-
Distributed deterministic asynchronous algorithms in time-varying graphs through Dykstra splitting
Authors:
C. H. Jeffrey Pang
Abstract:
Consider the setting where each vertex of a graph has a function, and communications can only occur between vertices connected by an edge. We wish to minimize the sum of these functions. For the case when each function is the sum of a strongly convex quadratic and a convex function, we propose a distributed version of Dykstra's algorithm. The computations to optimize the dual objective function ca…
▽ More
Consider the setting where each vertex of a graph has a function, and communications can only occur between vertices connected by an edge. We wish to minimize the sum of these functions. For the case when each function is the sum of a strongly convex quadratic and a convex function, we propose a distributed version of Dykstra's algorithm. The computations to optimize the dual objective function can run asynchronously without a global clock, and in a distributed manner without a central controller. Convergence to the primal minimizer is deterministic instead of being probabilistic, and is guaranteed as long as in each cycle, the edges where two-way communications occur connects all vertices. We also look at an accelerated algorithm, and an algorithm for the case when the functions on the nodes are not strongly convex.
△ Less
Submitted 27 November, 2018; v1 submitted 30 April, 2018;
originally announced April 2018.
-
A Decomposition-based Approach towards the Control of Boolean Networks (Technical Report)
Authors:
Soumya Paul,
Cui Su,
Jun Pang,
Andrzej Mizera
Abstract:
We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be controlled to drive its dynamics from an initial steady state (or attractor) to a target steady state. Due to the phenomenon of state-space explosion, a simple global approach that performs computations on the entire network, may not scale well for large networks. We believe that eff…
▽ More
We study the problem of computing a minimal subset of nodes of a given asynchronous Boolean network that need to be controlled to drive its dynamics from an initial steady state (or attractor) to a target steady state. Due to the phenomenon of state-space explosion, a simple global approach that performs computations on the entire network, may not scale well for large networks. We believe that efficient algorithms for such networks must exploit the structure of the networks together with their dynamics. Taking such an approach, we derive a decomposition-based solution to the minimal control problem which can be significantly faster than the existing approaches on large networks. We apply our solution to both real-life biological networks and randomly generated networks, demonstrating promising results.
△ Less
Submitted 17 May, 2018; v1 submitted 19 April, 2018;
originally announced April 2018.
-
3D Point Cloud Denoising using Graph Laplacian Regularization of a Low Dimensional Manifold Model
Authors:
** Zeng,
Gene Cheung,
Michael Ng,
Jiahao Pang,
Cheng Yang
Abstract:
3D point cloud - a new signal representation of volumetric objects - is a discrete collection of triples marking exterior object surface locations in 3D space. Conventional imperfect acquisition processes of 3D point cloud - e.g., stereo-matching from multiple viewpoint images or depth data acquired directly from active light sensors - imply non-negligible noise in the data. In this paper, we adop…
▽ More
3D point cloud - a new signal representation of volumetric objects - is a discrete collection of triples marking exterior object surface locations in 3D space. Conventional imperfect acquisition processes of 3D point cloud - e.g., stereo-matching from multiple viewpoint images or depth data acquired directly from active light sensors - imply non-negligible noise in the data. In this paper, we adopt a previously proposed low-dimensional manifold model for the surface patches in the point cloud and seek self-similar patches to denoise them simultaneously using the patch manifold prior. Due to discrete observations of the patches on the manifold, we approximate the manifold dimension computation defined in the continuous domain with a patch-based graph Laplacian regularizer and propose a new discrete patch distance measure to quantify the similarity between two same-sized surface patches for graph construction that is robust to noise. We show that our graph Laplacian regularizer has a natural graph spectral interpretation, and has desirable numerical stability properties via eigenanalysis. Extensive simulation results show that our proposed denoising scheme can outperform state-of-the-art methods in objective metrics and can better preserve visually salient structural features like edges.
△ Less
Submitted 30 April, 2019; v1 submitted 20 March, 2018;
originally announced March 2018.
-
Zoom and Learn: Generalizing Deep Stereo Matching to Novel Domains
Authors:
Jiahao Pang,
Wenxiu Sun,
Chengxi Yang,
Jimmy Ren,
Ruichao Xiao,
** Zeng,
Liang Lin
Abstract:
Despite the recent success of stereo matching with convolutional neural networks (CNNs), it remains arduous to generalize a pre-trained deep stereo model to a novel domain. A major difficulty is to collect accurate ground-truth disparities for stereo pairs in the target domain. In this work, we propose a self-adaptation approach for CNN training, utilizing both synthetic training data (with ground…
▽ More
Despite the recent success of stereo matching with convolutional neural networks (CNNs), it remains arduous to generalize a pre-trained deep stereo model to a novel domain. A major difficulty is to collect accurate ground-truth disparities for stereo pairs in the target domain. In this work, we propose a self-adaptation approach for CNN training, utilizing both synthetic training data (with ground-truth disparities) and stereo pairs in the new domain (without ground-truths). Our method is driven by two empirical observations. By feeding real stereo pairs of different domains to stereo models pre-trained with synthetic data, we see that: i) a pre-trained model does not generalize well to the new domain, producing artifacts at boundaries and ill-posed regions; however, ii) feeding an up-sampled stereo pair leads to a disparity map with extra details. To avoid i) while exploiting ii), we formulate an iterative optimization problem with graph Laplacian regularization. At each iteration, the CNN adapts itself better to the new domain: we let the CNN learn its own higher-resolution output; at the meanwhile, a graph Laplacian regularization is imposed to discriminatively keep the desired edges while smoothing out the artifacts. We demonstrate the effectiveness of our method in two domains: daily scenes collected by smartphone cameras, and street views captured in a driving car.
△ Less
Submitted 18 March, 2018;
originally announced March 2018.
-
Single View Stereo Matching
Authors:
Yue Luo,
Jimmy Ren,
Mude Lin,
Jiahao Pang,
Wenxiu Sun,
Hongsheng Li,
Liang Lin
Abstract:
Previous monocular depth estimation methods take a single view and directly regress the expected results. Though recent advances are made by applying geometrically inspired loss functions during training, the inference procedure does not explicitly impose any geometrical constraint. Therefore these models purely rely on the quality of data and the effectiveness of learning to generalize. This eith…
▽ More
Previous monocular depth estimation methods take a single view and directly regress the expected results. Though recent advances are made by applying geometrically inspired loss functions during training, the inference procedure does not explicitly impose any geometrical constraint. Therefore these models purely rely on the quality of data and the effectiveness of learning to generalize. This either leads to suboptimal results or the demand of huge amount of expensive ground truth labelled data to generate reasonable results. In this paper, we show for the first time that the monocular depth estimation problem can be reformulated as two sub-problems, a view synthesis procedure followed by stereo matching, with two intriguing properties, namely i) geometrical constraints can be explicitly imposed during inference; ii) demand on labelled depth data can be greatly alleviated. We show that the whole pipeline can still be trained in an end-to-end fashion and this new formulation plays a critical role in advancing the performance. The resulting model outperforms all the previous monocular depth estimation methods as well as the stereo block matching method in the challenging KITTI dataset by only using a small number of real training data. The model also generalizes well to other monocular depth estimation benchmarks. We also discuss the implications and the advantages of solving monocular depth estimation using stereo methods.
△ Less
Submitted 9 March, 2018; v1 submitted 7 March, 2018;
originally announced March 2018.
-
Composite Difference-Max Programs for Modern Statistical Estimation Problems
Authors:
Ying Cui,
Jong-Shi Pang,
Bodhisattva Sen
Abstract:
Many modern statistical estimation problems are defined by three major components: a statistical model that postulates the dependence of an output variable on the input features; a loss function measuring the error between the observed output and the model predicted output; and a regularizer that controls the overfitting and/or variable selection in the model. We study the sampling version of this…
▽ More
Many modern statistical estimation problems are defined by three major components: a statistical model that postulates the dependence of an output variable on the input features; a loss function measuring the error between the observed output and the model predicted output; and a regularizer that controls the overfitting and/or variable selection in the model. We study the sampling version of this generic statistical estimation problem where the model parameters are estimated by empirical risk minimization, which involves the minimization of the empirical average of the loss function at the data points weighted by the model regularizer. In our setup we allow all three component functions discussed above to be of the difference-of-convex (dc) type and illustrate them with a host of commonly used examples, including those in continuous piecewise affine regression and in deep learning (where the activation functions are piecewise affine). We describe a nonmonotone majorization-minimization (MM) algorithm for solving the unified nonconvex, nondifferentiable optimization problem which is formulated as a specially structured composite dc program of the pointwise max type, and present convergence results to a directional stationary solution. An efficient semismooth Newton method is proposed to solve the dual of the MM subproblems. Numerical results are presented to demonstrate the effectiveness of the proposed algorithm and the superiority of continuous piecewise affine regression over the standard linear model.
△ Less
Submitted 6 October, 2018; v1 submitted 28 February, 2018;
originally announced March 2018.
-
On the Finite Number of Directional Stationary Values of Piecewise Programs
Authors:
Ying Cui,
Jong-Shi Pang
Abstract:
Extending a fundamental result for (indefinite) quadratic programs, this paper shows that certain non-convex piecewise programs have only a finite number of directional stationary values, and thus, possess only finitely many locally minimum values. We present various special cases of our main results, in particular, an application to a least-squares piecewise affine regression problem for which ev…
▽ More
Extending a fundamental result for (indefinite) quadratic programs, this paper shows that certain non-convex piecewise programs have only a finite number of directional stationary values, and thus, possess only finitely many locally minimum values. We present various special cases of our main results, in particular, an application to a least-squares piecewise affine regression problem for which every directional stationary point is locally minimizing.
△ Less
Submitted 28 February, 2018;
originally announced March 2018.
-
Tagvisor: A Privacy Advisor for Sharing Hashtags
Authors:
Yang Zhang,
Mathias Humbert,
Tahleen Rahman,
Cheng-Te Li,
Jun Pang,
Michael Backes
Abstract:
Hashtag has emerged as a widely used concept of popular culture and campaigns, but its implications on people's privacy have not been investigated so far. In this paper, we present the first systematic analysis of privacy issues induced by hashtags. We concentrate in particular on location, which is recognized as one of the key privacy concerns in the Internet era. By relying on a random forest mo…
▽ More
Hashtag has emerged as a widely used concept of popular culture and campaigns, but its implications on people's privacy have not been investigated so far. In this paper, we present the first systematic analysis of privacy issues induced by hashtags. We concentrate in particular on location, which is recognized as one of the key privacy concerns in the Internet era. By relying on a random forest model, we show that we can infer a user's precise location from hashtags with accuracy of 70\% to 76\%, depending on the city. To remedy this situation, we introduce a system called Tagvisor that systematically suggests alternative hashtags if the user-selected ones constitute a threat to location privacy. Tagvisor realizes this by means of three conceptually different obfuscation techniques and a semantics-based metric for measuring the consequent utility loss. Our findings show that obfuscating as little as two hashtags already provides a near-optimal trade-off between privacy and utility in our dataset. This in particular renders Tagvisor highly time-efficient, and thus, practical in real-world settings.
△ Less
Submitted 12 February, 2018;
originally announced February 2018.
-
Three-body spectrum in a finite volume: the role of cubic symmetry
Authors:
M. Döring,
H. -W. Hammer,
M. Mai,
J. -Y. Pang,
A. Rusetsky,
J. Wu
Abstract:
The three-particle quantization condition is partially diagonalized in the center-of-mass frame by using cubic symmetry on the lattice. To this end, instead of spherical harmonics, the kernel of the Bethe-Salpeter equation for particle-dimer scattering is expanded in the basis functions of different irreducible representations of the octahedral group. Such a projection is of particular importance…
▽ More
The three-particle quantization condition is partially diagonalized in the center-of-mass frame by using cubic symmetry on the lattice. To this end, instead of spherical harmonics, the kernel of the Bethe-Salpeter equation for particle-dimer scattering is expanded in the basis functions of different irreducible representations of the octahedral group. Such a projection is of particular importance for the three-body problem in the finite volume due to the occurrence of three-body singularities above breakup. Additionally, we study the numerical solution and properties of such a projected quantization condition in a simple model. It is shown that, for large volumes, these solutions allow for an instructive interpretation of the energy eigenvalues in terms of bound and scattering states.
△ Less
Submitted 11 January, 2019; v1 submitted 9 February, 2018;
originally announced February 2018.
-
Solving Linear Programs with Complementarity Constraints using Branch-and-Cut
Authors:
Bin Yu,
John E. Mitchell,
Jong-Shi Pang
Abstract:
A linear program with linear complementarity constraints (LPCC) requires the minimization of a linear objective over a set of linear constraints together with additional linear complementarity constraints. This class has emerged as a modeling paradigm for a broad collection of problems, including bilevel programs, Stackelberg games, inverse quadratic programs, and problems involving equilibrium co…
▽ More
A linear program with linear complementarity constraints (LPCC) requires the minimization of a linear objective over a set of linear constraints together with additional linear complementarity constraints. This class has emerged as a modeling paradigm for a broad collection of problems, including bilevel programs, Stackelberg games, inverse quadratic programs, and problems involving equilibrium constraints. The presence of the complementarity constraints results in a nonconvex optimization problem. We develop a branch-and-cut algorithm to find a global optimum for this class of optimization problems, where we branch directly on complementarities. We develop branching rules and feasibility recovery procedures and demonstrate their computational effectiveness in a comparison with CPLEX. The implementation builds on CPLEX through the use of callback routines. The computational results show that our approach is a strong alternative to constructing an integer programming formulation using big-$M$ terms to represent bounds for variables, with testing conducted on general LPCCs as well as on instances generated from bilevel programs with convex quadratic lower level problems.
△ Less
Submitted 8 February, 2018;
originally announced February 2018.
-
LSTM Pose Machines
Authors:
Yue Luo,
Jimmy Ren,
Zhouxia Wang,
Wenxiu Sun,
**shan Pan,
Jianbo Liu,
Jiahao Pang,
Liang Lin
Abstract:
We observed that recent state-of-the-art results on single image human pose estimation were achieved by multi-stage Convolution Neural Networks (CNN). Notwithstanding the superior performance on static images, the application of these models on videos is not only computationally intensive, it also suffers from performance degeneration and flicking. Such suboptimal results are mainly attributed to…
▽ More
We observed that recent state-of-the-art results on single image human pose estimation were achieved by multi-stage Convolution Neural Networks (CNN). Notwithstanding the superior performance on static images, the application of these models on videos is not only computationally intensive, it also suffers from performance degeneration and flicking. Such suboptimal results are mainly attributed to the inability of imposing sequential geometric consistency, handling severe image quality degradation (e.g. motion blur and occlusion) as well as the inability of capturing the temporal correlation among video frames. In this paper, we proposed a novel recurrent network to tackle these problems. We showed that if we were to impose the weight sharing scheme to the multi-stage CNN, it could be re-written as a Recurrent Neural Network (RNN). This property decouples the relationship among multiple network stages and results in significantly faster speed in invoking the network for videos. It also enables the adoption of Long Short-Term Memory (LSTM) units between video frames. We found such memory augmented RNN is very effective in imposing geometric consistency among frames. It also well handles input quality degradation in videos while successfully stabilizes the sequential outputs. The experiments showed that our approach significantly outperformed current state-of-the-art methods on two large-scale video pose estimation benchmarks. We also explored the memory cells inside the LSTM and provided insights on why such mechanism would benefit the prediction for video-based pose estimations.
△ Less
Submitted 9 March, 2018; v1 submitted 18 December, 2017;
originally announced December 2017.
-
A general framework for parallelizing Dyskstra splitting
Authors:
C. H. Jeffrey Pang
Abstract:
We show a general framework of parallelizing Dykstra splitting that includes the classical Dykstra's algorithm and the product space formulation as special cases, and prove their convergence. The key idea is to split up the function whose conjugate takes in the sum of all dual variables in the dual formulation.
We show a general framework of parallelizing Dykstra splitting that includes the classical Dykstra's algorithm and the product space formulation as special cases, and prove their convergence. The key idea is to split up the function whose conjugate takes in the sum of all dual variables in the dual formulation.
△ Less
Submitted 27 September, 2017;
originally announced September 2017.
-
Dykstra splitting and an approximate proximal point algorithm for minimizing the sum of convex functions
Authors:
C. H. Jeffrey Pang
Abstract:
We show that Dykstra's splitting for projecting onto the intersection of convex sets can be extended to minimize the sum of convex functions and a regularizing quadratic. We give conditions for which convergence to the primal minimizer holds so that more than one convex function can be minimized at a time, the convex functions are not necessarily sampled in a cyclic manner, and the SHQP strategy f…
▽ More
We show that Dykstra's splitting for projecting onto the intersection of convex sets can be extended to minimize the sum of convex functions and a regularizing quadratic. We give conditions for which convergence to the primal minimizer holds so that more than one convex function can be minimized at a time, the convex functions are not necessarily sampled in a cyclic manner, and the SHQP strategy for problems involving the intersection of more than one convex set can be applied. When the sum does not involve the regularizing quadratic, we discuss an approximate proximal point method combined with Dykstra's splitting to minimize this sum.
△ Less
Submitted 27 September, 2017;
originally announced September 2017.
-
A Study of Piecewise Linear-Quadratic Programs
Authors:
Ying Cui,
Tsung-Hui Chang,
Mingyi Hong,
Jong-Shi Pang
Abstract:
Motivated by a growing list of nontraditional statistical estimation problems of the piecewise kind, this paper provides a survey of known results supplemented with new results for the class of piecewise linear-quadratic programs. These are linearly constrained optimization problems with piecewise linear-quadratic (PLQ) objective functions. Starting from a study of the representation of such a fun…
▽ More
Motivated by a growing list of nontraditional statistical estimation problems of the piecewise kind, this paper provides a survey of known results supplemented with new results for the class of piecewise linear-quadratic programs. These are linearly constrained optimization problems with piecewise linear-quadratic (PLQ) objective functions. Starting from a study of the representation of such a function in terms of a family of elementary functions consisting of squared affine functions, squared plus-composite-affine functions, and affine functions themselves, we summarize some local properties of a PLQ function in terms of their first and second-order directional derivatives. We extend some well-known necessary and sufficient second-order conditions for local optimality of a quadratic program to a PLQ program and provide a dozen such equivalent conditions for strong, strict, and isolated local optimality, showing in particular that a PLQ program has the same characterizations for local minimality as a standard quadratic program. As a consequence of one such condition, we show that the number of strong, strict, or isolated local minima of a PLQ program is finite; this result supplements a recent result about the finite number of directional stationary objective values. Interestingly, these finiteness results can be uncovered by invoking a very powerful property of subanalytic functions; our proof is fairly elementary, however. We discuss applications of PLQ programs in some modern statistical estimation problems. These problems lead to a special class of unconstrained composite programs involving the non-differentiable $\ell_1$-function, for which we show that the task of verifying the second-order stationary condition can be converted to the problem of checking the copositivity of certain Schur complement on the nonnegative orthant.
△ Less
Submitted 14 August, 2018; v1 submitted 17 September, 2017;
originally announced September 2017.
-
On the Renormalization of Entanglement Entropy
Authors:
Jiunn-Wei Chen,
**-Yi Pang
Abstract:
The renormalization of entanglement entropy of quantum field theories is investigated in the simplest setting with a $λφ^4$ scalar field theory. The 3+1 dimensional spacetime is separated into two regions by an infinitely flat 2-dimensional interface. The entanglement entropy of the system across the interface has an elegant geometrical interpretation using the replica trick, which requires puttin…
▽ More
The renormalization of entanglement entropy of quantum field theories is investigated in the simplest setting with a $λφ^4$ scalar field theory. The 3+1 dimensional spacetime is separated into two regions by an infinitely flat 2-dimensional interface. The entanglement entropy of the system across the interface has an elegant geometrical interpretation using the replica trick, which requires putting the field theory on a curved spacetime background. We demonstrate that the theory, and hence the entanglement entropy, is renormalizable at order $λ$ once all the relevant operators up to dimension-4 are included in the action. This exercise has a one-to-one correspondence to entanglement entropy interpretation of the black hole entropy which suggests that our treatment is sensible. Our study suggests that entanglement entropy is renormalizable and is a physical quantity.
△ Less
Submitted 18 September, 2017; v1 submitted 10 September, 2017;
originally announced September 2017.
-
Distributed Optimal Frequency Control Considering a Nonlinear Network-Preserving Model
Authors:
Zhaojian Wang,
Feng Liu,
John Z. F. Pang,
Steven Low,
Shengwei Mei
Abstract:
This paper addresses the distributed optimal frequency control of power systems considering a network-preserving model with nonlinear power flows and excitation voltage dynamics. Salient features of the proposed distributed control strategy are fourfold: i) nonlinearity is considered to cope with large disturbances; ii) only a part of generators are controllable; iii) no load measurement is requir…
▽ More
This paper addresses the distributed optimal frequency control of power systems considering a network-preserving model with nonlinear power flows and excitation voltage dynamics. Salient features of the proposed distributed control strategy are fourfold: i) nonlinearity is considered to cope with large disturbances; ii) only a part of generators are controllable; iii) no load measurement is required; iv) communication connectivity is required only for the controllable generators. To this end, benefiting from the concept of 'virtual load demand', we first design the distributed controller for the controllable generators by leveraging the primal-dual decomposition technique. We then propose a method to estimate the virtual load demand of each controllable generator based on local frequencies. We derive incremental passivity conditions for the uncontrollable generators. Finally, we prove that the closed-loop system is asymptotically stable and its equilibrium attains the optimal solution to the associated economic dispatch problem. Simulations, including small and large-disturbance scenarios, are carried on the New England system, demonstrating the effectiveness of our design.
△ Less
Submitted 13 February, 2018; v1 submitted 5 September, 2017;
originally announced September 2017.
-
Cascade Residual Learning: A Two-stage Convolutional Neural Network for Stereo Matching
Authors:
Jiahao Pang,
Wenxiu Sun,
Jimmy SJ. Ren,
Chengxi Yang,
Qiong Yan
Abstract:
Leveraging on the recent developments in convolutional neural networks (CNNs), matching dense correspondence from a stereo pair has been cast as a learning problem, with performance exceeding traditional approaches. However, it remains challenging to generate high-quality disparities for the inherently ill-posed regions. To tackle this problem, we propose a novel cascade CNN architecture composing…
▽ More
Leveraging on the recent developments in convolutional neural networks (CNNs), matching dense correspondence from a stereo pair has been cast as a learning problem, with performance exceeding traditional approaches. However, it remains challenging to generate high-quality disparities for the inherently ill-posed regions. To tackle this problem, we propose a novel cascade CNN architecture composing of two stages. The first stage advances the recently proposed DispNet by equip** it with extra up-convolution modules, leading to disparity images with more details. The second stage explicitly rectifies the disparity initialized by the first stage; it couples with the first-stage and generates residual signals across multiple scales. The summation of the outputs from the two stages gives the final disparity. As opposed to directly learning the disparity at the second stage, we show that residual learning provides more effective refinement. Moreover, it also benefits the training of the overall cascade network. Experimentation shows that our cascade residual learning scheme provides state-of-the-art performance for matching stereo correspondence. By the time of the submission of this paper, our method ranks first in the KITTI 2015 stereo benchmark, surpassing the prior works by a noteworthy margin.
△ Less
Submitted 30 July, 2018; v1 submitted 30 August, 2017;
originally announced August 2017.
-
walk2friends: Inferring Social Links from Mobility Profiles
Authors:
Michael Backes,
Mathias Humbert,
Jun Pang,
Yang Zhang
Abstract:
The development of positioning technologies has resulted in an increasing amount of mobility data being available. While bringing a lot of convenience to people's life, such availability also raises serious concerns about privacy. In this paper, we concentrate on one of the most sensitive information that can be inferred from mobility data, namely social relationships. We propose a novel social re…
▽ More
The development of positioning technologies has resulted in an increasing amount of mobility data being available. While bringing a lot of convenience to people's life, such availability also raises serious concerns about privacy. In this paper, we concentrate on one of the most sensitive information that can be inferred from mobility data, namely social relationships. We propose a novel social relation inference attack that relies on an advanced feature learning technique to automatically summarize users' mobility features. Compared to existing approaches, our attack is able to predict any two individuals' social relation, and it does not require the adversary to have any prior knowledge on existing social relations. These advantages significantly increase the applicability of our attack and the scope of the privacy assessment. Extensive experiments conducted on a large dataset demonstrate that our inference attack is effective, and achieves between 13% to 20% improvement over the best state-of-the-art scheme. We propose three defense mechanisms -- hiding, replacement and generalization -- and evaluate their effectiveness for mitigating the social link privacy risks stemming from mobility data sharing. Our experimental results show that both hiding and replacement mechanisms outperform generalization. Moreover, hiding and replacement achieve a comparable trade-off between utility and privacy, the former preserving better utility and the latter providing better privacy.
△ Less
Submitted 5 September, 2017; v1 submitted 28 August, 2017;
originally announced August 2017.
-
Nonasymptotic and asymptotic linear convergence of an almost cyclic SHQP Dykstra's algorithm for polyhedral problems
Authors:
C. H. Jeffrey Pang
Abstract:
We show that an almost cyclic (or generalized Gauss- Seidel) Dykstra's algorithm which incorporates the SHQP (supporting halfspace- quadratic programming) strategy can achieve nonasymptotic and asymptotic linear convergence for polyhedral problems.
We show that an almost cyclic (or generalized Gauss- Seidel) Dykstra's algorithm which incorporates the SHQP (supporting halfspace- quadratic programming) strategy can achieve nonasymptotic and asymptotic linear convergence for polyhedral problems.
△ Less
Submitted 10 July, 2017;
originally announced July 2017.
-
Three particle quantization condition in a finite volume: 2. general formalism and the analysis of data
Authors:
H. -W. Hammer,
J. -Y. Pang,
A. Rusetsky
Abstract:
We derive the three-body quantization condition in a finite volume using an effective field theory in the particle-dimer picture. Moreover, we consider the extraction of physical observables from the lattice spectrum using the quantization condition. To illustrate the general framework, we calculate the volume-dependent three-particle spectrum in a simple model both below and above the three-parti…
▽ More
We derive the three-body quantization condition in a finite volume using an effective field theory in the particle-dimer picture. Moreover, we consider the extraction of physical observables from the lattice spectrum using the quantization condition. To illustrate the general framework, we calculate the volume-dependent three-particle spectrum in a simple model both below and above the three-particle threshold. The relation to existing approaches is discussed in detail.
△ Less
Submitted 7 July, 2017;
originally announced July 2017.
-
Three-particle quantization condition in a finite volume: 1. The role of the three-particle force
Authors:
H. -W. Hammer,
J. -Y. Pang,
A. Rusetsky
Abstract:
Using non-relativistic effective Lagrangians in the particle-dimer picture, we rederive the expression for the energy shift of a loosely bound three-particle bound state of identical bosons in the unitary limit. The effective field theory formalism allows us to investigate the role of the three-particle force, which has not been taken into account in the earlier treatment of the problem. Moreover,…
▽ More
Using non-relativistic effective Lagrangians in the particle-dimer picture, we rederive the expression for the energy shift of a loosely bound three-particle bound state of identical bosons in the unitary limit. The effective field theory formalism allows us to investigate the role of the three-particle force, which has not been taken into account in the earlier treatment of the problem. Moreover, we are able to relax the requirement of the unitary limit of infinite scattering length and demonstrate a smooth transition from the weakly bound three-particle state to a two-particle bound state of a particle and a deeply bound dimer.
△ Less
Submitted 23 June, 2017;
originally announced June 2017.
-
Robust Tracking Using Region Proposal Networks
Authors:
Jimmy Ren,
Zhiyang Yu,
Jianbo Liu,
Rui Zhang,
Wenxiu Sun,
Jiahao Pang,
Xiaohao Chen,
Qiong Yan
Abstract:
Recent advances in visual tracking showed that deep Convolutional Neural Networks (CNN) trained for image classification can be strong feature extractors for discriminative trackers. However, due to the drastic difference between image classification and tracking, extra treatments such as model ensemble and feature engineering must be carried out to bridge the two domains. Such procedures are eith…
▽ More
Recent advances in visual tracking showed that deep Convolutional Neural Networks (CNN) trained for image classification can be strong feature extractors for discriminative trackers. However, due to the drastic difference between image classification and tracking, extra treatments such as model ensemble and feature engineering must be carried out to bridge the two domains. Such procedures are either time consuming or hard to generalize well across datasets. In this paper we discovered that the internal structure of Region Proposal Network (RPN)'s top layer feature can be utilized for robust visual tracking. We showed that such property has to be unleashed by a novel loss function which simultaneously considers classification accuracy and bounding box quality. Without ensemble and any extra treatment on feature maps, our proposed method achieved state-of-the-art results on several large scale benchmarks including OTB50, OTB100 and VOT2016. We will make our code publicly available.
△ Less
Submitted 29 May, 2017;
originally announced May 2017.
-
Taming Asynchrony for Attractor Detection in Large Boolean Networks (Technical Report)
Authors:
Andrzej Mizera,
Jun Pang,
Hongyang Qu,
Qixia Yuan
Abstract:
Boolean networks is a well-established formalism for modelling biological systems. A vital challenge for analysing a Boolean network is to identify all the attractors. This becomes more challenging for large asynchronous Boolean networks, due to the asynchronous updating scheme. Existing methods are prohibited due to the well-known state-space explosion problem in large Boolean networks. In this p…
▽ More
Boolean networks is a well-established formalism for modelling biological systems. A vital challenge for analysing a Boolean network is to identify all the attractors. This becomes more challenging for large asynchronous Boolean networks, due to the asynchronous updating scheme. Existing methods are prohibited due to the well-known state-space explosion problem in large Boolean networks. In this paper, we tackle this challenge by proposing a SCC-based decomposition method. We prove the correctness of our proposed method and demonstrate its efficiency with two real-life biological networks.
△ Less
Submitted 13 June, 2017; v1 submitted 20 April, 2017;
originally announced April 2017.
-
Accurate Single Stage Detector Using Recurrent Rolling Convolution
Authors:
Jimmy Ren,
Xiaohao Chen,
Jianbo Liu,
Wenxiu Sun,
Jiahao Pang,
Qiong Yan,
Yu-Wing Tai,
Li Xu
Abstract:
Most of the recent successful methods in accurate object detection and localization used some variants of R-CNN style two stage Convolutional Neural Networks (CNN) where plausible regions were proposed in the first stage then followed by a second stage for decision refinement. Despite the simplicity of training and the efficiency in deployment, the single stage detection methods have not been as c…
▽ More
Most of the recent successful methods in accurate object detection and localization used some variants of R-CNN style two stage Convolutional Neural Networks (CNN) where plausible regions were proposed in the first stage then followed by a second stage for decision refinement. Despite the simplicity of training and the efficiency in deployment, the single stage detection methods have not been as competitive when evaluated in benchmarks consider mAP for high IoU thresholds. In this paper, we proposed a novel single stage end-to-end trainable object detection network to overcome this limitation. We achieved this by introducing Recurrent Rolling Convolution (RRC) architecture over multi-scale feature maps to construct object classifiers and bounding box regressors which are "deep in context". We evaluated our method in the challenging KITTI dataset which measures methods under IoU threshold of 0.7. We showed that with RRC, a single reduced VGG-16 based model already significantly outperformed all the previously published results. At the time this paper was written our models ranked the first in KITTI car detection (the hard level), the first in cyclist detection and the second in pedestrian detection. These results were not reached by the previous single stage methods. The code is publicly available.
△ Less
Submitted 19 April, 2017;
originally announced April 2017.
-
On Synchronous, Asynchronous, and Randomized Best-Response schemes for computing equilibria in Stochastic Nash games
Authors:
**long Lei,
Uday V. Shanbhag,
Jong-Shi Pang,
Suvrajeet Sen
Abstract:
This work considers a stochastic Nash game in which each player solves a parameterized stochastic optimization problem. In deterministic regimes, best-response schemes have been shown to be convergent under a suitable spectral property associated with the proximal best-response map. However, a direct application of this scheme to stochastic settings requires obtaining exact solutions to stochastic…
▽ More
This work considers a stochastic Nash game in which each player solves a parameterized stochastic optimization problem. In deterministic regimes, best-response schemes have been shown to be convergent under a suitable spectral property associated with the proximal best-response map. However, a direct application of this scheme to stochastic settings requires obtaining exact solutions to stochastic optimization at each iteration. Instead, we propose an inexact generalization in which an inexact solution is computed via an increasing number of projected stochastic gradient steps. Based on this framework, we present three inexact best-response schemes: (i) First, we propose a synchronous scheme where all players simultaneously update their strategies; (ii) Subsequently, we extend this to a randomized setting where a subset of players is randomly chosen to their update strategies while the others keep their strategies invariant; (iii) Finally, we propose an asynchronous scheme, where each player determines its own update frequency and may use outdated rival-specific data in updating its strategy. Under a suitable contractive property of the proximal best-response map, we derive a.s. convergence of the iterates for (i) and (ii) and mean-convergence for (i) -- (iii). In addition, we show that for (i) -- (iii), the iterates converge to the unique equilibrium in mean at a prescribed linear rate. Finally, we establish the overall iteration complexity in terms of projected stochastic gradient steps for computing an $ε-$Nash equilibrium and in all settings, the iteration complexity is ${\cal O}(1/ε^{2(1+c) + δ})$ where $c = 0$ in the context of (i) and represents the positive cost of randomization (in (ii)) and asynchronicity and delay (in (iii)). The schemes are further extended to linear and quadratic recourse-based stochastic Nash games.
△ Less
Submitted 6 February, 2018; v1 submitted 15 April, 2017;
originally announced April 2017.
-
On the Pervasiveness of Difference-Convexity in Optimization and Statistics
Authors:
Maher Nouiehed,
Jong-Shi Pang,
Meisam Razaviyayn
Abstract:
With the increasing interest in applying the methodology of difference-of-convex (dc) optimization to diverse problems in engineering and statistics, this paper establishes the dc property of many well-known functions not previously known to be of this class. Motivated by a quadratic programming based recourse function in two-stage stochastic programming, we show that the (optimal) value function…
▽ More
With the increasing interest in applying the methodology of difference-of-convex (dc) optimization to diverse problems in engineering and statistics, this paper establishes the dc property of many well-known functions not previously known to be of this class. Motivated by a quadratic programming based recourse function in two-stage stochastic programming, we show that the (optimal) value function of a copositive (thus not necessarily convex) quadratic program is dc on the domain of finiteness of the program when the matrix in the objective function's quadratic term and the constraint matrix are fixed. The proof of this result is based on a dc decomposition of a piecewise LC1 function (i.e., functions with Lipschitz gradients). Armed with these new results and known properties of dc functions existed in the literature, we show that many composite statistical functions in risk analysis, including the value-at-risk (VaR), conditional value-at-risk (CVaR), expectation-based, VaR-based, and CVaR-based random deviation functions are all dc. Adding the known class of dc surrogate sparsity functions that are employed as approximations of the l_0 function in statistical learning, our work significantly expands the family of dc functions and positions them for fruitful applications.
△ Less
Submitted 19 February, 2019; v1 submitted 11 April, 2017;
originally announced April 2017.
-
The $Z_c(3900)$ peak does not come from the "triangle singularity"
Authors:
Qin-Rong Gong,
**g-Long Pang,
Yu-Fei Wang,
Han-Qing Zheng
Abstract:
We compare contributions from the triangle diagram and the $D\bar D^*$ bubble chain to the processes of $e^{+}e^{-}\rightarrow J/ψπ^{+}π^{-}$ and $e^{+}e^{-}\rightarrow (D\bar D^*)^\mpπ^{\pm}$. By fitting the $J/ψπ$ maximum spectrum and the $D\bar D^*$ spectrum, we find that the triangle diagram cannot explain the new data from BESIII Collaboration at center of mass at 4.23GeV and 4.26GeV, simulta…
▽ More
We compare contributions from the triangle diagram and the $D\bar D^*$ bubble chain to the processes of $e^{+}e^{-}\rightarrow J/ψπ^{+}π^{-}$ and $e^{+}e^{-}\rightarrow (D\bar D^*)^\mpπ^{\pm}$. By fitting the $J/ψπ$ maximum spectrum and the $D\bar D^*$ spectrum, we find that the triangle diagram cannot explain the new data from BESIII Collaboration at center of mass at 4.23GeV and 4.26GeV, simultaneously. On the contrary, the molecular assignment of $Z_c(3900)$ gives a much better description.
△ Less
Submitted 6 August, 2017; v1 submitted 24 December, 2016;
originally announced December 2016.
-
Pseudoscalar condensation induced by chiral anomaly and vorticity for massive fermions
Authors:
Ren-hong Fang,
**-yi Pang,
Qun Wang,
Xin-nian Wang
Abstract:
We derive the pseudoscalar condensate induced by anomaly and vorticity from the Wigner function for massive fermions in homogeneous electromagnetic fields. It has an anomaly term and a force-vorticity coupling term. As a mass effect, the pseudoscalar condensate is linearly proportional to the fermion mass in small mass expansion. By a generalization to two-flavor and three-flavor cases, the neutra…
▽ More
We derive the pseudoscalar condensate induced by anomaly and vorticity from the Wigner function for massive fermions in homogeneous electromagnetic fields. It has an anomaly term and a force-vorticity coupling term. As a mass effect, the pseudoscalar condensate is linearly proportional to the fermion mass in small mass expansion. By a generalization to two-flavor and three-flavor cases, the neutral pion and eta meson condensates are calculated from the Wigner function and have anomaly parts as well as force-vorticity parts, in which the anomaly part of the neutral pion condensate is consistent to the previous result. We also discuss about possible observables of the condensates in heavy ion collisions such as collective flows of neutral pions and eta mesons which may be influenced by the electromagnetic field and vorticity profiles.
△ Less
Submitted 14 November, 2016;
originally announced November 2016.
-
DeepCity: A Feature Learning Framework for Mining Location Check-ins
Authors:
Jun Pang,
Yang Zhang
Abstract:
Online social networks being extended to geographical space has resulted in large amount of user check-in data. Understanding check-ins can help to build appealing applications, such as location recommendation. In this paper, we propose DeepCity, a feature learning framework based on deep learning, to profile users and locations, with respect to user demographic and location category prediction. B…
▽ More
Online social networks being extended to geographical space has resulted in large amount of user check-in data. Understanding check-ins can help to build appealing applications, such as location recommendation. In this paper, we propose DeepCity, a feature learning framework based on deep learning, to profile users and locations, with respect to user demographic and location category prediction. Both of the predictions are essential for social network companies to increase user engagement. The key contribution of DeepCity is the proposal of task-specific random walk which uses the location and user properties to guide the feature learning to be specific to each prediction task. Experiments conducted on 42M check-ins in three cities collected from Instagram have shown that DeepCity achieves a superior performance and outperforms other baseline models significantly.
△ Less
Submitted 12 October, 2016;
originally announced October 2016.
-
The Lambda(1405) state in a chiral unitary approach with off-shell corrections to dimensional regularized loop functions
Authors:
Fang-Yong Dong,
Bao-Xi Sun,
**g-Long Pang
Abstract:
The Bethe-Salpeter equation is solved in the framework of unitary coupled-channel approximation by using the pseudoscalar meson-baryon octet interaction. The loop function of the intermediate meson and baryon is deduced in a dimensional regularization scheme, where the relativistic kinetic effect and off-shell corrections are taken into account. According to the experimental data at the $K^- p$ th…
▽ More
The Bethe-Salpeter equation is solved in the framework of unitary coupled-channel approximation by using the pseudoscalar meson-baryon octet interaction. The loop function of the intermediate meson and baryon is deduced in a dimensional regularization scheme, where the relativistic kinetic effect and off-shell corrections are taken into account. According to the experimental data at the $K^- p$ threshold, the subtraction constants in the loop function are determined. The squared amplitude is suppressed strongly and only one $Λ(1405)$ state is generated dynamically in the strangeness $S=-1$ and isospin $I=0$ sector.
△ Less
Submitted 27 April, 2017; v1 submitted 27 September, 2016;
originally announced September 2016.
-
Study of X(5568) in a unitary coupled-channel approximation of $B \bar{K}$ and $B_s π$
Authors:
Bao-Xi Sun,
Fang-Yong Dong,
**g-Long Pang
Abstract:
The potential of the $B$ meson and the pseudoscalar meson is constructed up to the next-to-leading order Lagrangian, and then the $B \bar{K}$ and $B_s π$ interaction is studied in the unitary coupled-channel approximation, and a resonant state with a mass about $5568MeV$ and $J^P=0^+$ is generated dynamically, which can be associated with the $X(5568)$ state announced by D0 Collaboration recently.…
▽ More
The potential of the $B$ meson and the pseudoscalar meson is constructed up to the next-to-leading order Lagrangian, and then the $B \bar{K}$ and $B_s π$ interaction is studied in the unitary coupled-channel approximation, and a resonant state with a mass about $5568MeV$ and $J^P=0^+$ is generated dynamically, which can be associated with the $X(5568)$ state announced by D0 Collaboration recently. The mass and the decay width of this resonant state depend on the regularization scale in the dimensional regularization scheme, or the maximum momentum in the momentum cutoff regularization scheme. The scattering amplitude of the vector $B$ meson and the pseudoscalar meson is calculated, and an axial-vector state with a mass near $5620MeV$ and $J^P=1^+$ is produced. Moreover, their partners in the charm sector are also discussed.
△ Less
Submitted 21 March, 2017; v1 submitted 13 September, 2016;
originally announced September 2016.
-
Should We Learn Probabilistic Models for Model Checking? A New Approach and An Empirical Study
Authors:
**gyi Wang,
Jun Sun,
Qixia Yuan,
Jun Pang
Abstract:
Many automated system analysis techniques (e.g., model checking, model-based testing) rely on first obtaining a model of the system under analysis. System modeling is often done manually, which is often considered as a hindrance to adopt model-based system analysis and development techniques. To overcome this problem, researchers have proposed to automatically "learn" models based on sample system…
▽ More
Many automated system analysis techniques (e.g., model checking, model-based testing) rely on first obtaining a model of the system under analysis. System modeling is often done manually, which is often considered as a hindrance to adopt model-based system analysis and development techniques. To overcome this problem, researchers have proposed to automatically "learn" models based on sample system executions and shown that the learned models can be useful sometimes. There are however many questions to be answered. For instance, how much shall we generalize from the observed samples and how fast would learning converge? Or, would the analysis result based on the learned model be more accurate than the estimation we could have obtained by sampling many system executions within the same amount of time? In this work, we investigate existing algorithms for learning probabilistic models for model checking, propose an evolution-based approach for better controlling the degree of generalization and conduct an empirical study in order to answer the questions. One of our findings is that the effectiveness of learning may sometimes be limited.
△ Less
Submitted 20 March, 2017; v1 submitted 26 May, 2016;
originally announced May 2016.
-
Fast Simulation of Probabilistic Boolean Networks (Technical Report)
Authors:
Andrzej Mizera,
Jun Pang,
Qixia Yuan
Abstract:
Probabilistic Boolean networks (PBNs) is an important mathematical framework widely used for modelling and analysing biological systems. PBNs are suited for modelling large biological systems, which more and more often arise in systems biology. However, the large system size poses a~significant challenge to the analysis of PBNs, in particular, to the crucial analysis of their steady-state behaviou…
▽ More
Probabilistic Boolean networks (PBNs) is an important mathematical framework widely used for modelling and analysing biological systems. PBNs are suited for modelling large biological systems, which more and more often arise in systems biology. However, the large system size poses a~significant challenge to the analysis of PBNs, in particular, to the crucial analysis of their steady-state behaviour. Numerical methods for performing steady-state analyses suffer from the state-space explosion problem, which makes the utilisation of statistical methods the only viable approach. However, such methods require long simulations of PBNs, rendering the simulation speed a crucial efficiency factor. For large PBNs and high estimation precision requirements, a slow simulation speed becomes an obstacle. In this paper, we propose a structure-based method for fast simulation of PBNs. This method first performs a network reduction operation and then divides nodes into groups for parallel simulation. Experimental results show that our method can lead to an approximately 10 times speedup for computing steady-state probabilities of a real-life biological network.
△ Less
Submitted 28 April, 2016;
originally announced May 2016.
-
Graph Laplacian Regularization for Image Denoising: Analysis in the Continuous Domain
Authors:
Jiahao Pang,
Gene Cheung
Abstract:
Inverse imaging problems are inherently under-determined, and hence it is important to employ appropriate image priors for regularization. One recent popular prior---the graph Laplacian regularizer---assumes that the target pixel patch is smooth with respect to an appropriately chosen graph. However, the mechanisms and implications of imposing the graph Laplacian regularizer on the original invers…
▽ More
Inverse imaging problems are inherently under-determined, and hence it is important to employ appropriate image priors for regularization. One recent popular prior---the graph Laplacian regularizer---assumes that the target pixel patch is smooth with respect to an appropriately chosen graph. However, the mechanisms and implications of imposing the graph Laplacian regularizer on the original inverse problem are not well understood. To address this problem, in this paper we interpret neighborhood graphs of pixel patches as discrete counterparts of Riemannian manifolds and perform analysis in the continuous domain, providing insights into several fundamental aspects of graph Laplacian regularization for image denoising. Specifically, we first show the convergence of the graph Laplacian regularizer to a continuous-domain functional, integrating a norm measured in a locally adaptive metric space. Focusing on image denoising, we derive an optimal metric space assuming non-local self-similarity of pixel patches, leading to an optimal graph Laplacian regularizer for denoising in the discrete domain. We then interpret graph Laplacian regularization as an anisotropic diffusion scheme to explain its behavior during iterations, e.g., its tendency to promote piecewise smooth signals under certain settings. To verify our analysis, an iterative image denoising algorithm is developed. Experimental results show that our algorithm performs competitively with state-of-the-art denoising methods such as BM3D for natural images, and outperforms them significantly for piecewise smooth images.
△ Less
Submitted 30 August, 2017; v1 submitted 27 April, 2016;
originally announced April 2016.
-
Quantifying Location Sociality
Authors:
Jun Pang,
Yang Zhang
Abstract:
The emergence of location-based social networks provides an unprecedented chance to study the interaction between human mobility and social relations. This work is a step towards quantifying whether a location is suitable for conducting social activities, and the notion is named location sociality. Being able to quantify location sociality creates practical opportunities such as urban planning and…
▽ More
The emergence of location-based social networks provides an unprecedented chance to study the interaction between human mobility and social relations. This work is a step towards quantifying whether a location is suitable for conducting social activities, and the notion is named location sociality. Being able to quantify location sociality creates practical opportunities such as urban planning and location recommendation. To quantify a location's sociality, we propose a mixture model of HITS and PageRank on a heterogeneous network linking users and locations. By exploiting millions of check-in data generated by Instagram users in New York and Los Angeles, we investigate the relation between location sociality and several location properties, including location categories, rating and popularity. We further perform two case studies, i.e., friendship prediction and location recommendation, experimental results demonstrate the usefulness of our quantification.
△ Less
Submitted 4 September, 2017; v1 submitted 1 April, 2016;
originally announced April 2016.
-
An accelerator scenario for hard X-ray free electron laser joint with high energy electron radiography
Authors:
Tao Wei,
Yiding Li,
Guojun Yang,
Jian Pang,
Yuhui Li,
Peng Li,
Joachim Pflueger,
Xiaozhong He,
Yaxing Lu,
Ke Wang,
Jidong Long,
Linwen Zhang,
Qiang Wu
Abstract:
In order to study the dynamic response of the material and the physical mechanism of the fluid dynamics, an accelerator scenario which can be applied to hard X-ray free electron laser and high energy electron radiography was proposed. This accelerator is mainly composed of a 12GeV linac, an undulator branch and an eRad beamline. In order to characterize sample's dynamic behavior in situ and real-t…
▽ More
In order to study the dynamic response of the material and the physical mechanism of the fluid dynamics, an accelerator scenario which can be applied to hard X-ray free electron laser and high energy electron radiography was proposed. This accelerator is mainly composed of a 12GeV linac, an undulator branch and an eRad beamline. In order to characterize sample's dynamic behavior in situ and real-time with XFEL and eRad simultaneously, the linac should be capable of accelerating the two kinds of beam within the same operation mode. Combining with in-vacuum and tapering techniques, the undulator branch can produce more than 1E11 photons per pulse in 0.1 precent bandwidth at 42keV. Finally, the eRad amplifying beamline with 1:10 ratio was proposed as an important complementary tool for the wider view field and density identification ability.
△ Less
Submitted 25 January, 2016;
originally announced January 2016.
-
The supporting halfspace- quadratic programming strategy for the dual of the best approximation problem
Authors:
C. H. Jeffrey Pang
Abstract:
We consider the best approximation problem (BAP) of projecting a point onto the intersection of a number of convex sets. It is known that Dykstra's algorithm is alternating minimization on the dual problem. We extend Dykstra's algorithm so that it can be enhanced by the SHQP strategy of using quadratic programming to project onto the intersection of supporting halfspaces generated by earlier proje…
▽ More
We consider the best approximation problem (BAP) of projecting a point onto the intersection of a number of convex sets. It is known that Dykstra's algorithm is alternating minimization on the dual problem. We extend Dykstra's algorithm so that it can be enhanced by the SHQP strategy of using quadratic programming to project onto the intersection of supporting halfspaces generated by earlier projection operations. By looking at a structured alternating minimization problem, we show the convergence rate of Dykstra's algorithm when reasonable conditions are imposed to guarantee a dual minimizer. We also establish convergence of using a warmstart iterate for Dykstra's algorithm, show how all the results for the Dykstra's algorithm can be carried over to the simultaneous Dykstra's algorithm, and discuss a different way of incorporating the SHQP strategy. Lastly, we show that the dual of the best approximation problem can have an O(1/k^2) accelerated algorithm that also incorporates the SHQP strategy.
△ Less
Submitted 6 January, 2016;
originally announced January 2016.
-
A Unified Algorithmic Framework for Block-Structured Optimization Involving Big Data
Authors:
Mingyi Hong,
Meisam Razaviyayn,
Zhi-Quan Luo,
Jong-Shi Pang
Abstract:
This article presents a powerful algorithmic framework for big data optimization, called the Block Successive Upper bound Minimization (BSUM). The BSUM includes as special cases many well-known methods for analyzing massive data sets, such as the Block Coordinate Descent (BCD), the Convex-Concave Procedure (CCCP), the Block Coordinate Proximal Gradient (BCPG) method, the Nonnegative Matrix Factori…
▽ More
This article presents a powerful algorithmic framework for big data optimization, called the Block Successive Upper bound Minimization (BSUM). The BSUM includes as special cases many well-known methods for analyzing massive data sets, such as the Block Coordinate Descent (BCD), the Convex-Concave Procedure (CCCP), the Block Coordinate Proximal Gradient (BCPG) method, the Nonnegative Matrix Factorization (NMF), the Expectation Maximization (EM) method and so on. In this article, various features and properties of the BSUM are discussed from the viewpoint of design flexibility, computational efficiency, parallel/distributed implementation and the required communication overhead. Illustrative examples from networking, signal processing and machine learning are presented to demonstrate the practical performance of the BSUM framework
△ Less
Submitted 9 November, 2015;
originally announced November 2015.
-
Computing B-Stationary Points of Nonsmooth DC Programs
Authors:
Jong-Shi Pang,
Meisam Razaviyayn,
Alberth Alvarado
Abstract:
Motivated by a class of applied problems arising from physical layer based security in a digital communication system, in particular, by a secrecy sum-rate maximization problem, this paper studies a nonsmooth, difference-of-convex (dc) minimization problem. The contributions of this paper are: (i) clarify several kinds of stationary solutions and their relations; (ii) develop and establish the con…
▽ More
Motivated by a class of applied problems arising from physical layer based security in a digital communication system, in particular, by a secrecy sum-rate maximization problem, this paper studies a nonsmooth, difference-of-convex (dc) minimization problem. The contributions of this paper are: (i) clarify several kinds of stationary solutions and their relations; (ii) develop and establish the convergence of a novel algorithm for computing a d-stationary solution of a problem with a convex feasible set that is arguably the sharpest kind among the various stationary solutions; (iii) extend the algorithm in several directions including: a randomized choice of the subproblems that could help the practical convergence of the algorithm, a distributed penalty approach for problems whose objective functions are sums of dc functions, and problems with a specially structured (nonconvex) dc constraint. For the latter class of problems, a pointwise Slater constraint qualification is introduced that facilitates the verification and computation of a B(ouligand)-stationary point.
△ Less
Submitted 5 November, 2015;
originally announced November 2015.
-
Three Point Functions in the N=4 Orthogonal Coset Theory
Authors:
Changhyun Ahn,
Hyunsu Kim,
**sub Paeng
Abstract:
We construct the lowest higher spin-2 current in terms of the spin-1 and the spin-1/2 currents living in the orthogonal SO(N+4)/[SO(N) x SO(4)] Wolf space coset theory for general N. The remaining fifteen higher spin currents are determined. We obtain the three-point functions of bosonic (higher) spin currents with two scalars for finite N and k (the level of the spin-1 current). By multiplying SU…
▽ More
We construct the lowest higher spin-2 current in terms of the spin-1 and the spin-1/2 currents living in the orthogonal SO(N+4)/[SO(N) x SO(4)] Wolf space coset theory for general N. The remaining fifteen higher spin currents are determined. We obtain the three-point functions of bosonic (higher) spin currents with two scalars for finite N and k (the level of the spin-1 current). By multiplying SU(2) x U(1) into the above Wolf space coset theory, the other fifteen higher spin currents together with the above lowest higher spin-2 current are realized in the extension of the large N=4 linear superconformal algebra. Similarly, the three-point functions of bosonic (higher) spin currents with two scalars for finite N and k are obtained. Under the large N 't Hooft limit, the two types of three-point functions in the nonlinear and linear versions coincide as in the unitary coset theory found previously.
△ Less
Submitted 12 October, 2015;
originally announced October 2015.
-
Parallel Approximate Steady-state Analysis of Large Probabilistic Boolean Networks (Technical Report)
Authors:
Andrzej Mizera,
Jun Pang,
Qixia Yuan
Abstract:
Probabilistic Boolean networks (PBNs) is a widely used computational framework for modelling biological systems. The steady-state dynamics of PBNs is of special interest in the analysis of biological systems. However, obtaining the steady-state distributions for such systems poses a significant challenge due to the state space explosion problem which often arises in the case of large PBNs. The onl…
▽ More
Probabilistic Boolean networks (PBNs) is a widely used computational framework for modelling biological systems. The steady-state dynamics of PBNs is of special interest in the analysis of biological systems. However, obtaining the steady-state distributions for such systems poses a significant challenge due to the state space explosion problem which often arises in the case of large PBNs. The only viable way is to use statistical methods. We have considered the two-state Markov chain approach and the Skart method for the analysis of large PBNs in our previous work. However, the sample size required in both methods is often huge in the case of large PBNs and generating them is expensive in terms of computation time. Parallelising the sample generation is an ideal way to solve this issue. In this paper, we consider combining the German & Rubin method with either the two-state Markov chain approach or the Skart method for parallelisation. The first method can be used to run multiple independent Markov chains in parallel and to control their convergence to the steady-state while the other two methods can be used to determine the sample size required for computing the steady-state probability of states of interest. Experimental results show that our proposed combinations can reduce time cost of computing stead-state probabilities of large PBNs significantly.
△ Less
Submitted 31 August, 2015;
originally announced August 2015.
-
First order constrained optimization algorithms with feasibility updates
Authors:
C. H. Jeffrey Pang
Abstract:
We propose first order algorithms for convex optimization problems where the feasible set is described by a large number of convex inequalities that is to be explored by subgradient projections. The first algorithm is an adaptation of a subgradient algorithm, and has convergence rate $1/\sqrt{k}$. The second algorithm has convergence rate 1/k when (1) one has linear metric inequality in the feasib…
▽ More
We propose first order algorithms for convex optimization problems where the feasible set is described by a large number of convex inequalities that is to be explored by subgradient projections. The first algorithm is an adaptation of a subgradient algorithm, and has convergence rate $1/\sqrt{k}$. The second algorithm has convergence rate 1/k when (1) one has linear metric inequality in the feasible set, (2) the objective function is strongly convex, differentiable and has Lipschitz gradient, and (3) it is easy to optimize the objective function on the intersection of two halfspaces. This second algorithm generalizes Haugazeau's algorithm. The third algorithm adapts the second algorithm when condition (3) is dropped. We give examples to show that the second algorithm performs poorly when the objective function is not strongly convex, or when the linear metric inequality is absent.
△ Less
Submitted 26 June, 2015;
originally announced June 2015.
-
Nonconvex set intersection problems: From projection methods to the Newton method for super-regular sets
Authors:
C. H. Jeffrey Pang
Abstract:
The problem of finding a point in the intersection of closed sets can be solved by the method of alternating projections and its variants. It was shown in earlier papers that for convex sets, the strategy of using quadratic programming (QP) to project onto the intersection of supporting halfspaces generated earlier by the projection process can lead to an algorithm that converges multiple-term sup…
▽ More
The problem of finding a point in the intersection of closed sets can be solved by the method of alternating projections and its variants. It was shown in earlier papers that for convex sets, the strategy of using quadratic programming (QP) to project onto the intersection of supporting halfspaces generated earlier by the projection process can lead to an algorithm that converges multiple-term superlinearly. The main contributions of this paper are to show that this strategy can be effective for super-regular sets, which are structured nonconvex sets introduced by Lewis, Luke and Malick. Manifolds should be approximated by hyperplanes rather than halfspaces. We prove the linear convergence of this strategy, followed by proving that superlinear and quadratic convergence can be obtained when the problem is similar to the setting of the Newton method. We also show an algorithm that converges at an arbitrarily fast linear rate if halfspaces from older iterations are used to construct the QP.
△ Less
Submitted 26 June, 2015;
originally announced June 2015.
-
Proceedings 4th International Workshop on Engineering Safety and Security Systems
Authors:
Jun Pang,
Yang Liu,
Sjouke Mauw
Abstract:
The present volume contains the proceedings of the Fourth International Workshop on Engineering Safety and Security Systems (ESSS'15). The workshop was held in Oslo, Norway, on June 22nd, 2015, as a satellite event of the 20th International Symposium on Formal Methods (FM'15).
The present volume contains the proceedings of the Fourth International Workshop on Engineering Safety and Security Systems (ESSS'15). The workshop was held in Oslo, Norway, on June 22nd, 2015, as a satellite event of the 20th International Symposium on Formal Methods (FM'15).
△ Less
Submitted 10 June, 2015;
originally announced June 2015.
-
Non-linear Dynamics, Emergent Behaviors and Controlled Expansions: Towards Effective Modeling of the Congested Traffic
Authors:
Bo Yang,
Xihua Xu,
John Z. F. Pang,
Christopher Monterola
Abstract:
We propose a framework for constructing microscopic traffic models from microscopic acceleration patterns that can in principle be experimental measured and proper averaged. The exact model thus obtained can be used to justify the consistency of various popular models in the literature. Assuming analyticity of the exact model, we suggest that a controlled expansion around the constant velocity, un…
▽ More
We propose a framework for constructing microscopic traffic models from microscopic acceleration patterns that can in principle be experimental measured and proper averaged. The exact model thus obtained can be used to justify the consistency of various popular models in the literature. Assuming analyticity of the exact model, we suggest that a controlled expansion around the constant velocity, uniform headway "ground state" is the proper way of constructing various different effective models. Assuming a unique ground state for any fixed average density, we discuss the universal properties of the resulting effective model, focusing on the emergent quantities of the coupled non-linear ODEs. These include the maximum and minimum headway that give the coexistence curve in the phase diagram, as well as an emergent intrinsic scale that characterizes the strength of interaction between clusters, leading to non-trivial cluster statistics when the unstable ground state is randomly perturbed. Utilizing the universal properties of the emergent quantities, a simple algorithm for constructing an effective traffic model is also presented. The algorithm tunes the model with statistically well-defined quantities extracted from the flow-density plot, and the resulting effective model naturally captures and predicts many quantitative and qualitative empirical features of the highway traffic, especially in the presence of an on-ramp bottleneck. The simplicity of the effective model provides strong evidence that stochasticity, diversity of vehicle types and modeling of complicated individual driving behaviors are \emph{not} fundamental to many observations of the complex spatiotemporal patterns in the real traffic dynamics. We also propose the nature of the congested phase can be well characterized by the long lasting transient states of the effective model, from which the wide moving jams evolve.
△ Less
Submitted 6 April, 2015;
originally announced April 2015.
-
Strong Coupling Expansion of the Entanglement Entropy of Yang-Mills Gauge Theories
Authors:
Jiunn-Wei Chen,
Shou-Huang Dai,
**-Yi Pang
Abstract:
We propose a novel prescription for calculating the entanglement entropy of the $SU(N)$ Yang-Mills gauge theories on the lattice under the strong coupling expansion in powers of $β=2N/g^{2}$, where $g$ is the coupling constant. Using the replica method, our Lagrangian formalism maintains gauge invariance on the lattice. At $O(β^{2})$ and $O(β^{3})$, the entanglement entropy is solely contributed b…
▽ More
We propose a novel prescription for calculating the entanglement entropy of the $SU(N)$ Yang-Mills gauge theories on the lattice under the strong coupling expansion in powers of $β=2N/g^{2}$, where $g$ is the coupling constant. Using the replica method, our Lagrangian formalism maintains gauge invariance on the lattice. At $O(β^{2})$ and $O(β^{3})$, the entanglement entropy is solely contributed by the central plaquettes enclosing the conical singularity of the $n$-sheeted Riemann surface. The area law emerges naturally to the highest order $O(β^{3})$ of our calculation. The leading $O(β)$ term is negative, which could in principle be canceled by taking into account the "cosmological constant" living in interface of the two entangled subregions. This unknown cosmological constant resembles the ambiguity of edge modes in the Hamiltonian formalism. We further speculate this unknown cosmological constant can show up in the entanglement entropy of scalar and spinor field theories as well. Furthermore, it could play the role of a counterterm to absorb the ultraviolet divergence of entanglement entropy and make entanglement entropy a finite physical quantity.
△ Less
Submitted 6 April, 2021; v1 submitted 5 March, 2015;
originally announced March 2015.
-
Teleportation-Based Quantum Computation, Extended Temperley-Lieb Diagrammatical Approach and Yang--Baxter Equation
Authors:
Yong Zhang,
Kun Zhang,
**glong Pang
Abstract:
This paper focuses on the study of topological features in teleportation-based quantum computation as well as aims at presenting a detailed review on teleportaiton-based quantum computation (Gottesman and Chuang, Nature 402, 390, 1999). In the extended Temperley-Lieb diagrammatical approach, we clearly show that such topological features bring about the fault-tolerant construction of both universa…
▽ More
This paper focuses on the study of topological features in teleportation-based quantum computation as well as aims at presenting a detailed review on teleportaiton-based quantum computation (Gottesman and Chuang, Nature 402, 390, 1999). In the extended Temperley-Lieb diagrammatical approach, we clearly show that such topological features bring about the fault-tolerant construction of both universal quantum gates and four-partite entangled states more intuitive and simpler. Furthermore, we describe the Yang--Baxter gate by its extended Temperley-Lieb configuration, and then study teleportation-based quantum circuit models using the Yang--Baxter gate. Moreover, we discuss the relationship between the extended Temperley-Lieb diagrammatical approach and the Yang-Baxter gate approach. With these research results, we propose a worthwhile subject, the extended Temperley-Lieb diagrammatical approach, for physicists in quantum information and quantum computation.
△ Less
Submitted 28 January, 2015;
originally announced January 2015.
-
Reviving the Two-state Markov Chain Approach (Technical Report)
Authors:
Andrzej Mizera,
Jun Pang,
Qixia Yuan
Abstract:
Probabilistic Boolean networks (PBNs) is a well-established computational framework for modelling biological systems. The steady-state dynamics of PBNs is of crucial importance in the study of such systems. However, for large PBNs, which often arise in systems biology, obtaining the steady-state distribution poses a significant challenge. In fact, statistical methods for steady-state approximation…
▽ More
Probabilistic Boolean networks (PBNs) is a well-established computational framework for modelling biological systems. The steady-state dynamics of PBNs is of crucial importance in the study of such systems. However, for large PBNs, which often arise in systems biology, obtaining the steady-state distribution poses a significant challenge. In fact, statistical methods for steady-state approximation are the only viable means when dealing with large networks. In this paper, we revive the two-state Markov chain approach presented in the literature. We first identify a problem of generating biased results, due to the size of the initial sample with which the approach needs to start and we propose a few heuristics to avoid such a pitfall. Second, we conduct an extensive experimental comparison of the two-state Markov chain approach and another approach based on the Skart method and we show that statistically the two-state Markov chain has a better performance. Finally, we apply this approach to a large PBN model of apoptosis in hepatocytes.
△ Less
Submitted 25 October, 2016; v1 submitted 8 January, 2015;
originally announced January 2015.
-
Entanglement Entropy and Quantum Phase Transition in the $O(N)$ $σ$-model
Authors:
Jiunn-Wei Chen,
Shou-Huang Dai,
**-Yi Pang
Abstract:
We investigate how entanglement entropy behaves in a non-conformal scalar field system with a quantum phase transition, by the replica method. We study the $σ$-model in 3+1 dimensions which is $O(N)$ symmetric as the mass squared parameter $μ^{2}$ is positive, and undergoes spontaneous symmetry breaking while $μ^{2}$ becomes negative. The area law leading divergence of the entanglement entropy is…
▽ More
We investigate how entanglement entropy behaves in a non-conformal scalar field system with a quantum phase transition, by the replica method. We study the $σ$-model in 3+1 dimensions which is $O(N)$ symmetric as the mass squared parameter $μ^{2}$ is positive, and undergoes spontaneous symmetry breaking while $μ^{2}$ becomes negative. The area law leading divergence of the entanglement entropy is preserved in both of the symmetric and the broken phases. The spontaneous symmetry breaking changes the subleading divergence from log to log squared, due to the cubic interaction on the cone. At the leading order of the coupling constant expansion, the entanglement entropy reaches a cusped maximum at the quantum phase transition point $μ^{2}=0$, and decreases while $μ^{2}$ is tuned away from 0 into either phase.
△ Less
Submitted 1 September, 2021; v1 submitted 11 November, 2014;
originally announced November 2014.
-
Higher Spin Currents in Orthogonal Wolf Space
Authors:
Changhyun Ahn,
**sub Paeng
Abstract:
For the N=4 superconformal coset theory by [SO(N+4)/SO(N) x SU(2)] x U(1) (that contains an orthogonal Wolf space) with N=4, the N=2 WZW affine current algebra is obtained. The 16 generators (or 11 generators) of the large N=4 linear (or nonlinear) superconformal algebra are described by these WZW affine currents explicitly. Along the line of large N=4 holography, the extra 16 currents with spins…
▽ More
For the N=4 superconformal coset theory by [SO(N+4)/SO(N) x SU(2)] x U(1) (that contains an orthogonal Wolf space) with N=4, the N=2 WZW affine current algebra is obtained. The 16 generators (or 11 generators) of the large N=4 linear (or nonlinear) superconformal algebra are described by these WZW affine currents explicitly. Along the line of large N=4 holography, the extra 16 currents with spins (2,5/2,5/2, 3), (5/2, 3, 3, 7/2), (5/2, 3, 3, 7/2), and (3, 7/2, 7/2, 4) are obtained in terms of the WZW affine currents. The lowest spin of this N=4 multiplet is two rather than one which is for an unitary Wolf space. The operator product expansions (OPEs) between the above 11 currents and these extra 16 higher spin currents are found explicitly.
△ Less
Submitted 30 September, 2014;
originally announced October 2014.