-
Parametric multi-element coupling architecture for coherent and dissipative control of superconducting qubits
Authors:
G. B. P. Huber,
F. A. Roy,
L. Koch,
I. Tsitsilin,
J. Schirk,
N. J. Glaser,
N. Bruckmoser,
C. Schweizer,
J. Romeiro,
G. Krylov,
M. Singh,
F. X. Haslbeck,
M. Knudsen,
A. Marx,
F. Pfeiffer,
C. Schneider,
F. Wallner,
D. Bunch,
L. Richard,
L. Södergren,
K. Liegener,
M. Werninghaus,
S. Filipp
Abstract:
As systems for quantum computing keep growing in size and number of qubits, challenges in scaling the control capabilities are becoming increasingly relevant. Efficient schemes to simultaneously mediate coherent interactions between multiple quantum systems and to reduce decoherence errors can minimize the control overhead in next-generation quantum processors. Here, we present a superconducting q…
▽ More
As systems for quantum computing keep growing in size and number of qubits, challenges in scaling the control capabilities are becoming increasingly relevant. Efficient schemes to simultaneously mediate coherent interactions between multiple quantum systems and to reduce decoherence errors can minimize the control overhead in next-generation quantum processors. Here, we present a superconducting qubit architecture based on tunable parametric interactions to perform two-qubit gates, reset, leakage recovery and to read out the qubits. In this architecture, parametrically driven multi-element couplers selectively couple qubits to resonators and neighbouring qubits, according to the frequency of the drive. We consider a system with two qubits and one readout resonator interacting via a single coupling circuit and experimentally demonstrate a controlled-Z gate with a fidelity of $98.30\pm 0.23 \%$, a reset operation that unconditionally prepares the qubit ground state with a fidelity of $99.80\pm 0.02 \%$ and a leakage recovery operation with a $98.5\pm 0.3 \%$ success probability. Furthermore, we implement a parametric readout with a single-shot assignment fidelity of $88.0\pm 0.4 \%$. These operations are all realized using a single tunable coupler, demonstrating the experimental feasibility of the proposed architecture and its potential for reducing the system complexity in scalable quantum processors.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Efficient decoupling of a non-linear qubit mode from its environment
Authors:
Frederik Pfeiffer,
Max Werninghaus,
Christian Schweizer,
Niklas Bruckmoser,
Leon Koch,
Niklas J. Glaser,
Gerhard Huber,
David Bunch,
Franz X. Haslbeck,
M. Knudsen,
Gleb Krylov,
Klaus Liegener,
Achim Marx,
Lea Richard,
João H. Romeiro,
Federico Roy,
Johannes Schirk,
Christian Schneider,
Malay Singh,
Lasse Södergren,
Ivan Tsitsilin,
Florian Wallner,
Carlos A. Riofrío,
Stefan Filipp
Abstract:
To control and measure the state of a quantum system it must necessarily be coupled to external degrees of freedom. This inevitably leads to spontaneous emission via the Purcell effect, photon-induced dephasing from measurement back-action, and errors caused by unwanted interactions with nearby quantum systems. To tackle this fundamental challenge, we make use of the design flexibility of supercon…
▽ More
To control and measure the state of a quantum system it must necessarily be coupled to external degrees of freedom. This inevitably leads to spontaneous emission via the Purcell effect, photon-induced dephasing from measurement back-action, and errors caused by unwanted interactions with nearby quantum systems. To tackle this fundamental challenge, we make use of the design flexibility of superconducting quantum circuits to form a multi-mode element -- an artificial molecule -- with symmetry-protected modes. The proposed circuit consists of three superconducting islands coupled to a central island via Josephson junctions. It exhibits two essential non-linear modes, one of which is flux-insensitive and used as the protected qubit mode. The second mode is flux-tunable and serves via a cross-Kerr type coupling as a mediator to control the dispersive coupling of the qubit mode to the readout resonator. We demonstrate the Purcell protection of the qubit mode by measuring relaxation times that are independent of the mediated dispersive coupling. We show that the coherence of the qubit is not limited by photon-induced dephasing when detuning the mediator mode from the readout resonator and thereby reducing the dispersive coupling. The resulting highly protected qubit with tunable interactions may serve as a basic building block of a scalable quantum processor architecture, in which qubit decoherence is strongly suppressed.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Applying Pre-Trained Deep-Learning Model on Wrist Angel Data -- An Analysis Plan
Authors:
Harald Vilhelm Skat-Rørdam,
Mia Hang Knudsen,
Simon Nørby Knudsen,
Nicole Nadine Lønfeldt,
Sneha Das,
Line Katrine Harder Clemmensen
Abstract:
We aim to investigate if we can improve predictions of stress caused by OCD symptoms using pre-trained models, and present our statistical analysis plan in this paper. With the methods presented in this plan, we aim to avoid bias from data knowledge and thereby strengthen our hypotheses and findings. The Wrist Angel study, which this statistical analysis plan concerns, contains data from nine part…
▽ More
We aim to investigate if we can improve predictions of stress caused by OCD symptoms using pre-trained models, and present our statistical analysis plan in this paper. With the methods presented in this plan, we aim to avoid bias from data knowledge and thereby strengthen our hypotheses and findings. The Wrist Angel study, which this statistical analysis plan concerns, contains data from nine participants, between 8 and 17 years old, diagnosed with obsessive-compulsive disorder (OCD). The data was obtained by an Empatica E4 wristband, which the participants wore during waking hours for 8 weeks. The purpose of the study is to assess the feasibility of predicting the in-the-wild OCD events captured during this period. In our analysis, we aim to investigate if we can improve predictions of stress caused by OCD symptoms, and to do this we have created a pre-trained model, trained on four open-source data for stress prediction. We intend to apply this pre-trained model to the Wrist Angel data by fine-tuning, thereby utilizing transfer learning. The pre-trained model is a convolutional neural network that uses blood volume pulse, heart rate, electrodermal activity, and skin temperature as time series windows to predict OCD events. Furthermore, using accelerometer data, another model filters physical activity to further improve performance, given that physical activity is physiologically similar to stress. By evaluating various ways of applying our model (fine-tuned, non-fine-tuned, pre-trained, non-pre-trained, and with or without activity classification), we contextualize the problem such that it can be assessed if transfer learning is a viable strategy in this domain.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
Solving Differential Equations via Continuous-Variable Quantum Computers
Authors:
Martin Knudsen,
Christian B. Mendl
Abstract:
We explore how a continuous-variable (CV) quantum computer could solve a classic differential equation, making use of its innate capability to represent real numbers in qumodes. Specifically, we construct variational CV quantum circuits [Killoran et al., Phys.~Rev.~Research 1, 033063 (2019)] to approximate the solution of one-dimensional ordinary differential equations (ODEs), with input encoding…
▽ More
We explore how a continuous-variable (CV) quantum computer could solve a classic differential equation, making use of its innate capability to represent real numbers in qumodes. Specifically, we construct variational CV quantum circuits [Killoran et al., Phys.~Rev.~Research 1, 033063 (2019)] to approximate the solution of one-dimensional ordinary differential equations (ODEs), with input encoding based on displacement gates and output via measurement averages. Our simulations and parameter optimization using the PennyLane / Strawberry Fields framework demonstrate good convergence for both linear and non-linear ODEs.
△ Less
Submitted 22 December, 2020;
originally announced December 2020.
-
Inertial and viscous flywheel sensing of nanoparticles
Authors:
Georgios Katsikis,
Jesse F. Collis,
Scott M. Knudsen,
Vincent Agache,
John E. Sader,
Scott R. Manalis
Abstract:
Rotational dynamics often challenge physical intuition while enabling unique realizations, from the rotor of a gyroscope that maintains its orientation regardless of the outer gimbals, to a tennis racket that rotates around its handle when tossed face-up in the air. In the context of inertial mass sensing, which can measure mass with atomic precision, rotational dynamics are normally considered a…
▽ More
Rotational dynamics often challenge physical intuition while enabling unique realizations, from the rotor of a gyroscope that maintains its orientation regardless of the outer gimbals, to a tennis racket that rotates around its handle when tossed face-up in the air. In the context of inertial mass sensing, which can measure mass with atomic precision, rotational dynamics are normally considered a complication hindering measurement interpretation. Here, we exploit the rotational dynamics of a microfluidic device to develop a new modality in inertial resonant sensing. Combining theory with experiments, we show that this modality normally measures the volume of the particle while being insensitive to its density. Paradoxically, particle density only emerges when fluid viscosity becomes dominant over inertia. We explain this paradox via a viscosity-driven, hydrodynamic coupling between the fluid and the particle that activates the rotational inertia of the particle, converting it into a viscous flywheel. This modality now enables the simultaneous measurement of particle volume and mass in fluid, using a single, high-throughput measurement.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Fast hashing with Strong Concentration Bounds
Authors:
Anders Aamand,
Jakob B. T. Knudsen,
Mathias B. T. Knudsen,
Peter M. R. Rasmussen,
Mikkel Thorup
Abstract:
Previous work on tabulation hashing by Patrascu and Thorup from STOC'11 on simple tabulation and from SODA'13 on twisted tabulation offered Chernoff-style concentration bounds on hash based sums, e.g., the number of balls/keys hashing to a given bin, but under some quite severe restrictions on the expected values of these sums. The basic idea in tabulation hashing is to view a key as consisting of…
▽ More
Previous work on tabulation hashing by Patrascu and Thorup from STOC'11 on simple tabulation and from SODA'13 on twisted tabulation offered Chernoff-style concentration bounds on hash based sums, e.g., the number of balls/keys hashing to a given bin, but under some quite severe restrictions on the expected values of these sums. The basic idea in tabulation hashing is to view a key as consisting of $c=O(1)$ characters, e.g., a 64-bit key as $c=8$ characters of 8-bits. The character domain $Σ$ should be small enough that character tables of size $|Σ|$ fit in fast cache. The schemes then use $O(1)$ tables of this size, so the space of tabulation hashing is $O(|Σ|)$. However, the concentration bounds by Patrascu and Thorup only apply if the expected sums are $\ll |Σ|$.
To see the problem, consider the very simple case where we use tabulation hashing to throw $n$ balls into $m$ bins and want to analyse the number of balls in a given bin. With their concentration bounds, we are fine if $n=m$, for then the expected value is $1$. However, if $m=2$, as when tossing $n$ unbiased coins, the expected value $n/2$ is $\gg |Σ|$ for large data sets, e.g., data sets that do not fit in fast cache.
To handle expectations that go beyond the limits of our small space, we need a much more advanced analysis of simple tabulation, plus a new tabulation technique that we call \emph{tabulation-permutation} hashing which is at most twice as slow as simple tabulation. No other hashing scheme of comparable speed offers similar Chernoff-style concentration bounds.
△ Less
Submitted 10 August, 2020; v1 submitted 1 May, 2019;
originally announced May 2019.
-
Power of $d$ Choices with Simple Tabulation
Authors:
Anders Aamand,
Mathias Bæk Tejs Knudsen,
Mikkel Thorup
Abstract:
Suppose that we are to place $m$ balls into $n$ bins sequentially using the $d$-choice paradigm: For each ball we are given a choice of $d$ bins, according to $d$ hash functions $h_1,\dots,h_d$ and we place the ball in the least loaded of these bins breaking ties arbitrarily. Our interest is in the number of balls in the fullest bin after all $m$ balls have been placed.
Azar et al. [STOC'94] pro…
▽ More
Suppose that we are to place $m$ balls into $n$ bins sequentially using the $d$-choice paradigm: For each ball we are given a choice of $d$ bins, according to $d$ hash functions $h_1,\dots,h_d$ and we place the ball in the least loaded of these bins breaking ties arbitrarily. Our interest is in the number of balls in the fullest bin after all $m$ balls have been placed.
Azar et al. [STOC'94] proved that when $m=O(n)$ and when the hash functions are fully random the maximum load is at most $\frac{\lg \lg n }{\lg d}+O(1)$ whp (i.e. with probability $1-O(n^{-γ})$ for any choice of $γ$).
In this paper we suppose that the $h_1,\dots,h_d$ are simple tabulation hash functions. Generalising a result by Dahlgaard et al [SODA'16] we show that for an arbitrary constant $d\geq 2$ the maximum load is $O(\lg \lg n)$ whp, and that expected maximum load is at most $\frac{\lg \lg n}{\lg d}+O(1)$. We further show that by using a simple tie-breaking algorithm introduced by Vöcking [J.ACM'03] the expected maximum load drops to $\frac{\lg \lg n}{d\lg \varphi_d}+O(1)$ where $\varphi_d$ is the rate of growth of the $d$-ary Fibonacci numbers. Both of these expected bounds match those of the fully random setting.
The analysis by Dahlgaard et al. relies on a proof by Pătraşcu and Thorup [J.ACM'11] concerning the use of simple tabulation for cuckoo hashing. We need here a generalisation to $d>2$ hash functions, but the original proof is an 8-page tour de force of ad-hoc arguments that do not appear to generalise. Our main technical contribution is a shorter, simpler and more accessible proof of the result by Pătraşcu and Thorup, where the relevant parts generalise nicely to the analysis of $d$ choices.
△ Less
Submitted 25 April, 2018;
originally announced April 2018.
-
Practical Hash Functions for Similarity Estimation and Dimensionality Reduction
Authors:
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Mikkel Thorup
Abstract:
Hashing is a basic tool for dimensionality reduction employed in several aspects of machine learning. However, the perfomance analysis is often carried out under the abstract assumption that a truly random unit cost hash function is used, without concern for which concrete hash function is employed. The concrete hash function may work fine on sufficiently random input. The question is if it can be…
▽ More
Hashing is a basic tool for dimensionality reduction employed in several aspects of machine learning. However, the perfomance analysis is often carried out under the abstract assumption that a truly random unit cost hash function is used, without concern for which concrete hash function is employed. The concrete hash function may work fine on sufficiently random input. The question is if it can be trusted in the real world when faced with more structured input.
In this paper we focus on two prominent applications of hashing, namely similarity estimation with the one permutation hashing (OPH) scheme of Li et al. [NIPS'12] and feature hashing (FH) of Weinberger et al. [ICML'09], both of which have found numerous applications, i.e. in approximate near-neighbour search with LSH and large-scale classification with SVM.
We consider mixed tabulation hashing of Dahlgaard et al.[FOCS'15] which was proved to perform like a truly random hash function in many applications, including OPH. Here we first show improved concentration bounds for FH with truly random hashing and then argue that mixed tabulation performs similar for sparse input. Our main contribution, however, is an experimental comparison of different hashing schemes when used inside FH, OPH, and LSH.
We find that mixed tabulation hashing is almost as fast as the multiply-mod-prime scheme ax+b mod p. Mutiply-mod-prime is guaranteed to work well on sufficiently random data, but we demonstrate that in the above applications, it can lead to bias and poor concentration on both real-world and synthetic data. We also compare with the popular MurmurHash3, which has no proven guarantees. Mixed tabulation and MurmurHash3 both perform similar to truly random hashing in our experiments. However, mixed tabulation is 40% faster than MurmurHash3, and it has the proven guarantee of good performance on all possible input.
△ Less
Submitted 23 November, 2017;
originally announced November 2017.
-
The influence of metallicity on stellar differential rotation and magnetic activity
Authors:
Christoffer Karoff,
Travis S. Metcalfe,
Angela R. G. Santos,
Benjamin T. Montet,
Howard Isaacson,
Veronika Witzke,
Alexander I. Shapiro,
Savita Mathur,
Guy R. Davies,
Mikkel N. Lund,
Rafael A. Garcia,
Allan S. Brun,
David Salabert,
Pedro P. Avelino,
Jennifer van Saders,
Ricky Egeland,
Margarida S. Cunha,
Tiago L. Campante,
William J. Chaplin,
Natalie Krivova,
Sami K. Solanki,
Maximilian Stritzinger,
Mads F. Knudsen
Abstract:
Observations of Sun-like stars over the last half-century have improved our understanding of how magnetic dynamos, like that responsible for the 11-year solar cycle, change with rotation, mass and age. Here we show for the first time how metallicity can affect a stellar dynamo. Using the most complete set of observations of a stellar cycle ever obtained for a Sun-like star, we show how the solar a…
▽ More
Observations of Sun-like stars over the last half-century have improved our understanding of how magnetic dynamos, like that responsible for the 11-year solar cycle, change with rotation, mass and age. Here we show for the first time how metallicity can affect a stellar dynamo. Using the most complete set of observations of a stellar cycle ever obtained for a Sun-like star, we show how the solar analog HD 173701 exhibits solar-like differential rotation and a 7.4-year activity cycle. While the duration of the cycle is comparable to that generated by the solar dynamo, the amplitude of the brightness variability is substantially stronger. The only significant difference between HD 173701 and the Sun is its metallicity, which is twice the solar value. Therefore, this provides a unique opportunity to study the effect of the higher metallicity on the dynamo acting in this star and to obtain a comprehensive understanding of the physical mechanisms responsible for the observed photometric variability. The observations can be explained by the higher metallicity of the star, which is predicted to foster a deeper outer convection zone and a higher facular contrast, resulting in stronger variability.
△ Less
Submitted 21 November, 2017;
originally announced November 2017.
-
Efficient Modal Decomposition of Vortex Beams via Holographically Reconstructed Phase
Authors:
Jasmine M. Knudsen,
Samuel N. Alperin,
Andrew A. Voitiv,
William G. Holtzmann,
Juliet T. Gopinath,
Mark E. Siemens
Abstract:
We use phase-shifting digital holography to measure the amplitude and phase of twisted light. In our experiment, a spatial light modulator generates the studied vortex beams in addition to a co-propagating reference beam with a controllable relative phase. We show complex field measurements for single and superposition Laguerre Gaussian (LG) modes, demonstrate full modal decompositions into LG and…
▽ More
We use phase-shifting digital holography to measure the amplitude and phase of twisted light. In our experiment, a spatial light modulator generates the studied vortex beams in addition to a co-propagating reference beam with a controllable relative phase. We show complex field measurements for single and superposition Laguerre Gaussian (LG) modes, demonstrate full modal decompositions into LG and orbital angular momentum (OAM) power spectral bases, provide error analysis and demonstrate high insensitivity to detector misalignment to show the robustness of the technique. This enables rapid determination of OAM spectra with low uncertainty, allowing us to report the first vortex beams with 99.9% purity.
△ Less
Submitted 8 October, 2017;
originally announced October 2017.
-
Linear Hashing is Awesome
Authors:
Mathias Bæk Tejs Knudsen
Abstract:
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected length of the longest chain is $\tilde{O}\!\left(n^{1/3}\right)$. The proof also generalises to give the same bound when we use the multiply-shift…
▽ More
We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use $h(x)$ in hashing with chaining to insert $n$ elements into a table of size $n$ the expected length of the longest chain is $\tilde{O}\!\left(n^{1/3}\right)$. The proof also generalises to give the same bound when we use the multiply-shift hash function by Dietzfelbinger et al. [Journal of Algorithms 1997].
△ Less
Submitted 8 June, 2017;
originally announced June 2017.
-
The Entropy of Backwards Analysis
Authors:
Mathias Bæk Tejs Knudsen,
Mikkel Thorup
Abstract:
Backwards analysis, first popularized by Seidel, is often the simplest most elegant way of analyzing a randomized algorithm. It applies to incremental algorithms where elements are added incrementally, following some random permutation, e.g., incremental Delauney triangulation of a pointset, where points are added one by one, and where we always maintain the Delauney triangulation of the points ad…
▽ More
Backwards analysis, first popularized by Seidel, is often the simplest most elegant way of analyzing a randomized algorithm. It applies to incremental algorithms where elements are added incrementally, following some random permutation, e.g., incremental Delauney triangulation of a pointset, where points are added one by one, and where we always maintain the Delauney triangulation of the points added thus far. For backwards analysis, we think of the permutation as generated backwards, implying that the $i$th point in the permutation is picked uniformly at random from the $i$ points not picked yet in the backwards direction. Backwards analysis has also been applied elegantly by Chan to the randomized linear time minimum spanning tree algorithm of Karger, Klein, and Tarjan.
The question considered in this paper is how much randomness we need in order to trust the expected bounds obtained using backwards analysis, exactly and approximately. For the exact case, it turns out that a random permutation works if and only if it is minwise, that is, for any given subset, each element has the same chance of being first. Minwise permutations are known to have $Θ(n)$ entropy, and this is then also what we need for exact backwards analysis.
However, when it comes to approximation, the two concepts diverge dramatically. To get backwards analysis to hold within a factor $α$, the random permutation needs entropy $Ω(n/α)$. This contrasts with minwise permutations, where it is known that a $1+\varepsilon$ approximation only needs $Θ(\log (n/\varepsilon))$ entropy. Our negative result for backwards analysis essentially shows that it is as abstract as any analysis based on full randomness.
△ Less
Submitted 14 April, 2017;
originally announced April 2017.
-
Additive Spanners and Distance Oracles in Quadratic Time
Authors:
Mathias Bæk Tejs Knudsen
Abstract:
Let $G$ be an unweighted, undirected graph. An additive $k$-spanner of $G$ is a subgraph $H$ that approximates all distances between pairs of nodes up to an additive error of $+k$, that is, it satisfies $d_H(u,v) \le d_G(u,v)+k$ for all nodes $u,v$, where $d$ is the shortest path distance. We give a deterministic algorithm that constructs an additive $O\!\left(1\right)$-spanner with…
▽ More
Let $G$ be an unweighted, undirected graph. An additive $k$-spanner of $G$ is a subgraph $H$ that approximates all distances between pairs of nodes up to an additive error of $+k$, that is, it satisfies $d_H(u,v) \le d_G(u,v)+k$ for all nodes $u,v$, where $d$ is the shortest path distance. We give a deterministic algorithm that constructs an additive $O\!\left(1\right)$-spanner with $O\!\left(n^{4/3}\right)$ edges in $O\!\left(n^2\right)$ time. This should be compared with the randomized Monte Carlo algorithm by Woodruff [ICALP 2010] giving an additive $6$-spanner with $O\!\left(n^{4/3}\log^3 n\right)$ edges in expected time $O\!\left(n^2\log^2 n\right)$.
An $(α,β)$-approximate distance oracle for $G$ is a data structure that supports the following distance queries between pairs of nodes in $G$. Given two nodes $u$, $v$ it can in constant time compute a distance estimate $\tilde{d}$ that satisfies $d \le \tilde{d} \le αd + β$ where $d$ is the distance between $u$ and $v$ in $G$. Sommer [ICALP 2016] gave a randomized Monte Carlo $(2,1)$-distance oracle of size $O\!\left(n^{5/3}\text{poly} \log n\right)$ in expected time $O\!\left(n^2\text{poly} \log n\right)$. As an application of the additive $O(1)$-spanner we improve the construction by Sommer [ICALP 2016] and give a Las Vegas $(2,1)$-distance oracle of size $O\!\left(n^{5/3}\right)$ in time $O\!\left(n^2\right)$. This also implies an algorithm that in $O\!\left(n^2\right)$ gives approximate distance for all pairs of nodes in $G$ improving on the $O\!\left(n^2 \log n\right)$ algorithm by Baswana and Kavitha [SICOMP 2010].
△ Less
Submitted 14 April, 2017;
originally announced April 2017.
-
Maximal Unbordered Factors of Random Strings
Authors:
Patrick Hagge Cording,
Travis Gagie,
Mathias Bæk Tejs Knudsen,
Tomasz Kociumaka
Abstract:
A border of a string is a non-empty prefix of the string that is also a suffix of the string, and a string is unbordered if it has no border other than itself. Loptev, Kucherov, and Starikovskaya [CPM 2015] conjectured the following: If we pick a string of length $n$ from a fixed non-unary alphabet uniformly at random, then the expected maximum length of its unbordered factors is $n - O(1)$. We co…
▽ More
A border of a string is a non-empty prefix of the string that is also a suffix of the string, and a string is unbordered if it has no border other than itself. Loptev, Kucherov, and Starikovskaya [CPM 2015] conjectured the following: If we pick a string of length $n$ from a fixed non-unary alphabet uniformly at random, then the expected maximum length of its unbordered factors is $n - O(1)$. We confirm this conjecture by proving that the expected value is, in fact, ${n - Θ(σ^{-1})}$, where $σ$ is the size of the alphabet. This immediately implies that we can find such a maximal unbordered factor in linear time on average. However, we go further and show that the optimum average-case running time is in $Ω(\sqrt{n}) \cap O (\sqrt{n \log_σn})$ due to analogous bounds by Czumaj and Gąsieniec [CPM 2000] for the problem of computing the shortest period of a uniformly random string.
△ Less
Submitted 17 December, 2018; v1 submitted 14 April, 2017;
originally announced April 2017.
-
New Subquadratic Approximation Algorithms for the Girth
Authors:
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Morten Stöckel
Abstract:
We consider the problem of approximating the girth, $g$, of an unweighted and undirected graph $G=(V,E)$ with $n$ nodes and $m$ edges. A seminal result of Itai and Rodeh [SICOMP'78] gave an additive $1$-approximation in $O(n^2)$ time, and the main open question is thus how well we can do in subquadratic time.
In this paper we present two main results. The first is a $(1+\varepsilon,O(1))$-approx…
▽ More
We consider the problem of approximating the girth, $g$, of an unweighted and undirected graph $G=(V,E)$ with $n$ nodes and $m$ edges. A seminal result of Itai and Rodeh [SICOMP'78] gave an additive $1$-approximation in $O(n^2)$ time, and the main open question is thus how well we can do in subquadratic time.
In this paper we present two main results. The first is a $(1+\varepsilon,O(1))$-approximation in truly subquadratic time. Specifically, for any $k\ge 2$ our algorithm returns a cycle of length $2\lceil g/2\rceil+2\left\lceil\frac{g}{2(k-1)}\right\rceil$ in $\tilde{O}(n^{2-1/k})$ time. This generalizes the results of Lingas and Lundell [IPL'09] who showed it for the special case of $k=2$ and Roditty and Vassilevska Williams [SODA'12] who showed it for $k=3$. Our second result is to present an $O(1)$-approximation running in $O(n^{1+\varepsilon})$ time for any $\varepsilon > 0$. Prior to this work the fastest constant-factor approximation was the $\tilde{O}(n^{3/2})$ time $8/3$-approximation of Lingas and Lundell [IPL'09] using the algorithm corresponding to the special case $k=2$ of our first result.
△ Less
Submitted 7 April, 2017;
originally announced April 2017.
-
Finding Even Cycles Faster via Capped k-Walks
Authors:
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Morten Stöckel
Abstract:
In this paper, we consider the problem of finding a cycle of length $2k$ (a $C_{2k}$) in an undirected graph $G$ with $n$ nodes and $m$ edges for constant $k\ge2$. A classic result by Bondy and Simonovits [J.Comb.Th.'74] implies that if $m \ge100k n^{1+1/k}$, then $G$ contains a $C_{2k}$, further implying that one needs to consider only graphs with $m = O(n^{1+1/k})$.
Previously the best known a…
▽ More
In this paper, we consider the problem of finding a cycle of length $2k$ (a $C_{2k}$) in an undirected graph $G$ with $n$ nodes and $m$ edges for constant $k\ge2$. A classic result by Bondy and Simonovits [J.Comb.Th.'74] implies that if $m \ge100k n^{1+1/k}$, then $G$ contains a $C_{2k}$, further implying that one needs to consider only graphs with $m = O(n^{1+1/k})$.
Previously the best known algorithms were an $O(n^2)$ algorithm due to Yuster and Zwick [J.Disc.Math'97] as well as a $O(m^{2-(1+\lceil k/2\rceil^{-1})/(k+1)})$ algorithm by Alon et al. [Algorithmica'97].
We present an algorithm that uses $O(m^{2k/(k+1)})$ time and finds a $C_{2k}$ if one exists. This bound is $O(n^2)$ exactly when $m=Θ(n^{1+1/k})$. For $4$-cycles our new bound coincides with Alon et al., while for every $k>2$ our bound yields a polynomial improvement in $m$.
Yuster and Zwick noted that it is "plausible to conjecture that $O(n^2)$ is the best possible bound in terms of $n$". We show "conditional optimality": if this hypothesis holds then our $O(m^{2k/(k+1)})$ algorithm is tight as well. Furthermore, a folklore reduction implies that no combinatorial algorithm can determine if a graph contains a $6$-cycle in time $O(m^{3/2-ε})$ for any $ε>0$ under the widely believed combinatorial BMM conjecture. Coupled with our main result, this gives tight bounds for finding $6$-cycles combinatorially and also separates the complexity of finding $4$- and $6$-cycles giving evidence that the exponent of $m$ in the running time should indeed increase with $k$.
The key ingredient in our algorithm is a new notion of capped $k$-walks, which are walks of length $k$ that visit only nodes according to a fixed ordering. Our main technical contribution is an involved analysis proving several properties of such walks which may be of independent interest.
△ Less
Submitted 30 March, 2017;
originally announced March 2017.
-
Chromospheric emission of planet candidate systems - a way to identify false positives
Authors:
Christoffer Karoff,
Simon Albrecht,
Alfio Bonanno,
Mads Faurschou Knudsen
Abstract:
It has been hypothesized that the presence of closely orbiting giant planets is associated with enhanced chromospheric emission of their host stars. The main cause for such a relation would likely be enhanced dynamo action induced by the planet. We present measurements of chromospheric emission in 234 planet candidate systems from the Kepler mission. This ensemble includes 37 systems with giant pl…
▽ More
It has been hypothesized that the presence of closely orbiting giant planets is associated with enhanced chromospheric emission of their host stars. The main cause for such a relation would likely be enhanced dynamo action induced by the planet. We present measurements of chromospheric emission in 234 planet candidate systems from the Kepler mission. This ensemble includes 37 systems with giant planet candidates, which show a clear emission enhancement. The enhancement, however, disappears when systems which are also identified as eclipsing binary candidates are removed from the ensemble. This suggests that a large fraction of the giant planet candidate systems with chromospheric emission stronger than the Sun are not giant planet system, but false positives. Such false-positive systems could be tidally interacting binaries with strong chromospheric emission. This hypotesis is supported by an analysis of 188 eclipsing binary candidates that show increasing chromospheric emission as function of decreasing orbital period.
△ Less
Submitted 30 August, 2016; v1 submitted 28 August, 2016;
originally announced August 2016.
-
Near-Optimal Induced Universal Graphs for Bounded Degree Graphs
Authors:
Mikkel Abrahamsen,
Stephen Alstrup,
Jacob Holm,
Mathias Bæk Tejs Knudsen,
Morten Stöckel
Abstract:
A graph $U$ is an induced universal graph for a family $F$ of graphs if every graph in $F$ is a vertex-induced subgraph of $U$. For the family of all undirected graphs on $n$ vertices Alstrup, Kaplan, Thorup, and Zwick [STOC 2015] give an induced universal graph with $O\!\left(2^{n/2}\right)$ vertices, matching a lower bound by Moon [Proc. Glasgow Math. Assoc. 1965].
Let $k= \lceil D/2 \rceil$.…
▽ More
A graph $U$ is an induced universal graph for a family $F$ of graphs if every graph in $F$ is a vertex-induced subgraph of $U$. For the family of all undirected graphs on $n$ vertices Alstrup, Kaplan, Thorup, and Zwick [STOC 2015] give an induced universal graph with $O\!\left(2^{n/2}\right)$ vertices, matching a lower bound by Moon [Proc. Glasgow Math. Assoc. 1965].
Let $k= \lceil D/2 \rceil$. Improving asymptotically on previous results by Butler [Graphs and Combinatorics 2009] and Esperet, Arnaud and Ochem [IPL 2008], we give an induced universal graph with $O\!\left(\frac{k2^k}{k!}n^k \right)$ vertices for the family of graphs with $n$ vertices of maximum degree $D$. For constant $D$, Butler gives a lower bound of $Ω\!\left(n^{D/2}\right)$. For an odd constant $D\geq 3$, Esperet et al. and Alon and Capalbo [SODA 2008] give a graph with $O\!\left(n^{k-\frac{1}{D}}\right)$ vertices. Using their techniques for any (including constant) even values of $D$ gives asymptotically worse bounds than we present.
For large $D$, i.e. when $D = Ω\left(\log^3 n\right)$, the previous best upper bound was ${n\choose\lceil D/2\rceil} n^{O(1)}$ due to Adjiashvili and Rotbart [ICALP 2014]. We give upper and lower bounds showing that the size is ${\lfloor n/2\rfloor\choose\lfloor D/2 \rfloor}2^{\pm\tilde{O}\left(\sqrt{D}\right)}$. Hence the optimal size is $2^{\tilde{O}(D)}$ and our construction is within a factor of $2^{\tilde{O}\left(\sqrt{D}\right)}$ from this. The previous results were larger by at least a factor of $2^{Ω(D)}$.
As a part of the above, proving a conjecture by Esperet et al., we construct an induced universal graph with $2n-1$ vertices for the family of graphs with max degree $2$. In addition, we give results for acyclic graphs with max degree $2$ and cycle graphs. Our results imply the first labeling schemes that for any $D$ are at most $o(n)$ bits from optimal.
△ Less
Submitted 21 July, 2016; v1 submitted 17 July, 2016;
originally announced July 2016.
-
On the current solar magnetic activity in the light of its behaviour during the Holocene
Authors:
F. Inceoglu,
R. Simoniello,
M. F. Knudsen,
C. Karoff,
J. Olsen,
S. Turck-Chièze
Abstract:
Solar modulation potential (SMP) reconstructions based on cosmogenic nuclide records reflect changes in the open solar magnetic field and can therefore help us obtain information on the behaviour of the open solar magnetic field over the Holocene period. We aim at comparing the Sun's large-scale magnetic field behaviour over the last three solar cycles with variations in the SMP reconstruction thr…
▽ More
Solar modulation potential (SMP) reconstructions based on cosmogenic nuclide records reflect changes in the open solar magnetic field and can therefore help us obtain information on the behaviour of the open solar magnetic field over the Holocene period. We aim at comparing the Sun's large-scale magnetic field behaviour over the last three solar cycles with variations in the SMP reconstruction through the Holocene epoch. To achieve these objectives, we use the IntCal13 $^{14}$C data to investigate distinct patterns in the occurrences of grand minima and maxima during the Holocene period. We then check whether these patterns might mimic the recent solar magnetic activity by investigating the evolution of the energy in the Sun's large-scale dipolar magnetic field using the Wilcox Solar Observatory data. The cosmogenic radionuclide data analysis shows that $\sim$71\% of grand maxima during the period from 6600 BC to 1650 AD were followed by a grand minimum. The occurrence characteristics of grand maxima and minima are consistent with the scenario in which the dynamical non-linearity induced by the Lorentz force leads the Sun to act as a relaxation oscillator. This finding implies that the probability for these events to occur is non-uniformly distributed in time, as there is a memory in their driving mechanism, which can be identified via the back reaction of the Lorentz force.
△ Less
Submitted 21 September, 2015;
originally announced September 2015.
-
Sublinear Distance Labeling
Authors:
Stephen Alstrup,
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Ely Porat
Abstract:
A distance labeling scheme labels the $n$ nodes of a graph with binary strings such that, given the labels of any two nodes, one can determine the distance in the graph between the two nodes by looking only at the labels. A $D$-preserving distance labeling scheme only returns precise distances between pairs of nodes that are at distance at least $D$ from each other. In this paper we consider dista…
▽ More
A distance labeling scheme labels the $n$ nodes of a graph with binary strings such that, given the labels of any two nodes, one can determine the distance in the graph between the two nodes by looking only at the labels. A $D$-preserving distance labeling scheme only returns precise distances between pairs of nodes that are at distance at least $D$ from each other. In this paper we consider distance labeling schemes for the classical case of unweighted graphs with both directed and undirected edges.
We present a $O(\frac{n}{D}\log^2 D)$ bit $D$-preserving distance labeling scheme, improving the previous bound by Bollobás et. al. [SIAM J. Discrete Math. 2005]. We also give an almost matching lower bound of $Ω(\frac{n}{D})$. With our $D$-preserving distance labeling scheme as a building block, we additionally achieve the following results:
1. We present the first distance labeling scheme of size $o(n)$ for sparse graphs (and hence bounded degree graphs). This addresses an open problem by Gavoille et. al. [J. Algo. 2004], hereby separating the complexity from distance labeling in general graphs which require $Ω(n)$ bits, Moon [Proc. of Glasgow Math. Association 1965].
2. For approximate $r$-additive labeling schemes, that return distances within an additive error of $r$ we show a scheme of size $O\left ( \frac{n}{r} \cdot\frac{\operatorname{polylog} (r\log n)}{\log n} \right )$ for $r \ge 2$. This improves on the current best bound of $O\left(\frac{n}{r}\right)$ by Alstrup et. al. [SODA 2016] for sub-polynomial $r$, and is a generalization of a result by Gawrychowski et al. [arXiv preprint 2015] who showed this for $r=2$.
△ Less
Submitted 8 September, 2016; v1 submitted 9 July, 2015;
originally announced July 2015.
-
A latent variable model with mixed binary and continuous response variables
Authors:
Klaus K. Holst,
Esben Budtz-Jørgensen,
Gitte Moos Knudsen
Abstract:
We propose a method for obtaining maximum likelihood estimates in a model with continuous and binary outcomes. Combinations of left and right censored observations are also naturally modeled in this framework. The model and estimation procedure has been implemented in the R package lava.tobit.
The method is demonstrated on brain imaging and personality data where measurement error on predictor v…
▽ More
We propose a method for obtaining maximum likelihood estimates in a model with continuous and binary outcomes. Combinations of left and right censored observations are also naturally modeled in this framework. The model and estimation procedure has been implemented in the R package lava.tobit.
The method is demonstrated on brain imaging and personality data where measurement error on predictor variables is handled in a latent variable framework. A simulation study is conducted comparing the small sample properties of the MLE with a limited information estimator.
△ Less
Submitted 5 July, 2015;
originally announced July 2015.
-
Longest Common Extensions in Sublinear Space
Authors:
Philip Bille,
Inge Li Gørtz,
Mathias Bæk Tejs Knudsen,
Moshe Lewenstein,
Hjalte Wedel Vildhøj
Abstract:
The longest common extension problem (LCE problem) is to construct a data structure for an input string $T$ of length $n$ that supports LCE$(i,j)$ queries. Such a query returns the length of the longest common prefix of the suffixes starting at positions $i$ and $j$ in $T$. This classic problem has a well-known solution that uses $O(n)$ space and $O(1)$ query time. In this paper we show that for a…
▽ More
The longest common extension problem (LCE problem) is to construct a data structure for an input string $T$ of length $n$ that supports LCE$(i,j)$ queries. Such a query returns the length of the longest common prefix of the suffixes starting at positions $i$ and $j$ in $T$. This classic problem has a well-known solution that uses $O(n)$ space and $O(1)$ query time. In this paper we show that for any trade-off parameter $1 \leq τ\leq n$, the problem can be solved in $O(\frac{n}τ)$ space and $O(τ)$ query time. This significantly improves the previously best known time-space trade-offs, and almost matches the best known time-space product lower bound.
△ Less
Submitted 10 April, 2015;
originally announced April 2015.
-
Optimal induced universal graphs and adjacency labeling for trees
Authors:
Stephen Alstrup,
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen
Abstract:
We show that there exists a graph $G$ with $O(n)$ nodes, where any forest of $n$ nodes is a node-induced subgraph of $G$. Furthermore, for constant arboricity $k$, the result implies the existence of a graph with $O(n^k)$ nodes that contains all $n$-node graphs as node-induced subgraphs, matching a $Ω(n^k)$ lower bound. The lower bound and previously best upper bounds were presented in Alstrup and…
▽ More
We show that there exists a graph $G$ with $O(n)$ nodes, where any forest of $n$ nodes is a node-induced subgraph of $G$. Furthermore, for constant arboricity $k$, the result implies the existence of a graph with $O(n^k)$ nodes that contains all $n$-node graphs as node-induced subgraphs, matching a $Ω(n^k)$ lower bound. The lower bound and previously best upper bounds were presented in Alstrup and Rauhe (FOCS'02). Our upper bounds are obtained through a $\log_2 n +O(1)$ labeling scheme for adjacency queries in forests.
We hereby solve an open problem being raised repeatedly over decades, e.g. in Kannan, Naor, Rudich (STOC 1988), Chung (J. of Graph Theory 1990), Fraigniaud and Korman (SODA 2010).
△ Less
Submitted 15 February, 2016; v1 submitted 9 April, 2015;
originally announced April 2015.
-
Quicksort, Largest Bucket, and Min-Wise Hashing with Limited Independence
Authors:
Mathias Bæk Tejs Knudsen,
Morten Stöckel
Abstract:
Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used to measure how "random" a hash function or a random number generator is, is its independence: a sequence of random variables is said to be $k$-independent if every variable is uniform and every size $k$ subset is independent. In this paper…
▽ More
Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used to measure how "random" a hash function or a random number generator is, is its independence: a sequence of random variables is said to be $k$-independent if every variable is uniform and every size $k$ subset is independent. In this paper we consider three classic algorithms under limited independence. We provide new bounds for randomized quicksort, min-wise hashing and largest bucket size under limited independence. Our results can be summarized as follows.
-Randomized quicksort. When pivot elements are computed using a $5$-independent hash function, Karloff and Raghavan, J.ACM'93 showed $O ( n \log n)$ expected worst-case running time for a special version of quicksort. We improve upon this, showing that the same running time is achieved with only $4$-independence.
-Min-wise hashing. For a set $A$, consider the probability of a particular element being mapped to the smallest hash value. It is known that $5$-independence implies the optimal probability $O (1 /n)$. Broder et al., STOC'98 showed that $2$-independence implies it is $O(1 / \sqrt{|A|})$. We show a matching lower bound as well as new tight bounds for $3$- and $4$-independent hash functions.
-Largest bucket. We consider the case where $n$ balls are distributed to $n$ buckets using a $k$-independent hash function and analyze the largest bucket size. Alon et. al, STOC'97 showed that there exists a $2$-independent hash function implying a bucket of size $Ω( n^{1/2})$. We generalize the bound, providing a $k$-independent family of functions that imply size $Ω( n^{1/k})$.
△ Less
Submitted 19 February, 2015;
originally announced February 2015.
-
The lost sunspot cycle: New support from Be10 measurements
Authors:
C. Karoff,
F. Inceoglu,
M. F. Knudsen,
J. Olsen,
A. Fogtmann-Schulz
Abstract:
It has been suggested that the deficit in the number of spots on the surface of the Sun between 1790 and 1830, known as the Dalton minimum, contained an extra cycle that was not identified in the original sunspot record by Wolf. Though this cycle would be shorter and weaker than the average solar cycle, it would shift the magnetic parity of the solar magnetic field of the earlier cycles. This extr…
▽ More
It has been suggested that the deficit in the number of spots on the surface of the Sun between 1790 and 1830, known as the Dalton minimum, contained an extra cycle that was not identified in the original sunspot record by Wolf. Though this cycle would be shorter and weaker than the average solar cycle, it would shift the magnetic parity of the solar magnetic field of the earlier cycles. This extra cycle is sometimes referred to as the 'lost solar cycle' or 'cycle 4b'. Here we reanalyse Be10 measurements with annual resolution from the NGRIP ice core in Greenland in order to investigate if the hypothesis regarding a lost sunspot cycle is supported by these measurements. Specifically, we make use of the fact that the Galactic cosmic rays, responsible for forming Be10 in the Earth's atmosphere, are affected differently by the open solar magnetic field during even and odd solar cycles. This fact enables us to evaluate if the numbering of cycles earlier than cycle 5 is correct. For the evaluation, we use Bayesian analysis, which reveals that the lost sunspot cycle hypothesis is likely to be correct. We also discuss if this cycle 4b is a real cycle, or a phase catastrophe, and what implications this has for our understanding of stellar activity cycles in general.
△ Less
Submitted 3 February, 2015; v1 submitted 9 December, 2014;
originally announced December 2014.
-
Hashing for statistics over k-partitions
Authors:
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Eva Rotenberg,
Mikkel Thorup
Abstract:
In this paper we analyze a hash function for $k$-partitioning a set into bins, obtaining strong concentration bounds for standard algorithms combining statistics from each bin.
This generic method was originally introduced by Flajolet and Martin~[FOCS'83] in order to save a factor $Ω(k)$ of time per element over $k$ independent samples when estimating the number of distinct elements in a data st…
▽ More
In this paper we analyze a hash function for $k$-partitioning a set into bins, obtaining strong concentration bounds for standard algorithms combining statistics from each bin.
This generic method was originally introduced by Flajolet and Martin~[FOCS'83] in order to save a factor $Ω(k)$ of time per element over $k$ independent samples when estimating the number of distinct elements in a data stream. It was also used in the widely used HyperLogLog algorithm of Flajolet et al.~[AOFA'97] and in large-scale machine learning by Li et al.~[NIPS'12] for minwise estimation of set similarity.
The main issue of $k$-partition, is that the contents of different bins may be highly correlated when using popular hash functions. This means that methods of analyzing the marginal distribution for a single bin do not apply. Here we show that a tabulation based hash function, mixed tabulation, does yield strong concentration bounds on the most popular applications of $k$-partitioning similar to those we would get using a truly random hash function. The analysis is very involved and implies several new results of independent interest for both simple and double tabulation, e.g. a simple and efficient construction for invertible bloom filters and uniform hashing on a given set.
△ Less
Submitted 15 February, 2016; v1 submitted 26 November, 2014;
originally announced November 2014.
-
The Power of Two Choices with Simple Tabulation
Authors:
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Eva Rotenberg,
Mikkel Thorup
Abstract:
The power of two choices is a classic paradigm for load balancing when assigning $m$ balls to $n$ bins. When placing a ball, we pick two bins according to two hash functions $h_0$ and $h_1$, and place the ball in the least loaded bin. Assuming fully random hash functions, when $m=O(n)$, Azar et al.~[STOC'94] proved that the maximum load is $\lg \lg n + O(1)$ with high probability.
In this paper,…
▽ More
The power of two choices is a classic paradigm for load balancing when assigning $m$ balls to $n$ bins. When placing a ball, we pick two bins according to two hash functions $h_0$ and $h_1$, and place the ball in the least loaded bin. Assuming fully random hash functions, when $m=O(n)$, Azar et al.~[STOC'94] proved that the maximum load is $\lg \lg n + O(1)$ with high probability.
In this paper, we investigate the power of two choices when the hash functions $h_0$ and $h_1$ are implemented with simple tabulation, which is a very efficient hash function evaluated in constant time. Following their analysis of Cuckoo hashing [J.ACM'12], Pǎtraşcu and Thorup claimed that the expected maximum load with simple tabulation is $O(\lg\lg n)$. This did not include any high probability guarantee, so the load balancing was not yet to be trusted.
Here, we show that with simple tabulation, the maximum load is $O(\lg\lg n)$ with high probability, giving the first constant time hash function with this guarantee. We also give a concrete example where, unlike with fully random hashing, the maximum load is not bounded by $\lg \lg n + O(1)$, or even $(1+o(1))\lg \lg n$ with high probability. Finally, we show that the expected maximum load is $\lg \lg n + O(1)$, just like with fully random hashing.
△ Less
Submitted 25 January, 2016; v1 submitted 25 July, 2014;
originally announced July 2014.
-
A simple and optimal ancestry labeling scheme for trees
Authors:
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Noy Rotbart
Abstract:
We present a $\lg n + 2 \lg \lg n+3$ ancestry labeling scheme for trees. The problem was first presented by Kannan et al. [STOC 88'] along with a simple $2 \lg n$ solution. Motivated by applications to XML files, the label size was improved incrementally over the course of more than 20 years by a series of papers. The last, due to Fraigniaud and Korman [STOC 10'], presented an asymptotically optim…
▽ More
We present a $\lg n + 2 \lg \lg n+3$ ancestry labeling scheme for trees. The problem was first presented by Kannan et al. [STOC 88'] along with a simple $2 \lg n$ solution. Motivated by applications to XML files, the label size was improved incrementally over the course of more than 20 years by a series of papers. The last, due to Fraigniaud and Korman [STOC 10'], presented an asymptotically optimal $\lg n + 4 \lg \lg n+O(1)$ labeling scheme using non-trivial tree-decomposition techniques. By providing a framework generalizing interval based labeling schemes, we obtain a simple, yet asymptotically optimal solution to the problem. Furthermore, our labeling scheme is attained by a small modification of the original $2 \lg n$ solution.
△ Less
Submitted 26 April, 2015; v1 submitted 18 July, 2014;
originally announced July 2014.
-
Dynamic and Multi-functional Labeling Schemes
Authors:
Søren Dahlgaard,
Mathias Bæk Tejs Knudsen,
Noy Rotbart
Abstract:
We investigate labeling schemes supporting adjacency, ancestry, sibling, and connectivity queries in forests. In the course of more than 20 years, the existence of $\log n + O(\log \log)$ labeling schemes supporting each of these functions was proven, with the most recent being ancestry [Fraigniaud and Korman, STOC '10]. Several multi-functional labeling schemes also enjoy lower or upper bounds of…
▽ More
We investigate labeling schemes supporting adjacency, ancestry, sibling, and connectivity queries in forests. In the course of more than 20 years, the existence of $\log n + O(\log \log)$ labeling schemes supporting each of these functions was proven, with the most recent being ancestry [Fraigniaud and Korman, STOC '10]. Several multi-functional labeling schemes also enjoy lower or upper bounds of $\log n + Ω(\log \log n)$ or $\log n + O(\log \log n)$ respectively. Notably an upper bound of $\log n + 5\log \log n$ for adjacency+siblings and a lower bound of $\log n + \log \log n$ for each of the functions siblings, ancestry, and connectivity [Alstrup et al., SODA '03]. We improve the constants hidden in the $O$-notation. In particular we show a $\log n + 2\log \log n$ lower bound for connectivity+ancestry and connectivity+siblings, as well as an upper bound of $\log n + 3\log \log n + O(\log \log \log n)$ for connectivity+adjacency+siblings by altering existing methods.
In the context of dynamic labeling schemes it is known that ancestry requires $Ω(n)$ bits [Cohen, et al. PODS '02]. In contrast, we show upper and lower bounds on the label size for adjacency, siblings, and connectivity of $2\log n$ bits, and $3 \log n$ to support all three functions. There exist efficient adjacency labeling schemes for planar, bounded treewidth, bounded arboricity and interval graphs. In a dynamic setting, we show a lower bound of $Ω(n)$ for each of those families.
△ Less
Submitted 19 April, 2014;
originally announced April 2014.
-
Additive Spanners: A Simple Construction
Authors:
Mathias Bæk Tejs Knudsen
Abstract:
We consider additive spanners of unweighted undirected graphs. Let $G$ be a graph and $H$ a subgraph of $G$. The most naïve way to construct an additive $k$-spanner of $G$ is the following: As long as $H$ is not an additive $k$-spanner repeat: Find a pair $(u,v) \in H$ that violates the spanner-condition and a shortest path from $u$ to $v$ in $G$. Add the edges of this path to $H$.
We show that,…
▽ More
We consider additive spanners of unweighted undirected graphs. Let $G$ be a graph and $H$ a subgraph of $G$. The most naïve way to construct an additive $k$-spanner of $G$ is the following: As long as $H$ is not an additive $k$-spanner repeat: Find a pair $(u,v) \in H$ that violates the spanner-condition and a shortest path from $u$ to $v$ in $G$. Add the edges of this path to $H$.
We show that, with a very simple initial graph $H$, this naïve method gives additive $6$- and $2$-spanners of sizes matching the best known upper bounds. For additive $2$-spanners we start with $H=\emptyset$ and end with $O(n^{3/2})$ edges in the spanner. For additive $6$-spanners we start with $H$ containing $\lfloor n^{1/3} \rfloor$ arbitrary edges incident to each node and end with a spanner of size $O(n^{4/3})$.
△ Less
Submitted 23 November, 2014; v1 submitted 2 March, 2014;
originally announced March 2014.
-
Exact Analysis of Intrinsic Qualitative Features of Phosphorelays using Mathematical Models
Authors:
Michael Knudsen,
Elisenda Feliu,
Carsten Wiuf
Abstract:
Phosphorelays are a class of signaling mechanisms used by cells to respond to changes in their environment. Phosphorelays (of which two-component systems constitute a special case) are particularly abundant in prokaryotes and have been shown to be involved in many fundamental processes such as stress response, osmotic regulation, virulence, and chemotaxis. We develop a general model of phosphorela…
▽ More
Phosphorelays are a class of signaling mechanisms used by cells to respond to changes in their environment. Phosphorelays (of which two-component systems constitute a special case) are particularly abundant in prokaryotes and have been shown to be involved in many fundamental processes such as stress response, osmotic regulation, virulence, and chemotaxis. We develop a general model of phosphorelays extending existing models of phosphorelays and two-component systems. We analyze the model analytically under the assumption of mass-action kinetics and prove that a phosphorelay has a unique stable steady-state. Furthermore, we derive explicit functions relating stimulus to the response in any layer of a phosphorelay and show that a limited degree of ultrasensitivity (the ability to respond to changes in stimulus in a switch-like manner) in the bottom layer of a phosphorelay is an intrinsic feature which does not depend on any reaction rates or substrate amounts. On the other hand, we show how adjusting reaction rates and substrate amounts may lead to higher degrees of ultrasensitivity in intermediate layers. The explicit formulas also enable us to prove how the response changes with alterations in stimulus, kinetic parameters, and substrate amounts. Aside from providing biological insight, the formulas may also be used to avoid time-consuming simulations in numerical analyses and simulations.
△ Less
Submitted 23 September, 2011;
originally announced September 2011.
-
An Algebraic Approach to Signaling Cascades with n Layers
Authors:
Elisenda Feliu,
Michael Knudsen,
Lars N. Andersen,
Carsten Wiuf
Abstract:
Posttranslational modification of proteins is key in transmission of signals in cells. Many signaling pathways contain several layers of modification cycles that mediate and change the signal through the pathway. Here, we study a simple signaling cascade consisting of n layers of modification cycles, such that the modified protein of one layer acts as modifier in the next layer. Assuming mass-acti…
▽ More
Posttranslational modification of proteins is key in transmission of signals in cells. Many signaling pathways contain several layers of modification cycles that mediate and change the signal through the pathway. Here, we study a simple signaling cascade consisting of n layers of modification cycles, such that the modified protein of one layer acts as modifier in the next layer. Assuming mass-action kinetics and taking the formation of intermediate complexes into account, we show that the steady states are solutions to a polynomial in one variable, and in fact that there is exactly one steady state for any given total amounts of substrates and enzymes.
We demonstrate that many steady state concentrations are related through rational functions, which can be found recursively. For example, stimulus-response curves arise as inverse functions to explicit rational functions. We show that the stimulus-response curves of the modified substrates are shifted to the left as we move down the cascade. Further, our approach allows us to study enzyme competition, sequestration and how the steady state changes in response to changes in the total amount of substrates.
Our approach is essentially algebraic and follows recent trends in the study of posttranslational modification systems.
△ Less
Submitted 18 December, 2010; v1 submitted 2 August, 2010;
originally announced August 2010.
-
A General Mathematical Framework Suitable for Studying Signaling Cascades
Authors:
Elisenda Feliu,
Lars N. Andersen,
Michael Knudsen,
Carsten Wiuf
Abstract:
We define a general mathematical framework for studying post-translational
modification processes under the assumption of mass action kinetics.
We define a general mathematical framework for studying post-translational
modification processes under the assumption of mass action kinetics.
△ Less
Submitted 13 December, 2011; v1 submitted 2 August, 2010;
originally announced August 2010.
-
Fatgraph Models of Proteins
Authors:
R. C. Penner,
Michael Knudsen,
Carsten Wiuf,
Joergen Ellegaard Andersen
Abstract:
We introduce a new model of proteins, which extends and enhances the traditional graphical representation by associating a combinatorial object called a fatgraph to any protein based upon its intrinsic geometry. Fatgraphs can easily be stored and manipulated as triples of permutations, and these methods are therefore amenable to fast computer implementation. Applications include the refinement o…
▽ More
We introduce a new model of proteins, which extends and enhances the traditional graphical representation by associating a combinatorial object called a fatgraph to any protein based upon its intrinsic geometry. Fatgraphs can easily be stored and manipulated as triples of permutations, and these methods are therefore amenable to fast computer implementation. Applications include the refinement of structural protein classifications and the prediction of geometric and other properties of proteins from their chemical structures.
△ Less
Submitted 30 May, 2009; v1 submitted 6 February, 2009;
originally announced February 2009.