-
Composite acousto-optical modulation
Authors:
Ruijuan Liu,
Yudi Ma,
Ling**g Ji,
Liyang Qiu,
Minbiao Ji,
Zhensheng Tao,
Saijun Wu
Abstract:
We propose a composite acousto-optical modulation (AOM) scheme for wide-band, efficient modulation of CW and pulsed lasers. We show that by adjusting the amplitudes and phases of weakly-driven daughter AOMs, diffraction beyond the Bragg condition can be achieved with exceptional efficiencies. Furthermore, by imaging pairs of AOMs in a counter-propagating configuration, high contrast switching of o…
▽ More
We propose a composite acousto-optical modulation (AOM) scheme for wide-band, efficient modulation of CW and pulsed lasers. We show that by adjusting the amplitudes and phases of weakly-driven daughter AOMs, diffraction beyond the Bragg condition can be achieved with exceptional efficiencies. Furthermore, by imaging pairs of AOMs in a counter-propagating configuration, high contrast switching of output orders can be achieved at the driving radio frequency (rf) limit, thereby enabling efficient bidirectional routing of a synchronized mode-locked laser. Here we demonstrate a simplest example of such scheme with a double-AOM setup for efficient diffraction across an octave of rf bandwidth, and for routing a mode-locked pulse train with up to $f_{\rm rep}=400$~MHz repetition rate. We discuss extension of the composite scheme toward multi-path routing and time-domain multiplexing, so as to individually shape each pulses of ultrafast lasers for novel quantum control applications.
△ Less
Submitted 9 March, 2022; v1 submitted 29 October, 2021;
originally announced October 2021.
-
A Q-Learning-based Approach for Distributed Beam Scheduling in mmWave Networks
Authors:
Xiang Zhang,
Shamik Sarkar,
Arupjyoti Bhuyan,
Sneha Kumar Kasera,
Mingyue Ji
Abstract:
We consider the problem of distributed downlink beam scheduling and power allocation for millimeter-Wave (mmWave) cellular networks where multiple base stations (BSs) belonging to different service operators share the same unlicensed spectrum with no central coordination or cooperation among them. Our goal is to design efficient distributed beam scheduling and power allocation algorithms such that…
▽ More
We consider the problem of distributed downlink beam scheduling and power allocation for millimeter-Wave (mmWave) cellular networks where multiple base stations (BSs) belonging to different service operators share the same unlicensed spectrum with no central coordination or cooperation among them. Our goal is to design efficient distributed beam scheduling and power allocation algorithms such that the network-level payoff, defined as the weighted sum of the total throughput and a power penalization term, can be maximized. To this end, we propose a distributed scheduling approach to power allocation and adaptation for efficient interference management over the shared spectrum by modeling each BS as an independent Q-learning agent. As a baseline, we compare the proposed approach to the state-of-the-art non-cooperative game-based approach which was previously developed for the same problem. We conduct extensive experiments under various scenarios to verify the effect of multiple factors on the performance of both approaches. Experiment results show that the proposed approach adapts well to different interference situations by learning from experience and can achieve higher payoff than the game-based approach. The proposed approach can also be integrated into our previously developed Lyapunov stochastic optimization framework for the purpose of network utility maximization with optimality guarantee. As a result, the weights in the payoff function can be automatically and optimally determined by the virtual queue values from the sub-problems derived from the Lyapunov optimization framework.
△ Less
Submitted 16 October, 2021;
originally announced October 2021.
-
EFENet: Reference-based Video Super-Resolution with Enhanced Flow Estimation
Authors:
Ya** Zhao,
Mengqi Ji,
Ruqi Huang,
Bin Wang,
Sheng** Wang
Abstract:
In this paper, we consider the problem of reference-based video super-resolution(RefVSR), i.e., how to utilize a high-resolution (HR) reference frame to super-resolve a low-resolution (LR) video sequence. The existing approaches to RefVSR essentially attempt to align the reference and the input sequence, in the presence of resolution gap and long temporal range. However, they either ignore tempora…
▽ More
In this paper, we consider the problem of reference-based video super-resolution(RefVSR), i.e., how to utilize a high-resolution (HR) reference frame to super-resolve a low-resolution (LR) video sequence. The existing approaches to RefVSR essentially attempt to align the reference and the input sequence, in the presence of resolution gap and long temporal range. However, they either ignore temporal structure within the input sequence, or suffer accumulative alignment errors. To address these issues, we propose EFENet to exploit simultaneously the visual cues contained in the HR reference and the temporal information contained in the LR sequence. EFENet first globally estimates cross-scale flow between the reference and each LR frame. Then our novel flow refinement module of EFENet refines the flow regarding the furthest frame using all the estimated flows, which leverages the global temporal information within the sequence and therefore effectively reduces the alignment errors. We provide comprehensive evaluations to validate the strengths of our approach, and to demonstrate that the proposed framework outperforms the state-of-the-art methods. Code is available at https://github.com/IndigoPurple/EFENet.
△ Less
Submitted 28 October, 2021; v1 submitted 14 October, 2021;
originally announced October 2021.
-
Capability for detection of GW190521-like binary black holes with TianQin
Authors:
Shuai Liu,
Liang-Gui Zhu,
Yi-Ming Hu,
Jian-dong Zhang,
Mu-Jie Ji
Abstract:
The detection of GW190521 gains huge attention because it is the most massive binary that LIGO and Virgo ever confidently detected until the release of GWTC-3 (GW190426_190642 is more massive), and it is the first black hole merger whose remnant is believed to be an intermediate mass black hole. Furthermore, the primary black hole mass falls in the black hole mass gap, where the pair-instability s…
▽ More
The detection of GW190521 gains huge attention because it is the most massive binary that LIGO and Virgo ever confidently detected until the release of GWTC-3 (GW190426_190642 is more massive), and it is the first black hole merger whose remnant is believed to be an intermediate mass black hole. Furthermore, the primary black hole mass falls in the black hole mass gap, where the pair-instability supernova prevents the formation of astrophysical black holes in this range. In this paper, we systematically explore the prospect of TianQin on detecting GW190521-like sources. For sources with small orbital eccentricities, (i) TianQin could resolve up to a dozen of sources with signal-to-noise ratio (SNR) larger than 8. Even if the signal-to-noise ratio threshold increases to 12, TianQin could still detect GW190521-like binaries. (ii) The parameters of sources merging within several years would be precisely recovered. The precision of coalescence time and sky localization closes to $1\ {\rm s}$ and $1\ {\rm deg^{2}}$ respectively. This indicates that TianQin could provide early warnings for ground-based gravitational waves detectors and electromagnetic telescopes for these sources. Furthermore, TianQin could distinguish the formation channels of these sources by measuring the orbital eccentricities with a relative precision of $10^{-4}$. (iii) TianQin could constrain the Hubble constant with a $10\%$ precision with GW190521-like sources. Finally, for very eccentric GW190521-like sources, although their gravitational wave signal might be too weak for TianQin to detect, even the null detection of TianQin could still present a significant contribution to the understanding of the underlying science.
△ Less
Submitted 19 January, 2022; v1 submitted 11 October, 2021;
originally announced October 2021.
-
Asymptotic Bounds for CO-irredundant and Irredundant Ramsey Numbers
Authors:
Meng Ji,
Ya** Mao,
Ingo Schiermeyer
Abstract:
A set of vertices $X\subseteq V$ in a simple graph $G(V,E)$ is irredundant (CO-irredundant) if each vertex $x\in X$ is either isolated in the induced subgraph $G[X]$ or else has a private neighbor $y\in V\setminus X$ ($y\in V$) that is adjacent to $x$ and to no other vertex of $X$. The irredundant Ramsey number $s(t_{1},\ldots,t_{l})$, CO-irredundant Ramsey number…
▽ More
A set of vertices $X\subseteq V$ in a simple graph $G(V,E)$ is irredundant (CO-irredundant) if each vertex $x\in X$ is either isolated in the induced subgraph $G[X]$ or else has a private neighbor $y\in V\setminus X$ ($y\in V$) that is adjacent to $x$ and to no other vertex of $X$. The irredundant Ramsey number $s(t_{1},\ldots,t_{l})$, CO-irredundant Ramsey number $s_{\operatorname{CO}}(t_{1},\ldots,t_{l})$, is the minimum $N$ such that every $l$-coloring of the edges of the complete graph $K_{N}$ on $N$ vertices has a monochromatic irredundant set, a monochromatic CO-irredundant set, of size $t_{i}$ for some $1\leq i\leq l$, respectively. In this paper, firstly, we establish a lower bound for the irredundant Ramsey number $s(t_{1},\ldots,t_{l})$ by a random and probabilistic method. Secondly, we improve an upper bound for $s(3,9)$ such that $24\leq s(3,9)\leq 26$. Thirdly, using Krivelevich's lemma, we establish an asymptotic lower bound for the $\operatorname{CO}$-irredundant Ramsey number $s_{\operatorname{CO}}(m,n)$.
△ Less
Submitted 27 February, 2024; v1 submitted 16 September, 2021;
originally announced September 2021.
-
BROS: A Pre-trained Language Model Focusing on Text and Layout for Better Key Information Extraction from Documents
Authors:
Teakgyu Hong,
Donghyun Kim,
Mingi Ji,
Wonseok Hwang,
Daehyun Nam,
Sungrae Park
Abstract:
Key information extraction (KIE) from document images requires understanding the contextual and spatial semantics of texts in two-dimensional (2D) space. Many recent studies try to solve the task by develo** pre-trained language models focusing on combining visual features from document images with texts and their layout. On the other hand, this paper tackles the problem by going back to the bas…
▽ More
Key information extraction (KIE) from document images requires understanding the contextual and spatial semantics of texts in two-dimensional (2D) space. Many recent studies try to solve the task by develo** pre-trained language models focusing on combining visual features from document images with texts and their layout. On the other hand, this paper tackles the problem by going back to the basic: effective combination of text and layout. Specifically, we propose a pre-trained language model, named BROS (BERT Relying On Spatiality), that encodes relative positions of texts in 2D space and learns from unlabeled documents with area-masking strategy. With this optimized training scheme for understanding texts in 2D space, BROS shows comparable or better performance compared to previous methods on four KIE benchmarks (FUNSD, SROIE*, CORD, and SciTSR) without relying on visual features. This paper also reveals two real-world challenges in KIE tasks-(1) minimizing the error from incorrect text ordering and (2) efficient learning from fewer downstream examples-and demonstrates the superiority of BROS over previous methods. Code is available at https://github.com/clovaai/bros.
△ Less
Submitted 5 April, 2022; v1 submitted 10 August, 2021;
originally announced August 2021.
-
A New Design Framework for Heterogeneous Uncoded Storage Elastic Computing
Authors:
Mingyue Ji,
Xiang Zhang,
Kai Wan
Abstract:
Elasticity is one important feature in modern cloud computing systems and can result in computation failure or significantly increase computing time. Such elasticity means that virtual machines over the cloud can be preempted under a short notice (e.g., hours or minutes) if a high-priority job appears; on the other hand, new virtual machines may become available over time to compensate the computi…
▽ More
Elasticity is one important feature in modern cloud computing systems and can result in computation failure or significantly increase computing time. Such elasticity means that virtual machines over the cloud can be preempted under a short notice (e.g., hours or minutes) if a high-priority job appears; on the other hand, new virtual machines may become available over time to compensate the computing resources. Coded Storage Elastic Computing (CSEC) introduced by Yang et al. in 2018 is an effective and efficient approach to overcome the elasticity and it costs relatively less storage and computation load. However, one of the limitations of the CSEC is that it may only be applied to certain types of computations (e.g., linear) and may be challenging to be applied to more involved computations because the coded data storage and approximation are often needed. Hence, it may be preferred to use uncoded storage by directly copying data into the virtual machines. In addition, based on our own measurement, virtual machines on Amazon EC2 clusters often have heterogeneous computation speed even if they have exactly the same configurations (e.g., CPU, RAM, I/O cost). In this paper, we introduce a new optimization framework on Uncoded Storage Elastic Computing (USEC) systems with heterogeneous computing speed to minimize the overall computation time. Under this framework, we propose optimal solutions of USEC systems with or without straggler tolerance using different storage placements. Our proposed algorithms are evaluated using power iteration applications on Amazon EC2.
△ Less
Submitted 23 July, 2021; v1 submitted 20 July, 2021;
originally announced July 2021.
-
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features
Authors:
Hui Liu,
Bo Zhao,
Minzhi Ji,
Yuefeng Peng,
Jiabao Guo,
Peng Liu
Abstract:
Deep neural networks (DNNs) are under threat from adversarial example attacks. The adversary can easily change the outputs of DNNs by adding small well-designed perturbations to inputs. Adversarial example detection is a fundamental work for robust DNNs-based service. Adversarial examples show the difference between humans and DNNs in image recognition. From a human-centric perspective, image feat…
▽ More
Deep neural networks (DNNs) are under threat from adversarial example attacks. The adversary can easily change the outputs of DNNs by adding small well-designed perturbations to inputs. Adversarial example detection is a fundamental work for robust DNNs-based service. Adversarial examples show the difference between humans and DNNs in image recognition. From a human-centric perspective, image features could be divided into dominant features that are comprehensible to humans, and recessive features that are incomprehensible to humans, yet are exploited by DNNs. In this paper, we reveal that imperceptible adversarial examples are the product of recessive features misleading neural networks, and an adversarial attack is essentially a kind of method to enrich these recessive features in the image. The imperceptibility of the adversarial examples indicates that the perturbations enrich recessive features, yet hardly affect dominant features. Therefore, adversarial examples are sensitive to filtering off recessive features, while benign examples are immune to such operation. Inspired by this idea, we propose a label-only adversarial detection approach that is referred to as feature-filter. Feature-filter utilizes discrete cosine transform to approximately separate recessive features from dominant features, and gets a mutant image that is filtered off recessive features. By only comparing DNN's prediction labels on the input and its mutant, feature-filter can real-time detect imperceptible adversarial examples at high accuracy and few false positives.
△ Less
Submitted 28 November, 2021; v1 submitted 19 July, 2021;
originally announced July 2021.
-
A Practical Algorithm Design and Evaluation for Heterogeneous Elastic Computing with Stragglers
Authors:
Nicholas Woolsey,
Joerg Kliewer,
Rong-Rong Chen,
Mingyue Ji
Abstract:
Our extensive real measurements over Amazon EC2 show that the virtual instances often have different computing speeds even if they share the same configurations. This motivates us to study heterogeneous Coded Storage Elastic Computing (CSEC) systems where machines, with different computing speeds, join and leave the network arbitrarily over different computing steps. In CSEC systems, a Maximum Dis…
▽ More
Our extensive real measurements over Amazon EC2 show that the virtual instances often have different computing speeds even if they share the same configurations. This motivates us to study heterogeneous Coded Storage Elastic Computing (CSEC) systems where machines, with different computing speeds, join and leave the network arbitrarily over different computing steps. In CSEC systems, a Maximum Distance Separable (MDS) code is used for coded storage such that the file placement does not have to be redefined with each elastic event. Computation assignment algorithms are used to minimize the computation time given computation speeds of different machines. While previous studies of heterogeneous CSEC do not include stragglers-the slow machines during the computation, we develop a new framework in heterogeneous CSEC that introduces straggler tolerance. Based on this framework, we design a novel algorithm using our previously proposed approach for heterogeneous CSEC such that the system can handle any subset of stragglers of a specified size while minimizing the computation time. Furthermore, we establish a trade-off in computation time and straggler tolerance. Another major limitation of existing CSEC designs is the lack of practical evaluations using real applications. In this paper, we evaluate the performance of our designs on Amazon EC2 for applications of the power iteration and linear regression. Evaluation results show that the proposed heterogeneous CSEC algorithms outperform the state-of-the-art designs by more than 30%.
△ Less
Submitted 15 September, 2021; v1 submitted 18 July, 2021;
originally announced July 2021.
-
Throughput-Outage Scaling Behaviors for Wireless Single-Hop D2D Caching Networks with Physical Model -- Analysis and Derivations
Authors:
Ming-Chun Lee,
Andreas F. Molisch,
Mingyue Ji
Abstract:
Throughput-Outage scaling laws for single-hop cache-aided device-to-device (D2D) communications have been extensively investigated under the assumption of the protocol model. However, the corresponding performance under physical models has not been explored; in particular it remains unclear whether link-level power control and scheduling can improve the asymptotic performance. This paper thus inve…
▽ More
Throughput-Outage scaling laws for single-hop cache-aided device-to-device (D2D) communications have been extensively investigated under the assumption of the protocol model. However, the corresponding performance under physical models has not been explored; in particular it remains unclear whether link-level power control and scheduling can improve the asymptotic performance. This paper thus investigates the throughput-outage scaling laws of cache-aided single-hop D2D networks considering a general physical channel model. By considering the networks with and without the equal-throughput assumption, we analyze the corresponding outer bounds and provide the achievable performance analysis. Results show that when the equal-throughput assumption is considered, using link-level power control and scheduling cannot improve the scaling laws. On the other hand, when the equal-throughput assumption is not considered, we show that the proposed double time-slot framework with appropriate link-level power control and scheduling can significantly improve the throughput-outage scaling laws, where the fundamental concept is to first distinguish links according to their communication distances, and then enhance the throughput for links with small communication distances.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Refine Myself by Teaching Myself: Feature Refinement via Self-Knowledge Distillation
Authors:
Mingi Ji,
Seungjae Shin,
Seunghyun Hwang,
Gibeom Park,
Il-Chul Moon
Abstract:
Knowledge distillation is a method of transferring the knowledge from a pretrained complex teacher model to a student model, so a smaller network can replace a large teacher network at the deployment stage. To reduce the necessity of training a large teacher model, the recent literatures introduced a self-knowledge distillation, which trains a student network progressively to distill its own knowl…
▽ More
Knowledge distillation is a method of transferring the knowledge from a pretrained complex teacher model to a student model, so a smaller network can replace a large teacher network at the deployment stage. To reduce the necessity of training a large teacher model, the recent literatures introduced a self-knowledge distillation, which trains a student network progressively to distill its own knowledge without a pretrained teacher network. While Self-knowledge distillation is largely divided into a data augmentation based approach and an auxiliary network based approach, the data augmentation approach looses its local information in the augmentation process, which hinders its applicability to diverse vision tasks, such as semantic segmentation. Moreover, these knowledge distillation approaches do not receive the refined feature maps, which are prevalent in the object detection and semantic segmentation community. This paper proposes a novel self-knowledge distillation method, Feature Refinement via Self-Knowledge Distillation (FRSKD), which utilizes an auxiliary self-teacher network to transfer a refined knowledge for the classifier network. Our proposed method, FRSKD, can utilize both soft label and feature-map distillations for the self-knowledge distillation. Therefore, FRSKD can be applied to classification, and semantic segmentation, which emphasize preserving the local information. We demonstrate the effectiveness of FRSKD by enumerating its performance improvements in diverse tasks and benchmark datasets. The implemented code is available at https://github.com/MingiJi/FRSKD.
△ Less
Submitted 15 March, 2021;
originally announced March 2021.
-
Uncoordinated Spectrum Sharing in Millimeter Wave Networks Using Carrier Sensing
Authors:
Shamik Sarkar,
Xiang Zhang,
Arupjyoti Bhuyan,
Mingyue Ji,
Sneha Kumar Kasera
Abstract:
We propose using Carrier Sensing (CS) for distributed interference management in millimeter-wave (mmWave) cellular networks where spectrum is shared by multiple operators that do not coordinate among themselves. In addition, even the base station sites can be shared by the operators. We describe important challenges in using traditional CS in this setting and propose enhanced CS protocols to addre…
▽ More
We propose using Carrier Sensing (CS) for distributed interference management in millimeter-wave (mmWave) cellular networks where spectrum is shared by multiple operators that do not coordinate among themselves. In addition, even the base station sites can be shared by the operators. We describe important challenges in using traditional CS in this setting and propose enhanced CS protocols to address these challenges. Using stochastic geometry, we develop a general framework for downlink coverage probability analysis of our shared mmWave network in the presence of CS and derive the downlink coverage probability expressions for several CS protocols. To the best of our knowledge, our work is the first to investigate and analyze (using stochastic geometry) CS for mmWave networks with spectrum and BS sites shared among non-coordinating operators. We evaluate the downlink coverage probability of our shared mmWave network using simulations as well as numerical examples based on our analysis. Our evaluations show that our proposed enhancements lead to an improvement in downlink coverage probability, compared to the downlink coverage probability with no CS, for higher values of signal-to-interference and noise ratio (SINR). Interestingly, our evaluations also reveal that for lower values of SINR, not using any CS is the best strategy in terms of the downlink coverage probability.
△ Less
Submitted 24 February, 2021;
originally announced February 2021.
-
Show, Attend and Distill:Knowledge Distillation via Attention-based Feature Matching
Authors:
Mingi Ji,
Byeongho Heo,
Sungrae Park
Abstract:
Knowledge distillation extracts general knowledge from a pre-trained teacher network and provides guidance to a target student network. Most studies manually tie intermediate features of the teacher and student, and transfer knowledge through pre-defined links. However, manual selection often constructs ineffective links that limit the improvement from the distillation. There has been an attempt t…
▽ More
Knowledge distillation extracts general knowledge from a pre-trained teacher network and provides guidance to a target student network. Most studies manually tie intermediate features of the teacher and student, and transfer knowledge through pre-defined links. However, manual selection often constructs ineffective links that limit the improvement from the distillation. There has been an attempt to address the problem, but it is still challenging to identify effective links under practical scenarios. In this paper, we introduce an effective and efficient feature distillation method utilizing all the feature levels of the teacher without manually selecting the links. Specifically, our method utilizes an attention-based meta-network that learns relative similarities between features, and applies identified similarities to control distillation intensities of all possible pairs. As a result, our method determines competent links more efficiently than the previous approach and provides better performance on model compression and transfer learning tasks. Further qualitative analyses and ablative studies describe how our method contributes to better distillation. The implementation code is available at github.com/clovaai/attention-feature-distillation.
△ Less
Submitted 4 February, 2021;
originally announced February 2021.
-
A New Design of Cache-aided Multiuser Private Information Retrieval with Uncoded Prefetching
Authors:
Xiang Zhang,
Kai Wan,
Hua Sun,
Mingyue Ji,
Giuseppe Caire
Abstract:
In the problem of cache-aided multiuser private information retrieval (MuPIR), a set of $K_{\rm u}$ cache-equipped users wish to privately download a set of messages from $N$ distributed databases each holding a library of $K$ messages. The system works in two phases: {\it cache placement (prefetching) phase} in which the users fill up their cache memory, and {\it private delivery phase} in which…
▽ More
In the problem of cache-aided multiuser private information retrieval (MuPIR), a set of $K_{\rm u}$ cache-equipped users wish to privately download a set of messages from $N$ distributed databases each holding a library of $K$ messages. The system works in two phases: {\it cache placement (prefetching) phase} in which the users fill up their cache memory, and {\it private delivery phase} in which the users' demands are revealed and they download an answer from each database so that the their desired messages can be recovered while each individual database learns nothing about the identities of the requested messages. The goal is to design the placement and the private delivery phases such that the \emph{load}, which is defined as the total number of downloaded bits normalized by the message size, is minimized given any user memory size. This paper considers the MuPIR problem with two messages, arbitrary number of users and databases where uncoded prefetching is assumed, i.e., the users directly copy some bits from the library as their cached contents. We propose a novel MuPIR scheme inspired by the Maddah-Ali and Niesen (MAN) coded caching scheme. The proposed scheme achieves lower load than any existing schemes, especially the product design (PD), and is shown to be optimal within a factor of $8$ in general and exactly optimal at very high or low memory regime.
△ Less
Submitted 3 February, 2021; v1 submitted 2 February, 2021;
originally announced February 2021.
-
On Secure Distributed Linearly Separable Computation
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Giuseppe Caire
Abstract:
Distributed linearly separable computation, where a user asks some distributed servers to compute a linearly separable function, was recently formulated by the same authors and aims to alleviate the bottlenecks of stragglers and communication cost in distributed computation. For this purpose, the data center assigns a subset of input datasets to each server, and each server computes some coded pac…
▽ More
Distributed linearly separable computation, where a user asks some distributed servers to compute a linearly separable function, was recently formulated by the same authors and aims to alleviate the bottlenecks of stragglers and communication cost in distributed computation. For this purpose, the data center assigns a subset of input datasets to each server, and each server computes some coded packets on the assigned datasets, which are then sent to the user. The user should recover the task function from the answers of a subset of servers, such the effect of stragglers could be tolerated. In this paper, we formulate a novel secure framework for this distributed linearly separable computation, where we aim to let the user only retrieve the desired task function without obtaining any other information about the input datasets, even if it receives the answers of all servers. In order to preserve the security of the input datasets, some common randomness variable independent of the datasets should be introduced into the transmission. We show that any non-secure linear-coding based computing scheme for the original distributed linearly separable computation problem, can be made secure without increasing the communication cost. Then we focus on the case where the computation cost of each server is minimum and aim to minimize the size of the randomness variable introduced in the system while achieving the optimal communication cost. We first propose an information theoretic converse bound on the randomness size. We then propose secure computing schemes based on two well-known data assignments, namely fractional repetition assignment and cyclic assignment. We then propose a computing scheme with novel assignment, which strictly outperforms the above two schemes. Some additional optimality results are also obtained.
△ Less
Submitted 1 February, 2021;
originally announced February 2021.
-
Angle-tunable intersubband photoabsorption and enhanced photobleaching in twisted bilayer graphene
Authors:
Eva A. A. Pogna,
Xianchong Miao,
Driele von Dreifus,
Thonimar V. Alencar,
Marcus V. O. Moutinho,
Pedro Venezuela,
Cristian Manzoni,
Minbiao Ji,
Giulio Cerullo,
Ana Maria de Paula
Abstract:
Van der Waals heterostructures obtained by artificially stacking two-dimensional crystals represent the frontier of material engineering, demonstrating properties superior to those of the starting materials. Fine control of the interlayer twist angle has opened new possibilities for tailoring the optoelectronic properties of these heterostructures. Twisted bilayer graphene with a strong interlayer…
▽ More
Van der Waals heterostructures obtained by artificially stacking two-dimensional crystals represent the frontier of material engineering, demonstrating properties superior to those of the starting materials. Fine control of the interlayer twist angle has opened new possibilities for tailoring the optoelectronic properties of these heterostructures. Twisted bilayer graphene with a strong interlayer coupling is a prototype of twisted heterostructure inheriting the intriguing electronic properties of graphene. Understanding the effects of the twist angle on its out-of-equilibrium optical properties is crucial for devising optoelectronic applications. With this aim, we here combine excitation-resolved hot photoluminescence with femtosecond transient absorption microscopy. The hot charge carrier distribution induced by photo-excitation results in peaked absorption bleaching and photo-induced absorption bands, both with pronounced twist angle dependence. Theoretical simulations of the electronic band structure and of the joint density of states enable to assign these bands to the blocking of interband transitions at the van Hove singularities and to photo-activated intersubband transitions. The tens of picoseconds relaxation dynamics of the observed bands is attributed to the angle-dependence of electron and phonon heat capacities of twisted bilayer graphene.
△ Less
Submitted 5 January, 2021;
originally announced January 2021.
-
Cache-aided General Linear Function Retrieval
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Daniela Tuninetti,
Giuseppe Caire
Abstract:
Coded Caching, proposed by Maddah-Ali and Niesen (MAN), has the potential to reduce network traffic by pre-storing content in the users' local memories when the network is underutilized and transmitting coded multicast messages that simultaneously benefit many users at once during peak-hour times. This paper considers the linear function retrieval version of the original coded caching setting, whe…
▽ More
Coded Caching, proposed by Maddah-Ali and Niesen (MAN), has the potential to reduce network traffic by pre-storing content in the users' local memories when the network is underutilized and transmitting coded multicast messages that simultaneously benefit many users at once during peak-hour times. This paper considers the linear function retrieval version of the original coded caching setting, where users are interested in retrieving a number of linear combinations of the data points stored at the server, as opposed to a single file. This extends the scope of the Authors' past work that only considered the class of linear functions that operate element-wise over the files. On observing that the existing cache-aided scalar linear function retrieval scheme does not work in the proposed setting, this paper designs a novel coded caching scheme that outperforms uncoded caching schemes that either use unicast transmissions or let each user recover all files in the library.
△ Less
Submitted 12 April, 2021; v1 submitted 28 December, 2020;
originally announced December 2020.
-
Mutual neutralisation in Li$^+$+H$^-$/D$^-$ and Na$^+$+H$^-$/D$^-$ collisions: Implications of experimental results for non-LTE modelling of stellar spectra
Authors:
Paul S. Barklem,
Anish M. Amarsi,
Jon Grumer,
Gustav Eklund,
Stefan Rosén,
MingChao Ji,
Henrik Cederquist,
Henning Zettergren,
Henning T. Schmidt
Abstract:
Advances in merged-beams instruments have allowed experimental studies of the mutual neutralisation (MN) processes in collisions of both Li$^+$ and Na$^+$ ions with D$^-$ at energies below 1 eV. These experimental results place constraints on theoretical predictions of MN processes of Li$^+$ and Na$^+$ with H$^-$, important for non-LTE modelling of Li and Na spectra in late-type stars. We compare…
▽ More
Advances in merged-beams instruments have allowed experimental studies of the mutual neutralisation (MN) processes in collisions of both Li$^+$ and Na$^+$ ions with D$^-$ at energies below 1 eV. These experimental results place constraints on theoretical predictions of MN processes of Li$^+$ and Na$^+$ with H$^-$, important for non-LTE modelling of Li and Na spectra in late-type stars. We compare experimental results with calculations for methods typically used to calculate MN processes, namely the full quantum (FQ) approach, and asymptotic model approaches based on the linear combination of atomic orbitals (LCAO) and semi-empirical (SE) methods for deriving couplings. It is found that FQ calculations compare best overall with the experiments, followed by the LCAO, and the SE approaches. The experimental results together with the theoretical calculations, allow us to investigate the effects on modelled spectra and derived abundances and their uncertainties arising from uncertainties in the MN rates. Numerical experiments in a large grid of 1D model atmospheres, and a smaller set of 3D models, indicate that neglect of MN can lead to abundance errors of up to 0.1 dex (26\%) for Li at low metallicity, and 0.2 dex (58\%) for Na at high metallicity, while the uncertainties in the relevant MN rates as constrained by experiments correspond to uncertainties in abundances of much less than 0.01~dex (2\%). This agreement for simple atoms gives confidence in the FQ, LCAO and SE model approaches to be able to predict MN with the accuracy required for non-LTE modelling in stellar atmospheres.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
A Non-cooperative Game-based Distributed Beam Scheduling Framework for 5G Millimeter-Wave Cellular Networks
Authors:
Xiang Zhang,
Shamik Sarkar,
Arupjyoti Bhuyan,
Sneha Kumar Kasera,
Mingyue Ji
Abstract:
This paper studies the problem of distributed beam scheduling for 5G millimeter-Wave (mm-Wave) cellular networks where base stations (BSs) belonging to different operators share the same spectrum without centralized coordination among them. Our goal is to design efficient distributed scheduling algorithms to maximize the network utility, which is a function of the achieved throughput by the user e…
▽ More
This paper studies the problem of distributed beam scheduling for 5G millimeter-Wave (mm-Wave) cellular networks where base stations (BSs) belonging to different operators share the same spectrum without centralized coordination among them. Our goal is to design efficient distributed scheduling algorithms to maximize the network utility, which is a function of the achieved throughput by the user equipment (UEs), subject to the average and instantaneous power consumption constraints of the BSs. We propose a Media Access Control (MAC) and a power allocation/adaptation mechanism utilizing the Lyapunov stochastic optimization framework and non-cooperative games. In particular, we first decompose the original utility maximization problem into two sub-optimization problems for each time frame, which are a convex optimization problem and a non-convex optimization problem, respectively. By formulating the distributed scheduling problem as a non-cooperative game where each BS is a player attempting to optimize its own utility, we provide a distributed solution to the non-convex sub-optimization problem via finding the Nash Equilibrium (NE) of the game whose weights are determined optimally by the Lyapunov optimization framework. Finally, we conduct simulation under various network settings to show the effectiveness of the proposed game-based beam scheduling algorithm in comparison to that of several reference schemes.
△ Less
Submitted 22 July, 2021; v1 submitted 21 December, 2020;
originally announced December 2020.
-
Conflict-free connection number and independence number of a graph
Authors:
**g Wang,
Meng Ji
Abstract:
An edge-colored graph $G$ is conflict-free connected if any two of its vertices are connected by a path, which contains a color used on exactly one of its edges. The conflict-free connection number of a connected graph $G$, denoted by $cfc(G)$, is defined as the minimum number of colors that are required in order to make $G$ conflict-free connected. In this paper, we investigate the relation betwe…
▽ More
An edge-colored graph $G$ is conflict-free connected if any two of its vertices are connected by a path, which contains a color used on exactly one of its edges. The conflict-free connection number of a connected graph $G$, denoted by $cfc(G)$, is defined as the minimum number of colors that are required in order to make $G$ conflict-free connected. In this paper, we investigate the relation between the conflict-free connection number and the independence number of a graph. We firstly show that $cfc(G)\le α(G)$ for any connected graph $G$, and an example is given showing that the bound is sharp. With this result, we prove that if $T$ is a tree with $Δ(T)\ge \frac{α(T)+2}{2}$, then $cfc(T)=Δ(T)$.
△ Less
Submitted 8 December, 2020;
originally announced December 2020.
-
Note on the connectivity kee** spiders in $k$-connected graphs
Authors:
Meng Ji,
Ya** Mao
Abstract:
W. Mader [J. Graph Theory 65 (2010), 61--69] conjectured that for any tree $T$ of order $m$, every $k$-connected graph $G$ with $δ(G)\geq\lfloor\frac{3k}{2}\rfloor+m-1$ contains a tree $T'\cong T$ such that $G-V(T')$ remains $k$-connected. In 2010, Mader confirmed the conjecture for the $k$-connected graph if $T$ is a path; very recently, Liu et al. confirmed the conjecture if $k=2,3$. The conject…
▽ More
W. Mader [J. Graph Theory 65 (2010), 61--69] conjectured that for any tree $T$ of order $m$, every $k$-connected graph $G$ with $δ(G)\geq\lfloor\frac{3k}{2}\rfloor+m-1$ contains a tree $T'\cong T$ such that $G-V(T')$ remains $k$-connected. In 2010, Mader confirmed the conjecture for the $k$-connected graph if $T$ is a path; very recently, Liu et al. confirmed the conjecture if $k=2,3$. The conjecture is open for $k\geq 4$ till now. In this paper, we show that Mader's conjecture is true for the $k+1$-connected graph if $T$ is a spider and $Δ(G)=|G|-1$.
△ Less
Submitted 7 April, 2023; v1 submitted 8 December, 2020;
originally announced December 2020.
-
Quantify Influence of Delay in Opinion Transmission of Opinion Leaders on COVID-19 Information Propagation in the Chinese Sina-microblog
Authors:
Fulian Yin,
Xueying Shao,
Meiqi Ji,
Jianhong Wu
Abstract:
In a fast evolving major public health crisis such as the COVID-19 pandemic, multiple pieces of relevant information can be posted sequentially in a social media platform. The interval between subsequent posting times may have different impact on the transmission and cross-propagation of the old and new information to result in different peak value and final size of forwarding users of the new inf…
▽ More
In a fast evolving major public health crisis such as the COVID-19 pandemic, multiple pieces of relevant information can be posted sequentially in a social media platform. The interval between subsequent posting times may have different impact on the transmission and cross-propagation of the old and new information to result in different peak value and final size of forwarding users of the new information, depending on the content correlation and whether the new information is posted during the outbreak or quasi steady state phase of the old information. To help in designing effective communication strategies to ensure information is delivered to the maximal number of users, we develop and analyze two classes of susceptible-forwarding-immune information propagation models with delay in transmission, to describe the cross-propagation process of relevant information. We parametrize these models using real data from the Sina-Microblog and use the parametrized models to define and evaluate mutual attractiveness indices, and we use these indices and parameter sensitivity analyses to inform strategies to ensure optimal strategies for a new information to be effectively propagated in the microblog.
△ Less
Submitted 13 November, 2020;
originally announced November 2020.
-
Demystifying Why Local Aggregation Helps: Convergence Analysis of Hierarchical SGD
Authors:
Jiayi Wang,
Shiqiang Wang,
Rong-Rong Chen,
Mingyue Ji
Abstract:
Hierarchical SGD (H-SGD) has emerged as a new distributed SGD algorithm for multi-level communication networks. In H-SGD, before each global aggregation, workers send their updated local models to local servers for aggregations. Despite recent research efforts, the effect of local aggregation on global convergence still lacks theoretical understanding. In this work, we first introduce a new notion…
▽ More
Hierarchical SGD (H-SGD) has emerged as a new distributed SGD algorithm for multi-level communication networks. In H-SGD, before each global aggregation, workers send their updated local models to local servers for aggregations. Despite recent research efforts, the effect of local aggregation on global convergence still lacks theoretical understanding. In this work, we first introduce a new notion of "upward" and "downward" divergences. We then use it to conduct a novel analysis to obtain a worst-case convergence upper bound for two-level H-SGD with non-IID data, non-convex objective function, and stochastic gradient. By extending this result to the case with random grou**, we observe that this convergence upper bound of H-SGD is between the upper bounds of two single-level local SGD settings, with the number of local iterations equal to the local and global update periods in H-SGD, respectively. We refer to this as the "sandwich behavior". Furthermore, we extend our analytical approach based on "upward" and "downward" divergences to study the convergence for the general case of H-SGD with more than two levels, where the "sandwich behavior" still holds. Our theoretical results provide key insights of why local aggregation can be beneficial in improving the convergence of H-SGD.
△ Less
Submitted 11 April, 2024; v1 submitted 24 October, 2020;
originally announced October 2020.
-
GreedyFool: Multi-Factor Imperceptibility and Its Application to Designing a Black-box Adversarial Attack
Authors:
Hui Liu,
Bo Zhao,
Minzhi Ji,
Peng Liu
Abstract:
Adversarial examples are well-designed input samples, in which perturbations are imperceptible to the human eyes, but easily mislead the output of deep neural networks (DNNs). Existing works synthesize adversarial examples by leveraging simple metrics to penalize perturbations, that lack sufficient consideration of the human visual system (HVS), which produces noticeable artifacts. To explore why…
▽ More
Adversarial examples are well-designed input samples, in which perturbations are imperceptible to the human eyes, but easily mislead the output of deep neural networks (DNNs). Existing works synthesize adversarial examples by leveraging simple metrics to penalize perturbations, that lack sufficient consideration of the human visual system (HVS), which produces noticeable artifacts. To explore why the perturbations are visible, this paper summarizes four primary factors affecting the perceptibility of human eyes. Based on this investigation, we design a multi-factor metric MulFactorLoss for measuring the perceptual loss between benign examples and adversarial ones. In order to test the imperceptibility of the multi-factor metric, we propose a novel black-box adversarial attack that is referred to as GreedyFool. GreedyFool applies differential evolution to evaluate the effects of perturbed pixels on the confidence of a target DNN, and introduces greedy approximation to automatically generate adversarial perturbations. We conduct extensive experiments on the ImageNet and CIFRA-10 datasets and a comprehensive user study with 60 participants. The experimental results demonstrate that MulFactorLoss is a more imperceptible metric than the existing pixelwise metrics, and GreedyFool achieves a 100% success rate in a black-box manner.
△ Less
Submitted 28 November, 2021; v1 submitted 14 October, 2020;
originally announced October 2020.
-
On the Fundamental Limits of Cache-aided Multiuser Private Information Retrieval
Authors:
Xiang Zhang,
Kai Wan,
Hua Sun,
Mingyue Ji,
Giuseppe Caire
Abstract:
We consider the problem of cache-aided Multiuser Private Information Retrieval (MuPIR) which is an extension of the single-user cache-aided PIR problem to the case of multiple users. In MuPIR, each of the $K_{\rm u}$ cache-equipped users wishes to privately retrieve a message out of $K$ messages from $N$ databases each having access to the entire message library. The privacy constraint requires th…
▽ More
We consider the problem of cache-aided Multiuser Private Information Retrieval (MuPIR) which is an extension of the single-user cache-aided PIR problem to the case of multiple users. In MuPIR, each of the $K_{\rm u}$ cache-equipped users wishes to privately retrieve a message out of $K$ messages from $N$ databases each having access to the entire message library. The privacy constraint requires that any individual database learns nothing about the demands of all users. The users are connected to each database via an error-free shared-link. In this paper, we aim to characterize the optimal trade-off between users' memory and communication load for such systems. Based on the proposed novel approach of \emph{cache-aided interference alignment (CIA)}, first, for the MuPIR problem with $K=2$ messages, $K_{\rm u}=2$ users and $N\ge 2$ databases, we propose achievable retrieval schemes for both uncoded and general cache placement. The CIA approach is optimal when the cache placement is uncoded. For general cache placement, the CIA approach is optimal when $N=2$ and $3$ verified by the computer-aided approach. Second, when $K,K_{\rm u}$ and $N$ are general, we propose a new \emph{product design} (PD) which incorporates the PIR code into the linear caching code.
The product design is shown to be order optimal within a multiplicative factor of 8 and is exactly optimal when the user cache memory size is large.
△ Less
Submitted 20 November, 2020; v1 submitted 13 October, 2020;
originally announced October 2020.
-
On the Tradeoff Between Computation and Communication Costs for Distributed Linearly Separable Computation
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Giuseppe Caire
Abstract:
This paper studies the distributed linearly separable computation problem, which is a generalization of many existing distributed computing problems such as distributed gradient descent and distributed linear transform. In this problem, a master asks $N$ distributed workers to compute a linearly separable function of $K$ datasets, which is a set of $K_c$ linear combinations of $K$ messages (each m…
▽ More
This paper studies the distributed linearly separable computation problem, which is a generalization of many existing distributed computing problems such as distributed gradient descent and distributed linear transform. In this problem, a master asks $N$ distributed workers to compute a linearly separable function of $K$ datasets, which is a set of $K_c$ linear combinations of $K$ messages (each message is a function of one dataset). We assign some datasets to each worker, which then computes the corresponding messages and returns some function of these messages, such that from the answers of any $N_r$ out of $N$ workers the master can recover the task function. In the literature, the specific case where $K_c = 1$ or where the computation cost is minimum has been considered. In this paper, we focus on the general case (i.e., general $K_c$ and general computation cost) and aim to find the minimum communication cost. We first propose a novel converse bound on the communication cost under the constraint of the popular cyclic assignment (widely considered in the literature), which assigns the datasets to the workers in a cyclic way. Motivated by the observation that existing strategies for distributed computing fall short of achieving the converse bound, we propose a novel distributed computing scheme for some system parameters. The proposed computing scheme is optimal for any assignment when $K_c$ is large and is optimal under cyclic assignment when the numbers of workers and datasets are equal or $K_c$ is small. In addition, it is order optimal within a factor of 2 under cyclic assignment for the remaining cases.
△ Less
Submitted 4 October, 2020;
originally announced October 2020.
-
Cache-aided Interference Management using Hypercube Combinatorial Cache Design with Reduced Subpacketizations and Order Optimal Sum-Degrees of Freedom
Authors:
Xiang Zhang,
Nicholas Woolsey,
Mingyue Ji
Abstract:
We consider a cache-aided interference network which consists of a library of $N$ files, $K_T$ transmitters and $K_R$ receivers (users), each equipped with a local cache of size $M_T$ and $M_R$ files respectively, and connected via a discrete-time additive white Gaussian noise (AWGN) channel. Each receiver requests an arbitrary file from the library. The objective is to design a cache placement wi…
▽ More
We consider a cache-aided interference network which consists of a library of $N$ files, $K_T$ transmitters and $K_R$ receivers (users), each equipped with a local cache of size $M_T$ and $M_R$ files respectively, and connected via a discrete-time additive white Gaussian noise (AWGN) channel. Each receiver requests an arbitrary file from the library. The objective is to design a cache placement without knowing the receivers' requests and a communication scheme such that the sum Degrees of Freedom (sum-DoF) of the delivery is maximized. This network model with one-shot transmission was firstly investigated by Naderializadeh {\em et al.}, who proposed a scheme that achieves a one-shot sum-DoF of $\min\{\frac{M_TK_T+K_RM_R}{N}, K_R\}$, which is optimal within a constant of $2$. One of the biggest limitations of this scheme is the requirement of high subpacketization level. This paper attempts to design new algorithms to reduce the file subpacketization in such a network without hurting the sum-DoF. In particular, we propose a new approach for both prefetching and linearly coded delivery based on a combinatorial design called {\em hypercube}. The proposed approach reduces the subpacketization exponentially in terms of $K_R M/N$ and achieves the identical one-shot sum DoF when $\frac{M_TK_T+K_RM_R}{N} \leq K_R$.
△ Less
Submitted 31 December, 2020; v1 submitted 19 August, 2020;
originally announced August 2020.
-
FLCD: A Flexible Low Complexity Design of Coded Distributed Computing
Authors:
Nicholas Woolsey,
Xingyue Wang,
Rong-Rong Chen,
Mingyue Ji
Abstract:
We propose a flexible low complexity design (FLCD) of coded distributed computing (CDC) with empirical evaluation on Amazon Elastic Compute Cloud (Amazon EC2). CDC can expedite MapReduce like computation by trading increased map computations to reduce communication load and shuffle time. A main novelty of FLCD is to utilize the design freedom in defining map and reduce functions to develop asympto…
▽ More
We propose a flexible low complexity design (FLCD) of coded distributed computing (CDC) with empirical evaluation on Amazon Elastic Compute Cloud (Amazon EC2). CDC can expedite MapReduce like computation by trading increased map computations to reduce communication load and shuffle time. A main novelty of FLCD is to utilize the design freedom in defining map and reduce functions to develop asymptotic homogeneous systems to support varying intermediate values (IV) sizes under a general MapReduce framework. Compared to existing designs with constant IV sizes, FLCD offers greater flexibility in adapting to network parameters and significantly reduces the implementation complexity by requiring fewer input files and shuffle groups. The FLCD scheme is the first proposed low-complexity CDC design that can operate on a network with an arbitrary number of nodes and computation load. We perform empirical evaluations of the FLCD by executing the TeraSort algorithm on an Amazon EC2 cluster. This is the first time that theoretical predictions of the CDC shuffle time are validated by empirical evaluations. The evaluations demonstrate a 2.0 to 4.24x speedup compared to conventional uncoded MapReduce, a 12% to 52% reduction in total time, and a wider range of operating network parameters compared to existing CDC schemes.
△ Less
Submitted 12 August, 2020;
originally announced August 2020.
-
Coded Elastic Computing on Machines with Heterogeneous Storage and Computation Speed
Authors:
Nicholas Woolsey,
Rong-Rong Chen,
Mingyue Ji
Abstract:
We study the optimal design of heterogeneous Coded Elastic Computing (CEC) where machines have varying computation speeds and storage. CEC introduced by Yang et al. in 2018 is a framework that mitigates the impact of elastic events, where machines can join and leave at arbitrary times. In CEC, data is distributed among machines using a Maximum Distance Separable (MDS) code such that subsets of mac…
▽ More
We study the optimal design of heterogeneous Coded Elastic Computing (CEC) where machines have varying computation speeds and storage. CEC introduced by Yang et al. in 2018 is a framework that mitigates the impact of elastic events, where machines can join and leave at arbitrary times. In CEC, data is distributed among machines using a Maximum Distance Separable (MDS) code such that subsets of machines can perform the desired computations. However, state-of-the-art CEC designs only operate on homogeneous networks where machines have the same speeds and storage. This may not be practical. In this work, based on an MDS storage assignment, we develop a novel computation assignment approach for heterogeneous CEC networks to minimize the overall computation time. We first consider the scenario where machines have heterogeneous computing speeds but same storage and then the scenario where both heterogeneities are present. We propose a novel combinatorial optimization formulation and solve it exactly by decomposing it into a convex optimization problem for finding the optimal computation load and a "filling problem" for finding the exact computation assignment. A low-complexity "filling algorithm" is adapted and can be completed within a number of iterations equals at most the number of available machines.
△ Less
Submitted 12 August, 2020;
originally announced August 2020.
-
A Combinatorial Design for Cascaded Coded Distributed Computing on General Networks
Authors:
Nicholas Woolsey,
Rong-Rong Chen,
Mingyue Ji
Abstract:
Coding theoretic approached have been developed to significantly reduce the communication load in modern distributed computing system. In particular, coded distributed computing (CDC) introduced by Li et al. can efficiently trade computation resources to reduce the communication load in MapReduce like computing systems. For the more general cascaded CDC, Map computations are repeated at r nodes to…
▽ More
Coding theoretic approached have been developed to significantly reduce the communication load in modern distributed computing system. In particular, coded distributed computing (CDC) introduced by Li et al. can efficiently trade computation resources to reduce the communication load in MapReduce like computing systems. For the more general cascaded CDC, Map computations are repeated at r nodes to significantly reduce the communication load among nodes tasked with computing Q Reduce functions s times. In this paper, we propose a novel low-complexity combinatorial design for cascaded CDC which 1) determines both input file and output function assignments, 2) requires significantly less number of input files and output functions, and 3) operates on heterogeneous networks where nodes have varying storage and computing capabilities. We provide an analytical characterization of the computation-communication tradeoff, from which we show the proposed scheme can outperform the state-of-the-art scheme proposed by Li et al. for the homogeneous networks. Further, when the network is heterogeneous, we show that the performance of the proposed scheme can be better than its homogeneous counterpart. In addition, the proposed scheme is optimal within a constant factor of the information theoretic converse bound while fixing the input file and the output function assignments.
△ Less
Submitted 2 August, 2020;
originally announced August 2020.
-
A New Combinatorial Coded Design for Heterogeneous Distributed Computing
Authors:
Nicholas Woolsey,
Rong-Rong Chen,
Mingyue Ji
Abstract:
Coded Distributed Computing (CDC) introduced by Li et al. in 2015 offers an efficient approach to trade computing power to reduce the communication load in general distributed computing frameworks such as MapReduce and Spark. In particular, increasing the computation load in the Map phase by a factor of r can create coded multicasting opportunities to reduce the communication load in the Shuffle p…
▽ More
Coded Distributed Computing (CDC) introduced by Li et al. in 2015 offers an efficient approach to trade computing power to reduce the communication load in general distributed computing frameworks such as MapReduce and Spark. In particular, increasing the computation load in the Map phase by a factor of r can create coded multicasting opportunities to reduce the communication load in the Shuffle phase by the same factor. However, the CDC scheme is designed for the homogeneous settings, where the storage, computation load and communication load on the computing nodes are the same. In addition, it requires an exponentially large number of input files (data batches), reduce functions and multicasting groups relative to the number of nodes to achieve the promised gain. We address the CDC limitations by proposing a novel CDC approach based on a combinatorial design, which accommodates heterogeneous networks where nodes have varying storage and computing capabilities. In addition, the proposed approach requires an exponentially less number of input files compared to the original CDC scheme proposed by Li et al. Meanwhile, the resulting computation-communication trade-off maintains the multiplicative gain compared to conventional uncoded unicast and asymptotically achieves the optimal performance proposed by Li et al.
△ Less
Submitted 21 July, 2020;
originally announced July 2020.
-
Cache-Aided Matrix Multiplication Retrieval
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Daniela Tuninetti,
Giuseppe Caire
Abstract:
Coded caching is a promising technique to smooth out network traffic by storing part of the library content at the users' local caches. The seminal work on coded caching for single file retrieval by Maddah-Ali and Niesen (MAN) showed the existence of a global caching gain that scales with the total memory in the system, in addition to the known local caching gain in uncoded systems. This paper for…
▽ More
Coded caching is a promising technique to smooth out network traffic by storing part of the library content at the users' local caches. The seminal work on coded caching for single file retrieval by Maddah-Ali and Niesen (MAN) showed the existence of a global caching gain that scales with the total memory in the system, in addition to the known local caching gain in uncoded systems. This paper formulates a novel cache-aided matrix multiplication retrieval problem, relevant for data analytics and machine learning applications. In the considered problem, each cache-aided user requests the product of two matrices from the library. A structure-agnostic solution is to treat each possible matrix product as an independent file and use the MAN coded caching scheme for single file retrieval. This paper proposes two structure-aware schemes, which partition each matrix in the library by either rows or columns and let a subset of users cache some sub-matrices, that improve on the structure-agnostic scheme. For the case where the library matrices are "fat" matrices, the structure-aware row-partition scheme is shown to be order optimal under some constraint.
△ Less
Submitted 26 May, 2021; v1 submitted 1 July, 2020;
originally announced July 2020.
-
Distributed Linearly Separable Computation
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Giuseppe Caire
Abstract:
This paper formulates a distributed computation problem, where a master asks $N$ distributed workers to compute a linearly separable function. The task function can be expressed as $K_c$ linear combinations of $K$ messages, where each message is a function of one dataset. Our objective is to find the optimal tradeoff between the computation cost (number of uncoded datasets assigned to each worker)…
▽ More
This paper formulates a distributed computation problem, where a master asks $N$ distributed workers to compute a linearly separable function. The task function can be expressed as $K_c$ linear combinations of $K$ messages, where each message is a function of one dataset. Our objective is to find the optimal tradeoff between the computation cost (number of uncoded datasets assigned to each worker) and the communication cost (number of symbols the master must download), such that from the answers of any $N_r$ out of $N$ workers the master can recover the task function with high probability, where the coefficients of the $K_c$ linear combinations are uniformly i.i.d. over some large enough finite field. The formulated problem can be seen as a generalized version of some existing problems, such as distributed gradient coding and distributed linear transform.
In this paper, we consider the specific case where the computation cost is minimum, and propose novel achievability schemes and converse bounds for the optimal communication cost. Achievability and converse bounds coincide for some system parameters; when they do not match, we prove that the achievable distributed computing scheme is optimal under the constraint of a widely used `cyclic assignment' scheme on the datasets. Our results also show that when $K = N$, with the same communication cost as the optimal distributed gradient coding scheme proposed by Tandon et al. from which the master recovers one linear combination of $K$ messages, our proposed scheme can let the master recover any additional $N_r - 1$ independent linear combinations of messages with high probability.
△ Less
Submitted 24 October, 2021; v1 submitted 1 July, 2020;
originally announced July 2020.
-
Zoom in to the details of human-centric videos
Authors:
Guanghan Li,
Ya** Zhao,
Mengqi Ji,
Xiaoyun Yuan,
Lu Fang
Abstract:
Presenting high-resolution (HR) human appearance is always critical for the human-centric videos. However, current imagery equipment can hardly capture HR details all the time. Existing super-resolution algorithms barely mitigate the problem by only considering universal and low-level priors of im-age patches. In contrast, our algorithm is under bias towards the human body super-resolution by taki…
▽ More
Presenting high-resolution (HR) human appearance is always critical for the human-centric videos. However, current imagery equipment can hardly capture HR details all the time. Existing super-resolution algorithms barely mitigate the problem by only considering universal and low-level priors of im-age patches. In contrast, our algorithm is under bias towards the human body super-resolution by taking advantage of high-level prior defined by HR human appearance. Firstly, a motion analysis module extracts inherent motion pattern from the HR reference video to refine the pose estimation of the low-resolution (LR) sequence. Furthermore, a human body reconstruction module maps the HR texture in the reference frames onto a 3D mesh model. Consequently, the input LR videos get super-resolved HR human sequences are generated conditioned on the original LR videos as well as few HR reference frames. Experiments on an existing dataset and real-world data captured by hybrid cameras show that our approach generates superior visual quality of human body compared with the traditional method.
△ Less
Submitted 27 May, 2020;
originally announced May 2020.
-
SurfaceNet+: An End-to-end 3D Neural Network for Very Sparse Multi-view Stereopsis
Authors:
Mengqi Ji,
**zhi Zhang,
Qionghai Dai,
Lu Fang
Abstract:
Multi-view stereopsis (MVS) tries to recover the 3D model from 2D images. As the observations become sparser, the significant 3D information loss makes the MVS problem more challenging. Instead of only focusing on densely sampled conditions, we investigate sparse-MVS with large baseline angles since the sparser sensation is more practical and more cost-efficient. By investigating various observati…
▽ More
Multi-view stereopsis (MVS) tries to recover the 3D model from 2D images. As the observations become sparser, the significant 3D information loss makes the MVS problem more challenging. Instead of only focusing on densely sampled conditions, we investigate sparse-MVS with large baseline angles since the sparser sensation is more practical and more cost-efficient. By investigating various observation sparsities, we show that the classical depth-fusion pipeline becomes powerless for the case with a larger baseline angle that worsens the photo-consistency check. As another line of the solution, we present SurfaceNet+, a volumetric method to handle the 'incompleteness' and the 'inaccuracy' problems induced by a very sparse MVS setup. Specifically, the former problem is handled by a novel volume-wise view selection approach. It owns superiority in selecting valid views while discarding invalid occluded views by considering the geometric prior. Furthermore, the latter problem is handled via a multi-scale strategy that consequently refines the recovered geometry around the region with the repeating pattern. The experiments demonstrate the tremendous performance gap between SurfaceNet+ and state-of-the-art methods in terms of precision and recall. Under the extreme sparse-MVS settings in two datasets, where existing methods can only return very few points, SurfaceNet+ still works as well as in the dense MVS setting. The benchmark and the implementation are publicly available at https://github.com/mjiUST/SurfaceNet-plus.
△ Less
Submitted 26 May, 2020;
originally announced May 2020.
-
Optimal Throughput-Outage Analysis of Cache-Aided Wireless Multi-Hop D2D Networks -- Derivations of Scaling Laws
Authors:
Ming-Chun Lee,
Mingyue Ji,
Andreas F. Molisch
Abstract:
Cache-aided wireless device-to-device (D2D) networks have demonstrated promising performance improvement for video distribution compared to conventional distribution methods. Understanding the fundamental scaling behavior of such networks is thus of paramount importance. However, existing scaling laws for multi-hop networks have not been found to be optimal even for the case of Zipf popularity dis…
▽ More
Cache-aided wireless device-to-device (D2D) networks have demonstrated promising performance improvement for video distribution compared to conventional distribution methods. Understanding the fundamental scaling behavior of such networks is thus of paramount importance. However, existing scaling laws for multi-hop networks have not been found to be optimal even for the case of Zipf popularity distributions (gaps between upper and lower bounds are not constants); furthermore, there are no scaling law results for such networks for the more practical case of a Mandelbrot-Zipf (MZipf) popularity distribution. We thus in this work investigate the throughput-outage performance for cache-aided wireless D2D networks adopting multi-hop communications, with the MZipf popularity distribution for file requests and users distributed according to Poisson point process. We propose an achievable content caching and delivery scheme and analyze its performance. By showing that the achievable performance is tight to the proposed outer bound, the optimal scaling law is obtained. Furthermore, since the Zipf distribution is a special case of the MZipf distribution, the optimal scaling law for the networks considering Zipf popularity distribution is also obtained, which closes the gap in the literature.
△ Less
Submitted 8 October, 2020; v1 submitted 11 May, 2020;
originally announced May 2020.
-
Astrochemical relevance of VUV ionization of large PAH cations
Authors:
Gabi Wenzel,
Christine Joblin,
Alexandre Giuliani,
Sarah Rodriguez Castillo,
Giacomo Mulas,
Mingchao Ji,
Hassan Sabbah,
Sabela Quiroga,
Diego Peña,
Laurent Nahon
Abstract:
As a part of interstellar dust, polycyclic aromatic hydrocarbons (PAHs) are processed by the interaction with vacuum ultraviolet (VUV) photons that are emitted by hot young stars. This interaction leads to the emission of the well-known aromatic infrared bands but also of electrons, which can significantly contribute to the heating of the interstellar gas.Our aim is to investigate the impact of mo…
▽ More
As a part of interstellar dust, polycyclic aromatic hydrocarbons (PAHs) are processed by the interaction with vacuum ultraviolet (VUV) photons that are emitted by hot young stars. This interaction leads to the emission of the well-known aromatic infrared bands but also of electrons, which can significantly contribute to the heating of the interstellar gas.Our aim is to investigate the impact of molecular size on the photoionization properties of cationic PAHs.Methods. Trapped PAH cations of sizes between 30 and 48 carbon atoms were submitted to VUV photons in the range of 9 to 20 eV from the DESIRS beamline at the synchrotron SOLEIL. All resulting photoproducts including dications and fragment cations were mass-analyzed and recorded as a function of photon energy.Photoionization is found to be predominant over dissociation at all energies, which differs from an earlier study on smaller PAHs. The photoionization branching ratio reaches 0.98 at 20 eV for the largest studied PAH. The photoionization threshold is observed to be between 9.1 and 10.2 eV, in agreement with the evolution of the ionization potential with size. Ionization cross sections were indirectly obtained and photoionization yields extracted from their ratio with theoretical photoabsorption cross sections, which were calculated using time-dependent density functional theory. An analytical function was derived to calculate this yield for a given molecular size.Large PAH cations could be efficiently ionized in H i regions and provide a contribution to the heating of the gas by photoelectric effect. Also, at the border of or in H ii regions, PAHs could be exposed to photons of energy higher than 13.6 eV. Our work provides recipes to be used in astronomical models to quantify these points.
△ Less
Submitted 22 July, 2020; v1 submitted 5 May, 2020;
originally announced May 2020.
-
Topological Coded Distributed Computing
Authors:
Kai Wan,
Mingyue Ji,
Giuseppe Caire
Abstract:
This paper considers the MapReduce-like coded distributed computing framework originally proposed by Li et al., which uses coding techniques when distributed computing servers exchange their computed intermediate values, in order to reduce the overall traffic load. Their original model servers are connected via an error-free common communication bus allowing broadcast transmissions. However, this…
▽ More
This paper considers the MapReduce-like coded distributed computing framework originally proposed by Li et al., which uses coding techniques when distributed computing servers exchange their computed intermediate values, in order to reduce the overall traffic load. Their original model servers are connected via an error-free common communication bus allowing broadcast transmissions. However, this assumption is one of the major limitations in practice since the practical cloud computing network topologies are far more involved than a simple single bus. We formulate a topological coded distributed computing problem, where the distributed servers communicate with each other through some switch network. By using a special instance of fat-tree topologies, referred to as t-ary fat-tree proposed by Al-Fares et al. which can be built by some cheap switches, we propose a coded distributed computing scheme to achieve the minimum max-link communication load defined as the maximum load over all links.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Cache-Aided Modulation for Heterogeneous Coded Caching over a Gaussian Broadcast Channel
Authors:
Mozhgan Bayat,
Kai Wan,
Mingyue Ji,
Giuseppe Caire
Abstract:
Coded caching is an information theoretic scheme to reduce high peak hours traffic by partially prefetching files in the users local storage during low peak hours. This paper considers heterogeneous decentralized caching systems where cache of users and content library files may have distinct sizes. The server communicates with the users through a Gaussian broadcast channel. The main contribution…
▽ More
Coded caching is an information theoretic scheme to reduce high peak hours traffic by partially prefetching files in the users local storage during low peak hours. This paper considers heterogeneous decentralized caching systems where cache of users and content library files may have distinct sizes. The server communicates with the users through a Gaussian broadcast channel. The main contribution of this paper is a novel modulation strategy to map the multicast messages generated in the coded caching delivery phase to the symbols of a signal constellation, such that users can leverage their cached content to demodulate the desired symbols with higher reliability. For the sake of simplicity, in this paper we focus only on uncoded modulation and symbol-by-symbol error probability. However, our scheme in conjunction with multilevel coded modulation can be extended to channel coding over a larger block lengths.
△ Less
Submitted 16 January, 2020;
originally announced January 2020.
-
Heterogeneous Computation Assignments in Coded Elastic Computing
Authors:
Nicholas Woolsey,
Rong-Rong Chen,
Mingyue Ji
Abstract:
We study the optimal design of a heterogeneous coded elastic computing (CEC) network where machines have varying relative computation speeds. CEC introduced by Yang {\it et al.} is a framework which mitigates the impact of elastic events, where machines join and leave the network. A set of data is distributed among storage constrained machines using a Maximum Distance Separable (MDS) code such tha…
▽ More
We study the optimal design of a heterogeneous coded elastic computing (CEC) network where machines have varying relative computation speeds. CEC introduced by Yang {\it et al.} is a framework which mitigates the impact of elastic events, where machines join and leave the network. A set of data is distributed among storage constrained machines using a Maximum Distance Separable (MDS) code such that any subset of machines of a specific size can perform the desired computations. This design eliminates the need to re-distribute the data after each elastic event. In this work, we develop a process for an arbitrary heterogeneous computing network to minimize the overall computation time by defining an optimal computation load, or number of computations assigned to each machine. We then present an algorithm to define a specific computation assignment among the machines that makes use of the MDS code and meets the optimal computation load.
△ Less
Submitted 12 January, 2020;
originally announced January 2020.
-
On Optimal Load-Memory Tradeoff of Cache-Aided Scalar Linear Function Retrieval
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Daniela Tuninetti,
Giuseppe Caire
Abstract:
Coded caching has the potential to greatly reduce network traffic by leveraging the cheap and abundant storage available in end-user devices so as to create multicast opportunities in the delivery phase. In the seminal work by Maddah-Ali and Niesen (MAN), the shared-link coded caching problem was formulated, where each user demands one file (i.e., single file retrieval). This paper generalizes the…
▽ More
Coded caching has the potential to greatly reduce network traffic by leveraging the cheap and abundant storage available in end-user devices so as to create multicast opportunities in the delivery phase. In the seminal work by Maddah-Ali and Niesen (MAN), the shared-link coded caching problem was formulated, where each user demands one file (i.e., single file retrieval). This paper generalizes the MAN problem so as to allow users to request scalar linear functions of the files. This paper proposes a novel coded delivery scheme that, based on MAN uncoded cache placement, is shown to allow for the decoding of arbitrary scalar linear functions of the files (on arbitrary finite fields). Interestingly, and quite surprisingly, it is shown that the load for cache-aided scalar linear function retrieval depends on the number of linearly independent functions that are demanded, akin to the cache-aided single-file retrieval problem where the load depends on the number of distinct file requests. The proposed scheme is optimal under the constraint of uncoded cache placement, in terms of worst-case load, and within a factor 2 otherwise. The key idea of this paper can be extended to all scenarios which the original MAN scheme has been extended to, including demand-private and/or device-to-device settings.
△ Less
Submitted 10 January, 2020;
originally announced January 2020.
-
On the Fundamental Limits of Device-to-Device Private Caching under Uncoded Cache Placement and User Collusion
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Daniela Tuninetti,
Giuseppe Caire
Abstract:
In the coded caching problem, as originally formulated by Maddah-Ali and Niesen, a server communicates via a noiseless shared broadcast link to multiple users that have local storage capability. In order for a user to decode its demanded file from the coded multicast transmission, the demands of all the users must be globally known, which may violate the privacy of the users. To overcome this priv…
▽ More
In the coded caching problem, as originally formulated by Maddah-Ali and Niesen, a server communicates via a noiseless shared broadcast link to multiple users that have local storage capability. In order for a user to decode its demanded file from the coded multicast transmission, the demands of all the users must be globally known, which may violate the privacy of the users. To overcome this privacy problem, Wan and Caire recently proposed several schemes that attain coded multicasting gain while simultaneously guarantee information theoretic privacy of the users' demands. In Device-to-Device (D2D) networks, the demand privacy problem is further exacerbated by the fact that each user is also a transmitter, which appears to be needing the knowledge of the files demanded by the remaining users in order to form its coded multicast transmission. This paper shows how to solve this seemingly infeasible problem. The main contribution of this paper is the development of novel achievable and converse bounds for D2D coded caching that are to within a constant factor of one another when privacy of the users' demands must be guaranteed even in the presence of colluding users.
△ Less
Submitted 5 May, 2022; v1 submitted 19 December, 2019;
originally announced December 2019.
-
Photo-processing of astro-PAHs
Authors:
Christine Joblin,
Gabi Wenzel,
Sarah Rodriguez Castillo,
Aude Simon,
Hassan Sabbah,
Anthony Bonnamy,
Dominique Toublanc,
Giacomo Mulas,
Mingchao Ji,
Alexandre Giuliani,
Laurent Nahon
Abstract:
Polycyclic aromatic hydrocarbons (PAHs) are key species in astrophysical environments in which vacuum ultraviolet (VUV) photons are present, such as star-forming regions. The interaction with these VUV photons governs the physical and chemical evolution of PAHs. Models show that only large species can survive. However, the actual molecular properties of large PAHs are poorly characterized and the…
▽ More
Polycyclic aromatic hydrocarbons (PAHs) are key species in astrophysical environments in which vacuum ultraviolet (VUV) photons are present, such as star-forming regions. The interaction with these VUV photons governs the physical and chemical evolution of PAHs. Models show that only large species can survive. However, the actual molecular properties of large PAHs are poorly characterized and the ones included in models are only an extrapolation of the properties of small and medium-sized species. We discuss here experiments performed on trapped ions including some at the SOLEIL VUV beam line DESIRS. We focus on the case of the large dicoronylene cation, C48H20+ , and compare its behavior under VUV processing with that of smaller species. We suggest that C2H2 is not a relevant channel in the fragmentation of large PAHs. Ionization is found to largely dominate fragmentation. In addition, we report evidence for a hydrogen dissociation channel through excited electronic states. Although this channel is minor, it is already effective below 13.6 eV and can significantly influence the stability of astro-PAHs. We emphasize that the competition between ionization and dissociation in large PAHs should be further evaluated for their use in astrophysical models.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
Sequential Recommendation with Relation-Aware Kernelized Self-Attention
Authors:
Mingi Ji,
Weonyoung Joo,
Kyungwoo Song,
Yoon-Yeong Kim,
Il-Chul Moon
Abstract:
Recent studies identified that sequential Recommendation is improved by the attention mechanism. By following this development, we propose Relation-Aware Kernelized Self-Attention (RKSA) adopting a self-attention mechanism of the Transformer with augmentation of a probabilistic model. The original self-attention of Transformer is a deterministic measure without relation-awareness. Therefore, we in…
▽ More
Recent studies identified that sequential Recommendation is improved by the attention mechanism. By following this development, we propose Relation-Aware Kernelized Self-Attention (RKSA) adopting a self-attention mechanism of the Transformer with augmentation of a probabilistic model. The original self-attention of Transformer is a deterministic measure without relation-awareness. Therefore, we introduce a latent space to the self-attention, and the latent space models the recommendation context from relation as a multivariate skew-normal distribution with a kernelized covariance matrix from co-occurrences, item characteristics, and user information. This work merges the self-attention of the Transformer and the sequential recommendation by adding a probabilistic model of the recommendation task specifics. We experimented RKSA over the benchmark datasets, and RKSA shows significant improvements compared to the recent baseline models. Also, RKSA were able to produce a latent space model that answers the reasons for recommendation.
△ Less
Submitted 14 November, 2019;
originally announced November 2019.
-
Device-to-Device Private Caching with Trusted Server
Authors:
Kai Wan,
Hua Sun,
Mingyue Ji,
Daniela Tuninetti,
Giuseppe Caire
Abstract:
In order to preserve the privacy of the users demands from other users, in this paper we formulate a novel information theoretic Device-to-Device (D2D) private caching model by adding a trusted server. In the delivery phase, the trusted server collects the users demands and sends a query to each user, who then broadcasts packets according to this query. Two D2D private caching schemes (uncoded and…
▽ More
In order to preserve the privacy of the users demands from other users, in this paper we formulate a novel information theoretic Device-to-Device (D2D) private caching model by adding a trusted server. In the delivery phase, the trusted server collects the users demands and sends a query to each user, who then broadcasts packets according to this query. Two D2D private caching schemes (uncoded and coded) are proposed in this paper, which are shown to be order optimal.
△ Less
Submitted 16 June, 2021; v1 submitted 26 September, 2019;
originally announced September 2019.
-
Implicit Recursive Characteristics of STOP
Authors:
Mike H. Ji
Abstract:
The most important notations of Communicating Sequential Process(CSP) are the process and the prefix (event)$\rightarrow$(process) operator. While we can formally apply the $\rightarrow$ operator to define a live process's behavior, the STOP process, which usually resulted from deadlock, starving or livelock, is lack of formal description, defined by most literatures as "doing nothing but halt". I…
▽ More
The most important notations of Communicating Sequential Process(CSP) are the process and the prefix (event)$\rightarrow$(process) operator. While we can formally apply the $\rightarrow$ operator to define a live process's behavior, the STOP process, which usually resulted from deadlock, starving or livelock, is lack of formal description, defined by most literatures as "doing nothing but halt". In this paper, we argue that the STOP process should not be considered as a black box, it should follow the prefix $\rightarrow$ schema and the same inference rules so that a unified and consistent process algebra model can be established. In order to achieve this goal, we introduce a special event called "nil" that any process can take. This nil event will do nothing meaningful and leave nothing on a process's observable record. With the nil event and its well-defined rules, we can successfully use the $\rightarrow$ operator to formally describe a process's complete behavior in its whole life circle. More interestingly, we can use prefix $\rightarrow$ and nil event to fully describe the STOP process's internal behavior and conclude that the STOP's formal equation can be given as simple as STOP$_{αX} = μ$ X. nil $\rightarrow$ X.
△ Less
Submitted 20 August, 2019; v1 submitted 19 August, 2019;
originally announced August 2019.
-
Proper disconnection of graphs
Authors:
Xuqing Bai,
You Chen,
Meng Ji,
Xueliang Li,
Yindi Weng,
Wenyan Wu
Abstract:
For an edge-colored graph $G$, a set $F$ of edges of $G$ is called a \emph{proper cut} if $F$ is an edge-cut of $G$ and any pair of adjacent edges in $F$ are assigned by different colors. An edge-colored graph is \emph{proper disconnected} if for each pair of distinct vertices of $G$ there exists a proper edge-cut separating them. For a connected graph $G$, the \emph{proper disconnection number} o…
▽ More
For an edge-colored graph $G$, a set $F$ of edges of $G$ is called a \emph{proper cut} if $F$ is an edge-cut of $G$ and any pair of adjacent edges in $F$ are assigned by different colors. An edge-colored graph is \emph{proper disconnected} if for each pair of distinct vertices of $G$ there exists a proper edge-cut separating them. For a connected graph $G$, the \emph{proper disconnection number} of $G$, denoted by $pd(G)$, is the minimum number of colors that are needed in order to make $G$ proper disconnected. In this paper, we first give the exact values of the proper disconnection numbers for some special families of graphs. Next, we obtain a sharp upper bound of $pd(G)$ for a connected graph $G$ of order $n$, i.e, $pd(G)\leq \min\{ χ'(G)-1, \left \lceil \frac{n}{2} \right \rceil\}$. Finally, we show that for given integers $k$ and $n$, the minimum size of a connected graph $G$ of order $n$ with $pd(G)=k$ is $n-1$ for $k=1$ and $n+2k-4$ for $2\leq k\leq \lceil\frac{n}{2}\rceil$.
△ Less
Submitted 5 June, 2019;
originally announced June 2019.
-
Computer-aided Detection of Squamous Carcinoma of the Cervix in Whole Slide Images
Authors:
Ye Tian,
Li Yang,
Wei Wang,
**g Zhang,
Qing Tang,
Mili Ji,
Yang Yu,
Yu Li,
Hong Yang,
Airong Qian
Abstract:
Goal: Squamous cell carcinoma of cervix is one of the most prevalent cancer worldwide in females. Traditionally, the most indispensable diagnosis of cervix squamous carcinoma is histopathological assessment which is achieved under microscope by pathologist. However, human evaluation of pathology slide is highly depending on the experience of pathologist, thus big inter- and intra-observer variabil…
▽ More
Goal: Squamous cell carcinoma of cervix is one of the most prevalent cancer worldwide in females. Traditionally, the most indispensable diagnosis of cervix squamous carcinoma is histopathological assessment which is achieved under microscope by pathologist. However, human evaluation of pathology slide is highly depending on the experience of pathologist, thus big inter- and intra-observer variability exists. Digital pathology, in combination with deep learning provides an opportunity to improve the objectivity and efficiency of histopathologic slide analysis. Methods: In this study, we obtained 800 haematoxylin and eosin stained slides from 300 patients suffered from cervix squamous carcinoma. Based on information from morphological heterogeneity in the tumor and its adjacent area, we established deep learning models using popular convolution neural network architectures (inception-v3, InceptionResnet-v2 and Resnet50). Then random forest was introduced to feature extractions and slide-based classification. Results: The overall performance of our proposed models on slide-based tumor discrimination were outstanding with an AUC scores > 0.94. While, location identifications of lesions in whole slide images were mediocre (FROC scores > 0.52) duo to the extreme complexity of tumor tissues. Conclusion: For the first time, our analysis workflow highlighted a quantitative visual-based slide analysis of cervix squamous carcinoma. Significance: This study demonstrates a pathway to assist pathologist and accelerate the diagnosis of patients by utilizing new computational approaches.
△ Less
Submitted 26 May, 2019;
originally announced May 2019.
-
Hierarchical Context enabled Recurrent Neural Network for Recommendation
Authors:
Kyungwoo Song,
Mingi Ji,
Sungrae Park,
Il-Chul Moon
Abstract:
A long user history inevitably reflects the transitions of personal interests over time. The analyses on the user history require the robust sequential model to anticipate the transitions and the decays of user interests. The user history is often modeled by various RNN structures, but the RNN structures in the recommendation system still suffer from the long-term dependency and the interest drift…
▽ More
A long user history inevitably reflects the transitions of personal interests over time. The analyses on the user history require the robust sequential model to anticipate the transitions and the decays of user interests. The user history is often modeled by various RNN structures, but the RNN structures in the recommendation system still suffer from the long-term dependency and the interest drifts. To resolve these challenges, we suggest HCRNN with three hierarchical contexts of the global, the local, and the temporary interests. This structure is designed to withhold the global long-term interest of users, to reflect the local sub-sequence interests, and to attend the temporary interests of each transition. Besides, we propose a hierarchical context-based gate structure to incorporate our \textit{interest drift assumption}. As we suggest a new RNN structure, we support HCRNN with a complementary \textit{bi-channel attention} structure to utilize hierarchical context. We experimented the suggested structure on the sequential recommendation tasks with CiteULike, MovieLens, and LastFM, and our model showed the best performances in the sequential recommendations.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
Adversarial Dropout for Recurrent Neural Networks
Authors:
Sungrae Park,
Kyungwoo Song,
Mingi Ji,
Wonsung Lee,
Il-Chul Moon
Abstract:
Successful application processing sequential data, such as text and speech, requires an improved generalization performance of recurrent neural networks (RNNs). Dropout techniques for RNNs were introduced to respond to these demands, but we conjecture that the dropout on RNNs could have been improved by adopting the adversarial concept. This paper investigates ways to improve the dropout for RNNs…
▽ More
Successful application processing sequential data, such as text and speech, requires an improved generalization performance of recurrent neural networks (RNNs). Dropout techniques for RNNs were introduced to respond to these demands, but we conjecture that the dropout on RNNs could have been improved by adopting the adversarial concept. This paper investigates ways to improve the dropout for RNNs by utilizing intentionally generated dropout masks. Specifically, the guided dropout used in this research is called as adversarial dropout, which adversarially disconnects neurons that are dominantly used to predict correct targets over time. Our analysis showed that our regularizer, which consists of a gap between the original and the reconfigured RNNs, was the upper bound of the gap between the training and the inference phases of the random dropout. We demonstrated that minimizing our regularizer improved the effectiveness of the dropout for RNNs on sequential MNIST tasks, semi-supervised text classification tasks, and language modeling tasks.
△ Less
Submitted 22 April, 2019;
originally announced April 2019.