantees. Finally, we demonstrate that, by incorporating a matroid constraint into the problem formulation, we can increase the diversity of the optimal set of counterfactual explanations and incentivize individuals across the whole spectrum of the population to self improve. Experiments on synthetic and real lending and credit card data illustrate our theoretical findings and show that the counterfactual explanations and decision policies found by our algorithms achieve higher utility than several competitive baselines.
△ Less
Submitted 14 October, 2020; v1 submitted 11 February, 2020;
originally announced February 2020.
-
Learning to Switch Among Agents in a Team via 2-Layer Markov Decision Processes
Authors:
Vahid Balazadeh,
Abir De,
Adish Singla,
Manuel Gomez-Rodriguez
Abstract:
Reinforcement learning agents have been mostly developed and evaluated under the assumption that they will operate in a fully autonomous manner -- they will take all actions. In this work, our goal is to develop algorithms that, by learning to switch control between agents, allow existing reinforcement learning agents to operate under different automation levels. To this end, we first formally def…
▽ More
Reinforcement learning agents have been mostly developed and evaluated under the assumption that they will operate in a fully autonomous manner -- they will take all actions. In this work, our goal is to develop algorithms that, by learning to switch control between agents, allow existing reinforcement learning agents to operate under different automation levels. To this end, we first formally define the problem of learning to switch control among agents in a team via a 2-layer Markov decision process. Then, we develop an online learning algorithm that uses upper confidence bounds on the agents' policies and the environment's transition probabilities to find a sequence of switching policies. The total regret of our algorithm with respect to the optimal switching policy is sublinear in the number of learning steps and, whenever multiple teams of agents operate in a similar environment, our algorithm greatly benefits from maintaining shared confidence bounds for the environments' transition probabilities and it enjoys a better regret bound than problem-agnostic algorithms. Simulation experiments in an obstacle avoidance task illustrate our theoretical findings and demonstrate that, by exploiting the specific structure of the problem, our proposed algorithm is superior to problem-agnostic algorithms.
△ Less
Submitted 30 June, 2023; v1 submitted 11 February, 2020;
originally announced February 2020.
-
Regression Under Human Assistance
Authors:
Abir De,
Nastaran Okati,
Paramita Koley,
Niloy Ganguly,
Manuel Gomez-Rodriguez
Abstract:
Decisions are increasingly taken by both humans and machine learning models. However, machine learning models are currently trained for full automation -- they are not aware that some of the decisions may still be taken by humans. In this paper, we take a first step towards the development of machine learning models that are optimized to operate under different automation levels. More specifically…
▽ More
Decisions are increasingly taken by both humans and machine learning models. However, machine learning models are currently trained for full automation -- they are not aware that some of the decisions may still be taken by humans. In this paper, we take a first step towards the development of machine learning models that are optimized to operate under different automation levels. More specifically, we first introduce the problem of ridge regression under human assistance and show that it is NP-hard. Then, we derive an alternative representation of the corresponding objective function as a difference of nondecreasing submodular functions. Building on this representation, we further show that the objective is nondecreasing and satisfies $α$-submodularity, a recently introduced notion of approximate submodularity. These properties allow a simple and efficient greedy algorithm to enjoy approximation guarantees at solving the problem. Experiments on synthetic and real-world data from two important applications -- medical diagnosis and content moderation-demonstrate that our algorithm outsources to humans those samples in which the prediction error of the ridge regression model would have been the highest if it had to make a prediction, it outperforms several competitive baselines, and its performance is robust with respect to several design choices and hyperparameters used in the experiments.
△ Less
Submitted 15 March, 2021; v1 submitted 6 September, 2019;
originally announced September 2019.
-
Can A User Anticipate What Her Followers Want?
Authors:
Abir De,
Adish Singla,
Utkarsh Upadhyay,
Manuel Gomez-Rodriguez
Abstract:
Whenever a social media user decides to share a story, she is typically pleased to receive likes, comments, shares, or, more generally, feedback from her followers. As a result, she may feel compelled to use the feedback she receives to (re-)estimate her followers' preferences and decides which stories to share next to receive more (positive) feedback. Under which conditions can she succeed? In th…
▽ More
Whenever a social media user decides to share a story, she is typically pleased to receive likes, comments, shares, or, more generally, feedback from her followers. As a result, she may feel compelled to use the feedback she receives to (re-)estimate her followers' preferences and decides which stories to share next to receive more (positive) feedback. Under which conditions can she succeed? In this work, we first look into this problem from a theoretical perspective and then provide a set of practical algorithms to identify and characterize such behavior in social media. More specifically, we address the above problem from the viewpoint of sequential decision making and utility maximization. For a wide variety of utility functions, we first show that, to succeed, a user needs to actively trade off exploitation-- sharing stories which lead to more (positive) feedback--and exploration-- sharing stories to learn about her followers' preferences. However, exploration is not necessary if a user utilizes the feedback her followers provide to other users in addition to the feedback she receives. Then, we develop a utility estimation framework for observation data, which relies on statistical hypothesis testing to determine whether a user utilizes the feedback she receives from each of her followers to decide what to post next. Experiments on synthetic data illustrate our theoretical findings and show that our estimation framework is able to accurately recover users' underlying utility functions. Experiments on several real datasets gathered from Twitter and Reddit reveal that up to 82% (43%) of the Twitter (Reddit) users in our datasets do use the feedback they receive to decide what to post next.
△ Less
Submitted 19 September, 2019; v1 submitted 1 September, 2019;
originally announced September 2019.
-
Optimal Decision Making Under Strategic Behavior
Authors:
Stratis Tsirtsis,
Behzad Tabibian,
Moein Khajehnejad,
Adish Singla,
Bernhard Schölkopf,
Manuel Gomez-Rodriguez
Abstract:
We are witnessing an increasing use of data-driven predictive models to inform decisions. As decisions have implications for individuals and society, there is increasing pressure on decision makers to be transparent about their decision policies. At the same time, individuals may use knowledge, gained by transparency, to invest effort strategically in order to maximize their chances of receiving a…
▽ More
We are witnessing an increasing use of data-driven predictive models to inform decisions. As decisions have implications for individuals and society, there is increasing pressure on decision makers to be transparent about their decision policies. At the same time, individuals may use knowledge, gained by transparency, to invest effort strategically in order to maximize their chances of receiving a beneficial decision. Our goal is to find decision policies that are optimal in terms of utility in such a strategic setting. To this end, we first characterize how strategic investment of effort by individuals leads to a change in the feature distribution. Using this characterization, we first show that, in general, we cannot expect to find optimal decision policies in polynomial time and there are cases in which deterministic policies are suboptimal. Then, we demonstrate that, if the cost individuals pay to change their features satisfies a natural monotonicity assumption, we can narrow down the search for the optimal policy to a particular family of decision policies with a set of desirable properties, which allow for a highly effective polynomial time heuristic search algorithm using dynamic programming. Finally, under no assumptions on the cost individuals pay to change their features, we develop an iterative search algorithm that is guaranteed to find locally optimal decision policies also in polynomial time. Experiments on synthetic and real credit card data illustrate our theoretical findings and show that the decision policies found by our algorithms achieve higher utility than those that do not account for strategic behavior.
△ Less
Submitted 21 September, 2020; v1 submitted 22 May, 2019;
originally announced May 2019.
-
Fair Decisions Despite Imperfect Predictions
Authors:
Niki Kilbertus,
Manuel Gomez-Rodriguez,
Bernhard Schölkopf,
Krikamol Muandet,
Isabel Valera
Abstract:
Consequential decisions are increasingly informed by sophisticated data-driven predictive models. However, to consistently learn accurate predictive models, one needs access to ground truth labels. Unfortunately, in practice, labels may only exist conditional on certain decisions---if a loan is denied, there is not even an option for the individual to pay back the loan. Hence, the observed data di…
▽ More
Consequential decisions are increasingly informed by sophisticated data-driven predictive models. However, to consistently learn accurate predictive models, one needs access to ground truth labels. Unfortunately, in practice, labels may only exist conditional on certain decisions---if a loan is denied, there is not even an option for the individual to pay back the loan. Hence, the observed data distribution depends on how decisions are being made. In this paper, we show that in this selective labels setting, learning a predictor directly only from available labeled data is suboptimal in terms of both fairness and utility. To avoid this undesirable behavior, we propose to directly learn decision policies that maximize utility under fairness constraints and thereby take into account how decisions affect which data is observed in the future. Our results suggest the need for a paradigm shift in the context of fair machine learning from the currently prevalent idea of simply building predictive models from a single static dataset via risk minimization, to a more interactive notion of "learning to decide". In particular, such policies should not entirely neglect part of the input space, drawing connections to explore/exploit tradeoffs in reinforcement learning, data missingness, and potential outcomes in causal inference. Experiments on synthetic and real-world data illustrate the favorable properties of learning to decide in terms of utility and fairness.
△ Less
Submitted 16 October, 2020; v1 submitted 8 February, 2019;
originally announced February 2019.
-
Non-submodular Function Maximization subject to a Matroid Constraint, with Applications
Authors:
Khashayar Gatmiry,
Manuel Gomez-Rodriguez
Abstract:
The standard greedy algorithm has been recently shown to enjoy approximation guarantees for constrained non-submodular nondecreasing set function maximization. While these recent results allow to better characterize the empirical success of the greedy algorithm, they are only applicable to simple cardinality constraints. In this paper, we study the problem of maximizing a non-submodular nondecreas…
▽ More
The standard greedy algorithm has been recently shown to enjoy approximation guarantees for constrained non-submodular nondecreasing set function maximization. While these recent results allow to better characterize the empirical success of the greedy algorithm, they are only applicable to simple cardinality constraints. In this paper, we study the problem of maximizing a non-submodular nondecreasing set function subject to a general matroid constraint. We first show that the standard greedy algorithm offers an approximation factor of $\frac{0.4 γ^{2}}{\sqrt{γr} + 1}$, where $γ$ is the submodularity ratio of the function and $r$ is the rank of the matroid. Then, we show that the same greedy algorithm offers a constant approximation factor of $(1 + 1/(1-α))^{-1}$, where $α$ is the generalized curvature of the function. In addition, we demonstrate that these approximation guarantees are applicable to several real-world applications in which the submodularity ratio and the generalized curvature can be bounded. Finally, we show that our greedy algorithm does achieve a competitive performance in practice using a variety of experiments on synthetic and real-world data.
△ Less
Submitted 8 October, 2019; v1 submitted 19 November, 2018;
originally announced November 2018.
-
Stochastic Optimal Control of Epidemic Processes in Networks
Authors:
Lars Lorch,
Abir De,
Samir Bhatt,
William Trouleau,
Utkarsh Upadhyay,
Manuel Gomez-Rodriguez
Abstract:
We approach the development of models and control strategies of susceptible-infected-susceptible (SIS) epidemic processes from the perspective of marked temporal point processes and stochastic optimal control of stochastic differential equations (SDEs) with jumps. In contrast to previous work, this novel perspective is particularly well-suited to make use of fine-grained data about disease outbrea…
▽ More
We approach the development of models and control strategies of susceptible-infected-susceptible (SIS) epidemic processes from the perspective of marked temporal point processes and stochastic optimal control of stochastic differential equations (SDEs) with jumps. In contrast to previous work, this novel perspective is particularly well-suited to make use of fine-grained data about disease outbreaks and lets us overcome the shortcomings of current control strategies. Our control strategy resorts to treatment intensities to determine who to treat and when to do so to minimize the amount of infected individuals over time. Preliminary experiments with synthetic data show that our control strategy consistently outperforms several alternatives. Looking into the future, we believe our methodology provides a promising step towards the development of practical data-driven control strategies of epidemic processes.
△ Less
Submitted 30 November, 2018; v1 submitted 30 October, 2018;
originally announced October 2018.
-
Deep Reinforcement Learning of Marked Temporal Point Processes
Authors:
Utkarsh Upadhyay,
Abir De,
Manuel Gomez-Rodriguez
Abstract:
In a wide variety of applications, humans interact with a complex environment by means of asynchronous stochastic discrete events in continuous time. Can we design online interventions that will help humans achieve certain goals in such asynchronous setting? In this paper, we address the above problem from the perspective of deep reinforcement learning of marked temporal point processes, where bot…
▽ More
In a wide variety of applications, humans interact with a complex environment by means of asynchronous stochastic discrete events in continuous time. Can we design online interventions that will help humans achieve certain goals in such asynchronous setting? In this paper, we address the above problem from the perspective of deep reinforcement learning of marked temporal point processes, where both the actions taken by an agent and the feedback it receives from the environment are asynchronous stochastic discrete events characterized using marked temporal point processes. In doing so, we define the agent's policy using the intensity and mark distribution of the corresponding process and then derive a flexible policy gradient method, which embeds the agent's actions and the feedback it receives into real-valued vectors using deep recurrent neural networks. Our method does not make any assumptions on the functional form of the intensity and mark distribution of the feedback and it allows for arbitrarily complex reward functions. We apply our methodology to two different applications in personalized teaching and viral marketing and, using data gathered from Duolingo and Twitter, we show that it may be able to find interventions to help learners and marketers achieve their goals more effectively than alternatives.
△ Less
Submitted 6 November, 2018; v1 submitted 23 May, 2018;
originally announced May 2018.
-
Steering Social Activity: A Stochastic Optimal Control Point Of View
Authors:
Ali Zarezade,
Abir De,
Utkarsh Upadhyay,
Hamid R. Rabiee,
Manuel Gomez-Rodriguez
Abstract:
User engagement in online social networking depends critically on the level of social activity in the corresponding platform--the number of online actions, such as posts, shares or replies, taken by their users. Can we design data-driven algorithms to increase social activity? At a user level, such algorithms may increase activity by hel** users decide when to take an action to be more likely to…
▽ More
User engagement in online social networking depends critically on the level of social activity in the corresponding platform--the number of online actions, such as posts, shares or replies, taken by their users. Can we design data-driven algorithms to increase social activity? At a user level, such algorithms may increase activity by hel** users decide when to take an action to be more likely to be noticed by their peers. At a network level, they may increase activity by incentivizing a few influential users to take more actions, which in turn will trigger additional actions by other users. In this paper, we model social activity using the framework of marked temporal point processes, derive an alternate representation of these processes using stochastic differential equations (SDEs) with jumps and, exploiting this alternate representation, develop two efficient online algorithms with provable guarantees to steer social activity both at a user and at a network level. In doing so, we establish a previously unexplored connection between optimal control of jump SDEs and doubly stochastic marked temporal point processes, which is of independent interest. Finally, we experiment both with synthetic and real data gathered from Twitter and show that our algorithms consistently steer social activity more effectively than the state of the art.
△ Less
Submitted 19 February, 2018;
originally announced February 2018.
-
On the Complexity of Opinions and Online Discussions
Authors:
Utkarsh Upadhyay,
Abir De,
Aasish Pappu,
Manuel Gomez-Rodriguez
Abstract:
In an increasingly polarized world, demagogues who reduce complexity down to simple arguments based on emotion are gaining in popularity. Are opinions and online discussions falling into demagoguery? In this work, we aim to provide computational tools to investigate this question and, by doing so, explore the nature and complexity of online discussions and their space of opinions, uncovering where…
▽ More
In an increasingly polarized world, demagogues who reduce complexity down to simple arguments based on emotion are gaining in popularity. Are opinions and online discussions falling into demagoguery? In this work, we aim to provide computational tools to investigate this question and, by doing so, explore the nature and complexity of online discussions and their space of opinions, uncovering where each participant lies.
More specifically, we present a modeling framework to construct latent representations of opinions in online discussions which are consistent with human judgements, as measured by online voting. If two opinions are close in the resulting latent space of opinions, it is because humans think they are similar. Our modeling framework is theoretically grounded and establishes a surprising connection between opinions and voting models and the sign-rank of a matrix. Moreover, it also provides a set of practical algorithms to both estimate the dimension of the latent space of opinions and infer where opinions expressed by the participants of an online discussion lie in this space. Experiments on a large dataset from Yahoo! News, Yahoo! Finance, Yahoo! Sports, and the Newsroom app suggest that unidimensional opinion models may often be unable to accurately represent online discussions, provide insights into human judgements and opinions, and show that our framework is able to circumvent language nuances such as sarcasm or humor by relying on human judgements instead of textual analysis.
△ Less
Submitted 20 December, 2018; v1 submitted 19 February, 2018;
originally announced February 2018.
-
NeVAE: A Deep Generative Model for Molecular Graphs
Authors:
Bidisha Samanta,
Abir De,
Gourhari Jana,
Pratim Kumar Chattaraj,
Niloy Ganguly,
Manuel Gomez-Rodriguez
Abstract:
Deep generative models have been praised for their ability to learn smooth latent representation of images, text, and audio, which can then be used to generate new, plausible data. However, current generative models are unable to work with molecular graphs due to their unique characteristics-their underlying structure is not Euclidean or grid-like, they remain isomorphic under permutation of the n…
▽ More
Deep generative models have been praised for their ability to learn smooth latent representation of images, text, and audio, which can then be used to generate new, plausible data. However, current generative models are unable to work with molecular graphs due to their unique characteristics-their underlying structure is not Euclidean or grid-like, they remain isomorphic under permutation of the nodes labels, and they come with a different number of nodes and edges. In this paper, we first propose a novel variational autoencoder for molecular graphs, whose encoder and decoder are specially designed to account for the above properties by means of several technical innovations. Moreover, in contrast with the state of the art, our decoder is able to provide the spatial coordinates of the atoms of the molecules it generates. Then, we develop a gradient-based algorithm to optimize the decoder of our model so that it learns to generate molecules that maximize the value of certain property of interest and, given a molecule of interest, it is able to optimize the spatial configuration of its atoms for greater stability. Experiments reveal that our variational autoencoder can discover plausible, diverse and novel molecules more effectively than several state of the art models. Moreover, for several properties of interest, our optimized decoder is able to identify molecules with property values 121% higher than those identified by several state of the art methods based on Bayesian optimization and reinforcement learning
△ Less
Submitted 6 September, 2019; v1 submitted 14 February, 2018;
originally announced February 2018.
-
Optimizing Human Learning
Authors:
Behzad Tabibian,
Utkarsh Upadhyay,
Abir De,
Ali Zarezade,
Bernhard Schoelkopf,
Manuel Gomez-Rodriguez
Abstract:
Spaced repetition is a technique for efficient memorization which uses repeated, spaced review of content to improve long-term retention. Can we find the optimal reviewing schedule to maximize the benefits of spaced repetition? In this paper, we introduce a novel, flexible representation of spaced repetition using the framework of marked temporal point processes and then address the above question…
▽ More
Spaced repetition is a technique for efficient memorization which uses repeated, spaced review of content to improve long-term retention. Can we find the optimal reviewing schedule to maximize the benefits of spaced repetition? In this paper, we introduce a novel, flexible representation of spaced repetition using the framework of marked temporal point processes and then address the above question as an optimal control problem for stochastic differential equations with jumps. For two well-known human memory models, we show that the optimal reviewing schedule is given by the recall probability of the content to be learned. As a result, we can then develop a simple, scalable online algorithm, Memorize, to sample the optimal reviewing times. Experiments on both synthetic and real data gathered from Duolingo, a popular language-learning online platform, show that our algorithm may be able to help learners memorize more effectively than alternatives.
△ Less
Submitted 10 March, 2018; v1 submitted 5 December, 2017;
originally announced December 2017.
-
Leveraging the Crowd to Detect and Reduce the Spread of Fake News and Misinformation
Authors:
Jooyeon Kim,
Behzad Tabibian,
Alice Oh,
Bernhard Schoelkopf,
Manuel Gomez-Rodriguez
Abstract:
Online social networking sites are experimenting with the following crowd-powered procedure to reduce the spread of fake news and misinformation: whenever a user is exposed to a story through her feed, she can flag the story as misinformation and, if the story receives enough flags, it is sent to a trusted third party for fact checking. If this party identifies the story as misinformation, it is m…
▽ More
Online social networking sites are experimenting with the following crowd-powered procedure to reduce the spread of fake news and misinformation: whenever a user is exposed to a story through her feed, she can flag the story as misinformation and, if the story receives enough flags, it is sent to a trusted third party for fact checking. If this party identifies the story as misinformation, it is marked as disputed. However, given the uncertain number of exposures, the high cost of fact checking, and the trade-off between flags and exposures, the above mentioned procedure requires careful reasoning and smart algorithms which, to the best of our knowledge, do not exist to date.
In this paper, we first introduce a flexible representation of the above procedure using the framework of marked temporal point processes. Then, we develop a scalable online algorithm, Curb, to select which stories to send for fact checking and when to do so to efficiently reduce the spread of misinformation with provable guarantees. In doing so, we need to solve a novel stochastic optimal control problem for stochastic differential equations with jumps, which is of independent interest. Experiments on two real-world datasets gathered from Twitter and Weibo show that our algorithm may be able to effectively reduce the spread of fake news and misinformation.
△ Less
Submitted 27 November, 2017;
originally announced November 2017.
-
Harnessing Natural Experiments to Quantify the Causal Effect of Badges
Authors:
Tomasz Kusmierczyk,
Manuel Gomez-Rodriguez
Abstract:
A wide variety of online platforms use digital badges to encourage users to take certain types of desirable actions. However, despite their growing popularity, their causal effect on users' behavior is not well understood. This is partly due to the lack of counterfactual data and the myriad of complex factors that influence users' behavior over time. As a consequence, their design and deployment l…
▽ More
A wide variety of online platforms use digital badges to encourage users to take certain types of desirable actions. However, despite their growing popularity, their causal effect on users' behavior is not well understood. This is partly due to the lack of counterfactual data and the myriad of complex factors that influence users' behavior over time. As a consequence, their design and deployment lacks general principles.
In this paper, we focus on first-time badges, which are awarded after a user takes a particular type of action for the first time, and study their causal effect by harnessing the delayed introduction of several badges in a popular Q&A website. In doing so, we introduce a novel causal inference framework for badges whose main technical innovations are a robust survival-based hypothesis testing procedure, which controls for the utility heterogeneity across users, and a bootstrap difference-in-differences method, which controls for the random fluctuations in users' behavior over time. We find that first-time badges steer users' behavior if the utility a user obtains from taking the corresponding action is sufficiently low, otherwise, the badge does not have a significant effect. Moreover, for badges that successfully steered user behavior, we perform a counterfactual analysis and show that they significantly improved the functioning of the site at a community level.
△ Less
Submitted 10 April, 2018; v1 submitted 25 July, 2017;
originally announced July 2017.
-
Strong-coupling charge density wave in a one-dimensional topological metal
Authors:
Philip Hofmann,
Miguel Ugeda,
Antonio J. Martínez-Galera,
Anna Stróżecka,
Jose M. Gómez-Rodríguez,
Emile Rienks,
Maria Fuglsang Jensen,
J. I. Pascual,
Justin W. Wells
Abstract:
Scanning tunnelling microscopy and low energy electron diffraction show a dimerization-like reconstruction in the one-dimensional atomic chains on Bi(114) at low temperatures. While one-dimensional systems are generally unstable against such a distortion, its observation is not expected for this particular surface, since there are several factors that should prevent it: One is the particular spin…
▽ More
Scanning tunnelling microscopy and low energy electron diffraction show a dimerization-like reconstruction in the one-dimensional atomic chains on Bi(114) at low temperatures. While one-dimensional systems are generally unstable against such a distortion, its observation is not expected for this particular surface, since there are several factors that should prevent it: One is the particular spin texture of the Fermi surface, which resembles a one-dimensional topological state, and spin protection should hence prevent the formation of the reconstruction. The second is the very short nesting vector $2 k_F$, which is inconsistent with the observed lattice distortion. A nesting-driven mechanism of the reconstruction is indeed excluded by the absence of any changes in the electronic structure near the Fermi surface, as observed by angle-resolved photoemission spectroscopy. However, distinct changes in the electronic structure at higher binding energies are found to accompany the structural phase transition. This, as well as the observed short correlation length of the pairing distortion, suggest that the transition is of the strong coupling type and driven by phonon entropy rather than electronic entropy.
△ Less
Submitted 11 July, 2017;
originally announced July 2017.
-
Uncovering the Spatiotemporal Patterns of Collective Social Activity
Authors:
Martin Jankowiak,
Manuel Gomez-Rodriguez
Abstract:
Social media users and microbloggers post about a wide variety of (off-line) collective social activities as they participate in them, ranging from concerts and sporting events to political rallies and civil protests. In this context, people who take part in the same collective social activity often post closely related content from nearby locations at similar times, resulting in distinctive spati…
▽ More
Social media users and microbloggers post about a wide variety of (off-line) collective social activities as they participate in them, ranging from concerts and sporting events to political rallies and civil protests. In this context, people who take part in the same collective social activity often post closely related content from nearby locations at similar times, resulting in distinctive spatiotemporal patterns. Can we automatically detect these patterns and thus provide insights into the associated activities? In this paper, we propose a modeling framework for clustering streaming spatiotemporal data, the Spatial Dirichlet Hawkes Process (SDHP), which allows us to automatically uncover a wide variety of spatiotemporal patterns of collective social activity from geolocated online traces. Moreover, we develop an efficient, online inference algorithm based on Sequential Monte Carlo that scales to millions of geolocated posts. Experiments on synthetic data and real data gathered from Twitter show that our framework can recover a wide variety of meaningful social activity patterns in terms of both content and spatiotemporal dynamics, that it yields interesting insights about these patterns, and that it can be used to estimate the location from where a tweet was posted.
△ Less
Submitted 10 January, 2017;
originally announced January 2017.
-
Uncovering the Dynamics of Crowdlearning and the Value of Knowledge
Authors:
Utkarsh Upadhyay,
Isabel Valera,
Manuel Gomez-Rodriguez
Abstract:
Learning from the crowd has become increasingly popular in the Web and social media. There is a wide variety of crowdlearning sites in which, on the one hand, users learn from the knowledge that other users contribute to the site, and, on the other hand, knowledge is reviewed and curated by the same users using assessment measures such as upvotes or likes.
In this paper, we present a probabilist…
▽ More
Learning from the crowd has become increasingly popular in the Web and social media. There is a wide variety of crowdlearning sites in which, on the one hand, users learn from the knowledge that other users contribute to the site, and, on the other hand, knowledge is reviewed and curated by the same users using assessment measures such as upvotes or likes.
In this paper, we present a probabilistic modeling framework of crowdlearning, which uncovers the evolution of a user's expertise over time by leveraging other users' assessments of her contributions. The model allows for both off-site and on-site learning and captures forgetting of knowledge. We then develop a scalable estimation method to fit the model parameters from millions of recorded learning and contributing events. We show the effectiveness of our model by tracing activity of ~25 thousand users in Stack Overflow over a 4.5 year period. We find that answers with high knowledge value are rare. Newbies and experts tend to acquire less knowledge than users in the middle range. Prolific learners tend to be also proficient contributors that post answers with high knowledge value.
△ Less
Submitted 14 December, 2016;
originally announced December 2016.
-
Scalable Influence Maximization for Multiple Products in Continuous-Time Diffusion Networks
Authors:
Nan Du,
Yingyu Liang,
Maria-Florina Balcan,
Manuel Gomez-Rodriguez,
Hongyuan Zha,
Le Song
Abstract:
A typical viral marketing model identifies influential users in a social network to maximize a single product adoption assuming unlimited user attention, campaign budgets, and time. In reality, multiple products need campaigns, users have limited attention, convincing users incurs costs, and advertisers have limited budgets and expect the adoptions to be maximized soon. Facing these user, monetary…
▽ More
A typical viral marketing model identifies influential users in a social network to maximize a single product adoption assuming unlimited user attention, campaign budgets, and time. In reality, multiple products need campaigns, users have limited attention, convincing users incurs costs, and advertisers have limited budgets and expect the adoptions to be maximized soon. Facing these user, monetary, and timing constraints, we formulate the problem as a submodular maximization task in a continuous-time diffusion model under the intersection of a matroid and multiple knapsack constraints. We propose a randomized algorithm estimating the user influence in a network ($|\mathcal{V}|$ nodes, $|\mathcal{E}|$ edges) to an accuracy of $ε$ with $n=\mathcal{O}(1/ε^2)$ randomizations and $\tilde{\mathcal{O}}(n|\mathcal{E}|+n|\mathcal{V}|)$ computations. By exploiting the influence estimation algorithm as a subroutine, we develop an adaptive threshold greedy algorithm achieving an approximation factor $k_a/(2+2 k)$ of the optimal when $k_a$ out of the $k$ knapsack constraints are active. Extensive experiments on networks of millions of nodes demonstrate that the proposed algorithms achieve the state-of-the-art in terms of effectiveness and scalability.
△ Less
Submitted 29 January, 2017; v1 submitted 8 December, 2016;
originally announced December 2016.
-
Distilling Information Reliability and Source Trustworthiness from Digital Traces
Authors:
Behzad Tabibian,
Isabel Valera,
Mehrdad Farajtabar,
Le Song,
Bernhard Schölkopf,
Manuel Gomez-Rodriguez
Abstract:
Online knowledge repositories typically rely on their users or dedicated editors to evaluate the reliability of their content. These evaluations can be viewed as noisy measurements of both information reliability and information source trustworthiness. Can we leverage these noisy evaluations, often biased, to distill a robust, unbiased and interpretable measure of both notions?
In this paper, we…
▽ More
Online knowledge repositories typically rely on their users or dedicated editors to evaluate the reliability of their content. These evaluations can be viewed as noisy measurements of both information reliability and information source trustworthiness. Can we leverage these noisy evaluations, often biased, to distill a robust, unbiased and interpretable measure of both notions?
In this paper, we argue that the temporal traces left by these noisy evaluations give cues on the reliability of the information and the trustworthiness of the sources. Then, we propose a temporal point process modeling framework that links these temporal traces to robust, unbiased and interpretable notions of information reliability and source trustworthiness. Furthermore, we develop an efficient convex optimization procedure to learn the parameters of the model from historical traces. Experiments on real-world data gathered from Wikipedia and Stack Overflow show that our modeling framework accurately predicts evaluation events, provides an interpretable measure of information reliability and source trustworthiness, and yields interesting insights about real-world events.
△ Less
Submitted 2 April, 2017; v1 submitted 24 October, 2016;
originally announced October 2016.
-
Smart broadcasting: Do you want to be seen?
Authors:
Mohammad Reza Karimi,
Erfan Tavakoli,
Mehrdad Farajtabar,
Le Song,
Manuel Gomez-Rodriguez
Abstract:
Many users in online social networks are constantly trying to gain attention from their followers by broadcasting posts to them. These broadcasters are likely to gain greater attention if their posts can remain visible for a longer period of time among their followers' most recent feeds. Then when to post? In this paper, we study the problem of smart broadcasting using the framework of temporal po…
▽ More
Many users in online social networks are constantly trying to gain attention from their followers by broadcasting posts to them. These broadcasters are likely to gain greater attention if their posts can remain visible for a longer period of time among their followers' most recent feeds. Then when to post? In this paper, we study the problem of smart broadcasting using the framework of temporal point processes, where we model users feeds and posts as discrete events occurring in continuous time. Based on such continuous-time model, then choosing a broadcasting strategy for a user becomes a problem of designing the conditional intensity of her posting events. We derive a novel formula which links this conditional intensity with the visibility of the user in her followers' feeds. Furthermore, by exploiting this formula, we develop an efficient convex optimization framework for the when-to-post problem. Our method can find broadcasting strategies that reach a desired visibility level with provable guarantees. We experimented with data gathered from Twitter, and show that our framework can consistently make broadcasters' post more visible than alternatives.
△ Less
Submitted 22 May, 2016;
originally announced May 2016.
-
Unveiling the Penta-Silicene nature of perfectly aligned single and double strand Si-nanoribbons on Ag(110)
Authors:
Jorge I. Cerdá,
Jagoda Sławińska,
Guy Le Lay,
Antonela C. Marele,
José M. Gómez-Rodríguez,
María . E. Dávila
Abstract:
We reveal through extensive DFT calculations, confronted to key experimental facts, the hidden penta-silicene nature of single and double strand chiral Si nanoribbons perfectly aligned on Ag(110) surfaces, that were discovered in 2005, but whose structure remained elusive. We thus simultaneously demonstrate the existence of penta-silicene, a recently conjectured novel pentagonal silicon allotrope,…
▽ More
We reveal through extensive DFT calculations, confronted to key experimental facts, the hidden penta-silicene nature of single and double strand chiral Si nanoribbons perfectly aligned on Ag(110) surfaces, that were discovered in 2005, but whose structure remained elusive. We thus simultaneously demonstrate the existence of penta-silicene, a recently conjectured novel pentagonal silicon allotrope, which remained unveiled for 11 years, and which materializes a paradigmatic shift from normal hexagonal silicene.
△ Less
Submitted 29 April, 2016;
originally announced April 2016.
-
On the Efficiency of the Information Networks in Social Media
Authors:
Mahmoudreza Babaei,
Przemyslaw A. Grabowicz,
Isabel Valera,
Krishna P. Gummadi,
Manuel Gomez-Rodriguez
Abstract:
Social media sites are information marketplaces, where users produce and consume a wide variety of information and ideas. In these sites, users typically choose their information sources, which in turn determine what specific information they receive, how much information they receive and how quickly this information is shown to them. In this context, a natural question that arises is how efficien…
▽ More
Social media sites are information marketplaces, where users produce and consume a wide variety of information and ideas. In these sites, users typically choose their information sources, which in turn determine what specific information they receive, how much information they receive and how quickly this information is shown to them. In this context, a natural question that arises is how efficient are social media users at selecting their information sources.
In this work, we propose a computational framework to quantify users' efficiency at selecting information sources. Our framework is based on the assumption that the goal of users is to acquire a set of unique pieces of information. To quantify user's efficiency, we ask if the user could have acquired the same pieces of information from another set of sources more efficiently. We define three different notions of efficiency -- link, in-flow, and delay -- corresponding to the number of sources the user follows, the amount of (redundant) information she acquires and the delay with which she receives the information. Our definitions of efficiency are general and applicable to any social media system with an underlying information network, in which every user follows others to receive the information they produce.
In our experiments, we measure the efficiency of Twitter users at acquiring different types of information. We find that Twitter users exhibit sub-optimal efficiency across the three notions of efficiency, although they tend to be more efficient at acquiring non-popular than popular pieces of information. We then show that this lack of efficiency is a consequence of the triadic closure mechanism by which users typically discover and follow other users in social media. Finally, we develop a heuristic algorithm that enables users to be significantly more efficient at acquiring the same unique pieces of information.
△ Less
Submitted 14 March, 2016;
originally announced March 2016.
-
Back to the Past: Source Identification in Diffusion Networks from Partially Observed Cascades
Authors:
Mehrdad Farajtabar,
Manuel Gomez-Rodriguez,
Nan Du,
Mohammad Zamani,
Hongyuan Zha,
Le Song
Abstract:
When a piece of malicious information becomes rampant in an information diffusion network, can we identify the source node that originally introduced the piece into the network and infer the time when it initiated this? Being able to do so is critical for curtailing the spread of malicious information, and reducing the potential losses incurred. This is a very challenging problem since typically o…
▽ More
When a piece of malicious information becomes rampant in an information diffusion network, can we identify the source node that originally introduced the piece into the network and infer the time when it initiated this? Being able to do so is critical for curtailing the spread of malicious information, and reducing the potential losses incurred. This is a very challenging problem since typically only incomplete traces are observed and we need to unroll the incomplete traces into the past in order to pinpoint the source. In this paper, we tackle this problem by develo** a two-stage framework, which first learns a continuous-time diffusion network model based on historical diffusion traces and then identifies the source of an incomplete diffusion trace by maximizing the likelihood of the trace under the learned model. Experiments on both large synthetic and real-world data show that our framework can effectively go back to the past, and pinpoint the source node and its initiation time significantly more accurately than previous state-of-the-arts.
△ Less
Submitted 26 January, 2015;
originally announced January 2015.
-
Towards scalable nano-engineering of graphene
Authors:
A. J. Martínez-Galera,
I. Brihuega,
A. Gutiérrez-Rubio,
T. Stauber,
J. M. Gómez-Rodríguez
Abstract:
By merging bottom-up and top-down strategies we tailor graphene's electronic properties within nanometer accuracy, which opens up the possibility to design optical and plasmonic circuitries at will. In a first step, graphene electronic properties are macroscopically modified exploiting the periodic potential generated by the self assembly of metal cluster superlattices on a graphene/Ir(111) surfac…
▽ More
By merging bottom-up and top-down strategies we tailor graphene's electronic properties within nanometer accuracy, which opens up the possibility to design optical and plasmonic circuitries at will. In a first step, graphene electronic properties are macroscopically modified exploiting the periodic potential generated by the self assembly of metal cluster superlattices on a graphene/Ir(111) surface. We then demonstrate that individual metal clusters can be selectively removed by a STM tip with perfect reproducibility and that the structures so created are stable even at room temperature. This enables one to nanopattern circuits down to the 2.5 nm only limited by the periodicity of the Moiré-pattern, i.e., by the distance between neighbouring clusters, and different electronic and optical properties should prevail in the covered and uncovered regions. The method can be carried out on micro-meter-sized regions with clusters of different materials permitting to tune the strength of the periodic potential.
△ Less
Submitted 21 November, 2014;
originally announced November 2014.
-
Modeling Adoption and Usage of Competing Products
Authors:
Isabel Valera,
Manuel Gomez-Rodriguez
Abstract:
The emergence and wide-spread use of online social networks has led to a dramatic increase on the availability of social activity data. Importantly, this data can be exploited to investigate, at a microscopic level, some of the problems that have captured the attention of economists, marketers and sociologists for decades, such as, e.g., product adoption, usage and competition.
In this paper, we…
▽ More
The emergence and wide-spread use of online social networks has led to a dramatic increase on the availability of social activity data. Importantly, this data can be exploited to investigate, at a microscopic level, some of the problems that have captured the attention of economists, marketers and sociologists for decades, such as, e.g., product adoption, usage and competition.
In this paper, we propose a continuous-time probabilistic model, based on temporal point processes, for the adoption and frequency of use of competing products, where the frequency of use of one product can be modulated by those of others. This model allows us to efficiently simulate the adoption and recurrent usages of competing products, and generate traces in which we can easily recognize the effect of social influence, recency and competition. We then develop an inference method to efficiently fit the model parameters by solving a convex program. The problem decouples into a collection of smaller subproblems, thus scaling easily to networks with hundred of thousands of nodes. We validate our model over synthetic and real diffusion data gathered from Twitter, and show that the proposed model does not only provides a good fit to the data and more accurate predictions than alternatives but also provides interpretable model parameters, which allow us to gain insights into some of the factors driving product adoption and frequency of use.
△ Less
Submitted 11 June, 2015; v1 submitted 2 June, 2014;
originally announced June 2014.
-
Estimating Diffusion Network Structures: Recovery Conditions, Sample Complexity & Soft-thresholding Algorithm
Authors:
Hadi Daneshmand,
Manuel Gomez-Rodriguez,
Le Song,
Bernhard Schoelkopf
Abstract:
Information spreads across social and technological networks, but often the network structures are hidden from us and we only observe the traces left by the diffusion processes, called cascades. Can we recover the hidden network structures from these observed cascades? What kind of cascades and how many cascades do we need? Are there some network structures which are more difficult than others to…
▽ More
Information spreads across social and technological networks, but often the network structures are hidden from us and we only observe the traces left by the diffusion processes, called cascades. Can we recover the hidden network structures from these observed cascades? What kind of cascades and how many cascades do we need? Are there some network structures which are more difficult than others to recover? Can we design efficient inference algorithms with provable guarantees?
Despite the increasing availability of cascade data and methods for inferring networks from these data, a thorough theoretical understanding of the above questions remains largely unexplored in the literature. In this paper, we investigate the network structure inference problem for a general family of continuous-time diffusion models using an $l_1$-regularized likelihood maximization framework. We show that, as long as the cascade sampling process satisfies a natural incoherence condition, our framework can recover the correct network structure with high probability if we observe $O(d^3 \log N)$ cascades, where $d$ is the maximum number of parents of a node and $N$ is the total number of nodes. Moreover, we develop a simple and efficient soft-thresholding inference algorithm, which we use to illustrate the consequences of our theoretical results, and show that our framework outperforms other alternatives in practice.
△ Less
Submitted 12 May, 2014;
originally announced May 2014.
-
Unravelling the intrinsic and robust nature of van Hove singularities in twisted bilayer graphene
Authors:
I. Brihuega,
P. Mallet,
H. González-Herrero,
G. Trambly de Laissardière,
M. M. Ugeda,
L. Magaud,
J. M. Gómez-Rodríguez,
F. Ynduráin,
J. -Y. Veuillen
Abstract:
Extensive scanning tunnelling microscopy and spectroscopy experiments complemented by first principles and parameterized tight binding calculations provide a clear answer to the existence, origin and robustness of van Hove singularities (vHs) in twisted graphene layers. Our results are conclusive: vHs due to interlayer coupling are ubiquitously present in a broad range (from 1° to 10°) of rotation…
▽ More
Extensive scanning tunnelling microscopy and spectroscopy experiments complemented by first principles and parameterized tight binding calculations provide a clear answer to the existence, origin and robustness of van Hove singularities (vHs) in twisted graphene layers. Our results are conclusive: vHs due to interlayer coupling are ubiquitously present in a broad range (from 1° to 10°) of rotation angles in our graphene on 6H-SiC(000-1) samples. From the variation of the energy separation of the vHs with rotation angle we are able to recover the Fermi velocity of a graphene monolayer as well as the strength of the interlayer interaction. The robustness of the vHs is assessed both by experiments, which show that they survive in the presence of a third graphene layer, and calculations, which test the role of the periodic modulation and absolute value of the interlayer distance. Finally, we clarify the origin of the related moiré corrugation detected in the STM images.
△ Less
Submitted 5 September, 2012;
originally announced September 2012.
-
Role of pseudospin in quasiparticle interferences in epitaxial graphene probed by high-resolution scanning tunneling microscopy
Authors:
P. Mallet,
I. Brihuega,
S. Bose,
M. M. Ugeda,
J. M. Gómez-Rodríguez,
K. Kern,
J. Y. Veuillen
Abstract:
Pseudospin, an additional degree of freedom related to the honeycomb structure of graphene, is responsible of many of the outstanding electronic properties found in this material. This article provides a clear understanding of how such pseudospin impacts the quasiparticle interferences of monolayer (ML) and bilayer (BL) graphene measured by low temperature scanning tunneling microscopy and spectro…
▽ More
Pseudospin, an additional degree of freedom related to the honeycomb structure of graphene, is responsible of many of the outstanding electronic properties found in this material. This article provides a clear understanding of how such pseudospin impacts the quasiparticle interferences of monolayer (ML) and bilayer (BL) graphene measured by low temperature scanning tunneling microscopy and spectroscopy. We have used this technique to map, with very high energy and space resolution, the spatial modulations of the local density of states of ML and BL graphene epitaxialy grown on SiC(0001), in presence of native disorder. We perform a Fourier transform analysis of such modulations including wavevectors up to unit-vectors of the reciprocal lattice. Our data demonstrate that the quasiparticle interferences associated to some particular scattering processes are suppressed in ML graphene, but not in BL graphene. Most importantly, interferences with 2qF wavevector associated to intravalley backscattering are not measured in ML graphene, even on the images with highest resolution. In order to clarify the role of the pseudospin on the quasiparticle interferences, we use a simple model which nicely captures the main features observed on our data. The model unambiguously shows that graphene's pseudospin is responsible for such suppression of quasiparticle interferences features in ML graphene, in particular for those with 2qF wavevector. It also confirms scanning tunneling microscopy as a unique technique to probe the pseudospin in graphene samples in real space with nanometer precision. Finally, we show that such observations are robust with energy and obtain with great accuracy the dispersion of the π-bands for both ML and BL graphene in the vicinity of the Fermi level, extracting their main tight binding parameters.
△ Less
Submitted 27 August, 2012;
originally announced August 2012.
-
Electronic and structural characterization of divacancies in irradiated graphene
Authors:
Miguel M. Ugeda,
Iván Brihuega,
Fanny Hiebel,
Pierre Mallet,
Jean-Yves Veuillen,
José M. Gómez-Rodríguez,
Félix Ynduráin
Abstract:
We provide a thorough study of a carbon divacancy, a fundamental but almost unexplored point defect in graphene. Low temperature scanning tunneling microscopy (STM) imaging of irradiated graphene on different substrates enabled us to identify a common two-fold symmetry point defect. Our first principles calculations reveal that the structure of this type of defect accommodates two adjacent missing…
▽ More
We provide a thorough study of a carbon divacancy, a fundamental but almost unexplored point defect in graphene. Low temperature scanning tunneling microscopy (STM) imaging of irradiated graphene on different substrates enabled us to identify a common two-fold symmetry point defect. Our first principles calculations reveal that the structure of this type of defect accommodates two adjacent missing atoms in a rearranged atomic network formed by two pentagons and one octagon, with no dangling bonds. Scanning tunneling spectroscopy (STS) measurements on divacancies generated in nearly ideal graphene show an electronic spectrum dominated by an empty-states resonance, which is ascribed to a spin-degenerated nearly flat band of $π$-electron nature. While the calculated electronic structure rules out the formation of a magnetic moment around the divacancy, the generation of an electronic resonance near the Fermi level, reveals divacancies as key point defects for tuning electron transport properties in graphene systems.
△ Less
Submitted 23 December, 2011;
originally announced December 2011.
-
Point defects on graphene on metals
Authors:
M. M. Ugeda,
D. Fernández-Torre,
I. Brihuega,
P. Pou,
A. J. Martínez-Galera,
R. Pérez,
J. M. Gómez-Rodríguez
Abstract:
Understanding the coupling of graphene with its local environment is critical to be able to integrate it in tomorrow's electronic devices. Here we show how the presence of a metallic substrate affects the properties of an atomically tailored graphene layer. We have deliberately introduced single carbon vacancies on a graphene monolayer grown on a Pt(111) surface and investigated its impact in the…
▽ More
Understanding the coupling of graphene with its local environment is critical to be able to integrate it in tomorrow's electronic devices. Here we show how the presence of a metallic substrate affects the properties of an atomically tailored graphene layer. We have deliberately introduced single carbon vacancies on a graphene monolayer grown on a Pt(111) surface and investigated its impact in the electronic, structural and magnetic properties of the graphene layer. Our low temperature scanning tunneling microscopy studies, complemented by density functional theory, show the existence of a broad electronic resonance above the Fermi energy associated with the vacancies. Vacancy sites become reactive leading to an increase of the coupling between the graphene layer and the metal substrate at these points; this gives rise to a rapid decay of the localized state and the quenching of the magnetic moment associated with carbon vacancies in free-standing graphene layers.
△ Less
Submitted 8 April, 2011;
originally announced April 2011.
-
Inferring Networks of Diffusion and Influence
Authors:
Manuel Gomez-Rodriguez,
Jure Leskovec,
Andreas Krause
Abstract:
Information diffusion and virus propagation are fundamental processes taking place in networks. While it is often possible to directly observe when nodes become infected with a virus or adopt the information, observing individual transmissions (i.e., who infects whom, or who influences whom) is typically very difficult. Furthermore, in many applications, the underlying network over which the diffu…
▽ More
Information diffusion and virus propagation are fundamental processes taking place in networks. While it is often possible to directly observe when nodes become infected with a virus or adopt the information, observing individual transmissions (i.e., who infects whom, or who influences whom) is typically very difficult. Furthermore, in many applications, the underlying network over which the diffusions and propagations spread is actually unobserved. We tackle these challenges by develo** a method for tracing paths of diffusion and influence through networks and inferring the networks over which contagions propagate. Given the times when nodes adopt pieces of information or become infected, we identify the optimal network that best explains the observed infection times. Since the optimization problem is NP-hard to solve exactly, we develop an efficient approximation algorithm that scales to large datasets and finds provably near-optimal networks.
We demonstrate the effectiveness of our approach by tracing information diffusion in a set of 170 million blogs and news articles over a one year period to infer how information flows through the online media space. We find that the diffusion network of news for the top 1,000 media sites and blogs tends to have a core-periphery structure with a small set of core media sites that diffuse information to the rest of the Web. These sites tend to have stable circles of influence with more general news media sites acting as connectors between them.
△ Less
Submitted 23 October, 2011; v1 submitted 1 June, 2010;
originally announced June 2010.
-
The missing atom as a source of carbon magnetism
Authors:
M. M. Ugeda,
I. Brihuega,
F. Guinea,
J. M. Gomez-Rodriguez
Abstract:
Atomic vacancies have a strong impact in the mechanical, electronic and magnetic properties of graphene-like materials. By artificially generating isolated vacancies on a graphite surface and measuring their local density of states on the atomic scale, we have shown how single vacancies modify the electronic properties of this graphene-like system. Our scanning tunneling microscopy experiments,…
▽ More
Atomic vacancies have a strong impact in the mechanical, electronic and magnetic properties of graphene-like materials. By artificially generating isolated vacancies on a graphite surface and measuring their local density of states on the atomic scale, we have shown how single vacancies modify the electronic properties of this graphene-like system. Our scanning tunneling microscopy experiments, complemented by tight binding calculations, reveal the presence of a sharp electronic resonance at the Fermi energy around each single graphite vacancy, which can be associated with the formation of local magnetic moments and implies a dramatic reduction of the charge carriers' mobility. While vacancies in single layer graphene naturally lead to magnetic couplings of arbitrary sign, our results show the possibility of inducing a macroscopic ferrimagnetic state in multilayered graphene samples just by randomly removing single C atoms.
△ Less
Submitted 4 February, 2010; v1 submitted 18 January, 2010;
originally announced January 2010.
-
In situ observation of stress relaxation in epitaxial graphene
Authors:
Alpha T. N'Diaye,
Raoul van Gastel,
Antonio J. Martinez-Galera,
Johann Coraux,
Hichem Hattab,
Dirk Wall,
Frank-J. Meyer zu Heringdorf,
Michael Horn-von Hoegen,
Jose M. Gomez-Rodriguez,
Bene Poelsema,
Carsten Busse,
Thomas Michely
Abstract:
Upon cooling, branched line defects develop in epitaxial graphene grown at high temperature on Pt(111) and Ir(111). Using atomically resolved scanning tunneling microscopy we demonstrate that these defects are wrinkles in the graphene layer, i.e. stripes of partially delaminated graphene. With low energy electron microscopy (LEEM) we investigate the wrinkling phenomenon in situ. Upon temperature…
▽ More
Upon cooling, branched line defects develop in epitaxial graphene grown at high temperature on Pt(111) and Ir(111). Using atomically resolved scanning tunneling microscopy we demonstrate that these defects are wrinkles in the graphene layer, i.e. stripes of partially delaminated graphene. With low energy electron microscopy (LEEM) we investigate the wrinkling phenomenon in situ. Upon temperature cycling we observe hysteresis in the appearance and disappearance of the wrinkles. Simultaneously with wrinkle formation a change in bright field imaging intensity of adjacent areas and a shift in the moire spot positions for micro diffraction of such areas takes place. The stress relieved by wrinkle formation results from the mismatch in thermal expansion coefficients of graphene and the substrate. A simple one-dimensional model taking into account the energies related to strain, delamination and bending of graphene is in qualitative agreement with our observations.
△ Less
Submitted 15 September, 2009; v1 submitted 4 June, 2009;
originally announced June 2009.
-
Tip and Surface Determination from Experiments and Simulations of Scanning Tunneling Microscopy and Spectroscopy
Authors:
Óscar Paz,
Iván Brihuega,
José M. Gómez-Rodríguez,
José M. Soler
Abstract:
We present a very efficient and accurate method to simulate scanning tunneling microscopy images and spectra from first-principles density functional calculations. The wave-functions of the tip and sample are calculated separately on the same footing, and propagated far from the surface using the vacuum Green's function. This allows to express the Bardeen matrix elements in terms of convolutions…
▽ More
We present a very efficient and accurate method to simulate scanning tunneling microscopy images and spectra from first-principles density functional calculations. The wave-functions of the tip and sample are calculated separately on the same footing, and propagated far from the surface using the vacuum Green's function. This allows to express the Bardeen matrix elements in terms of convolutions, and to obtain the tunneling current at all tip positions and bias voltages in a single calculation. The efficiency of the method opens the door to real time determination of both tip and surface composition and structure, by comparing experiments to simulated images for a variety of precomputed tips. Comparison with the experimental topography and spectra of the Si(111)-(7x7) surface show a much better agreement with Si than with W tips, implying that the metallic tip is terminated by silicon.
△ Less
Submitted 10 November, 2004;
originally announced November 2004.