-
Inconsistency of parsimony under the multispecies coalescent
Authors:
Daniel Rickert,
Wai-Tong Fan,
Matthew Hahn
Abstract:
While it is known that parsimony can be statistically inconsistent under certain models of evolution due to high levels of homoplasy, the consistency of parsimony under the multispecies coalescent (MSC) is less well studied. Previous studies have shown the consistency of concatenated parsimony (parsimony applied to concatenated alignments) under the MSC for the rooted 4-taxa case under an infinite…
▽ More
While it is known that parsimony can be statistically inconsistent under certain models of evolution due to high levels of homoplasy, the consistency of parsimony under the multispecies coalescent (MSC) is less well studied. Previous studies have shown the consistency of concatenated parsimony (parsimony applied to concatenated alignments) under the MSC for the rooted 4-taxa case under an infinite-sites model of mutation; on the other hand, other work has also established the inconsistency of concatenated parsimony for the unrooted 6-taxa case. These seemingly contradictory results suggest that concatenated parsimony may fail to be consistent for trees with more than 5 taxa, for all unrooted trees, or for some combination of the two. Here, we present a technique for computing the expected internal branch lengths of gene trees under the MSC. This technique allows us to determine the regions of the parameter space of the species tree under which concatenated parsimony fails for different numbers of taxa, for rooted or unrooted trees. We use our new approach to demonstrate that there are always regions of statistical inconsistency for concatenated parsimony for the 5- and 6-taxa cases, regardless of rooting. Our results therefore suggest that parsimony is not generally dependable under the MSC.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Separations in the Representational Capabilities of Transformers and Recurrent Architectures
Authors:
Satwik Bhattamishra,
Michael Hahn,
Phil Blunsom,
Varun Kanade
Abstract:
Transformer architectures have been widely adopted in foundation models. Due to their high inference costs, there is renewed interest in exploring the potential of efficient recurrent architectures (RNNs). In this paper, we analyze the differences in the representational capabilities of Transformers and RNNs across several tasks of practical relevance, including index lookup, nearest neighbor, rec…
▽ More
Transformer architectures have been widely adopted in foundation models. Due to their high inference costs, there is renewed interest in exploring the potential of efficient recurrent architectures (RNNs). In this paper, we analyze the differences in the representational capabilities of Transformers and RNNs across several tasks of practical relevance, including index lookup, nearest neighbor, recognizing bounded Dyck languages, and string equality. For the tasks considered, our results show separations based on the size of the model required for different architectures. For example, we show that a one-layer Transformer of logarithmic width can perform index lookup, whereas an RNN requires a hidden state of linear size. Conversely, while constant-size RNNs can recognize bounded Dyck languages, we show that one-layer Transformers require a linear size for this task. Furthermore, we show that two-layer Transformers of logarithmic size can perform decision tasks such as string equality or disjointness, whereas both one-layer Transformers and recurrent models require linear size for these tasks. We also show that a log-size two-layer Transformer can implement the nearest neighbor algorithm in its forward pass; on the other hand recurrent models require linear size. Our constructions are based on the existence of $N$ nearly orthogonal vectors in $O(\log N)$ dimensional space and our lower bounds are based on reductions from communication complexity problems. We supplement our theoretical results with experiments that highlight the differences in the performance of these architectures on practical-size sequences.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
InversionView: A General-Purpose Method for Reading Information from Neural Activations
Authors:
Xinting Huang,
Madhur Panwar,
Navin Goyal,
Michael Hahn
Abstract:
The inner workings of neural networks can be better understood if we can fully decipher the information encoded in neural activations. In this paper, we argue that this information is embodied by the subset of inputs that give rise to similar activations. Computing such subsets is nontrivial as the input space is exponentially large. We propose InversionView, which allows us to practically inspect…
▽ More
The inner workings of neural networks can be better understood if we can fully decipher the information encoded in neural activations. In this paper, we argue that this information is embodied by the subset of inputs that give rise to similar activations. Computing such subsets is nontrivial as the input space is exponentially large. We propose InversionView, which allows us to practically inspect this subset by sampling from a trained decoder model conditioned on activations. This helps uncover the information content of activation vectors, and facilitates understanding of the algorithms implemented by transformer models. We present three case studies where we investigate models ranging from small transformers to GPT-2. In these studies, we demonstrate the characteristics of our method, show the distinctive advantages it offers, and provide causally verified circuits.
△ Less
Submitted 2 June, 2024; v1 submitted 27 May, 2024;
originally announced May 2024.
-
The Expressive Capacity of State Space Models: A Formal Language Perspective
Authors:
Yash Sarrof,
Yana Veitsman,
Michael Hahn
Abstract:
Recently, recurrent models based on linear state space models (SSMs) have shown promising performance in language modeling (LM), competititve with transformers. However, there is little understanding of the in-principle abilities of such models, which could provide useful guidance to the search for better LM architectures. We present a comprehensive theoretical study of the capacity of such SSMs a…
▽ More
Recently, recurrent models based on linear state space models (SSMs) have shown promising performance in language modeling (LM), competititve with transformers. However, there is little understanding of the in-principle abilities of such models, which could provide useful guidance to the search for better LM architectures. We present a comprehensive theoretical study of the capacity of such SSMs as it compares to that of transformers and traditional RNNs. We find that SSMs and transformers have overlap** but distinct strengths. In star-free state tracking, SSMs implement straightforward and exact solutions to problems that transformers struggle to represent exactly. They can also model bounded hierarchical structure with optimal memory even without simulating a stack. On the other hand, we identify a design choice in current SSMs that limits their expressive power. We discuss implications for SSM and LM research, and verify results empirically on a recent SSM, Mamba.
△ Less
Submitted 2 June, 2024; v1 submitted 27 May, 2024;
originally announced May 2024.
-
Tools at the Frontiers of Quantitative Verification
Authors:
Roman Andriushchenko,
Alexander Bork,
Carlos E. Budde,
Milan Češka,
Kush Grover,
Ernst Moritz Hahn,
Arnd Hartmanns,
Bryant Israelsen,
Nils Jansen,
Joshua Jeppson,
Sebastian Junges,
Maximilian A. Köhl,
Bettina Könighofer,
Jan Křetínský,
Tobias Meggendorfer,
David Parker,
Stefan Pranger,
Tim Quatmann,
Enno Ruijters,
Landon Taylor,
Matthias Volk,
Maximilian Weininger,
Zhen Zhang
Abstract:
The analysis of formal models that include quantitative aspects such as timing or probabilistic choices is performed by quantitative verification tools. Broad and mature tool support is available for computing basic properties such as expected rewards on basic models such as Markov chains. Previous editions of QComp, the comparison of tools for the analysis of quantitative formal models, focused o…
▽ More
The analysis of formal models that include quantitative aspects such as timing or probabilistic choices is performed by quantitative verification tools. Broad and mature tool support is available for computing basic properties such as expected rewards on basic models such as Markov chains. Previous editions of QComp, the comparison of tools for the analysis of quantitative formal models, focused on this setting. Many application scenarios, however, require more advanced property types such as LTL and parameter synthesis queries as well as advanced models like stochastic games and partially observable MDPs. For these, tool support is in its infancy today. This paper presents the outcomes of QComp 2023: a survey of the state of the art in quantitative verification tool support for advanced property types and models. With tools ranging from first research prototypes to well-supported integrations into established toolsets, this report highlights today's active areas and tomorrow's challenges in tool-focused research for quantitative verification.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Linguistic Structure from a Bottleneck on Sequential Information Processing
Authors:
Richard Futrell,
Michael Hahn
Abstract:
Human language is a unique form of communication in the natural world, distinguished by its structured nature. Most fundamentally, it is systematic, meaning that signals can be broken down into component parts that are individually meaningful -- roughly, words -- which are combined in a regular way to form sentences. Furthermore, the way in which these parts are combined maintains a kind of locali…
▽ More
Human language is a unique form of communication in the natural world, distinguished by its structured nature. Most fundamentally, it is systematic, meaning that signals can be broken down into component parts that are individually meaningful -- roughly, words -- which are combined in a regular way to form sentences. Furthermore, the way in which these parts are combined maintains a kind of locality: words are usually concatenated together, and they form contiguous phrases, kee** related parts of sentences close to each other. We address the challenge of understanding how these basic properties of language arise from broader principles of efficient communication under information processing constraints. Here we show that natural-language-like systematicity arises from minimization of excess entropy, a measure of statistical complexity that represents the minimum amount of information necessary for predicting the future of a sequence based on its past. In simulations, we show that codes that minimize excess entropy factorize their source distributions into approximately independent components, and then express those components systematically and locally. Next, in a series of massively cross-linguistic corpus studies, we show that human languages are structured to have low excess entropy at the level of phonology, morphology, syntax, and semantics. Our result suggests that human language performs a sequential generalization of Independent Components Analysis on the statistical distribution over meanings that need to be expressed. It establishes a link between the statistical and algebraic structure of human language, and reinforces the idea that the structure of human language may have evolved to minimize cognitive load while maximizing communicative expressiveness.
△ Less
Submitted 20 May, 2024;
originally announced May 2024.
-
Observations of Non-thermal Velocity and Comparison with Alfvén Wave Turbulence Model in Solar Active Regions
Authors:
M. Asgari-Targhi,
D. H. Brooks,
M. Hahn,
S. Imada,
E. Tajfirouze,
D. W. Savin
Abstract:
We present a study of spectral line width measurements from the Extreme Ultraviolet Imaging Spectrometer (EIS) on {\it Hinode}. We used spectral line profiles of Fe {\sc xvi} 262.984 Å, Fe {\sc xiv} 264.787 Å, Fe {\sc xiv} 270.519 Å, Fe {\sc xiv} 274.203 Å, and Fe {\sc xv} 284.160 Å, and studied 11 active regions. Previous studies of spectral line widths have shown that in hot loops in the cores o…
▽ More
We present a study of spectral line width measurements from the Extreme Ultraviolet Imaging Spectrometer (EIS) on {\it Hinode}. We used spectral line profiles of Fe {\sc xvi} 262.984 Å, Fe {\sc xiv} 264.787 Å, Fe {\sc xiv} 270.519 Å, Fe {\sc xiv} 274.203 Å, and Fe {\sc xv} 284.160 Å, and studied 11 active regions. Previous studies of spectral line widths have shown that in hot loops in the cores of active regions, the observed non-thermal velocities are smaller than predicted from models of reconnection jets in the corona or shock heating associated with Alfvén waves. The observed line widths are also inconsistent with models of chromospheric evaporation due to coronal nanoflares. We show that recent advances in higher resolution Alfvén wave turbulence modeling enables us to obtain non-thermal velocities similar to those measured in
active regions. The observed non-thermal velocities for the 11 active regions in our study are in the range of 17$-$30 $\rm km ~ s^{-1}$, consistent with the spectral line non-thermal widths predicted from our model of 16 interacting flux tubes, which are in the range of ~15$-$37 $\rm km ~ s^{-1}$.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Order-One Rolling Shutter Cameras
Authors:
Marvin Anas Hahn,
Kathlén Kohn,
Orlando Marigliano,
Tomas Pajdla
Abstract:
Rolling shutter (RS) cameras dominate consumer and smartphone markets. Several methods for computing the absolute pose of RS cameras have appeared in the last 20 years, but the relative pose problem has not been fully solved yet. We provide a unified theory for the important class of order-one rolling shutter (RS$_1$) cameras. These cameras generalize the perspective projection to RS cameras, proj…
▽ More
Rolling shutter (RS) cameras dominate consumer and smartphone markets. Several methods for computing the absolute pose of RS cameras have appeared in the last 20 years, but the relative pose problem has not been fully solved yet. We provide a unified theory for the important class of order-one rolling shutter (RS$_1$) cameras. These cameras generalize the perspective projection to RS cameras, projecting a generic space point to exactly one image point via a rational map. We introduce a new back-projection RS camera model, characterize RS$_1$ cameras, construct explicit parameterizations of such cameras, and determine the image of a space line. We classify all minimal problems for solving the relative camera pose problem with linear RS$_1$ cameras and discover new practical cases. Finally, we show how the theory can be used to explain RS models previously used for absolute pose computation.
△ Less
Submitted 17 March, 2024;
originally announced March 2024.
-
Tropical twisted Hurwitz numbers for elliptic curves
Authors:
Marvin Anas Hahn,
Hannah Markwig
Abstract:
Hurwitz numbers enumerate branched morphisms between Riemann surfaces. For a fixed elliptic target, Hurwitz numbers are intimately related to mirror symmetry following work of Dijkgraaf. In recent work of Chapuy and Dolega a new variant of Hurwitz numbers with fixed genus $0$ target was introduced that includes maps between between non-orientiable surfaces. These numbers are called $b$-Hurwitz num…
▽ More
Hurwitz numbers enumerate branched morphisms between Riemann surfaces. For a fixed elliptic target, Hurwitz numbers are intimately related to mirror symmetry following work of Dijkgraaf. In recent work of Chapuy and Dolega a new variant of Hurwitz numbers with fixed genus $0$ target was introduced that includes maps between between non-orientiable surfaces. These numbers are called $b$-Hurwitz numbers and are polynomials in a parameter $b$ which measures the non-orientability of the involved maps. An interpretation in terms of factorisations of $b$-Hurwitz numbers for $b=1$, so-called twisted Hurwitz numbers, was found in work of Burman and Fesler. In previous work, the authors derived a tropical geometry interpretation of these numbers. In this paper, we introduce a natural generalisation of twisted Hurwitz numbers with elliptic targets within the framework of symmetric groups. We derive a tropical interpretation of these invariants, relate them to Feynman integrals and derive an expression as a matrix element of an operator in the bosonic Fock space.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
exploreCOSMOS: Interactive Exploration of Conditional Statistical Shape Models in the Web-Browser
Authors:
Maximilian Hahn,
Bernhard Egger
Abstract:
Statistical Shape Models of faces and various body parts are heavily used in medical image analysis, computer vision and visualization. Whilst the field is well explored with many existing tools, all of them aim at experts, which limits their applicability. We demonstrate the first tool that enables the convenient exploration of statistical shape models in the browser, with the capability to manip…
▽ More
Statistical Shape Models of faces and various body parts are heavily used in medical image analysis, computer vision and visualization. Whilst the field is well explored with many existing tools, all of them aim at experts, which limits their applicability. We demonstrate the first tool that enables the convenient exploration of statistical shape models in the browser, with the capability to manipulate the faces in a targeted manner. This manipulation is performed via a posterior model given partial observations. We release our code and application on GitHub https://github.com/maximilian-hahn/exploreCOSMOS
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Why are Sensitive Functions Hard for Transformers?
Authors:
Michael Hahn,
Mark Rofin
Abstract:
Empirical studies have identified a range of learnability biases and limitations of transformers, such as a persistent difficulty in learning to compute simple formal languages such as PARITY, and a bias towards low-degree functions. However, theoretical understanding remains limited, with existing expressiveness theory either overpredicting or underpredicting realistic learning abilities. We prov…
▽ More
Empirical studies have identified a range of learnability biases and limitations of transformers, such as a persistent difficulty in learning to compute simple formal languages such as PARITY, and a bias towards low-degree functions. However, theoretical understanding remains limited, with existing expressiveness theory either overpredicting or underpredicting realistic learning abilities. We prove that, under the transformer architecture, the loss landscape is constrained by the input-space sensitivity: Transformers whose output is sensitive to many parts of the input string inhabit isolated points in parameter space, leading to a low-sensitivity bias in generalization. We show theoretically and empirically that this theory unifies a broad array of empirical observations about the learning abilities and biases of transformers, such as their generalization bias towards low sensitivity and low degree, and difficulty in length generalization for PARITY. This shows that understanding transformers' inductive biases requires studying not just their in-principle expressivity, but also their loss landscape.
△ Less
Submitted 27 May, 2024; v1 submitted 15 February, 2024;
originally announced February 2024.
-
Experimental study of Alfvén wave reflection from an Alfvén-speed gradient relevant to the solar coronal holes
Authors:
Sayak Bose,
Jason M. TenBarge,
Troy Carter,
Michael Hahn,
Hantao Ji,
James Juno,
Daniel Wolf Savin,
Shreekrishna Tripathi,
Stephen Vincena
Abstract:
We report the first experimental detection of a reflected Alfvén wave from an Alfvén-speed gradient under conditions similar to those in coronal holes. The experiments were conducted in the Large Plasma Device at the University of California, Los Angeles. We present the experimentally measured dependence of the coefficient of reflection versus the wave inhomogeneity parameter, i.e., the ratio of t…
▽ More
We report the first experimental detection of a reflected Alfvén wave from an Alfvén-speed gradient under conditions similar to those in coronal holes. The experiments were conducted in the Large Plasma Device at the University of California, Los Angeles. We present the experimentally measured dependence of the coefficient of reflection versus the wave inhomogeneity parameter, i.e., the ratio of the wave length of the incident wave to the length scale of the gradient. Two-fluid simulations using the Gkeyll code qualitatively agree with and support the experimental findings. Our experimental results support models of wave heating that rely on wave reflection at low heights from a smooth Alfvén-speed gradient to drive turbulence.
△ Less
Submitted 9 February, 2024;
originally announced February 2024.
-
Querying Fault and Attack Trees: Property Specification on a Water Network
Authors:
Stefano M. Nicoletti,
Milan Lopuhaä-Zwakenberg,
E. Moritz Hahn,
Mariëlle Stoelinga
Abstract:
We provide an overview of three different query languages whose objective is to specify properties on the highly popular formalisms of fault trees (FTs) and attack trees (ATs). These are BFL, a Boolean Logic for FTs, PFL, a probabilistic extension of BFL and ATM, a logic for security metrics on ATs. We validate the framework composed by these three logics by applying them to the case study of a wa…
▽ More
We provide an overview of three different query languages whose objective is to specify properties on the highly popular formalisms of fault trees (FTs) and attack trees (ATs). These are BFL, a Boolean Logic for FTs, PFL, a probabilistic extension of BFL and ATM, a logic for security metrics on ATs. We validate the framework composed by these three logics by applying them to the case study of a water distribution network. We extend the FT for this network - found in the literature - and we propose to model the system under analysis with the Fault Trees/Attack Trees (FT/ATs) formalism, combining both FTs and ATs in a unique model. Furthermore, we propose a novel combination of the showcased logics to account for queries that jointly consider both the FT and the AT of the model, integrating influences of attacks on failure probabilities of different components. Finally, we extend the domain specific language for PFL with novel constructs to capture the interplay between metrics of attacks - e.g., "cost", success probabilities - and failure probabilities in the system.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
A Data-Driven Digital Twin Network Architecture in the Industrial Internet of Things (IIoT) Applications
Authors:
Abubakar Isah,
Hyeju Shin,
Ibrahim Aliyu,
Sangwon Oh,
Sangjoon Lee,
Jaehyung Park,
Minsoo Hahn,
**sul Kim
Abstract:
A new network named the "Digital Twin Network" (DTN) uses the "Digital Twin" (DT) technology to produce virtual twins of real things. The network load and size continue to grow as a result of the development of 5G, the Internet of Things, and cloud computing technology as well as the advent of new network services. As a result, network operation and maintenance are becoming more difficult. A digit…
▽ More
A new network named the "Digital Twin Network" (DTN) uses the "Digital Twin" (DT) technology to produce virtual twins of real things. The network load and size continue to grow as a result of the development of 5G, the Internet of Things, and cloud computing technology as well as the advent of new network services. As a result, network operation and maintenance are becoming more difficult. A digital twin connects the real and digital worlds, exchanging data in both directions and revealing information about the progression of a network process. The framework of the Industrial Internet of Things, data processing, and digital twin network is taken into consideration in this article as a key aspect. This paper proposed a data-driven digital twin network architecture, that comprises the physical network layer (PNL), the digital twin layer(DTL), the application layer (AL), and what those layers encompass and beyond. Also, we presented DTN data types and protocols to be used for data integration.
△ Less
Submitted 17 July, 2023;
originally announced December 2023.
-
VideoPoet: A Large Language Model for Zero-Shot Video Generation
Authors:
Dan Kondratyuk,
Lijun Yu,
Xiuye Gu,
José Lezama,
Jonathan Huang,
Grant Schindler,
Rachel Hornung,
Vighnesh Birodkar,
Jimmy Yan,
Ming-Chang Chiu,
Krishna Somandepalli,
Hassan Akbari,
Yair Alon,
Yong Cheng,
Josh Dillon,
Agrim Gupta,
Meera Hahn,
Anja Hauth,
David Hendon,
Alonso Martinez,
David Minnen,
Mikhail Sirotenko,
Kihyuk Sohn,
Xuan Yang,
Hartwig Adam
, et al. (6 additional authors not shown)
Abstract:
We present VideoPoet, a language model capable of synthesizing high-quality video, with matching audio, from a large variety of conditioning signals. VideoPoet employs a decoder-only transformer architecture that processes multimodal inputs -- including images, videos, text, and audio. The training protocol follows that of Large Language Models (LLMs), consisting of two stages: pretraining and tas…
▽ More
We present VideoPoet, a language model capable of synthesizing high-quality video, with matching audio, from a large variety of conditioning signals. VideoPoet employs a decoder-only transformer architecture that processes multimodal inputs -- including images, videos, text, and audio. The training protocol follows that of Large Language Models (LLMs), consisting of two stages: pretraining and task-specific adaptation. During pretraining, VideoPoet incorporates a mixture of multimodal generative objectives within an autoregressive Transformer framework. The pretrained LLM serves as a foundation that can be adapted for a range of video generation tasks. We present empirical results demonstrating the model's state-of-the-art capabilities in zero-shot video generation, specifically highlighting VideoPoet's ability to generate high-fidelity motions. Project page: http://sites.research.google/videopoet/
△ Less
Submitted 4 June, 2024; v1 submitted 21 December, 2023;
originally announced December 2023.
-
Omega-Regular Decision Processes
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
Regular decision processes (RDPs) are a subclass of non-Markovian decision processes where the transition and reward functions are guarded by some regular property of the past (a lookback). While RDPs enable intuitive and succinct representation of non-Markovian decision processes, their expressive power coincides with finite-state Markov decision processes (MDPs). We introduce omega-regular decis…
▽ More
Regular decision processes (RDPs) are a subclass of non-Markovian decision processes where the transition and reward functions are guarded by some regular property of the past (a lookback). While RDPs enable intuitive and succinct representation of non-Markovian decision processes, their expressive power coincides with finite-state Markov decision processes (MDPs). We introduce omega-regular decision processes (ODPs) where the non-Markovian aspect of the transition and reward functions are extended to an omega-regular lookahead over the system evolution. Semantically, these lookaheads can be considered as promises made by the decision maker or the learning agent about her future behavior. In particular, we assume that, if the promised lookaheads are not met, then the payoff to the decision maker is $\bot$ (least desirable payoff), overriding any rewards collected by the decision maker. We enable optimization and learning for ODPs under the discounted-reward objective by reducing them to lexicographic optimization and learning over finite MDPs. We present experimental results demonstrating the effectiveness of the proposed reduction.
△ Less
Submitted 13 December, 2023;
originally announced December 2023.
-
Photorealistic Video Generation with Diffusion Models
Authors:
Agrim Gupta,
Lijun Yu,
Kihyuk Sohn,
Xiuye Gu,
Meera Hahn,
Li Fei-Fei,
Irfan Essa,
Lu Jiang,
José Lezama
Abstract:
We present W.A.L.T, a transformer-based approach for photorealistic video generation via diffusion modeling. Our approach has two key design decisions. First, we use a causal encoder to jointly compress images and videos within a unified latent space, enabling training and generation across modalities. Second, for memory and training efficiency, we use a window attention architecture tailored for…
▽ More
We present W.A.L.T, a transformer-based approach for photorealistic video generation via diffusion modeling. Our approach has two key design decisions. First, we use a causal encoder to jointly compress images and videos within a unified latent space, enabling training and generation across modalities. Second, for memory and training efficiency, we use a window attention architecture tailored for joint spatial and spatiotemporal generative modeling. Taken together these design decisions enable us to achieve state-of-the-art performance on established video (UCF-101 and Kinetics-600) and image (ImageNet) generation benchmarks without using classifier free guidance. Finally, we also train a cascade of three models for the task of text-to-video generation consisting of a base latent video diffusion model, and two video super-resolution diffusion models to generate videos of $512 \times 896$ resolution at $8$ frames per second.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Which way is `right'?: Uncovering limitations of Vision-and-Language Navigation model
Authors:
Meera Hahn,
Amit Raj,
James M. Rehg
Abstract:
The challenging task of Vision-and-Language Navigation (VLN) requires embodied agents to follow natural language instructions to reach a goal location or object (e.g. `walk down the hallway and turn left at the piano'). For agents to complete this task successfully, they must be able to ground objects referenced into the instruction (e.g.`piano') into the visual scene as well as ground directional…
▽ More
The challenging task of Vision-and-Language Navigation (VLN) requires embodied agents to follow natural language instructions to reach a goal location or object (e.g. `walk down the hallway and turn left at the piano'). For agents to complete this task successfully, they must be able to ground objects referenced into the instruction (e.g.`piano') into the visual scene as well as ground directional phrases (e.g.`turn left') into actions. In this work we ask the following question -- to what degree are spatial and directional language cues informing the navigation model's decisions? We propose a series of simple masking experiments to inspect the model's reliance on different parts of the instruction. Surprisingly we uncover that certain top performing models rely only on the noun tokens of the instructions. We propose two training methods to alleviate this concerning limitation.
△ Less
Submitted 30 November, 2023;
originally announced December 2023.
-
Text and Click inputs for unambiguous open vocabulary instance segmentation
Authors:
Nikolai Warner,
Meera Hahn,
Jonathan Huang,
Irfan Essa,
Vighnesh Birodkar
Abstract:
Segmentation localizes objects in an image on a fine-grained per-pixel scale. Segmentation benefits by humans-in-the-loop to provide additional input of objects to segment using a combination of foreground or background clicks. Tasks include photoediting or novel dataset annotation, where human annotators leverage an existing segmentation model instead of drawing raw pixel level annotations. We pr…
▽ More
Segmentation localizes objects in an image on a fine-grained per-pixel scale. Segmentation benefits by humans-in-the-loop to provide additional input of objects to segment using a combination of foreground or background clicks. Tasks include photoediting or novel dataset annotation, where human annotators leverage an existing segmentation model instead of drawing raw pixel level annotations. We propose a new segmentation process, Text + Click segmentation, where a model takes as input an image, a text phrase describing a class to segment, and a single foreground click specifying the instance to segment. Compared to previous approaches, we leverage open-vocabulary image-text models to support a wide-range of text prompts. Conditioning segmentations on text prompts improves the accuracy of segmentations on novel or unseen classes. We demonstrate that the combination of a single user-specified foreground click and a text prompt allows a model to better disambiguate overlap** or co-occurring semantic categories, such as "tie", "suit", and "person". We study these results across common segmentation datasets such as refCOCO, COCO, VOC, and OpenImages. Source code available here.
△ Less
Submitted 24 November, 2023;
originally announced November 2023.
-
AGNES: Abstraction-guided Framework for Deep Neural Networks Security
Authors:
Akshay Dhonthi,
Marcello Eiermann,
Ernst Moritz Hahn,
Vahid Hashemi
Abstract:
Deep Neural Networks (DNNs) are becoming widespread, particularly in safety-critical areas. One prominent application is image recognition in autonomous driving, where the correct classification of objects, such as traffic signs, is essential for safe driving. Unfortunately, DNNs are prone to backdoors, meaning that they concentrate on attributes of the image that should be irrelevant for their co…
▽ More
Deep Neural Networks (DNNs) are becoming widespread, particularly in safety-critical areas. One prominent application is image recognition in autonomous driving, where the correct classification of objects, such as traffic signs, is essential for safe driving. Unfortunately, DNNs are prone to backdoors, meaning that they concentrate on attributes of the image that should be irrelevant for their correct classification. Backdoors are integrated into a DNN during training, either with malicious intent (such as a manipulated training process, because of which a yellow sticker always leads to a traffic sign being recognised as a stop sign) or unintentional (such as a rural background leading to any traffic sign being recognised as animal crossing, because of biased training data).
In this paper, we introduce AGNES, a tool to detect backdoors in DNNs for image recognition. We discuss the principle approach on which AGNES is based. Afterwards, we show that our tool performs better than many state-of-the-art methods for multiple relevant case studies.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Combinatorics of pruned Hurwitz numbers
Authors:
Sean Gearoid Fitzgerald,
Marvin Anas Hahn,
Síofra Kelly
Abstract:
Hurwitz numbers enumerate branched morphisms between Riemannn surfaces with fixed numerical data. They represent important objects in enumerative geometry that are accessible by combinatorial techniques. In the past decade, many variants of Hurwitz numbers have appeared in the literature. In this paper, we focus on an exciting such variant that arises naturally from the theory of topological recur…
▽ More
Hurwitz numbers enumerate branched morphisms between Riemannn surfaces with fixed numerical data. They represent important objects in enumerative geometry that are accessible by combinatorial techniques. In the past decade, many variants of Hurwitz numbers have appeared in the literature. In this paper, we focus on an exciting such variant that arises naturally from the theory of topological recursion: Pruned Hurwitz numbers. These are defined as an enumeration of a relevant subset of branched morphisms between Riemann surfaces, that yield smaller numbers than their classical counterparts while retaining maximal information. Thus, pruned Hurwitz numbers may be viewed as the core of the Hurwitz problem. In this paper, we develop the combinatorial theory of pruned Hurwitz numbers. In particular, motivated by the successful application of combinatorial techniques to classical Hurwitz numbers, we derive two new combinatorial expressions of pruned Hurwitz numbers. Firstly, we show that they may be expressed in terms of Hurwitz mobiles which are tree-like structure that arise from the theory of random planar maps. Secondly, we prove a tropical correspondence theorem which allows the enumeration of pruned Hurwitz numbers in terms of tropical covers.
△ Less
Submitted 8 October, 2023;
originally announced October 2023.
-
ATM: a Logic for Quantitative Security Properties on Attack Trees
Authors:
Stefano M. Nicoletti,
Milan Lopuhaä-Zwakenberg,
E. Moritz Hahn,
Mariëlle Stoelinga
Abstract:
Critical infrastructure systems - for which high reliability and availability are paramount - must operate securely. Attack trees (ATs) are hierarchical diagrams that offer a flexible modelling language used to assess how systems can be attacked. ATs are widely employed both in industry and academia but - in spite of their popularity - little work has been done to give practitioners instruments to…
▽ More
Critical infrastructure systems - for which high reliability and availability are paramount - must operate securely. Attack trees (ATs) are hierarchical diagrams that offer a flexible modelling language used to assess how systems can be attacked. ATs are widely employed both in industry and academia but - in spite of their popularity - little work has been done to give practitioners instruments to formulate queries on ATs in an understandable yet powerful way. In this paper we fill this gap by presenting ATM, a logic to express quantitative security properties on ATs. ATM allows for the specification of properties involved with security metrics that include "cost", "probability" and "skill" and permits the formulation of insightful what-if scenarios. To showcase its potential, we apply ATM to the case study of a CubeSAT, presenting three different ways in which an attacker can compromise its availability. We showcase property specification on the corresponding attack tree and we present theory and algorithms - based on binary decision diagrams - to check properties and compute metrics of ATM-formulae.
△ Less
Submitted 17 May, 2024; v1 submitted 17 September, 2023;
originally announced September 2023.
-
Omega-Regular Reward Machines
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
Reinforcement learning (RL) is a powerful approach for training agents to perform tasks, but designing an appropriate reward mechanism is critical to its success. However, in many cases, the complexity of the learning objectives goes beyond the capabilities of the Markovian assumption, necessitating a more sophisticated reward mechanism. Reward machines and omega-regular languages are two formalis…
▽ More
Reinforcement learning (RL) is a powerful approach for training agents to perform tasks, but designing an appropriate reward mechanism is critical to its success. However, in many cases, the complexity of the learning objectives goes beyond the capabilities of the Markovian assumption, necessitating a more sophisticated reward mechanism. Reward machines and omega-regular languages are two formalisms used to express non-Markovian rewards for quantitative and qualitative objectives, respectively. This paper introduces omega-regular reward machines, which integrate reward machines with omega-regular languages to enable an expressive and effective reward mechanism for RL. We present a model-free RL algorithm to compute epsilon-optimal strategies against omega-egular reward machines and evaluate the effectiveness of the proposed algorithm through experiments.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
A Cross-Linguistic Pressure for Uniform Information Density in Word Order
Authors:
Thomas Hikaru Clark,
Clara Meister,
Tiago Pimentel,
Michael Hahn,
Ryan Cotterell,
Richard Futrell,
Roger Levy
Abstract:
While natural languages differ widely in both canonical word order and word order flexibility, their word orders still follow shared cross-linguistic statistical patterns, often attributed to functional pressures. In the effort to identify these pressures, prior work has compared real and counterfactual word orders. Yet one functional pressure has been overlooked in such investigations: the unifor…
▽ More
While natural languages differ widely in both canonical word order and word order flexibility, their word orders still follow shared cross-linguistic statistical patterns, often attributed to functional pressures. In the effort to identify these pressures, prior work has compared real and counterfactual word orders. Yet one functional pressure has been overlooked in such investigations: the uniform information density (UID) hypothesis, which holds that information should be spread evenly throughout an utterance. Here, we ask whether a pressure for UID may have influenced word order patterns cross-linguistically. To this end, we use computational models to test whether real orders lead to greater information uniformity than counterfactual orders. In our empirical study of 10 typologically diverse languages, we find that: (i) among SVO languages, real word orders consistently have greater uniformity than reverse word orders, and (ii) only linguistically implausible counterfactual orders consistently exceed the uniformity of real orders. These findings are compatible with a pressure for information uniformity in the development and usage of natural languages.
△ Less
Submitted 9 July, 2023; v1 submitted 6 June, 2023;
originally announced June 2023.
-
Are Non-thermal Velocities in Active Region Coronal Loops Anisotropic?
Authors:
Michael Hahn,
Mahboubeh Asgari-Targhi,
Daniel Wolf Savin
Abstract:
We have measured line widths in active region coronal loops in order to determine whether the non-thermal broadening is anisotropic with respect to the magnetic field direction. These non-thermal velocities are caused by unresolved fluid motions. Our analysis method combines spectroscopic data and a magnetic field extrapolation. We analyzed spectra from the Extreme Ultraviolet Imaging Spectrometer…
▽ More
We have measured line widths in active region coronal loops in order to determine whether the non-thermal broadening is anisotropic with respect to the magnetic field direction. These non-thermal velocities are caused by unresolved fluid motions. Our analysis method combines spectroscopic data and a magnetic field extrapolation. We analyzed spectra from the Extreme Ultraviolet Imaging Spectrometer on Hinode. A differential emission measure analysis showed that many spectral lines that are commonly considered to be formed in the active region have a substantial contribution from the background quiet Sun. From these spectra we identified lines whose emission was dominated by the active region loops rather than background sources. Using these lines, we constructed maps of the non-thermal velocity. With data from the Helioseismic Magnetic Imager on the Solar Dynamics Observatory and the Coronal Modeling System nonlinear force-free magnetic field reconstruction code, we traced several of the magnetic field lines through the active region. Comparing the spectroscopic and magnetic data, we looked for correlations of non-thermal velocity with the viewing angle between the line of sight and the magnetic field. We found that non-thermal velocities show a weak anti-correlation with the viewing angle. That is, the tendency is for the non-thermal velocity to be slightly larger in the parallel direction. This parallel broadening may be due to acoustic waves or unresolved parallel flows.
△ Less
Submitted 5 May, 2023;
originally announced May 2023.
-
Scenario Approach for Parametric Markov Models
Authors:
Ying Liu,
Andrea Turrini,
Moritz Hahn,
Bai Xue,
Lijun Zhang
Abstract:
In this paper, we propose an approximating framework for analyzing parametric Markov models. Instead of computing complex rational functions encoding the reachability probability and the reward values of the parametric model, we exploit the scenario approach to synthesize a relatively simple polynomial approximation. The approximation is probably approximately correct (PAC), meaning that with high…
▽ More
In this paper, we propose an approximating framework for analyzing parametric Markov models. Instead of computing complex rational functions encoding the reachability probability and the reward values of the parametric model, we exploit the scenario approach to synthesize a relatively simple polynomial approximation. The approximation is probably approximately correct (PAC), meaning that with high confidence, the approximating function is close to the actual function with an allowable error. With the PAC approximations, one can check properties of the parametric Markov models. We show that the scenario approach can also be used to check PRCTL properties directly, without synthesizing the polynomial at first hand. We have implemented our algorithm in a prototype tool and conducted thorough experiments. The experimental results demonstrate that our tool is able to compute polynomials for more benchmarks than state of the art tools such as PRISM and Storm, confirming the efficacy of our PAC-based synthesis.
△ Less
Submitted 13 November, 2023; v1 submitted 17 April, 2023;
originally announced April 2023.
-
PFL: a Probabilistic Logic for Fault Trees
Authors:
Stefano M. Nicoletti,
Milan Lopuhaä-Zwakenberg,
E. Moritz Hahn,
Mariëlle Stoelinga
Abstract:
Safety-critical infrastructures must operate in a safe and reliable way. Fault tree analysis is a widespread method used for risk assessment of these systems: fault trees (FTs) are required by, e.g., the Federal Aviation Administration and the Nuclear Regulatory Commission. In spite of their popularity, little work has been done on formulating structural queries about FT and analyzing these, e.g.,…
▽ More
Safety-critical infrastructures must operate in a safe and reliable way. Fault tree analysis is a widespread method used for risk assessment of these systems: fault trees (FTs) are required by, e.g., the Federal Aviation Administration and the Nuclear Regulatory Commission. In spite of their popularity, little work has been done on formulating structural queries about FT and analyzing these, e.g., when evaluating potential scenarios, and to give practitioners instruments to formulate queries on FTs in an understandable yet powerful way. In this paper, we aim to fill this gap by extending BFL [32], a logic that reasons about Boolean FTs. To do so, we introduce a Probabilistic Fault tree Logic (PFL). PFL is a simple, yet expressive logic that supports easier formulation of complex scenarios and specification of FT properties that comprise probabilities. Alongside PFL, we present LangPFL, a domain specific language to further ease property specification. We showcase PFL and LangPFL by applying them to a COVID-19 related FT and to a FT for an oil/gas pipeline. Finally, we present theory and model checking algorithms based on binary decision diagrams (BDDs).
△ Less
Submitted 1 June, 2024; v1 submitted 30 March, 2023;
originally announced March 2023.
-
A Theory of Emergent In-Context Learning as Implicit Structure Induction
Authors:
Michael Hahn,
Navin Goyal
Abstract:
Scaling large language models (LLMs) leads to an emergent capacity to learn in-context from example demonstrations. Despite progress, theoretical understanding of this phenomenon remains limited. We argue that in-context learning relies on recombination of compositional operations found in natural language data. We derive an information-theoretic bound showing how in-context learning abilities ari…
▽ More
Scaling large language models (LLMs) leads to an emergent capacity to learn in-context from example demonstrations. Despite progress, theoretical understanding of this phenomenon remains limited. We argue that in-context learning relies on recombination of compositional operations found in natural language data. We derive an information-theoretic bound showing how in-context learning abilities arise from generic next-token prediction when the pretraining distribution has sufficient amounts of compositional structure, under linguistically motivated assumptions. A second bound provides a theoretical justification for the empirical success of prompting LLMs to output intermediate steps towards an answer. To validate theoretical predictions, we introduce a controlled setup for inducing in-context learning; unlike previous approaches, it accounts for the compositional nature of language. Trained transformers can perform in-context learning for a range of tasks, in a manner consistent with the theoretical results. Mirroring real-world LLMs in a miniature setup, in-context learning emerges when scaling parameters and data, and models perform better when prompted to output intermediate steps. Probing shows that in-context learning is supported by a representation of the input's compositional structure. Taken together, these results provide a step towards theoretical understanding of emergent behavior in large language models.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
The human factor: results of a small-angle scattering data analysis Round Robin
Authors:
Brian R. Pauw,
Glen J. Smales,
Andy S. Anker,
Daniel M. Balazs,
Frederick L. Beyer,
Ralf Bienert,
Wim G. Bouwman,
Ingo Breßler,
Joachim Breternitz,
Erik S Brok,
Gary Bryant,
Andrew J. Clulow,
Erin R. Crater,
Frédéric De Geuser,
Alessandra Del Giudice,
Jérôme Deumer,
Sabrina Disch,
Shankar Dutt,
Kilian Frank,
Emiliano Fratini,
Elliot P. Gilbert,
Marc Benjamin Hahn,
James Hallett,
Max Hohenschutz,
Martin Hollamby
, et al. (24 additional authors not shown)
Abstract:
A Round Robin study has been carried out to estimate the impact of the human element in small-angle scattering data analysis. Four corrected datasets were provided to participants ready for analysis. All datasets were measured on samples containing spherical scatterers, with two datasets in dilute dispersions, and two from powders. Most of the 46 participants correctly identified the number of pop…
▽ More
A Round Robin study has been carried out to estimate the impact of the human element in small-angle scattering data analysis. Four corrected datasets were provided to participants ready for analysis. All datasets were measured on samples containing spherical scatterers, with two datasets in dilute dispersions, and two from powders. Most of the 46 participants correctly identified the number of populations in the dilute dispersions, with half of the population mean entries within 1.5% and half of the population width entries within 40%, respectively. Due to the added complexity of the structure factor, much fewer people submitted answers on the powder datasets. For those that did, half of the entries for the means and widths were within 44% and 86% respectively. This Round Robin experiment highlights several causes for the discrepancies, for which solutions are proposed.
△ Less
Submitted 7 March, 2023;
originally announced March 2023.
-
Backdoor Mitigation in Deep Neural Networks via Strategic Retraining
Authors:
Akshay Dhonthi,
Ernst Moritz Hahn,
Vahid Hashemi
Abstract:
Deep Neural Networks (DNN) are becoming increasingly more important in assisted and automated driving. Using such entities which are obtained using machine learning is inevitable: tasks such as recognizing traffic signs cannot be developed reasonably using traditional software development methods. DNN however do have the problem that they are mostly black boxes and therefore hard to understand and…
▽ More
Deep Neural Networks (DNN) are becoming increasingly more important in assisted and automated driving. Using such entities which are obtained using machine learning is inevitable: tasks such as recognizing traffic signs cannot be developed reasonably using traditional software development methods. DNN however do have the problem that they are mostly black boxes and therefore hard to understand and debug. One particular problem is that they are prone to hidden backdoors. This means that the DNN misclassifies its input, because it considers properties that should not be decisive for the output. Backdoors may either be introduced by malicious attackers or by inappropriate training. In any case, detecting and removing them is important in the automotive area, as they might lead to safety violations with potentially severe consequences. In this paper, we introduce a novel method to remove backdoors. Our method works for both intentional as well as unintentional backdoors. We also do not require prior knowledge about the shape or distribution of backdoors. Experimental evidence shows that our method performs well on several medium-sized examples.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Transformer-based Localization from Embodied Dialog with Large-scale Pre-training
Authors:
Meera Hahn,
James M. Rehg
Abstract:
We address the challenging task of Localization via Embodied Dialog (LED). Given a dialog from two agents, an Observer navigating through an unknown environment and a Locator who is attempting to identify the Observer's location, the goal is to predict the Observer's final location in a map. We develop a novel LED-Bert architecture and present an effective pretraining strategy. We show that a grap…
▽ More
We address the challenging task of Localization via Embodied Dialog (LED). Given a dialog from two agents, an Observer navigating through an unknown environment and a Locator who is attempting to identify the Observer's location, the goal is to predict the Observer's final location in a map. We develop a novel LED-Bert architecture and present an effective pretraining strategy. We show that a graph-based scene representation is more effective than the top-down 2D maps used in prior works. Our approach outperforms previous baselines.
△ Less
Submitted 10 October, 2022;
originally announced October 2022.
-
Learning a Visually Grounded Memory Assistant
Authors:
Meera Hahn,
Kevin Carlberg,
Ruta Desai,
James Hillis
Abstract:
We introduce a novel interface for large scale collection of human memory and assistance. Using the 3D Matterport simulator we create a realistic indoor environments in which we have people perform specific embodied memory tasks that mimic household daily activities. This interface was then deployed on Amazon Mechanical Turk allowing us to test and record human memory, navigation and needs for ass…
▽ More
We introduce a novel interface for large scale collection of human memory and assistance. Using the 3D Matterport simulator we create a realistic indoor environments in which we have people perform specific embodied memory tasks that mimic household daily activities. This interface was then deployed on Amazon Mechanical Turk allowing us to test and record human memory, navigation and needs for assistance at a large scale that was previously impossible. Using the interface we collect the `The Visually Grounded Memory Assistant Dataset' which is aimed at develo** our understanding of (1) the information people encode during navigation of 3D environments and (2) conditions under which people ask for memory assistance. Additionally we experiment with with predicting when people will ask for assistance using models trained on hand-selected visual and semantic features. This provides an opportunity to build stronger ties between the machine-learning and cognitive-science communities through learned models of human perception, memory, and cognition.
△ Less
Submitted 7 October, 2022;
originally announced October 2022.
-
Twisted Hurwitz numbers: Tropical and polynomial structures
Authors:
Marvin Anas Hahn,
Hannah Markwig
Abstract:
Hurwitz numbers count covers of curves satisfying fixed ramification data. Via monodromy representation, this counting problem can be transformed to a problem of counting factorizations in the symmetric group. This and other beautiful connections make Hurwitz numbers a longstanding active research topic. In recent work Chapuy and Dolęga, a new enumerative invariant called b-Hurwitz number was intr…
▽ More
Hurwitz numbers count covers of curves satisfying fixed ramification data. Via monodromy representation, this counting problem can be transformed to a problem of counting factorizations in the symmetric group. This and other beautiful connections make Hurwitz numbers a longstanding active research topic. In recent work Chapuy and Dolęga, a new enumerative invariant called b-Hurwitz number was introduced, which enumerates non-orientable branched coverings. For b=1, we obtain twisted Hurwitz numbers which were linked to surgery theory in work of Burman and Fesler and admit a representation as factorisations in the symmetric group. In this paper, we derive a tropical interperetation of twisted Hurwitz numbers in terms of tropical covers and study their polynomial structure.
△ Less
Submitted 6 December, 2023; v1 submitted 2 October, 2022;
originally announced October 2022.
-
Report of the Topical Group on Physics Beyond the Standard Model at Energy Frontier for Snowmass 2021
Authors:
Tulika Bose,
Antonio Boveia,
Caterina Doglioni,
Simone Pagan Griso,
James Hirschauer,
Elliot Lipeles,
Zhen Liu,
Nausheen R. Shah,
Lian-Tao Wang,
Kaustubh Agashe,
Juliette Alimena,
Sebastian Baum,
Mohamed Berkat,
Kevin Black,
Gwen Gardner,
Tony Gherghetta,
Josh Greaves,
Maxx Haehn,
Phil C. Harris,
Robert Harris,
Julie Hogan,
Suneth Jayawardana,
Abraham Kahn,
Jan Kalinowski,
Simon Knapen
, et al. (297 additional authors not shown)
Abstract:
This is the Snowmass2021 Energy Frontier (EF) Beyond the Standard Model (BSM) report. It combines the EF topical group reports of EF08 (Model-specific explorations), EF09 (More general explorations), and EF10 (Dark Matter at Colliders). The report includes a general introduction to BSM motivations and the comparative prospects for proposed future experiments for a broad range of potential BSM mode…
▽ More
This is the Snowmass2021 Energy Frontier (EF) Beyond the Standard Model (BSM) report. It combines the EF topical group reports of EF08 (Model-specific explorations), EF09 (More general explorations), and EF10 (Dark Matter at Colliders). The report includes a general introduction to BSM motivations and the comparative prospects for proposed future experiments for a broad range of potential BSM models and signatures, including compositeness, SUSY, leptoquarks, more general new bosons and fermions, long-lived particles, dark matter, charged-lepton flavor violation, and anomaly detection.
△ Less
Submitted 18 October, 2022; v1 submitted 26 September, 2022;
originally announced September 2022.
-
BFL: a Logic to Reason about Fault Trees
Authors:
Stefano M. Nicoletti,
E. Moritz Hahn,
Marielle Stoelinga
Abstract:
Safety-critical infrastructures must operate safely and reliably. Fault tree analysis is a widespread method used to assess risks in these systems: fault trees (FTs) are required - among others - by the Federal Aviation Authority, the Nuclear Regulatory Commission, in the ISO26262 standard for autonomous driving and for software development in aerospace systems. Although popular both in industry a…
▽ More
Safety-critical infrastructures must operate safely and reliably. Fault tree analysis is a widespread method used to assess risks in these systems: fault trees (FTs) are required - among others - by the Federal Aviation Authority, the Nuclear Regulatory Commission, in the ISO26262 standard for autonomous driving and for software development in aerospace systems. Although popular both in industry and academia, FTs lack a systematic way to formulate powerful and understandable analysis queries. In this paper, we aim to fill this gap and introduce Boolean Fault tree Logic (BFL), a logic to reason about FTs. BFL is a simple, yet expressive logic that supports easier formulation of complex scenarios and specification of FT properties. Alongside BFL, we present model checking algorithms based on binary decision diagrams (BDDs) to analyse specified properties in BFL, patterns and an algorithm to construct counterexamples. Finally, we propose a case-study application of BFL by analysing a COVID19-related FT.
△ Less
Submitted 1 June, 2024; v1 submitted 29 August, 2022;
originally announced August 2022.
-
Deriving instrumental point spread functions from partially occulted images
Authors:
Stefan Johann Hofmeister,
Michael Hahn,
Daniel Wolf Savin
Abstract:
The point-spread function (PSF) of an imaging system describes the response of the system to a point source. Accurately determining the PSF enables one to correct for the combined effects of focussing and scattering within the imaging system, and thereby enhance the spatial resolution and dynamic contrast of the resulting images. We present a semi-empirical semi-blind methodology to derive a PSF f…
▽ More
The point-spread function (PSF) of an imaging system describes the response of the system to a point source. Accurately determining the PSF enables one to correct for the combined effects of focussing and scattering within the imaging system, and thereby enhance the spatial resolution and dynamic contrast of the resulting images. We present a semi-empirical semi-blind methodology to derive a PSF from partially occulted images. We partition the two-dimensional PSF into multiple segments, set up a multi-linear system of equations, and directly fit the system of equations to determine the PSF weight in each segment. The algorithm is guaranteed to converge towards the correct instrumental PSF for a large class of occultations, does not require a predefined functional form of the PSF, and can be applied to a large variety of partially occulted images, such as within laboratory settings, regular calibrations within a production line or in the field, astronomical images of distant clusters of stars, or partial solar eclipse images. We show that the central weight of the PSF, which gives the percentage of photons that are not scattered by the instrument, is accurate to bettern than 1.2%. The mean absolute percentage error between the reconstructed and true PSF is usually between 0.5% and 5% for the entire PSF, between 0.5% and 5% for the PSF core, and between 0.5% and 3% for the PSF tail.
△ Less
Submitted 28 October, 2022; v1 submitted 6 July, 2022;
originally announced July 2022.
-
Subspaces Fixed by a Nilpotent Matrix
Authors:
Marvin Anas Hahn,
Gabriele Nebe,
Mima Stanojkovski,
Bernd Sturmfels
Abstract:
The linear spaces that are fixed by a given nilpotent $n \times n$ matrix form a subvariety of the Grassmannian. We classify these varieties for small $n$. Mutiah, Weekes and Yacobi conjectured that their radical ideals are generated by certain linear forms known as shuffle equations. We prove this conjecture for $n \leq 7$, and we disprove it for $n=8$. The question remains open for nilpotent mat…
▽ More
The linear spaces that are fixed by a given nilpotent $n \times n$ matrix form a subvariety of the Grassmannian. We classify these varieties for small $n$. Mutiah, Weekes and Yacobi conjectured that their radical ideals are generated by certain linear forms known as shuffle equations. We prove this conjecture for $n \leq 7$, and we disprove it for $n=8$. The question remains open for nilpotent matrices arising from the affine Grassmannian.
△ Less
Submitted 9 March, 2023; v1 submitted 2 July, 2022;
originally announced July 2022.
-
Recursive Reinforcement Learning
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
Recursion is the fundamental paradigm to finitely describe potentially infinite objects. As state-of-the-art reinforcement learning (RL) algorithms cannot directly reason about recursion, they must rely on the practitioner's ingenuity in designing a suitable "flat" representation of the environment. The resulting manual feature constructions and approximations are cumbersome and error-prone; their…
▽ More
Recursion is the fundamental paradigm to finitely describe potentially infinite objects. As state-of-the-art reinforcement learning (RL) algorithms cannot directly reason about recursion, they must rely on the practitioner's ingenuity in designing a suitable "flat" representation of the environment. The resulting manual feature constructions and approximations are cumbersome and error-prone; their lack of transparency hampers scalability. To overcome these challenges, we develop RL algorithms capable of computing optimal policies in environments described as a collection of Markov decision processes (MDPs) that can recursively invoke one another. Each constituent MDP is characterized by several entry and exit points that correspond to input and output values of these invocations. These recursive MDPs (or RMDPs) are expressively equivalent to probabilistic pushdown systems (with call-stack playing the role of the pushdown stack), and can model probabilistic programs with recursive procedural calls. We introduce Recursive Q-learning -- a model-free RL algorithm for RMDPs -- and prove that it converges for finite, single-exit and deterministic multi-exit RMDPs under mild assumptions.
△ Less
Submitted 22 June, 2022;
originally announced June 2022.
-
Crosslinguistic word order variation reflects evolutionary pressures of dependency and information locality
Authors:
Michael Hahn,
Yang Xu
Abstract:
Languages vary considerably in syntactic structure. About 40% of the world's languages have subject-verb-object order, and about 40% have subject-object-verb order. Extensive work has sought to explain this word order variation across languages. However, the existing approaches are not able to explain coherently the frequency distribution and evolution of word order in individual languages. We pro…
▽ More
Languages vary considerably in syntactic structure. About 40% of the world's languages have subject-verb-object order, and about 40% have subject-object-verb order. Extensive work has sought to explain this word order variation across languages. However, the existing approaches are not able to explain coherently the frequency distribution and evolution of word order in individual languages. We propose that variation in word order reflects different ways of balancing competing pressures of dependency locality and information locality, whereby languages favor placing elements together when they are syntactically related or contextually informative about each other. Using data from 80 languages in 17 language families and phylogenetic modeling, we demonstrate that languages evolve to balance these pressures, such that word order change is accompanied by change in the frequency distribution of the syntactic structures which speakers communicate to maintain overall efficiency. Variability in word order thus reflects different ways in which languages resolve these evolutionary pressures. We identify relevant characteristics that result from this joint optimization, particularly the frequency with which subjects and objects are expressed together for the same verb. Our findings suggest that syntactic structure and usage across languages co-adapt to support efficient communication under limited cognitive resources.
△ Less
Submitted 8 June, 2022;
originally announced June 2022.
-
Alternating Good-for-MDP Automata
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
When omega-regular objectives were first proposed in model-free reinforcement learning (RL) for controlling MDPs, deterministic Rabin automata were used in an attempt to provide a direct translation from their transitions to scalar values. While these translations failed, it has turned out that it is possible to repair them by using good-for-MDPs (GFM) Büchi automata instead. These are nondetermin…
▽ More
When omega-regular objectives were first proposed in model-free reinforcement learning (RL) for controlling MDPs, deterministic Rabin automata were used in an attempt to provide a direct translation from their transitions to scalar values. While these translations failed, it has turned out that it is possible to repair them by using good-for-MDPs (GFM) Büchi automata instead. These are nondeterministic Büchi automata with a restricted type of nondeterminism, albeit not as restricted as in good-for-games automata. Indeed, deterministic Rabin automata have a pretty straightforward translation to such GFM automata, which is bi-linear in the number of states and pairs. Interestingly, the same cannot be said for deterministic Streett automata: a translation to nondeterministic Rabin or Büchi automata comes at an exponential cost, even without requiring the target automaton to be good-for-MDPs. Do we have to pay more than that to obtain a good-for-MDP automaton? The surprising answer is that we have to pay significantly less when we instead expand the good-for-MDP property to alternating automata: like the nondeterministic GFM automata obtained from deterministic Rabin automata, the alternating good-for-MDP automata we produce from deterministic Streett automata are bi-linear in the the size of the deterministic automaton and its index, and can therefore be exponentially more succinct than minimal nondeterministic Büchi automata.
△ Less
Submitted 6 May, 2022;
originally announced May 2022.
-
Evidence for Parameteric Decay Instability in the Lower Solar Atmosphere
Authors:
Michael Hahn,
Xiangrong Fu,
Daniel Wolf Savin
Abstract:
We find evidence for the first observation of the parametric decay instability (PDI) in the lower solar atmosphere. Specifically, we find that the power spectrum of density fluctuations near the solar transition region resembles the power spectrum of the velocity fluctuations, but with the frequency axis scaled up by about a factor of two. These results are from an analysis of the Si IV lines obse…
▽ More
We find evidence for the first observation of the parametric decay instability (PDI) in the lower solar atmosphere. Specifically, we find that the power spectrum of density fluctuations near the solar transition region resembles the power spectrum of the velocity fluctuations, but with the frequency axis scaled up by about a factor of two. These results are from an analysis of the Si IV lines observed by the Interface Region Imaging Spectrometer (IRIS) in the transition region of a polar coronal hole. We also find that the density fluctuations have radial velocity of about 75 km/s and that the velocity fluctuations are much faster with an estimated speed of 250 km/s, as is expected for sound waves and Alfvén waves, respectively, in the transition region. Theoretical calculations show that this frequency relationship is consistent with those expected from PDI for the plasma conditions of the observed region. These measurements suggest an interaction between sound waves and Alfvén waves in the transition region that is evidence for the parametric decay instability.
△ Less
Submitted 20 April, 2022;
originally announced April 2022.
-
On Convergence of Binary Trust-Region Steepest Descent
Authors:
Paul Manns,
Mirko Hahn,
Christian Kirches,
Sven Leyffer,
Sebastian Sager
Abstract:
Binary trust-region steepest descent (BTR) and combinatorial integral approximation (CIA) are two recently investigated approaches for the solution of optimization problems with distributed binary-/discrete-valued variables (control functions). We show improved convergence results for BTR by imposing a compactness assumption that is similar to the convergence theory of CIA. As a corollary we concl…
▽ More
Binary trust-region steepest descent (BTR) and combinatorial integral approximation (CIA) are two recently investigated approaches for the solution of optimization problems with distributed binary-/discrete-valued variables (control functions). We show improved convergence results for BTR by imposing a compactness assumption that is similar to the convergence theory of CIA. As a corollary we conclude that BTR also constitutes a descent algorithm on the continuous relaxation and its iterates converge weakly-$^*$ to stationary points of the latter. We provide computational results that validate our findings. In addition, we observe a regularizing effect of BTR, which we explore by means of a hybridization of CIA and BTR.
△ Less
Submitted 23 July, 2023; v1 submitted 16 February, 2022;
originally announced February 2022.
-
No RL, No Simulation: Learning to Navigate without Navigating
Authors:
Meera Hahn,
Devendra Chaplot,
Shubham Tulsiani,
Mustafa Mukadam,
James M. Rehg,
Abhinav Gupta
Abstract:
Most prior methods for learning navigation policies require access to simulation environments, as they need online policy interaction and rely on ground-truth maps for rewards. However, building simulators is expensive (requires manual effort for each and every scene) and creates challenges in transferring learned policies to robotic platforms in the real-world, due to the sim-to-real domain gap.…
▽ More
Most prior methods for learning navigation policies require access to simulation environments, as they need online policy interaction and rely on ground-truth maps for rewards. However, building simulators is expensive (requires manual effort for each and every scene) and creates challenges in transferring learned policies to robotic platforms in the real-world, due to the sim-to-real domain gap. In this paper, we pose a simple question: Do we really need active interaction, ground-truth maps or even reinforcement-learning (RL) in order to solve the image-goal navigation task? We propose a self-supervised approach to learn to navigate from only passive videos of roaming. Our approach, No RL, No Simulator (NRNS), is simple and scalable, yet highly effective. NRNS outperforms RL-based formulations by a significant margin. We present NRNS as a strong baseline for any future image-based navigation tasks that use RL or Simulation.
△ Less
Submitted 22 October, 2021; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Intersection numbers on tropical Hassett spaces
Authors:
Marvin Anas Hahn,
Shiyue Li
Abstract:
We study the intersection of tropical psi-classes on tropical heavy/light Hassett spaces, generalising a result of Kerber--Markwig for tropical moduli spaces of rational stable curves with distinct marked points. Our computation reveals that the weight of a maximal cone in an intersection has a combinatorial intepretation in terms of the underlying tropical curve and it is always nonnegative. In p…
▽ More
We study the intersection of tropical psi-classes on tropical heavy/light Hassett spaces, generalising a result of Kerber--Markwig for tropical moduli spaces of rational stable curves with distinct marked points. Our computation reveals that the weight of a maximal cone in an intersection has a combinatorial intepretation in terms of the underlying tropical curve and it is always nonnegative. In particular, our result specialises to that, in top dimension, the tropical intersection product coincides with its classical counterpart.
△ Less
Submitted 17 August, 2022; v1 submitted 2 August, 2021;
originally announced August 2021.
-
Orders and Polytropes: Matrix Algebras from Valuations
Authors:
Yassine El Maazouz,
Marvin Anas Hahn,
Gabriele Nebe,
Mima Stanojkovski,
Bernd Sturmfels
Abstract:
We apply tropical geometry to study matrix algebras over a field with valuation. Using the shapes of min-max convexity, known as polytropes, we revisit the graduated orders introduced by Plesken and Zassenhaus. These are classified by the polytrope region. We advance the ideal theory of graduated orders by introducing their ideal class polytropes. This article emphasizes examples and computations.…
▽ More
We apply tropical geometry to study matrix algebras over a field with valuation. Using the shapes of min-max convexity, known as polytropes, we revisit the graduated orders introduced by Plesken and Zassenhaus. These are classified by the polytrope region. We advance the ideal theory of graduated orders by introducing their ideal class polytropes. This article emphasizes examples and computations. It offers first steps in the geometric combinatorics of endomorphism rings of configurations in affine buildings.
△ Less
Submitted 26 August, 2021; v1 submitted 1 July, 2021;
originally announced July 2021.
-
Mungojerrie: Reinforcement Learning of Linear-Time Objectives
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
Reinforcement learning synthesizes controllers without prior knowledge of the system. At each timestep, a reward is given. The controllers optimize the discounted sum of these rewards. Applying this class of algorithms requires designing a reward scheme, which is typically done manually. The designer must ensure that their intent is accurately captured. This may not be trivial, and is prone to err…
▽ More
Reinforcement learning synthesizes controllers without prior knowledge of the system. At each timestep, a reward is given. The controllers optimize the discounted sum of these rewards. Applying this class of algorithms requires designing a reward scheme, which is typically done manually. The designer must ensure that their intent is accurately captured. This may not be trivial, and is prone to error. An alternative to this manual programming, akin to programming directly in assembly, is to specify the objective in a formal language and have it "compiled" to a reward scheme. Mungojerrie (https://plv.colorado.edu/mungojerrie/) is a tool for testing reward schemes for $ω$-regular objectives on finite models. The tool contains reinforcement learning algorithms and a probabilistic model checker. Mungojerrie supports models specified in PRISM and $ω$-automata specified in HOA.
△ Less
Submitted 17 June, 2021; v1 submitted 16 June, 2021;
originally announced June 2021.
-
Model-free Reinforcement Learning for Branching Markov Decision Processes
Authors:
Ernst Moritz Hahn,
Mateo Perez,
Sven Schewe,
Fabio Somenzi,
Ashutosh Trivedi,
Dominik Wojtczak
Abstract:
We study reinforcement learning for the optimal control of Branching Markov Decision Processes (BMDPs), a natural extension of (multitype) Branching Markov Chains (BMCs). The state of a (discrete-time) BMCs is a collection of entities of various types that, while spawning other entities, generate a payoff. In comparison with BMCs, where the evolution of a each entity of the same type follows the s…
▽ More
We study reinforcement learning for the optimal control of Branching Markov Decision Processes (BMDPs), a natural extension of (multitype) Branching Markov Chains (BMCs). The state of a (discrete-time) BMCs is a collection of entities of various types that, while spawning other entities, generate a payoff. In comparison with BMCs, where the evolution of a each entity of the same type follows the same probabilistic pattern, BMDPs allow an external controller to pick from a range of options. This permits us to study the best/worst behaviour of the system. We generalise model-free reinforcement learning techniques to compute an optimal control strategy of an unknown BMDP in the limit. We present results of an implementation that demonstrate the practicality of the approach.
△ Less
Submitted 12 June, 2021;
originally announced June 2021.
-
Sensitivity as a Complexity Measure for Sequence Classification Tasks
Authors:
Michael Hahn,
Dan Jurafsky,
Richard Futrell
Abstract:
We introduce a theoretical framework for understanding and predicting the complexity of sequence classification tasks, using a novel extension of the theory of Boolean function sensitivity. The sensitivity of a function, given a distribution over input sequences, quantifies the number of disjoint subsets of the input sequence that can each be individually changed to change the output. We argue tha…
▽ More
We introduce a theoretical framework for understanding and predicting the complexity of sequence classification tasks, using a novel extension of the theory of Boolean function sensitivity. The sensitivity of a function, given a distribution over input sequences, quantifies the number of disjoint subsets of the input sequence that can each be individually changed to change the output. We argue that standard sequence classification methods are biased towards learning low-sensitivity functions, so that tasks requiring high sensitivity are more difficult. To that end, we show analytically that simple lexical classifiers can only express functions of bounded sensitivity, and we show empirically that low-sensitivity functions are easier to learn for LSTMs. We then estimate sensitivity on 15 NLP tasks, finding that sensitivity is higher on challenging tasks collected in GLUE than on simple text classification tasks, and that sensitivity predicts the performance both of simple lexical classifiers and of vanilla BiLSTMs without pretrained contextualized embeddings. Within a task, sensitivity predicts which inputs are hard for such simple models. Our results suggest that the success of massively pretrained contextual representations stems in part because they provide representations from which information can be extracted by low-sensitivity decoders.
△ Less
Submitted 20 April, 2021;
originally announced April 2021.
-
Valued rank-metric codes
Authors:
Yassine El Maazouz,
Marvin Anas Hahn,
Alessandro Neri,
Mima Stanojkovski
Abstract:
In this paper, we study linear spaces of matrices defined over discretely valued fields and discuss their dimension and minimal rank drops over the associated residue fields. To this end, we take first steps into the theory of rank-metric codes over discrete valuation rings by means of skew algebras derived from Galois extensions of rings. Additionally, we model projectivizations of rank-metric co…
▽ More
In this paper, we study linear spaces of matrices defined over discretely valued fields and discuss their dimension and minimal rank drops over the associated residue fields. To this end, we take first steps into the theory of rank-metric codes over discrete valuation rings by means of skew algebras derived from Galois extensions of rings. Additionally, we model projectivizations of rank-metric codes via Mustafin varieties, which we then employ to give sufficient conditions for a decrease in the dimension.
△ Less
Submitted 13 October, 2023; v1 submitted 7 April, 2021;
originally announced April 2021.
-
RadarScenes: A Real-World Radar Point Cloud Data Set for Automotive Applications
Authors:
Ole Schumann,
Markus Hahn,
Nicolas Scheiner,
Fabio Weishaupt,
Julius F. Tilly,
Jürgen Dickmann,
Christian Wöhler
Abstract:
A new automotive radar data set with measurements and point-wise annotations from more than four hours of driving is presented. Data provided by four series radar sensors mounted on one test vehicle were recorded and the individual detections of dynamic objects were manually grouped to clusters and labeled afterwards. The purpose of this data set is to enable the development of novel (machine lear…
▽ More
A new automotive radar data set with measurements and point-wise annotations from more than four hours of driving is presented. Data provided by four series radar sensors mounted on one test vehicle were recorded and the individual detections of dynamic objects were manually grouped to clusters and labeled afterwards. The purpose of this data set is to enable the development of novel (machine learning-based) radar perception algorithms with the focus on moving road users. Images of the recorded sequences were captured using a documentary camera. For the evaluation of future object detection and classification algorithms, proposals for score calculation are made so that researchers can evaluate their algorithms on a common basis. Additional information as well as download instructions can be found on the website of the data set: www.radar-scenes.com.
△ Less
Submitted 18 February, 2024; v1 submitted 6 April, 2021;
originally announced April 2021.