-
Compositional Models for Estimating Causal Effects
Authors:
Purva Pruthi,
David Jensen
Abstract:
Many real-world systems can be represented as sets of interacting components. Examples of such systems include computational systems such as query processors, natural systems such as cells, and social systems such as families. Many approaches have been proposed in traditional (associational) machine learning to model such structured systems, including statistical relational models and graph neural…
▽ More
Many real-world systems can be represented as sets of interacting components. Examples of such systems include computational systems such as query processors, natural systems such as cells, and social systems such as families. Many approaches have been proposed in traditional (associational) machine learning to model such structured systems, including statistical relational models and graph neural networks. Despite this prior work, existing approaches to estimating causal effects typically treat such systems as single units, represent them with a fixed set of variables and assume a homogeneous data-generating process. We study a compositional approach for estimating individual treatment effects (ITE) in structured systems, where each unit is represented by the composition of multiple heterogeneous components. This approach uses a modular architecture to model potential outcomes at each component and aggregates component-level potential outcomes to obtain the unit-level potential outcomes. We discover novel benefits of the compositional approach in causal inference - systematic generalization to estimate counterfactual outcomes of unseen combinations of components and improved overlap guarantees between treatment and control groups compared to the classical methods for causal effect estimation. We also introduce a set of novel environments for empirically evaluating the compositional approach and demonstrate the effectiveness of our approach using both simulated and real-world data.
△ Less
Submitted 25 June, 2024;
originally announced June 2024.
-
An 808 Line Phasor-Based Dehomogenisation Matlab Code For Multi-Scale Topology Optimisation
Authors:
Rebekka Varum Woldseth,
Ole Sigmund,
Peter Dørffler Ladegaard Jensen
Abstract:
This work presents an 808-line Matlab educational code for combined multi-scale topology optimisation and phasor-based dehomogenisation titled deHomTop808. The multi-scale formulation utilises homogenisation of optimal microstructures to facilitate efficient coarse-scale optimisation. Dehomogenisation allows for a high-resolution single-scale reconstruction of the optimised multi-scale structure,…
▽ More
This work presents an 808-line Matlab educational code for combined multi-scale topology optimisation and phasor-based dehomogenisation titled deHomTop808. The multi-scale formulation utilises homogenisation of optimal microstructures to facilitate efficient coarse-scale optimisation. Dehomogenisation allows for a high-resolution single-scale reconstruction of the optimised multi-scale structure, achieving minor losses in structural performance, at a fraction of the computational cost, compared to its large-scale topology optimisation counterpart. The presented code utilises stiffness optimal Rank-2 microstructures to minimise the compliance of a single-load case problem, subject to a volume fraction constraint. By exploiting the inherent efficiency benefits of the phasor-based dehomogenisation procedure, on-the-fly dehomogenisation to a single-scale structure is obtained. The presented code includes procedures for structural verification of the final dehomogenised structure by comparison to the multi-scale solution. The code is introduced in terms of the underlying theory and its major components, including examples and potential extensions, and can be downloaded from https://github.com/peterdorffler/deHomTop808.git.
△ Less
Submitted 24 May, 2024; v1 submitted 23 May, 2024;
originally announced May 2024.
-
On the Gonality of Ferrers Rook Graphs
Authors:
David Jensen,
Marissa Morvai,
William Welch,
Sydney Yeomans
Abstract:
A Ferrers rook graph is a graph whose vertices correspond to the dots in a Ferrers diagram, and where two vertices are adjacent if they are in the same row or the same column. We propose a conjectural formula for the gonality of Ferrers rook graphs, and prove this conjecture for a few infinite families of Ferrers diagrams. We also prove the conjecture for all Ferrers diagrams $F$ with…
▽ More
A Ferrers rook graph is a graph whose vertices correspond to the dots in a Ferrers diagram, and where two vertices are adjacent if they are in the same row or the same column. We propose a conjectural formula for the gonality of Ferrers rook graphs, and prove this conjecture for a few infinite families of Ferrers diagrams. We also prove the conjecture for all Ferrers diagrams $F$ with $|F| \leq 8$.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Automated Discovery of Functional Actual Causes in Complex Environments
Authors:
Caleb Chuck,
Sankaran Vaidyanathan,
Stephen Giguere,
Amy Zhang,
David Jensen,
Scott Niekum
Abstract:
Reinforcement learning (RL) algorithms often struggle to learn policies that generalize to novel situations due to issues such as causal confusion, overfitting to irrelevant factors, and failure to isolate control of state factors. These issues stem from a common source: a failure to accurately identify and exploit state-specific causal relationships in the environment. While some prior works in R…
▽ More
Reinforcement learning (RL) algorithms often struggle to learn policies that generalize to novel situations due to issues such as causal confusion, overfitting to irrelevant factors, and failure to isolate control of state factors. These issues stem from a common source: a failure to accurately identify and exploit state-specific causal relationships in the environment. While some prior works in RL aim to identify these relationships explicitly, they rely on informal domain-specific heuristics such as spatial and temporal proximity. Actual causality offers a principled and general framework for determining the causes of particular events. However, existing definitions of actual cause often attribute causality to a large number of events, even if many of them rarely influence the outcome. Prior work on actual causality proposes normality as a solution to this problem, but its existing implementations are challenging to scale to complex and continuous-valued RL environments. This paper introduces functional actual cause (FAC), a framework that uses context-specific independencies in the environment to restrict the set of actual causes. We additionally introduce Joint Optimization for Actual Cause Inference (JACI), an algorithm that learns from observational data to infer functional actual causes. We demonstrate empirically that FAC agrees with known results on a suite of examples from the actual causality literature, and JACI identifies actual causes with significantly higher accuracy than existing heuristic methods in a set of complex, continuous-valued environments.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Beyond Point Masses. II. Non-Keplerian Shape Effects are Detectable in Several TNO Binaries
Authors:
Benjamin C. N. Proudfoot,
Darin A. Ragozzine,
Meagan L. Thatcher,
Will Grundy,
Dallin J. Spencer,
Tahina M. Alailima,
Sawyer Allen,
Penelope C. Bowden,
Susanne Byrd,
Conner D. Camacho,
Gibson H. Campbell,
Edison P. Carlisle,
Jacob A. Christensen,
Noah K. Christensen,
Kaelyn Clement,
Benjamin J. Derieg,
Mara K. Dille,
Cristian Dorrett,
Abigail L. Ellefson,
Taylor S. Fleming,
N. J. Freeman,
Ethan J. Gibson,
William G. Giforos,
Jacob A. Guerrette,
Olivia Haddock
, et al. (38 additional authors not shown)
Abstract:
About 40 transneptunian binaries (TNBs) have fully determined orbits with about 10 others being solved except for breaking the mirror ambiguity. Despite decades of study almost all TNBs have only ever been analyzed with a model that assumes perfect Keplerian motion (e.g., two point masses). In reality, all TNB systems are non-Keplerian due to non-spherical shapes, possible presence of undetected s…
▽ More
About 40 transneptunian binaries (TNBs) have fully determined orbits with about 10 others being solved except for breaking the mirror ambiguity. Despite decades of study almost all TNBs have only ever been analyzed with a model that assumes perfect Keplerian motion (e.g., two point masses). In reality, all TNB systems are non-Keplerian due to non-spherical shapes, possible presence of undetected system components, and/or solar perturbations. In this work, we focus on identifying candidates for detectable non-Keplerian motion based on sample of 45 well-characterized binaries. We use MultiMoon, a non-Keplerian Bayesian inference tool, to analyze published relative astrometry allowing for non-spherical shapes of each TNB system's primary. We first reproduce the results of previous Keplerian fitting efforts with MultiMoon, which serves as a comparison for the non-Keplerian fits and confirms that these fits are not biased by the assumption of a Keplerian orbit. We unambiguously detect non-Keplerian motion in 8 TNB systems across a range of primary radii, mutual orbit separations, and system masses. As a proof of concept for non-Keplerian fitting, we perform detailed fits for (66652) Borasisi-Pabu, possibly revealing a $J_2 \approx 0.44$, implying Borasisi (and/or Pabu) may be a contact binary or an unresolved compact binary. However, full confirmation of this result will require new observations. This work begins the next generation of TNB analyses that go beyond the point mass assumption to provide unique and valuable information on the physical properties of TNBs with implications for their formation and evolution.
△ Less
Submitted 19 March, 2024;
originally announced March 2024.
-
Algorithmic Robustness
Authors:
David Jensen,
Brian LaMacchia,
Ufuk Topcu,
Pamela Wisniewski
Abstract:
Algorithmic robustness refers to the sustained performance of a computational system in the face of change in the nature of the environment in which that system operates or in the task that the system is meant to perform. Below, we motivate the importance of algorithmic robustness, present a conceptual framework, and highlight the relevant areas of research for which algorithmic robustness is rele…
▽ More
Algorithmic robustness refers to the sustained performance of a computational system in the face of change in the nature of the environment in which that system operates or in the task that the system is meant to perform. Below, we motivate the importance of algorithmic robustness, present a conceptual framework, and highlight the relevant areas of research for which algorithmic robustness is relevant. Why robustness? Robustness is an important enabler of other goals that are frequently cited in the context of public policy decisions about computational systems, including trustworthiness, accountability, fairness, and safety. Despite this dependence, it tends to be under-recognized compared to these other concepts. This is unfortunate, because robustness is often more immediately achievable than these other ultimate goals, which can be more subjective and exacting. Thus, we highlight robustness as an important goal for researchers, engineers, regulators, and policymakers when considering the design, implementation, and deployment of computational systems. We urge researchers and practitioners to elevate the attention paid to robustness when designing and evaluating computational systems. For many key systems, the immediate question after any demonstration of high performance should be: "How robust is that performance to realistic changes in the task or environment?" Greater robustness will set the stage for systems that are more trustworthy, accountable, fair, and safe. Toward that end, this document provides a brief roadmap to some of the concepts and existing research around the idea of algorithmic robustness.
△ Less
Submitted 17 October, 2023;
originally announced November 2023.
-
Efficient Inverse-designed Structural Infill for Complex Engineering Structures
Authors:
Peter Dørffler Ladegaard Jensen,
Tim Felle Olsen,
J. Andreas Bærentzen,
Niels Aage,
Ole Sigmund
Abstract:
Inverse design of high-resolution and fine-detailed 3D lightweight mechanical structures is notoriously expensive due to the need for vast computational resources and the use of very fine-scaled complex meshes. Furthermore, in designing for additive manufacturing, infill is often neglected as a component of the optimized structure. In this paper, both concerns are addressed using a de-homogenizati…
▽ More
Inverse design of high-resolution and fine-detailed 3D lightweight mechanical structures is notoriously expensive due to the need for vast computational resources and the use of very fine-scaled complex meshes. Furthermore, in designing for additive manufacturing, infill is often neglected as a component of the optimized structure. In this paper, both concerns are addressed using a de-homogenization topology optimization procedure on complex engineering structures discretized by 3D unstructured hexahedrals.
Using a rectangular-hole microstructure (reminiscent to the stiffness optimal orthogonal rank-3 multi-scale) as a base material for the multi-scale optimization, a coarse-scale optimized geometry can be obtained using homogenization-based topology optimization. Due to the microstructure periodicity, this coarse-scale geometry can be up-sampled to a fine physical geometry with optimized infill, with minor loss in structural performance and at a fraction of the cost of a fine-scale solution. The upsampling on 3D unstructured grids is achieved through stream surface tracing which aligns with the optimized local orientation. The periodicity of the physical geometry can be tuned, such that the material serves as a structural component and also as an efficient infill for additive manufacturing designs.
The method is demonstrated through three examples. It achieves comparable structural performance to state-of-the-art methods but stands out for its significant computational time reduction, much faster than the base-line method. By allowing multiple active layers, the mapped solution becomes more mechanically stable, leading to an increased critical buckling load factor without additional computational expense. The proposed approach achieves promising results, benchmarking against large-scale SIMP models demonstrates computational efficiency improvements of up to 250 times.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
On the Semigroup of Graph Gonality Sequences
Authors:
Austin Fessler,
David Jensen,
Elizabeth Kelsey,
Noah Owen
Abstract:
The $r$th gonality of a graph is the smallest degree of a divisor on the graph with rank $r$. The gonality sequence of a graph is a tropical analogue of the gonality sequence of an algebraic curve. We show that the set of truncated gonality sequences of graphs forms a semigroup under addition. Using this, we study which triples $(x,y,z)$ can be the first 3 terms of a graph gonality sequence. We sh…
▽ More
The $r$th gonality of a graph is the smallest degree of a divisor on the graph with rank $r$. The gonality sequence of a graph is a tropical analogue of the gonality sequence of an algebraic curve. We show that the set of truncated gonality sequences of graphs forms a semigroup under addition. Using this, we study which triples $(x,y,z)$ can be the first 3 terms of a graph gonality sequence. We show that nearly every such triple with $z \geq \frac{3}{2}x+2$ is the first three terms of a graph gonality sequence, and also exhibit triples where the ratio $\frac{z}{x}$ is an arbitrary rational number between 1 and 3. In the final section, we study algebraic curves whose $r$th and $(r+1)$st gonality differ by 1, and posit several questions about graphs with this property.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
The embedding theorem in Hurwitz-Brill-Noether Theory
Authors:
Kaelin Cook-Powell,
David Jensen,
Eric Larson,
Hannah Larson,
Isabel Vogt
Abstract:
We generalize the Embedding Theorem of Eisenbud-Harris from classical Brill-Noether theory to the setting of Hurwitz-Brill-Noether theory.
More precisely, in classical Brill-Noether theory, the embedding theorem states that a general linear series of degree d and rank r on a general curve of genus g is an embedding if r is at least 3. If \(f \colon C \to \mathbb{P}^1\) is a general cover of degr…
▽ More
We generalize the Embedding Theorem of Eisenbud-Harris from classical Brill-Noether theory to the setting of Hurwitz-Brill-Noether theory.
More precisely, in classical Brill-Noether theory, the embedding theorem states that a general linear series of degree d and rank r on a general curve of genus g is an embedding if r is at least 3. If \(f \colon C \to \mathbb{P}^1\) is a general cover of degree k, and L is a line bundle on C, recent work of the authors shows that the splitting type of \(f_* L\) provides the appropriate generalization of the pair (r, d) in classical Brill--Noether theory.
In the context of Hurwitz-Brill-Noether theory, the condition that r is at least 3 is no longer sufficient to guarantee that a general such linear series is an embedding. We show that the additional condition needed to guarantee that a general linear series |L| is an embedding is that the splitting type of \(f_* L\) has at least three nonnegative parts. This new extra condition reflects the unique geometry of k-gonal curves, which lie on scrolls in \(\mathbb{P}^r\).
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Autonomous Restructuring of Asteroids into Rotating Space Stations
Authors:
David W. Jensen
Abstract:
Asteroid restructuring uses robotics, self replication, and mechanical automatons to autonomously restructure an asteroid into a large rotating space station. The restructuring process makes structures from asteroid oxide materials; uses productive self-replication to make replicators, helpers, and products; and creates a multiple floor station to support a large population. In an example simulati…
▽ More
Asteroid restructuring uses robotics, self replication, and mechanical automatons to autonomously restructure an asteroid into a large rotating space station. The restructuring process makes structures from asteroid oxide materials; uses productive self-replication to make replicators, helpers, and products; and creates a multiple floor station to support a large population. In an example simulation, it takes 12 years to autonomously restructure a large asteroid into the space station. This is accomplished with a single rocket launch. The single payload contains a base station, 4 robots (spiders), and a modest set of supplies. Our simulation creates 3000 spiders and over 23,500 other pieces of equipment. Only the base station and spiders (replicators) have advanced microprocessors and algorithms. These represent 21st century technologies created and trans-ported from Earth. The equipment and tools are built using in-situ materials and represent 18th or 19th century technologies. The equipment and tools (helpers) have simple mechanical programs to perform repetitive tasks. The resulting example station would be a rotating framework almost 5 kilometers in diameter. Once completed, it could support a population of over 700,000 people. Many researchers identify the high launch costs, the harsh space environment, and the lack of gravity as the key obstacles hindering the development of space stations. The single probe addresses the high launch cost. The autonomous construction eliminates the harsh space environment for construction crews. The completed rotating station provides radiation protection and centripetal gravity for the first work crews and colonists.
△ Less
Submitted 27 November, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS
Authors:
Rishikesh Sahay,
D. A. Sepulveda Estay,
Weizhi Meng,
Christian D. Jensen,
Michael Bruhn Barfod
Abstract:
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have bee…
▽ More
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have been proposed to carry out these analyses. This paper evaluates and compares the application of three risk assessment methodologies: system theoretic process analysis (STPA-Sec), STRIDE and CORAS for identifying threats and vulnerabilities in a CyberShip system. We specifically selected these three methodologies because they identify threats not only at the component level, but also threats or hazards caused due to the interaction between components, resulting in sets of threats identified with each methodology and relevant differences. Moreover, STPA-Sec which is a variant of the STPA is widely used for safety and security analysis of cyber physical systems (CPS); CORAS offers a framework to perform cyber risk assessment in a top-down approach that aligns with STPA-Sec; and STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, Elevation of Privilege) considers threat at the component level as well as during the interaction that is similar to STPA-Sec. As a result of this analysis, this paper highlights the pros and cons of these methodologies, illustrates areas of special applicability, and suggests that their complementary use as threats identified through STRIDE can be used as an input to CORAS and STPA-Sec to make these methods more structured.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Improving the Efficiency of the PC Algorithm by Using Model-Based Conditional Independence Tests
Authors:
Erica Cai,
Andrew McGregor,
David Jensen
Abstract:
Learning causal structure is useful in many areas of artificial intelligence, including planning, robotics, and explanation. Constraint-based structure learning algorithms such as PC use conditional independence (CI) tests to infer causal structure. Traditionally, constraint-based algorithms perform CI tests with a preference for smaller-sized conditioning sets, partially because the statistical p…
▽ More
Learning causal structure is useful in many areas of artificial intelligence, including planning, robotics, and explanation. Constraint-based structure learning algorithms such as PC use conditional independence (CI) tests to infer causal structure. Traditionally, constraint-based algorithms perform CI tests with a preference for smaller-sized conditioning sets, partially because the statistical power of conventional CI tests declines rapidly as the size of the conditioning set increases. However, many modern conditional independence tests are model-based, and these tests use well-regularized models that maintain statistical power even with very large conditioning sets. This suggests an intriguing new strategy for constraint-based algorithms which may result in a reduction of the total number of CI tests performed: Test variable pairs with large conditioning sets first, as a pre-processing step that finds some conditional independencies quickly, before moving on to the more conventional strategy that favors small conditioning sets. We propose such a pre-processing step for the PC algorithm which relies on performing CI tests on a few randomly selected large conditioning sets. We perform an empirical analysis on directed acyclic graphs (DAGs) that correspond to real-world systems and both empirical and theoretical analyses for Erdős-Renyi DAGs. Our results show that Pre-Processing Plus PC (P3PC) performs far fewer CI tests than the original PC algorithm, between 0.5% to 36%, and often less than 10%, of the CI tests that the PC algorithm alone performs. The efficiency gains are particularly significant for the DAGs corresponding to real-world systems.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Sliding Block Puzzles with a Twist: On Segerman's 15+4 Puzzle
Authors:
Patrick Garcia,
Angela Hanson,
David Jensen,
Noah Owen
Abstract:
Segerman's 15+4 puzzle is a hinged version of the classic 15-puzzle, in which the tiles rotate as they slide around. In 1974, Wilson classified the groups of solutions to sliding block puzzles. We generalize Wilson's result to puzzles like the 15+4 puzzle, where the tiles can rotate, and the sets of solutions are subgroups of the generalized symmetric groups. Aside from two exceptional cases, we s…
▽ More
Segerman's 15+4 puzzle is a hinged version of the classic 15-puzzle, in which the tiles rotate as they slide around. In 1974, Wilson classified the groups of solutions to sliding block puzzles. We generalize Wilson's result to puzzles like the 15+4 puzzle, where the tiles can rotate, and the sets of solutions are subgroups of the generalized symmetric groups. Aside from two exceptional cases, we see that the group of solutions to such a puzzle is always either the entire generalized symmetric group or one of two special subgroups of index two.
△ Less
Submitted 30 October, 2022;
originally announced October 2022.
-
Tropical Linear Series and Tropical Independence
Authors:
David Jensen,
Sam Payne
Abstract:
We propose a definition of tropical linear series that isolates some of the essential combinatorial properties of tropicalizations of not-necessarily-complete linear series on algebraic curves. The definition combines the Baker-Norine notion of rank with the notion of tropical independence and has the property that the restriction of a tropical linear series of rank r to a connected subgraph is a…
▽ More
We propose a definition of tropical linear series that isolates some of the essential combinatorial properties of tropicalizations of not-necessarily-complete linear series on algebraic curves. The definition combines the Baker-Norine notion of rank with the notion of tropical independence and has the property that the restriction of a tropical linear series of rank r to a connected subgraph is a tropical linear series of rank r. We show that tropical linear series of rank 1 are finitely generated as tropical modules and state a number of open problems related to algebraic, combinatorial, and topological properties of higher rank tropical linear series
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Measuring Interventional Robustness in Reinforcement Learning
Authors:
Katherine Avery,
Jack Kenney,
Pracheta Amaranath,
Erica Cai,
David Jensen
Abstract:
Recent work in reinforcement learning has focused on several characteristics of learned policies that go beyond maximizing reward. These properties include fairness, explainability, generalization, and robustness. In this paper, we define interventional robustness (IR), a measure of how much variability is introduced into learned policies by incidental aspects of the training procedure, such as th…
▽ More
Recent work in reinforcement learning has focused on several characteristics of learned policies that go beyond maximizing reward. These properties include fairness, explainability, generalization, and robustness. In this paper, we define interventional robustness (IR), a measure of how much variability is introduced into learned policies by incidental aspects of the training procedure, such as the order of training data or the particular exploratory actions taken by agents. A training procedure has high IR when the agents it produces take very similar actions under intervention, despite variation in these incidental aspects of the training procedure. We develop an intuitive, quantitative measure of IR and calculate it for eight algorithms in three Atari environments across dozens of interventions and states. From these experiments, we find that IR varies with the amount of training and type of algorithm and that high performance does not imply high IR, as one might expect.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Inferred Properties of Planets in Mean-Motion Resonances are Biased by Measurement Noise
Authors:
David Jensen,
Sarah C. Millholland
Abstract:
Planetary systems with mean-motion resonances (MMRs) hold special value in terms of their dynamical complexity and their capacity to constrain planet formation and migration histories. The key towards making these connections, however, is to have a reliable characterization of the resonant dynamics, especially the so-called "libration amplitude", which qualitatively measures how deep the system is…
▽ More
Planetary systems with mean-motion resonances (MMRs) hold special value in terms of their dynamical complexity and their capacity to constrain planet formation and migration histories. The key towards making these connections, however, is to have a reliable characterization of the resonant dynamics, especially the so-called "libration amplitude", which qualitatively measures how deep the system is into the resonance. In this work, we identify an important complication with the interpretation of libration amplitude estimates from observational data of resonant systems. Specifically, we show that measurement noise causes inferences of the libration amplitude to be systematically biased to larger values, with noisier data yielding a larger bias. We demonstrated this through multiple approaches, including using dynamical fits of synthetic radial velocity data to explore how the the libration amplitude distribution inferred from the posterior parameter distribution varies with the degree of measurement noise. We find that even modest levels of noise still result in a slight bias. The origin of the bias stems from the topology of the resonant phase space and the fact that the available phase space volume increases non-uniformly with increasing libration amplitude. We highlight strategies for mitigating the bias through the usage of particular priors. Our results imply that many known resonant systems are likely deeper in resonance than previously appreciated.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Recent Developments in Brill-Noether Theory
Authors:
David Jensen,
Sam Payne
Abstract:
We briefly survey recent results related to linear series on curves that are general in various moduli spaces, highlighting the interplay between algebraic geometry on a general curve and the combinatorics of its degenerations. Breakthroughs include the proof of the Maximal Rank Theorem, which determines the Hilbert function of the general linear series of given degree and rank on the general curv…
▽ More
We briefly survey recent results related to linear series on curves that are general in various moduli spaces, highlighting the interplay between algebraic geometry on a general curve and the combinatorics of its degenerations. Breakthroughs include the proof of the Maximal Rank Theorem, which determines the Hilbert function of the general linear series of given degree and rank on the general curve in M_g, and complete analogs of the standard Brill-Noether theorems for curves that are general in Hurwitz spaces. Other advances include partial results in a similar direction for linear series in the Prym locus of a general unramified double cover of a general k-gonal curve and instances of the Strong Maximal Rank Conjecture.
△ Less
Submitted 30 October, 2021;
originally announced November 2021.
-
The non-abelian Brill-Noether divisor on $\overline{\mathcal{M}}_{13}$ and the Kodaira dimension of $\overline{\mathcal{R}}_{13}$
Authors:
Gavril Farkas,
Dave Jensen,
Sam Payne
Abstract:
The paper is devoted to highlighting several novel aspects of the moduli space of curves of genus 13, the first genus g where phenomena related to K3 surfaces no longer govern the birational geometry of M_g. We compute the class of the non-abelian Brill-Noether divisor on M_13 of curves that have a stable rank 2 vector bundle with many sections. This provides the first example of an effective divi…
▽ More
The paper is devoted to highlighting several novel aspects of the moduli space of curves of genus 13, the first genus g where phenomena related to K3 surfaces no longer govern the birational geometry of M_g. We compute the class of the non-abelian Brill-Noether divisor on M_13 of curves that have a stable rank 2 vector bundle with many sections. This provides the first example of an effective divisor on M_g with slope less than 6+10/g. Earlier work on the Slope Conjecture suggested that such divisors may not exist. The main geometric application of our result is a proof that the Prym moduli space of genus 13 is of general type. Among other things, we also prove the Bertram-Feinberg-Mukai and the Strong Maximal Rank Conjectures on M_13
△ Less
Submitted 6 July, 2022; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Measurement of the ($π^-$, Ar) total hadronic cross section at the LArIAT experiment
Authors:
E. Gramellini,
J. Ho,
R. Acciarri,
C. Adams,
J. Asaadi,
M. Backfish,
W. Badgett,
B. Baller,
V. Basque,
O. Benevides Rodrigues,
F. d. M. Blaszczyk,
R. Bouabid,
C. Bromberg,
R. Carey,
R. Castillo Fernandez,
F. Cavanna,
J. I. Cevallos Aleman,
A. Chatterjee,
P. Dedin,
M. V. dos Santos,
D. Edmunds,
C. Escobar,
J. Esquivel,
J. J. Evans,
A. Falcone
, et al. (73 additional authors not shown)
Abstract:
We present the first measurement of the negative pion total hadronic cross section on argon, which we performed at the Liquid Argon In A Testbeam (LArIAT) experiment. All hadronic reaction channels, as well as hadronic elastic interactions with scattering angle greater than 5~degrees are included. The pions have a kinetic energies in the range 100-700~MeV and are produced by a beam of charged part…
▽ More
We present the first measurement of the negative pion total hadronic cross section on argon, which we performed at the Liquid Argon In A Testbeam (LArIAT) experiment. All hadronic reaction channels, as well as hadronic elastic interactions with scattering angle greater than 5~degrees are included. The pions have a kinetic energies in the range 100-700~MeV and are produced by a beam of charged particles im**ing on a solid target at the Fermilab Test Beam Facility. LArIAT employs a 0.24~ton active mass Liquid Argon Time Projection Chamber (LArTPC) to measure the pion hadronic interactions. For this measurement, LArIAT has developed the ``thin slice method", a new technique to measure cross sections with LArTPCs. While generally higher than the prediction, our measurement of the ($π^-$,Ar) total hadronic cross section is in agreement with the prediction of the Geant4 model when considering a model uncertainty of $\sim$5.1\%.
△ Less
Submitted 7 July, 2022; v1 submitted 30 July, 2021;
originally announced August 2021.
-
Brittle AI, Causal Confusion, and Bad Mental Models: Challenges and Successes in the XAI Program
Authors:
Jeff Druce,
James Niehaus,
Vanessa Moody,
David Jensen,
Michael L. Littman
Abstract:
The advances in artificial intelligence enabled by deep learning architectures are undeniable. In several cases, deep neural network driven models have surpassed human level performance in benchmark autonomy tasks. The underlying policies for these agents, however, are not easily interpretable. In fact, given their underlying deep models, it is impossible to directly understand the map** from ob…
▽ More
The advances in artificial intelligence enabled by deep learning architectures are undeniable. In several cases, deep neural network driven models have surpassed human level performance in benchmark autonomy tasks. The underlying policies for these agents, however, are not easily interpretable. In fact, given their underlying deep models, it is impossible to directly understand the map** from observations to actions for any reasonably complex agent. Producing this supporting technology to "open the black box" of these AI systems, while not sacrificing performance, was the fundamental goal of the DARPA XAI program. In our journey through this program, we have several "big picture" takeaways: 1) Explanations need to be highly tailored to their scenario; 2) many seemingly high performing RL agents are extremely brittle and are not amendable to explanation; 3) causal models allow for rich explanations, but how to present them isn't always straightforward; and 4) human subjects conjure fantastically wrong mental models for AIs, and these models are often hard to break. This paper discusses the origins of these takeaways, provides amplifying information, and suggestions for future work.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
SBI: A Simulation-Based Test of Identifiability for Bayesian Causal Inference
Authors:
Sam Witty,
David Jensen,
Vikash Mansinghka
Abstract:
A growing family of approaches to causal inference rely on Bayesian formulations of assumptions that go beyond causal graph structure. For example, Bayesian approaches have been developed for analyzing instrumental variable designs, regression discontinuity designs, and within-subjects designs. This paper introduces simulation-based identifiability (SBI), a procedure for testing the identifiabilit…
▽ More
A growing family of approaches to causal inference rely on Bayesian formulations of assumptions that go beyond causal graph structure. For example, Bayesian approaches have been developed for analyzing instrumental variable designs, regression discontinuity designs, and within-subjects designs. This paper introduces simulation-based identifiability (SBI), a procedure for testing the identifiability of queries in Bayesian causal inference approaches that are implemented as probabilistic programs. SBI complements analytical approaches to identifiability, leveraging a particle-based optimization scheme on simulated data to determine identifiability for analytically intractable models. We analyze SBI's soundness for a broad class of differentiable, finite-dimensional probabilistic programs with bounded effects. Finally, we provide an implementation of SBI using stochastic gradient descent, and show empirically that it agrees with known identification results on a suite of graph-based and quasi-experimental design benchmarks, including those using Gaussian processes.
△ Less
Submitted 31 October, 2022; v1 submitted 23 February, 2021;
originally announced February 2021.
-
Preserving Privacy in Personalized Models for Distributed Mobile Services
Authors:
Akanksha Atrey,
Prashant Shenoy,
David Jensen
Abstract:
The ubiquity of mobile devices has led to the proliferation of mobile services that provide personalized and context-aware content to their users. Modern mobile services are distributed between end-devices, such as smartphones, and remote servers that reside in the cloud. Such services thrive on their ability to predict future contexts to pre-fetch content or make context-specific recommendations.…
▽ More
The ubiquity of mobile devices has led to the proliferation of mobile services that provide personalized and context-aware content to their users. Modern mobile services are distributed between end-devices, such as smartphones, and remote servers that reside in the cloud. Such services thrive on their ability to predict future contexts to pre-fetch content or make context-specific recommendations. An increasingly common method to predict future contexts, such as location, is via machine learning (ML) models. Recent work in context prediction has focused on ML model personalization where a personalized model is learned for each individual user in order to tailor predictions or recommendations to a user's mobile behavior. While the use of personalized models increases efficacy of the mobile service, we argue that it increases privacy risk since a personalized model encodes contextual behavior unique to each user. To demonstrate these privacy risks, we present several attribute inference-based privacy attacks and show that such attacks can leak privacy with up to 78% efficacy for top-3 predictions. We present Pelican, a privacy-preserving personalization system for context-aware mobile services that leverages both device and cloud resources to personalize ML models while minimizing the risk of privacy leakage for users. We evaluate Pelican using real world traces for location-aware mobile services and show that Pelican can substantially reduce privacy leakage by up to 75%.
△ Less
Submitted 21 April, 2021; v1 submitted 14 January, 2021;
originally announced January 2021.
-
Comprehensive Energy Balance Analysis of Photon-Enhanced Thermionic Power Generation Considering Concentrated Solar Absorption Distribution
Authors:
A. N. M. Taufiq Elahi,
Mohammad Ghashami,
Devon Jensen,
Keunhan Park
Abstract:
The present article reports a comprehensive energy balance analysis of a photon-enhanced thermionic emission (PETE) device when it is used for concentrated solar power (CSP) generation. To this end, we consider a realistic PETE device composed of a boron-doped silicon emitter on glass and a phosphorus-doped diamond collector on tungsten separated by the inter-electrode vacuum gap. Depth-dependent…
▽ More
The present article reports a comprehensive energy balance analysis of a photon-enhanced thermionic emission (PETE) device when it is used for concentrated solar power (CSP) generation. To this end, we consider a realistic PETE device composed of a boron-doped silicon emitter on glass and a phosphorus-doped diamond collector on tungsten separated by the inter-electrode vacuum gap. Depth-dependent spectral solar absorption and its photovoltaic and photothermal energy conversion processes are rigorously calculated to predict the PETE power output and energy conversion efficiency. Our calculation predicts that when optimized, the power output of the considered PETE device can reach 1.6 W/cm$^2$ with the energy conversion efficiency of $\sim$18 \% for 100$\times$ solar concentration, which is substantially lower than those predicted in previous works under ideal conditions. In addition, the photon-enhancement ratio is lower than 10 and decreases with the increasing solar concentration due to the photothermal heating of the emitter, suggesting that PETE may be an adequate energy conversion process for low-to-medium CSP below $\sim$100$\times$ concentration. These observations signify the importance of a rigorous energy balance analysis based on spectral and spatial solar absorption distribution for the accurate prediction of PETE power generation.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
How and Why to Use Experimental Data to Evaluate Methods for Observational Causal Inference
Authors:
Amanda Gentzel,
Purva Pruthi,
David Jensen
Abstract:
Methods that infer causal dependence from observational data are central to many areas of science, including medicine, economics, and the social sciences. A variety of theoretical properties of these methods have been proven, but empirical evaluation remains a challenge, largely due to the lack of observational data sets for which treatment effect is known. We describe and analyze observational sa…
▽ More
Methods that infer causal dependence from observational data are central to many areas of science, including medicine, economics, and the social sciences. A variety of theoretical properties of these methods have been proven, but empirical evaluation remains a challenge, largely due to the lack of observational data sets for which treatment effect is known. We describe and analyze observational sampling from randomized controlled trials (OSRCT), a method for evaluating causal inference methods using data from randomized controlled trials (RCTs). This method can be used to create constructed observational data sets with corresponding unbiased estimates of treatment effect, substantially increasing the number of data sets available for empirical evaluation of causal inference methods. We show that, in expectation, OSRCT creates data sets that are equivalent to those produced by randomly sampling from empirical data sets in which all potential outcomes are available. We then perform a large-scale evaluation of seven causal inference methods over 37 data sets, drawn from RCTs, as well as simulators, real-world computational systems, and observational data sets augmented with a synthetic response variable. We find notable performance differences when comparing across data from different sources, demonstrating the importance of using data from a variety of sources when evaluating any causal inference method.
△ Less
Submitted 7 July, 2021; v1 submitted 6 October, 2020;
originally announced October 2020.
-
Tropical Methods in Hurwitz-Brill-Noether Theory
Authors:
Kaelin Cook-Powell,
David Jensen
Abstract:
Splitting type loci are the natural generalizations of Brill-Noether varieties for curves with a distinguished map to the projective line. We give a tropical proof of a theorem of H. Larson, showing that splitting type loci have the expected dimension for general elements of the Hurwitz space. Our proof uses an explicit description of splitting type loci on a certain family of tropical curves. We…
▽ More
Splitting type loci are the natural generalizations of Brill-Noether varieties for curves with a distinguished map to the projective line. We give a tropical proof of a theorem of H. Larson, showing that splitting type loci have the expected dimension for general elements of the Hurwitz space. Our proof uses an explicit description of splitting type loci on a certain family of tropical curves. We further show that these tropical splitting type loci are connected in codimension one, and describe an algorithm for computing their cardinality when they are zero-dimensional. We provide a conjecture for the numerical class of splitting type loci, which we confirm in a number of cases.
△ Less
Submitted 27 July, 2020;
originally announced July 2020.
-
Causal Inference using Gaussian Processes with Structured Latent Confounders
Authors:
Sam Witty,
Kenta Takatsu,
David Jensen,
Vikash Mansinghka
Abstract:
Latent confounders---unobserved variables that influence both treatment and outcome---can bias estimates of causal effects. In some cases, these confounders are shared across observations, e.g. all students taking a course are influenced by the course's difficulty in addition to any educational interventions they receive individually. This paper shows how to semiparametrically model latent confoun…
▽ More
Latent confounders---unobserved variables that influence both treatment and outcome---can bias estimates of causal effects. In some cases, these confounders are shared across observations, e.g. all students taking a course are influenced by the course's difficulty in addition to any educational interventions they receive individually. This paper shows how to semiparametrically model latent confounders that have this structure and thereby improve estimates of causal effects. The key innovations are a hierarchical Bayesian model, Gaussian processes with structured latent confounders (GP-SLC), and a Monte Carlo inference algorithm for this model based on elliptical slice sampling. GP-SLC provides principled Bayesian uncertainty estimates of individual treatment effect with minimal assumptions about the functional forms relating confounders, covariates, treatment, and outcome. Finally, this paper shows GP-SLC is competitive with or more accurate than widely used causal inference techniques on three benchmark datasets, including the Infant Health and Development Program and a dataset showing the effect of changing temperatures on state-wide energy consumption across New England.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Review of the First Charged-Particle Transport Coefficient Comparison Workshop
Authors:
P. E. Grabowski,
S. B. Hansen,
M. S. Murillo,
L. G. Stanton,
F. R. Graziani,
A. B. Zylstra,
S. D. Baalrud,
P. Arnault,
A. D. Baczewski,
L. X. Benedict,
C. Blancard,
O. Certik,
J. Clerouin,
L. A. Collins,
S. Copeland,
A. A. Correa,
J. Dai,
J. Daligault,
M. P. Desjarlais,
M. W. C. Dharma-wardana,
G. Faussurier,
J. Haack,
T. Haxhimali,
A. Hayes-Sterbenz,
Y. Hou
, et al. (20 additional authors not shown)
Abstract:
We present the results of the first Charged-Particle Transport Coefficient Code Comparison Workshop, which was held in Albuquerque, NM October 4-6, 2016. In this first workshop, scientists from eight institutions and four countries gathered to compare calculations of transport coefficients including thermal and electrical conduction, electron-ion coupling, inter-ion diffusion, ion viscosity, and c…
▽ More
We present the results of the first Charged-Particle Transport Coefficient Code Comparison Workshop, which was held in Albuquerque, NM October 4-6, 2016. In this first workshop, scientists from eight institutions and four countries gathered to compare calculations of transport coefficients including thermal and electrical conduction, electron-ion coupling, inter-ion diffusion, ion viscosity, and charged particle stop** powers. Here, we give general background on Coulomb coupling and computational expense, review where some transport coefficients appear in hydrodynamic equations, and present the submitted data. Large variations are found when either the relevant Coulomb coupling parameter is large or computational expense causes difficulties. Understanding the general accuracy and uncertainty associated with such transport coefficients is important for quantifying errors in hydrodynamic simulations of inertial confinement fusion and high-energy density experiments.
△ Less
Submitted 29 September, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
-
A New Lower Bound on Graph Gonality
Authors:
Michael Harp,
Elijah Jackson,
David Jensen,
Noah Speeter
Abstract:
We define a new graph invariant called the scramble number. We show that the scramble number of a graph is a lower bound for the gonality and an upper bound for the treewidth. Unlike the treewidth, the scramble number is not minor monotone, but it is subgraph monotone and invariant under refinement. We compute the scramble number and gonality of several families of graphs for which these invariant…
▽ More
We define a new graph invariant called the scramble number. We show that the scramble number of a graph is a lower bound for the gonality and an upper bound for the treewidth. Unlike the treewidth, the scramble number is not minor monotone, but it is subgraph monotone and invariant under refinement. We compute the scramble number and gonality of several families of graphs for which these invariants are strictly greater than the treewidth.
△ Less
Submitted 4 November, 2021; v1 submitted 1 June, 2020;
originally announced June 2020.
-
Text and Causal Inference: A Review of Using Text to Remove Confounding from Causal Estimates
Authors:
Katherine A. Keith,
David Jensen,
Brendan O'Connor
Abstract:
Many applications of computational social science aim to infer causal conclusions from non-experimental data. Such observational data often contains confounders, variables that influence both potential causes and potential effects. Unmeasured or latent confounders can bias causal estimates, and this has motivated interest in measuring potential confounders from observed text. For example, an indiv…
▽ More
Many applications of computational social science aim to infer causal conclusions from non-experimental data. Such observational data often contains confounders, variables that influence both potential causes and potential effects. Unmeasured or latent confounders can bias causal estimates, and this has motivated interest in measuring potential confounders from observed text. For example, an individual's entire history of social media posts or the content of a news article could provide a rich measurement of multiple confounders. Yet, methods and applications for this problem are scattered across different communities and evaluation practices are inconsistent. This review is the first to gather and categorize these examples and provide a guide to data-processing and evaluation decisions. Despite increased attention on adjusting for confounding using text, there are still many open problems, which we highlight in this paper.
△ Less
Submitted 1 May, 2020;
originally announced May 2020.
-
The Kodaira dimensions of $\overline{\mathcal{M}}_{22}$ and $\overline{\mathcal{M}}_{23}$
Authors:
Gavril Farkas,
David Jensen,
Sam Payne
Abstract:
We prove that the moduli spaces of curves of genus 22 and 23 are of general type. To do this, we calculate certain virtual divisor classes of small slope associated to linear series of rank 6 with quadric relations. We then develop new tropical methods for studying linear series and independence of quadrics and show that these virtual classes are represented by effective divisors.
We prove that the moduli spaces of curves of genus 22 and 23 are of general type. To do this, we calculate certain virtual divisor classes of small slope associated to linear series of rank 6 with quadric relations. We then develop new tropical methods for studying linear series and independence of quadrics and show that these virtual classes are represented by effective divisors.
△ Less
Submitted 22 June, 2023; v1 submitted 1 May, 2020;
originally announced May 2020.
-
Scrollar Invariants of Tropical Curves
Authors:
David Jensen,
Kalila Joelle Sawyer
Abstract:
We define scrollar invariants of tropical curves with a fixed divisor of rank 1. We examine the behavior of scrollar invariants under specialization, and compute these invariants for a much-studied family of tropical curves. Our examples highlight many parallels between the classical and tropical theories, but also point to some substantive distinctions.
We define scrollar invariants of tropical curves with a fixed divisor of rank 1. We examine the behavior of scrollar invariants under specialization, and compute these invariants for a much-studied family of tropical curves. Our examples highlight many parallels between the classical and tropical theories, but also point to some substantive distinctions.
△ Less
Submitted 8 January, 2020;
originally announced January 2020.
-
Exploratory Not Explanatory: Counterfactual Analysis of Saliency Maps for Deep Reinforcement Learning
Authors:
Akanksha Atrey,
Kaleigh Clary,
David Jensen
Abstract:
Saliency maps are frequently used to support explanations of the behavior of deep reinforcement learning (RL) agents. However, a review of how saliency maps are used in practice indicates that the derived explanations are often unfalsifiable and can be highly subjective. We introduce an empirical approach grounded in counterfactual reasoning to test the hypotheses generated from saliency maps and…
▽ More
Saliency maps are frequently used to support explanations of the behavior of deep reinforcement learning (RL) agents. However, a review of how saliency maps are used in practice indicates that the derived explanations are often unfalsifiable and can be highly subjective. We introduce an empirical approach grounded in counterfactual reasoning to test the hypotheses generated from saliency maps and assess the degree to which they correspond to the semantics of RL environments. We use Atari games, a common benchmark for deep RL, to evaluate three types of saliency maps. Our results show the extent to which existing claims about Atari games can be evaluated and suggest that saliency maps are best viewed as an exploratory tool rather than an explanatory tool.
△ Less
Submitted 20 February, 2020; v1 submitted 9 December, 2019;
originally announced December 2019.
-
The Liquid Argon In A Testbeam (LArIAT) Experiment
Authors:
LArIAT Collaboration,
R. Acciarri,
C. J. Adams,
J. Asaadi,
M. Backfish,
W. Badgett,
B. Baller,
O. Benevides Rodrigues,
F. d. M. Blaszczyk,
R. Bouabid,
C. Bromberg,
R. Carey,
R. Castillo Fernandez,
F. Cavanna,
J. I. Cevallos Aleman,
A. Chatterjee,
P. Dedin Neto,
M. V. Dos Santos,
S. Dytman,
D. Edmunds,
M. Elkins,
C. O. Escobar,
J. Esquivel,
J. Evans,
A. Falcone
, et al. (81 additional authors not shown)
Abstract:
The LArIAT liquid argon time projection chamber, placed in a tertiary beam of charged particles at the Fermilab Test Beam Facility, has collected large samples of pions, muons, electrons, protons, and kaons in the momentum range 300-1400 MeV/c. This paper describes the main aspects of the detector and beamline, and also reports on calibrations performed for the detector and beamline components.
The LArIAT liquid argon time projection chamber, placed in a tertiary beam of charged particles at the Fermilab Test Beam Facility, has collected large samples of pions, muons, electrons, protons, and kaons in the momentum range 300-1400 MeV/c. This paper describes the main aspects of the detector and beamline, and also reports on calibrations performed for the detector and beamline components.
△ Less
Submitted 6 February, 2020; v1 submitted 23 November, 2019;
originally announced November 2019.
-
Bayesian causal inference via probabilistic program synthesis
Authors:
Sam Witty,
Alexander Lew,
David Jensen,
Vikash Mansinghka
Abstract:
Causal inference can be formalized as Bayesian inference that combines a prior distribution over causal models and likelihoods that account for both observations and interventions. We show that it is possible to implement this approach using a sufficiently expressive probabilistic programming language. Priors are represented using probabilistic programs that generate source code in a domain specif…
▽ More
Causal inference can be formalized as Bayesian inference that combines a prior distribution over causal models and likelihoods that account for both observations and interventions. We show that it is possible to implement this approach using a sufficiently expressive probabilistic programming language. Priors are represented using probabilistic programs that generate source code in a domain specific language. Interventions are represented using probabilistic programs that edit this source code to modify the original generative process. This approach makes it straightforward to incorporate data from atomic interventions, as well as shift interventions, variance-scaling interventions, and other interventions that modify causal structure. This approach also enables the use of general-purpose inference machinery for probabilistic programs to infer probable causal structures and parameters from data. This abstract describes a prototype of this approach in the Gen probabilistic programming language.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
The Case for Evaluating Causal Models Using Interventional Measures and Empirical Data
Authors:
Amanda Gentzel,
Dan Garant,
David Jensen
Abstract:
Causal inference is central to many areas of artificial intelligence, including complex reasoning, planning, knowledge-base construction, robotics, explanation, and fairness. An active community of researchers develops and enhances algorithms that learn causal models from data, and this work has produced a series of impressive technical advances. However, evaluation techniques for causal modeling…
▽ More
Causal inference is central to many areas of artificial intelligence, including complex reasoning, planning, knowledge-base construction, robotics, explanation, and fairness. An active community of researchers develops and enhances algorithms that learn causal models from data, and this work has produced a series of impressive technical advances. However, evaluation techniques for causal modeling algorithms have remained somewhat primitive, limiting what we can learn from experimental studies of algorithm performance, constraining the types of algorithms and model representations that researchers consider, and creating a gap between theory and practice. We argue for more frequent use of evaluation techniques that examine interventional measures rather than structural or observational measures, and that evaluate those measures on empirical data rather than synthetic data. We survey the current practice in evaluation and show that the techniques we recommend are rarely used in practice. We show that such techniques are feasible and that data sets are available to conduct such evaluations. We also show that these techniques produce substantially different results than using structural measures and synthetic data.
△ Less
Submitted 1 November, 2019; v1 submitted 11 October, 2019;
originally announced October 2019.
-
The motivic zeta functions of a matroid
Authors:
David Jensen,
Max Kutler,
Jeremy Usatine
Abstract:
We introduce motivic zeta functions for matroids. These zeta functions are defined as sums over the lattice points of Bergman fans, and in the realizable case, they coincide with the motivic Igusa zeta functions of hyperplane arrangements. We show that these motivic zeta functions satisfy a functional equation arising from matroid Poincaré duality in the sense of Adiprasito-Huh-Katz. In the proces…
▽ More
We introduce motivic zeta functions for matroids. These zeta functions are defined as sums over the lattice points of Bergman fans, and in the realizable case, they coincide with the motivic Igusa zeta functions of hyperplane arrangements. We show that these motivic zeta functions satisfy a functional equation arising from matroid Poincaré duality in the sense of Adiprasito-Huh-Katz. In the process, we obtain a formula for the Hilbert series of the cohomology ring of a matroid, in the sense of Feichtner-Yuzvinsky. We then show that our motivic zeta functions specialize to the topological zeta functions for matroids introduced by van der Veer, and we compute the first two coefficients in the Taylor expansion of these topological zeta functions, providing affirmative answers to two questions posed by van der Veer.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
PlanAlyzer: Assessing Threats to the Validity of Online Experiments
Authors:
Emma Tosch,
Eytan Bakshy,
Emery D. Berger,
David D. Jensen,
J. Eliot B. Moss
Abstract:
Online experiments are ubiquitous. As the scale of experiments has grown, so has the complexity of their design and implementation. In response, firms have developed software frameworks for designing and deploying online experiments. Ensuring that experiments in these frameworks are correctly designed and that their results are trustworthy---referred to as *internal validity*---can be difficult. C…
▽ More
Online experiments are ubiquitous. As the scale of experiments has grown, so has the complexity of their design and implementation. In response, firms have developed software frameworks for designing and deploying online experiments. Ensuring that experiments in these frameworks are correctly designed and that their results are trustworthy---referred to as *internal validity*---can be difficult. Currently, verifying internal validity requires manual inspection by someone with substantial expertise in experimental design.
We present the first approach for statically checking the internal validity of online experiments. Our checks are based on well-known problems that arise in experimental design and causal inference. Our analyses target PlanOut, a widely deployed, open-source experimentation framework that uses a domain-specific language to specify and run complex experiments. We have built a tool, PlanAlyzer, that checks PlanOut programs for a variety of threats to internal validity, including failures of randomization, treatment assignment, and causal sufficiency. PlanAlyzer uses its analyses to automatically generate *contrasts*, a key type of information required to perform valid statistical analyses over experimental results. We demonstrate PlanAlyzer's utility on a corpus of PlanOut scripts deployed in production at Facebook, and we evaluate its ability to identify threats to validity on a mutated subset of this corpus. PlanAlyzer has both precision and recall of 92% on the mutated corpus, and 82% of the contrasts it automatically generates match hand-specified data.
△ Less
Submitted 30 September, 2019;
originally announced September 2019.
-
Components of Brill-Noether Loci for Curves with Fixed Gonality
Authors:
Kaelin Cook-Powell,
David Jensen
Abstract:
We describe a conjectural stratification of the Brill-Noether variety for general curves of fixed genus and gonality. As evidence for this conjecture, we show that this Brill-Noether variety has at least as many irreducible components as predicted by the conjecture, and that each of these components has the expected dimension. Our proof uses combinatorial and tropical techniques. Specifically, we…
▽ More
We describe a conjectural stratification of the Brill-Noether variety for general curves of fixed genus and gonality. As evidence for this conjecture, we show that this Brill-Noether variety has at least as many irreducible components as predicted by the conjecture, and that each of these components has the expected dimension. Our proof uses combinatorial and tropical techniques. Specifically, we analyze containment relations between the various strata of tropical Brill-Noether loci identified by Pflueger in his classification of special divisors on chains of loops.
△ Less
Submitted 18 July, 2019;
originally announced July 2019.
-
Revisiting Submicron-Gap Thermionic Power Generation Based on Comprehensive Charge and Thermal Transport Modeling
Authors:
Devon Jensen,
Mohammad Ghashami,
Keunhan Park
Abstract:
Over the past years, thermionic energy conversion (TEC) with a reduced inter-electrode vacuum gap has been studied as an effective way to mitigate a large potential barrier due to space charge accumulation. However, existing theoretical models do not fully consider the fundamental aspects of thermionic emission when the inter-electrode gap shrinks to the nanoscale, which results in underestimation…
▽ More
Over the past years, thermionic energy conversion (TEC) with a reduced inter-electrode vacuum gap has been studied as an effective way to mitigate a large potential barrier due to space charge accumulation. However, existing theoretical models do not fully consider the fundamental aspects of thermionic emission when the inter-electrode gap shrinks to the nanoscale, which results in underestimation of thermionic power generation for such small gaps. The present work addresses this challenge by comprehensively modeling charge and thermal transport processes with specific consideration of nanoscale gap effects, such as image charge perturbation, electron tunneling, and near-field thermal radiation. Carefully conducted energy balance analysis reveals that if optimized, submicron-gap TEC can excel the micron-gap counterpart with $\sim$4 times the power output and ~5-10 % higher energy conversion efficiency. Moreover, the high-temperature collector of the submicron-gap TEC, which is due to thermionic and near-field radiative heat transfer, allows the addition of a bottom-cycle heat engine to further enhance the power and efficiency when combined. Electric field concentration due to engineered surface roughness is also examined as a potential approach to produce an additional increase in power generation. We believe that the present work provides a theoretical framework for submicron-gap thermionic power generation as a promising energy recycling scheme for high-quality heat sources.
△ Less
Submitted 13 July, 2019;
originally announced July 2019.
-
Toybox: A Suite of Environments for Experimental Evaluation of Deep Reinforcement Learning
Authors:
Emma Tosch,
Kaleigh Clary,
John Foley,
David Jensen
Abstract:
Evaluation of deep reinforcement learning (RL) is inherently challenging. In particular, learned policies are largely opaque, and hypotheses about the behavior of deep RL agents are difficult to test in black-box environments. Considerable effort has gone into addressing opacity, but almost no effort has been devoted to producing high quality environments for experimental evaluation of agent behav…
▽ More
Evaluation of deep reinforcement learning (RL) is inherently challenging. In particular, learned policies are largely opaque, and hypotheses about the behavior of deep RL agents are difficult to test in black-box environments. Considerable effort has gone into addressing opacity, but almost no effort has been devoted to producing high quality environments for experimental evaluation of agent behavior. We present TOYBOX, a new high-performance, open-source* subset of Atari environments re-designed for the experimental evaluation of deep RL. We show that TOYBOX enables a wide range of experiments and analyses that are impossible in other environments.
*https://kdl-umass.github.io/Toybox/
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Let's Play Again: Variability of Deep Reinforcement Learning Agents in Atari Environments
Authors:
Kaleigh Clary,
Emma Tosch,
John Foley,
David Jensen
Abstract:
Reproducibility in reinforcement learning is challenging: uncontrolled stochasticity from many sources, such as the learning algorithm, the learned policy, and the environment itself have led researchers to report the performance of learned agents using aggregate metrics of performance over multiple random seeds for a single environment. Unfortunately, there are still pernicious sources of variabi…
▽ More
Reproducibility in reinforcement learning is challenging: uncontrolled stochasticity from many sources, such as the learning algorithm, the learned policy, and the environment itself have led researchers to report the performance of learned agents using aggregate metrics of performance over multiple random seeds for a single environment. Unfortunately, there are still pernicious sources of variability in reinforcement learning agents that make reporting common summary statistics an unsound metric for performance. Our experiments demonstrate the variability of common agents used in the popular OpenAI Baselines repository. We make the case for reporting post-training agent performance as a distribution, rather than a point estimate.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.
-
Strangelets -- Effects of Finite Size and Exact Color Singletness
Authors:
Dan M\{o}nster Jensen
Abstract:
Matter consisting of up, down and strange quarks, socalled Strange Quark Matter, has been hypothesized to be stable in bulk, and conceivably stable or metastable in finite systems---strangelets---as an alternative state to ordinary baryonic matter. Strangelets, if they exist, may be relics from the hot and dense early universe, or they could be produced in high energy events, such as collisions of…
▽ More
Matter consisting of up, down and strange quarks, socalled Strange Quark Matter, has been hypothesized to be stable in bulk, and conceivably stable or metastable in finite systems---strangelets---as an alternative state to ordinary baryonic matter. Strangelets, if they exist, may be relics from the hot and dense early universe, or they could be produced in high energy events, such as collisions of heavy nuclei at relativistic speeds. This thesis investigates the implications of various effects that affects the possible (meta-) stability of strangelets, such as finite size, distribution of quark states (shell model), interaction with a hadron gas, non-zero temperature and QCD constraints of color singletness of the wave function. These effects are studied within the phenomenological MIT bag model of quark matter using the multiple reflection expansion for a liquid drop model equation of state with comparison to a shell model. Finite size, non-zero temperature and color singlet constraints have a destabilizing effect on strangelets, and can suppress their production in heavy ion collisions.
The work presented has been described in part in the following publications:
Dan Mønster Jensen and Jes Madsen, Strangelets at Non-Zero Temperature, in Strangeness and Quark Matter, edited by G. Vassiliadis, A. D. Panagiotou, S. Kumar, and J. Madsen (World Scientific, Singapore, 1995), pp. 220--229.
Jes Madsen, Dan M. Jensen, and Michael B. Christiansen, Color Singlet Suppression of Quark-Gluon Plasma Formation, Phys. Rev. C 53, 1883 (1996).
Dan M. Jensen and Jes Madsen, Strangelets with Finite Entropy, Phys. Rev. D 53, R4719 (1996).
Dan Mønster Jensen, Jes Madsen, and Michael B. Christiansen, Color Singlet Strangelets, Heavy Ion Phys. 4 (1-4), 387-394 (1996).
△ Less
Submitted 9 April, 2019;
originally announced April 2019.
-
A Measurement of the Branching Ratio of $π^0$ Dalitz Decay using $K_L \rightarrow π^0π^0π^0$ Decays
Authors:
E. Abouzaid,
M. Arenton,
A. R. Barker,
L. Bellantoni,
E. Blucher,
G. J. Bock,
E. Cheu,
R. Coleman,
M. D. Corcoran,
B. Cox,
A. R. Erwin,
C. O. Escobar,
A. Glazov,
A. Golossanov,
R. A. Gomes,
P. Gouffon,
Y. B. Hsiung,
D. A. Jensen,
R. Kessler,
K. Kotera,
A. Ledovskoy,
P. L. McBride,
E. Monnier,
H. Nguyen,
R. Niclasen
, et al. (22 additional authors not shown)
Abstract:
We present a measurement of $B(π^0 \rightarrow e^+e^- γ)/B(π^0 \rightarrow γγ)$, the Dalitz branching ratio, using data taken in 1999 by the E832 KTeV experiment at Fermi National Accelerator Laboratory. We use neutral pions from fully reconstructed $K_L$ decays in flight; the measurement is based on about 60 thousand $K_L \rightarrow π^0π^0π^0 \rightarrow γγ~γγ~e^+e^-γ$ decays. We normalize to…
▽ More
We present a measurement of $B(π^0 \rightarrow e^+e^- γ)/B(π^0 \rightarrow γγ)$, the Dalitz branching ratio, using data taken in 1999 by the E832 KTeV experiment at Fermi National Accelerator Laboratory. We use neutral pions from fully reconstructed $K_L$ decays in flight; the measurement is based on about 60 thousand $K_L \rightarrow π^0π^0π^0 \rightarrow γγ~γγ~e^+e^-γ$ decays. We normalize to $K_L \rightarrow π^0π^0π^0 \rightarrow 6γ$ decays. We find $B(π^0 \rightarrow e^+e^- γ)/B(π^0 \rightarrow γγ)$ $(m_{e^+e^-}$ > 15 MeV/$c^2)$ = $[3.920 \pm 0.016(stat) \pm 0.036 (syst)] \times 10^{-3}$. Using the Mikaelian and Smith prediction for the $e^+e^-$ mass spectrum, we correct the result to the full $e^+e^-$ mass range. The corrected result is $B(π^0 \rightarrow e^+e^- γ)/B(π^0 \rightarrow γγ) = [1.1559 \pm 0.0047(stat) \pm 0.0106 (syst)]$%. This result is consistent with previous measurements and the uncertainty is a factor of three smaller than any previous measurement.
△ Less
Submitted 26 November, 2019; v1 submitted 4 February, 2019;
originally announced February 2019.
-
Measuring and Characterizing Generalization in Deep Reinforcement Learning
Authors:
Sam Witty,
Jun Ki Lee,
Emma Tosch,
Akanksha Atrey,
Michael Littman,
David Jensen
Abstract:
Deep reinforcement-learning methods have achieved remarkable performance on challenging control tasks. Observations of the resulting behavior give the impression that the agent has constructed a generalized representation that supports insightful action decisions. We re-examine what is meant by generalization in RL, and propose several definitions based on an agent's performance in on-policy, off-…
▽ More
Deep reinforcement-learning methods have achieved remarkable performance on challenging control tasks. Observations of the resulting behavior give the impression that the agent has constructed a generalized representation that supports insightful action decisions. We re-examine what is meant by generalization in RL, and propose several definitions based on an agent's performance in on-policy, off-policy, and unreachable states. We propose a set of practical methods for evaluating agents with these definitions of generalization. We demonstrate these techniques on a common benchmark task for deep RL, and we show that the learned networks make poor decisions for states that differ only slightly from on-policy states, even though those states are not selected adversarially. Taken together, these results call into question the extent to which deep Q-networks learn generalized representations, and suggest that more experimentation and analysis is necessary before claims of representation learning can be supported.
△ Less
Submitted 11 December, 2018; v1 submitted 6 December, 2018;
originally announced December 2018.
-
ToyBox: Better Atari Environments for Testing Reinforcement Learning Agents
Authors:
John Foley,
Emma Tosch,
Kaleigh Clary,
David Jensen
Abstract:
It is a widely accepted principle that software without tests has bugs. Testing reinforcement learning agents is especially difficult because of the stochastic nature of both agents and environments, the complexity of state-of-the-art models, and the sequential nature of their predictions. Recently, the Arcade Learning Environment (ALE) has become one of the most widely used benchmark suites for d…
▽ More
It is a widely accepted principle that software without tests has bugs. Testing reinforcement learning agents is especially difficult because of the stochastic nature of both agents and environments, the complexity of state-of-the-art models, and the sequential nature of their predictions. Recently, the Arcade Learning Environment (ALE) has become one of the most widely used benchmark suites for deep learning research, and state-of-the-art Reinforcement Learning (RL) agents have been shown to routinely equal or exceed human performance on many ALE tasks. Since ALE is based on emulation of original Atari games, the environment does not provide semantically meaningful representations of internal game state. This means that ALE has limited utility as an environment for supporting testing or model introspection. We propose ToyBox, a collection of reimplementations of these games that solves this critical problem and enables robust testing of RL agents.
△ Less
Submitted 25 January, 2019; v1 submitted 6 December, 2018;
originally announced December 2018.
-
On the strong maximal rank conjecture in genus 22 and 23
Authors:
David Jensen,
Sam Payne
Abstract:
We develop new methods to study tropicalizations of linear series and show linear independence of sections. Using these methods, we prove two new cases of the strong maximal rank conjecture for linear series of degree 25 and 26 on curves of genus 22 and 23, respectively.
We develop new methods to study tropicalizations of linear series and show linear independence of sections. Using these methods, we prove two new cases of the strong maximal rank conjecture for linear series of degree 25 and 26 on curves of genus 22 and 23, respectively.
△ Less
Submitted 9 December, 2018; v1 submitted 3 August, 2018;
originally announced August 2018.
-
Search for sterile neutrinos in MINOS and MINOS+ using a two-detector fit
Authors:
P. Adamson,
I. Anghel,
A. Aurisano,
G. Barr,
M. Bishai,
A. Blake,
G. J. Bock,
D. Bogert,
S. V. Cao,
T. J. Carroll,
C. M. Castromonte,
R. Chen,
S. Childress,
J. A. B. Coelho,
L. Corwin,
D. Cronin-Hennessy,
J. K. de Jong,
S. De Rijck,
A. V. Devan,
N. E. Devenish,
M. V. Diwan,
C. O. Escobar,
J. J. Evans,
E. Falk,
G. J. Feldman
, et al. (95 additional authors not shown)
Abstract:
A search for mixing between active neutrinos and light sterile neutrinos has been performed by looking for muon neutrino disappearance in two detectors at baselines of 1.04 km and 735 km, using a combined MINOS and MINOS+ exposure of $16.36\times10^{20}$ protons-on-target. A simultaneous fit to the charged-current muon neutrino and neutral-current neutrino energy spectra in the two detectors yield…
▽ More
A search for mixing between active neutrinos and light sterile neutrinos has been performed by looking for muon neutrino disappearance in two detectors at baselines of 1.04 km and 735 km, using a combined MINOS and MINOS+ exposure of $16.36\times10^{20}$ protons-on-target. A simultaneous fit to the charged-current muon neutrino and neutral-current neutrino energy spectra in the two detectors yields no evidence for sterile neutrino mixing using a 3+1 model. The most stringent limit to date is set on the mixing parameter $\sin^2θ_{24}$ for most values of the sterile neutrino mass-splitting $Δm^2_{41} > 10^{-4}$ eV$^2$.
△ Less
Submitted 3 June, 2020; v1 submitted 17 October, 2017;
originally announced October 2017.
-
Brill-Noether theory of curves on $\mathbb{P}^1 \times \mathbb{P}^1$: tropical and classical approach
Authors:
Filip Cools,
Michele D'Adderio,
David Jensen,
Marta Panizzut
Abstract:
The gonality sequence $(d_r)_{r\geq1}$ of a smooth algebraic curve comprises the minimal degrees $d_r$ of linear systems of rank $r$. We explain two approaches to compute the gonality sequence of smooth curves in $\mathbb{P}^1 \times \mathbb{P}^1$: a tropical and a classical approach. The tropical approach uses the recently developed Brill--Noether theory on tropical curves and Baker's specializat…
▽ More
The gonality sequence $(d_r)_{r\geq1}$ of a smooth algebraic curve comprises the minimal degrees $d_r$ of linear systems of rank $r$. We explain two approaches to compute the gonality sequence of smooth curves in $\mathbb{P}^1 \times \mathbb{P}^1$: a tropical and a classical approach. The tropical approach uses the recently developed Brill--Noether theory on tropical curves and Baker's specialization of linear systems from curves to metric graphs. The classical one extends the work of Hartshorne on plane curves to curves on $\mathbb{P}^1 \times \mathbb{P}^1$.
△ Less
Submitted 21 September, 2017;
originally announced September 2017.
-
Emission Line Properties of Seyfert Galaxies in the 12 Micron Sample
Authors:
Matthew A. Malkan,
Lisbeth D. Jensen,
David R. Rodriguez,
Luigi Spinoglio,
Brian Rush
Abstract:
We present spectroscopy of emission lines for 81 Seyfert 1 and 104 Seyfert 2 galaxies in the IRAS 12$μ$m galaxy sample. We analyzed the emission-line luminosity functions, reddening, and other gas diagnostics. The narrow-line regions (NLR) of Sy1 and 2 galaxies do not significantly differ from each other in most of these diagnostics. Combining the H$α$/H$β$ ratio with a new reddening indicator-the…
▽ More
We present spectroscopy of emission lines for 81 Seyfert 1 and 104 Seyfert 2 galaxies in the IRAS 12$μ$m galaxy sample. We analyzed the emission-line luminosity functions, reddening, and other gas diagnostics. The narrow-line regions (NLR) of Sy1 and 2 galaxies do not significantly differ from each other in most of these diagnostics. Combining the H$α$/H$β$ ratio with a new reddening indicator-the [SII]6720/[OII]3727 ratio, we find the average $E(B-V)=0.49\pm0.35$ for Sy1s and $0.52\pm0.26$ for Sy2s. The NLR of Sy1 galaxies has only marginally higher ionization than the Sy2s. Our sample includes 22 Sy1.9s and 1.8s. In their narrow lines, these low-luminosity Seyferts are more similar to the Sy2s than the Sy1s. We construct a BPT diagram, and include the Sy1.8s and 1.9s. They overlap the region occupied by the Sy2s. The C IV equivalent width correlates more strongly with [O III]/H$β$ than with UV luminosity. The Sy1 and Sy2 luminosity functions of [OII]3727 and [OIII]5007 are indistinguishable. Unlike the LF's of Seyfert galaxies measured by SDSS, ours are nearly flat at low L. The larger number of faint Sloan "AGN" is attributable to their inclusion of weakly emitting LINERs and H II+AGN "composite" nuclei, which do not meet our classification criteria for Seyferts. An Appendix investigates which emission line luminosities provide the most reliable measures of the total non-stellar luminosity. The hard X-ray or near-ultraviolet continuum luminosity can be crudely predicted from either the [O III]5007 luminosity, or the combination of [O III]+H$β$, or [N II]+H$α$ lines, with a scatter of $\pm\,4$ times for the Sy1s and $\pm\,10$ times for the Sy2s. The latter two hybrid (NLR+BLR) indicators have the advantage of predicting the same HX luminosity independent of Seyfert type.
△ Less
Submitted 28 August, 2017;
originally announced August 2017.
-
Numerical Methods for the Inverse Problem of Density Functional Theory
Authors:
Daniel Jensen,
Adam Wasserman
Abstract:
The inverse problem of Kohn-Sham density functional theory (DFT) is often solved in an effort to benchmark and design approximate exchange-correlation potentials. The forward and inverse problems of DFT rely on the same equations but the numerical methods for solving each problem are substantially different. We examine both problems in this tutorial with a special emphasis on the algorithms and er…
▽ More
The inverse problem of Kohn-Sham density functional theory (DFT) is often solved in an effort to benchmark and design approximate exchange-correlation potentials. The forward and inverse problems of DFT rely on the same equations but the numerical methods for solving each problem are substantially different. We examine both problems in this tutorial with a special emphasis on the algorithms and error analysis needed for solving the inverse problem. Two inversion methods based on partial differential equation constrained optimization and constrained variational ideas are introduced. We compare and contrast several different inversion methods applied to one-dimensional finite and periodic model systems.
△ Less
Submitted 2 June, 2017; v1 submitted 13 March, 2017;
originally announced March 2017.