-
The Blame Problem in Evaluating Local Explanations, and How to Tackle it
Authors:
Amir Hossein Akhavan Rahnama
Abstract:
The number of local model-agnostic explanation techniques proposed has grown rapidly recently. One main reason is that the bar for develo** new explainability techniques is low due to the lack of optimal evaluation measures. Without rigorous measures, it is hard to have concrete evidence of whether the new explanation techniques can significantly outperform their predecessors. Our study proposes…
▽ More
The number of local model-agnostic explanation techniques proposed has grown rapidly recently. One main reason is that the bar for develo** new explainability techniques is low due to the lack of optimal evaluation measures. Without rigorous measures, it is hard to have concrete evidence of whether the new explanation techniques can significantly outperform their predecessors. Our study proposes a new taxonomy for evaluating local explanations: robustness, evaluation using ground truth from synthetic datasets and interpretable models, model randomization, and human-grounded evaluation. Using this proposed taxonomy, we highlight that all categories of evaluation methods, except those based on the ground truth from interpretable models, suffer from a problem we call the "blame problem." In our study, we argue that this category of evaluation measure is a more reasonable method for evaluating local model-agnostic explanations. However, we show that even this category of evaluation measures has further limitations. The evaluation of local explanations remains an open research problem.
△ Less
Submitted 5 October, 2023;
originally announced October 2023.
-
Evaluating Local Model-Agnostic Explanations of Learning to Rank Models with Decision Paths
Authors:
Amir Hossein Akhavan Rahnama,
Judith Butepage
Abstract:
Local explanations of learning-to-rank (LTR) models are thought to extract the most important features that contribute to the ranking predicted by the LTR model for a single data point. Evaluating the accuracy of such explanations is challenging since the ground truth feature importance scores are not available for most modern LTR models. In this work, we propose a systematic evaluation technique…
▽ More
Local explanations of learning-to-rank (LTR) models are thought to extract the most important features that contribute to the ranking predicted by the LTR model for a single data point. Evaluating the accuracy of such explanations is challenging since the ground truth feature importance scores are not available for most modern LTR models. In this work, we propose a systematic evaluation technique for explanations of LTR models. Instead of using black-box models, such as neural networks, we propose to focus on tree-based LTR models, from which we can extract the ground truth feature importance scores using decision paths. Once extracted, we can directly compare the ground truth feature importance scores to the feature importance scores generated with explanation techniques. We compare two recently proposed explanation techniques for LTR models when using decision trees and gradient boosting models on the MQ2008 dataset. We show that the explanation accuracy in these techniques can largely vary depending on the explained model and even which data point is explained.
△ Less
Submitted 16 March, 2022; v1 submitted 4 March, 2022;
originally announced March 2022.
-
Robustness against Adversarial Attacks in Neural Networks using Incremental Dissipativity
Authors:
Bernardo Aquino,
Arash Rahnama,
Peter Seiler,
Lizhen Lin,
Vijay Gupta
Abstract:
Adversarial examples can easily degrade the classification performance in neural networks. Empirical methods for promoting robustness to such examples have been proposed, but often lack both analytical insights and formal guarantees. Recently, some robustness certificates have appeared in the literature based on system theoretic notions. This work proposes an incremental dissipativity-based robust…
▽ More
Adversarial examples can easily degrade the classification performance in neural networks. Empirical methods for promoting robustness to such examples have been proposed, but often lack both analytical insights and formal guarantees. Recently, some robustness certificates have appeared in the literature based on system theoretic notions. This work proposes an incremental dissipativity-based robustness certificate for neural networks in the form of a linear matrix inequality for each layer. We also propose an equivalent spectral norm bound for this certificate which is scalable to neural networks with multiple layers. We demonstrate the improved performance against adversarial attacks on a feed-forward neural network trained on MNIST and an Alexnet trained using CIFAR-10.
△ Less
Submitted 13 February, 2022; v1 submitted 24 November, 2021;
originally announced November 2021.
-
Amazon SageMaker Model Parallelism: A General and Flexible Framework for Large Model Training
Authors:
Can Karakus,
Rahul Huilgol,
Fei Wu,
Anirudh Subramanian,
Cade Daniel,
Derya Cavdar,
Teng Xu,
Haohan Chen,
Arash Rahnama,
Luis Quintela
Abstract:
With deep learning models rapidly growing in size, systems-level solutions for large-model training are required. We present Amazon SageMaker model parallelism, a software library that integrates with PyTorch, and enables easy training of large models using model parallelism and other memory-saving features. In contrast to existing solutions, the implementation of the SageMaker library is much mor…
▽ More
With deep learning models rapidly growing in size, systems-level solutions for large-model training are required. We present Amazon SageMaker model parallelism, a software library that integrates with PyTorch, and enables easy training of large models using model parallelism and other memory-saving features. In contrast to existing solutions, the implementation of the SageMaker library is much more generic and flexible, in that it can automatically partition and run pipeline parallelism over arbitrary model architectures with minimal code change, and also offers a general and extensible framework for tensor parallelism, which supports a wider range of use cases, and is modular enough to be easily applied to new training scripts. The library also preserves the native PyTorch user experience to a much larger degree, supporting module re-use and dynamic graphs, while giving the user full control over the details of the training step. We evaluate performance over GPT-3, RoBERTa, BERT, and neural collaborative filtering, and demonstrate competitive performance over existing solutions.
△ Less
Submitted 10 November, 2021;
originally announced November 2021.
-
Evaluating Local Explanations using White-box Models
Authors:
Amir Hossein Akhavan Rahnama,
Judith Butepage,
Pierre Geurts,
Henrik Bostrom
Abstract:
Evaluating explanation techniques using human subjects is costly, time-consuming and can lead to subjectivity in the assessments. To evaluate the accuracy of local explanations, we require access to the true feature importance scores for a given instance. However, the prediction function of a model usually does not decompose into linear additive terms that indicate how much a feature contributes t…
▽ More
Evaluating explanation techniques using human subjects is costly, time-consuming and can lead to subjectivity in the assessments. To evaluate the accuracy of local explanations, we require access to the true feature importance scores for a given instance. However, the prediction function of a model usually does not decompose into linear additive terms that indicate how much a feature contributes to the output. In this work, we suggest to instead focus on the log odds ratio (LOR) of the prediction function, which naturally decomposes into additive terms for logistic regression and naive Bayes. We demonstrate how we can benchmark different explanation techniques in terms of their similarity to the LOR scores based on our proposed approach. In the experiments, we compare prominent local explanation techniques and find that the performance of the techniques can depend on the underlying model, the dataset, which data point is explained, the normalization of the data and the similarity metric.
△ Less
Submitted 28 January, 2022; v1 submitted 4 June, 2021;
originally announced June 2021.
-
Laser Nano-Filament Explosion for Enabling Open-Grating Sensing in Optical Fibre
Authors:
Keivan Mahmoud Aghdami,
Abdullah Rahnama,
Erden Ertorer,
Peter R. Herman
Abstract:
Embedding strong photonic stopbands into traditional optical fibre that can directly access and sense the outside environment is challenging, relying on tedious nanoprocessing steps that result in fragile thinned fibre. Ultrashort pulsed laser filaments have recently provided a non contact means of opening high aspect ratio nanoholes inside of bulk transparent glasses. This method has been extende…
▽ More
Embedding strong photonic stopbands into traditional optical fibre that can directly access and sense the outside environment is challenging, relying on tedious nanoprocessing steps that result in fragile thinned fibre. Ultrashort pulsed laser filaments have recently provided a non contact means of opening high aspect ratio nanoholes inside of bulk transparent glasses. This method has been extended here to optical fibre, resulting in high density arrays of laser filamented holes penetrating transversely through the silica cladding and guiding core to provide high refractive index contrast Bragg gratings in the telecommunication band. The point by point fabrication was combined with post-chemical etching to engineer strong photonic stopbands directly inside of the compact and flexible fibre. Fibre Bragg gratings with sharply resolved pi-shifts are presented for high resolution refractive index sensing from n = 1 to 1.67 as the nano-holes were readily wetted and filled with various solvents and oils through an intact fibre cladding.
△ Less
Submitted 29 November, 2020;
originally announced November 2020.
-
An Adversarial Approach for Explaining the Predictions of Deep Neural Networks
Authors:
Arash Rahnama,
Andrew Tseng
Abstract:
Machine learning models have been successfully applied to a wide range of applications including computer vision, natural language processing, and speech recognition. A successful implementation of these models however, usually relies on deep neural networks (DNNs) which are treated as opaque black-box systems due to their incomprehensible complexity and intricate internal mechanism. In this work,…
▽ More
Machine learning models have been successfully applied to a wide range of applications including computer vision, natural language processing, and speech recognition. A successful implementation of these models however, usually relies on deep neural networks (DNNs) which are treated as opaque black-box systems due to their incomprehensible complexity and intricate internal mechanism. In this work, we present a novel algorithm for explaining the predictions of a DNN using adversarial machine learning. Our approach identifies the relative importance of input features in relation to the predictions based on the behavior of an adversarial attack on the DNN. Our algorithm has the advantage of being fast, consistent, and easy to implement and interpret. We present our detailed analysis that demonstrates how the behavior of an adversarial attack, given a DNN and a task, stays consistent for any input test data point proving the generality of our approach. Our analysis enables us to produce consistent and efficient explanations. We illustrate the effectiveness of our approach by conducting experiments using a variety of DNNs, tasks, and datasets. Finally, we compare our work with other well-known techniques in the current literature.
△ Less
Submitted 28 September, 2020; v1 submitted 20 May, 2020;
originally announced May 2020.
-
Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory
Authors:
Arash Rahnama,
Andre T. Nguyen,
Edward Raff
Abstract:
Deep neural networks (DNNs) are vulnerable to subtle adversarial perturbations applied to the input. These adversarial perturbations, though imperceptible, can easily mislead the DNN. In this work, we take a control theoretic approach to the problem of robustness in DNNs. We treat each individual layer of the DNN as a nonlinear dynamical system and use Lyapunov theory to prove stability and robust…
▽ More
Deep neural networks (DNNs) are vulnerable to subtle adversarial perturbations applied to the input. These adversarial perturbations, though imperceptible, can easily mislead the DNN. In this work, we take a control theoretic approach to the problem of robustness in DNNs. We treat each individual layer of the DNN as a nonlinear dynamical system and use Lyapunov theory to prove stability and robustness locally. We then proceed to prove stability and robustness globally for the entire DNN. We develop empirically tight bounds on the response of the output layer, or any hidden layer, to adversarial perturbations added to the input, or the input of hidden layers. Recent works have proposed spectral norm regularization as a solution for improving robustness against l2 adversarial attacks. Our results give new insights into how spectral norm regularization can mitigate the adversarial effects. Finally, we evaluate the power of our approach on a variety of data sets and network architectures and against some of the well-known adversarial attacks.
△ Less
Submitted 11 November, 2019;
originally announced November 2019.
-
A study of data and label shift in the LIME framework
Authors:
Amir Hossein Akhavan Rahnama,
Henrik Boström
Abstract:
LIME is a popular approach for explaining a black-box prediction through an interpretable model that is trained on instances in the vicinity of the predicted instance. To generate these instances, LIME randomly selects a subset of the non-zero features of the predicted instance. After that, the perturbed instances are fed into the black-box model to obtain labels for these, which are then used for…
▽ More
LIME is a popular approach for explaining a black-box prediction through an interpretable model that is trained on instances in the vicinity of the predicted instance. To generate these instances, LIME randomly selects a subset of the non-zero features of the predicted instance. After that, the perturbed instances are fed into the black-box model to obtain labels for these, which are then used for training the interpretable model. In this study, we present a systematic evaluation of the interpretable models that are output by LIME on the two use-cases that were considered in the original paper introducing the approach; text classification and object detection. The investigation shows that the perturbation and labeling phases result in both data and label shift. In addition, we study the correlation between the shift and the fidelity of the interpretable model and show that in certain cases the shift negatively correlates with the fidelity. Based on these findings, it is argued that there is a need for a new sampling approach that mitigates the shift in the LIME's framework.
△ Less
Submitted 31 October, 2019;
originally announced October 2019.
-
Connecting Lyapunov Control Theory to Adversarial Attacks
Authors:
Arash Rahnama,
Andre T. Nguyen,
Edward Raff
Abstract:
Significant work is being done to develop the math and tools necessary to build provable defenses, or at least bounds, against adversarial attacks of neural networks. In this work, we argue that tools from control theory could be leveraged to aid in defending against such attacks. We do this by example, building a provable defense against a weaker adversary. This is done so we can focus on the mec…
▽ More
Significant work is being done to develop the math and tools necessary to build provable defenses, or at least bounds, against adversarial attacks of neural networks. In this work, we argue that tools from control theory could be leveraged to aid in defending against such attacks. We do this by example, building a provable defense against a weaker adversary. This is done so we can focus on the mechanisms of control theory, and illuminate its intrinsic value.
△ Less
Submitted 17 July, 2019;
originally announced July 2019.
-
Network-based protein structural classification
Authors:
Khalique Newaz,
Mahboobeh Ghalehnovi,
Arash Rahnama,
Panos J. Antsaklis,
Tijana Milenkovic
Abstract:
Experimental determination of protein function is resource-consuming. As an alternative, computational prediction of protein function has received attention. In this context, protein structural classification (PSC) can help, by allowing for determining structural classes of currently unclassified proteins based on their features, and then relying on the fact that proteins with similar structures h…
▽ More
Experimental determination of protein function is resource-consuming. As an alternative, computational prediction of protein function has received attention. In this context, protein structural classification (PSC) can help, by allowing for determining structural classes of currently unclassified proteins based on their features, and then relying on the fact that proteins with similar structures have similar functions. Existing PSC approaches rely on sequence-based or direct 3-dimensional (3D) structure-based protein features. In contrast, we first model 3D structures of proteins as protein structure networks (PSNs). Then, we use network-based features for PSC. We propose the use of graphlets, state-of-the-art features in many research areas of network science, in the task of PSC. Moreover, because graphlets can deal only with unweighted PSNs, and because accounting for edge weights when constructing PSNs could improve PSC accuracy, we also propose a deep learning framework that automatically learns network features from weighted PSNs. When evaluated on a large set of ~9,400 CATH and ~12,800 SCOP protein domains (spanning 36 PSN sets), our proposed approaches are superior to existing PSC approaches in terms of accuracy, with comparable running time.
△ Less
Submitted 15 March, 2020; v1 submitted 12 April, 2018;
originally announced April 2018.
-
An LP-based hyperparameter optimization model for language modeling
Authors:
Amir Hossein Akhavan Rahnama,
Mehdi Toloo,
Nezer Jacob Zaidenberg
Abstract:
In order to find hyperparameters for a machine learning model, algorithms such as grid search or random search are used over the space of possible values of the models hyperparameters. These search algorithms opt the solution that minimizes a specific cost function. In language models, perplexity is one of the most popular cost functions. In this study, we propose a fractional nonlinear programmin…
▽ More
In order to find hyperparameters for a machine learning model, algorithms such as grid search or random search are used over the space of possible values of the models hyperparameters. These search algorithms opt the solution that minimizes a specific cost function. In language models, perplexity is one of the most popular cost functions. In this study, we propose a fractional nonlinear programming model that finds the optimal perplexity value. The special structure of the model allows us to approximate it by a linear programming model that can be solved using the well-known simplex algorithm. To the best of our knowledge, this is the first attempt to use optimization techniques to find perplexity values in the language modeling literature. We apply our model to find hyperparameters of a language model and compare it to the grid search algorithm. Furthermore, we illustrating that it results in lower perplexity values. We perform this experiment on a real-world dataset from SwiftKey to validate our proposed approach.
△ Less
Submitted 29 March, 2018;
originally announced March 2018.
-
Resilient Learning-Based Control for Synchronization of Passive Multi-Agent Systems under Attack
Authors:
Arash Rahnama,
Panos J. Antsaklis
Abstract:
In this paper, we show synchronization for a group of output passive agents that communicate with each other according to an underlying communication graph to achieve a common goal. We propose a distributed event-triggered control framework that will guarantee synchronization and considerably decrease the required communication load on the band-limited network. We define a general Byzantine attack…
▽ More
In this paper, we show synchronization for a group of output passive agents that communicate with each other according to an underlying communication graph to achieve a common goal. We propose a distributed event-triggered control framework that will guarantee synchronization and considerably decrease the required communication load on the band-limited network. We define a general Byzantine attack on the event-triggered multi-agent network system and characterize its negative effects on synchronization. The Byzantine agents are capable of intelligently falsifying their data and manipulating the underlying communication graph by altering their respective control feedback weights. We introduce a decentralized detection framework and analyze its steady-state and transient performances. We propose a way of identifying individual Byzantine neighbors and a learning-based method of estimating the attack parameters. Lastly, we propose learning-based control approaches to mitigate the negative effects of the adversarial attack.
△ Less
Submitted 28 September, 2017;
originally announced September 2017.
-
Encoding Multi-Resolution Brain Networks Using Unsupervised Deep Learning
Authors:
Arash Rahnama,
Abdullah Alchihabi,
Vijay Gupta,
Panos Antsaklis,
Fatos T. Yarman Vural
Abstract:
The main goal of this study is to extract a set of brain networks in multiple time-resolutions to analyze the connectivity patterns among the anatomic regions for a given cognitive task. We suggest a deep architecture which learns the natural grou**s of the connectivity patterns of human brain in multiple time-resolutions. The suggested architecture is tested on task data set of Human Connectome…
▽ More
The main goal of this study is to extract a set of brain networks in multiple time-resolutions to analyze the connectivity patterns among the anatomic regions for a given cognitive task. We suggest a deep architecture which learns the natural grou**s of the connectivity patterns of human brain in multiple time-resolutions. The suggested architecture is tested on task data set of Human Connectome Project (HCP) where we extract multi-resolution networks, each of which corresponds to a cognitive task. At the first level of this architecture, we decompose the fMRI signal into multiple sub-bands using wavelet decompositions. At the second level, for each sub-band, we estimate a brain network extracted from short time windows of the fMRI signal. At the third level, we feed the adjacency matrices of each mesh network at each time-resolution into an unsupervised deep learning algorithm, namely, a Stacked De- noising Auto-Encoder (SDAE). The outputs of the SDAE provide a compact connectivity representation for each time window at each sub-band of the fMRI signal. We concatenate the learned representations of all sub-bands at each window and cluster them by a hierarchical algorithm to find the natural grou**s among the windows. We observe that each cluster represents a cognitive task with a performance of 93% Rand Index and 71% Adjusted Rand Index. We visualize the mean values and the precisions of the networks at each component of the cluster mixture. The mean brain networks at cluster centers show the variations among cognitive tasks and the precision of each cluster shows the within cluster variability of networks, across the subjects.
△ Less
Submitted 12 August, 2017;
originally announced August 2017.
-
A Passivity-Based Design for Stability and Robustness in Event-Triggered Networked Control Systems with Communication Delays, Signal Quantizations and Packet Dropouts
Authors:
Arash Rahnama,
Meng Xia,
Panos J. Antsaklis
Abstract:
In this report, we introduce a comprehensive design framework for Event-Triggered Networked Control Systems based on the passivity-based concept of Input Feed-Forward Output Feedback Passive (IF-OFP) systems. Our approach is comprehensive in the sense that we show finite-gain $L_2$-stability and robustness for the networked control system by considering the effects of time-varying or constant netw…
▽ More
In this report, we introduce a comprehensive design framework for Event-Triggered Networked Control Systems based on the passivity-based concept of Input Feed-Forward Output Feedback Passive (IF-OFP) systems. Our approach is comprehensive in the sense that we show finite-gain $L_2$-stability and robustness for the networked control system by considering the effects of time-varying or constant network induced delays, signal quantizations, and data losses in communication links from the plant to controller and the controller to plant. Our design is based on the need for a more efficient utilization of band-limited shared communication networks which is a necessity for the design of Large-Scale Cyber-Physical systems. To achieve this, we introduce simple triggering conditions that do not require the exact knowledge of the sub-systems and are located on both sides of the communication network: the plant's output and the controller's output. This specifically leads to a great decrease in the communication rate between the controller and plant. Additionally, we show lower-bounds on inter-event time intervals for the triggering conditions and show the design's robustness against external noise and disturbance. We illustrate the relationship amongst stability, robustness and passivity levels for the plant and controller. We analyze our design's robustness against packet dropouts and loss of communication. Our results are design-oriented in the sense that based on our proposed framework, the designer can easily observe the trade-offs amongst different components of the networked control system, time-varying delays, effects of signal quantizations and triggering conditions, stability, robustness and performance of networked control system and make design decisions accordingly.
△ Less
Submitted 24 March, 2017;
originally announced April 2017.
-
Distributed Real-Time Sentiment Analysis for Big Data Social Streams
Authors:
Amir Hossein Akhavan Rahnama
Abstract:
Big data trend has enforced the data-centric systems to have continuous fast data streams. In recent years, real-time analytics on stream data has formed into a new research field, which aims to answer queries about what-is-happening-now with a negligible delay. The real challenge with real-time stream data processing is that it is impossible to store instances of data, and therefore online analyt…
▽ More
Big data trend has enforced the data-centric systems to have continuous fast data streams. In recent years, real-time analytics on stream data has formed into a new research field, which aims to answer queries about what-is-happening-now with a negligible delay. The real challenge with real-time stream data processing is that it is impossible to store instances of data, and therefore online analytical algorithms are utilized. To perform real-time analytics, pre-processing of data should be performed in a way that only a short summary of stream is stored in main memory. In addition, due to high speed of arrival, average processing time for each instance of data should be in such a way that incoming instances are not lost without being captured. Lastly, the learner needs to provide high analytical accuracy measures. Sentinel is a distributed system written in Java that aims to solve this challenge by enforcing both the processing and learning process to be done in distributed form. Sentinel is built on top of Apache Storm, a distributed computing platform. Sentinels learner, Vertical Hoeffding Tree, is a parallel decision tree-learning algorithm based on the VFDT, with ability of enabling parallel classification in distributed environments. Sentinel also uses SpaceSaving to keep a summary of the data stream and stores its summary in a synopsis data structure. Application of Sentinel on Twitter Public Stream API is shown and the results are discussed.
△ Less
Submitted 27 December, 2016;
originally announced December 2016.
-
An Extremum-Seeking Co-Simulation Based Framework for Passivation Theory and its Application in Adaptive Cruise Control Systems
Authors:
Arash Rahnama,
Meng Xia,
Shige Wang,
Panos J. Antsaklis
Abstract:
In this report, we apply an input-output transformation passivation method, described in our previous works, to an Adaptive Cruise Control system. We analyze the system's performance under a co-simulation framework that makes use of an online optimization method called extremum-seeking to achieve the optimized behavior. The matrix for passivation method encompasses commonly used methods of series,…
▽ More
In this report, we apply an input-output transformation passivation method, described in our previous works, to an Adaptive Cruise Control system. We analyze the system's performance under a co-simulation framework that makes use of an online optimization method called extremum-seeking to achieve the optimized behavior. The matrix for passivation method encompasses commonly used methods of series, feedback and feed-forward interconnections for passivating the system. We have previously shown that passivity levels can be guaranteed for a system using our passivation method. In this work, an extremum-seeking algorithm was used to determine the passivation parameters. It is known that systems with input-output time-delays are not passive. On the other hand, time-delays are unavoidable in automotive systems and commonly emerge in software implementations and communication units as well as driver's behavior. We show that by using our passivation method, we can passivate the system and improve its overall performance. Our simulation examples in CarSim and Simulink will show that the passive system has a considerably better performance.
△ Less
Submitted 13 July, 2016;
originally announced July 2016.
-
QSR-Dissipativity and Passivity Analysis of Event-Triggered Networked Control Cyber-Physical Systems
Authors:
Arash Rahnama,
Meng Xia,
Panos J. Antsaklis
Abstract:
Input feed-forward output feedback passive (IF-OFP) systems define a great number of dynamical systems. In this report, we show that dissipativity and passivity-based control combined with event-triggered networked control systems (NCS) provide a powerful platform for the design of cyber-physical systems (CPS). We propose QSR-dissipativity, passivity and L2 stability conditions for an event-trigge…
▽ More
Input feed-forward output feedback passive (IF-OFP) systems define a great number of dynamical systems. In this report, we show that dissipativity and passivity-based control combined with event-triggered networked control systems (NCS) provide a powerful platform for the design of cyber-physical systems (CPS). We propose QSR-dissipativity, passivity and L2 stability conditions for an event-triggered networked control system in three cases where: (i) an input-output event-triggering sampler condition is located on the plant's output side, (ii) an input-output event-triggering sampler condition is located on controller's output side, (iii) input-output event-triggering sampler conditions are located on the outputs of both the plant and controller. We will show that this leads to a large decrease in communicational load amongst sub-units in networked control structures. We show that passivity and stability conditions depend on passivity levels for the plant and controller. Our results also illustrate the trade-off among passivity levels, stability, and system's dependence on the rate of communication between the plant and controller.
△ Less
Submitted 2 July, 2016;
originally announced July 2016.