-
Model-Free Active Exploration in Reinforcement Learning
Authors:
Alessio Russo,
Alexandre Proutiere
Abstract:
We study the problem of exploration in Reinforcement Learning and present a novel model-free solution. We adopt an information-theoretical viewpoint and start from the instance-specific lower bound of the number of samples that have to be collected to identify a nearly-optimal policy. Deriving this lower bound along with the optimal exploration strategy entails solving an intricate optimization pr…
▽ More
We study the problem of exploration in Reinforcement Learning and present a novel model-free solution. We adopt an information-theoretical viewpoint and start from the instance-specific lower bound of the number of samples that have to be collected to identify a nearly-optimal policy. Deriving this lower bound along with the optimal exploration strategy entails solving an intricate optimization problem and requires a model of the system. In turn, most existing sample optimal exploration algorithms rely on estimating the model. We derive an approximation of the instance-specific lower bound that only involves quantities that can be inferred using model-free approaches. Leveraging this approximation, we devise an ensemble-based model-free exploration strategy applicable to both tabular and continuous Markov decision processes. Numerical results demonstrate that our strategy is able to identify efficient policies faster than state-of-the-art exploration approaches
△ Less
Submitted 30 June, 2024;
originally announced July 2024.
-
The Belle II Detector Upgrades Framework Conceptual Design Report
Authors:
H. Aihara,
A. Aloisio,
D. P. Auguste,
M. Aversano,
M. Babeluk,
S. Bahinipati,
Sw. Banerjee,
M. Barbero,
J. Baudot,
A. Beaubien,
F. Becherer,
T. Bergauer,
F. U. Bernlochner.,
V. Bertacchi,
G. Bertolone,
C. Bespin,
M. Bessner,
S. Bettarini,
A. J. Bevan,
B. Bhuyan,
M. Bona,
J. F. Bonis,
J. Borah,
F. Bosi,
R. Boudagga
, et al. (183 additional authors not shown)
Abstract:
We describe the planned near-term and potential longer-term upgrades of the Belle II detector at the SuperKEKB electron-positron collider operating at the KEK laboratory in Tsukuba, Japan. These upgrades will allow increasingly sensitive searches for possible new physics beyond the Standard Model in flavor, tau, electroweak and dark sector physics that are both complementary to and competitive wit…
▽ More
We describe the planned near-term and potential longer-term upgrades of the Belle II detector at the SuperKEKB electron-positron collider operating at the KEK laboratory in Tsukuba, Japan. These upgrades will allow increasingly sensitive searches for possible new physics beyond the Standard Model in flavor, tau, electroweak and dark sector physics that are both complementary to and competitive with the LHC and other experiments.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
$ω$-regular Expression Synthesis from Transition-Based Büchi Automata
Authors:
Charles Pert,
Dalal Alrajeh,
Alessandra Russo
Abstract:
A popular method for modelling reactive systems is to use $ω$-regular languages. These languages can be represented as nondeterministic Büchi automata (NBAs) or $ω$-regular expressions. Existing methods synthesise expressions from state-based NBAs. Synthesis from transition-based NBAs is traditionally done by transforming transition-based NBAs into state-based NBAs. This transformation, however, c…
▽ More
A popular method for modelling reactive systems is to use $ω$-regular languages. These languages can be represented as nondeterministic Büchi automata (NBAs) or $ω$-regular expressions. Existing methods synthesise expressions from state-based NBAs. Synthesis from transition-based NBAs is traditionally done by transforming transition-based NBAs into state-based NBAs. This transformation, however, can increase the complexity of the synthesised expressions. This paper proposes a novel method for directly synthesising $ω$-regular expressions from transition-based NBAs. We prove that the method is sound and complete. Our empirical results show that the $ω$-regular expressions synthesised from transition-based NBAs are more compact than those synthesised from state-based NBAs. This is particularly the case for NBAs computed from obligation, reactivity, safety and recurrence-type LTL formulas, reporting in the latter case an average reduction of over 50%. We also show that our method successfully synthesises $ω$-regular expressions from more LTL formulas when using a transition-based instead of a state-based NBA.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Enhancing the light yield of He:CF$_4$ based gaseous detector
Authors:
F. D. Amaro,
R. Antonietti,
E. Baracchini,
L. Benussi,
S. Bianco,
R. Campagnola,
C. Capoccia,
M. Caponero,
D. S. Cardoso,
L. G. M. de Carvalho,
G. Cavoto,
I. Abritta Costa,
A. Croce,
E. Dané,
G. Dho,
F. Di Giambattista,
E. Di Marco,
M. D'Astolfo,
G. D'Imperio,
D. Fiorina,
F. Iacoangeli,
Z. Islam,
H. P. L. Jùnior,
E. Kemp,
G. Maccarrone
, et al. (29 additional authors not shown)
Abstract:
The CYGNO experiment aims to build a large ($\mathcal{O}(10)$ m$^3$) directional detector for rare event searches, such as nuclear recoils (NRs) induced by dark matter (DM), such as weakly interactive massive particles (WIMPs). The detector concept comprises a time projection chamber (TPC), filled with a He:CF$_4$ 60/40 scintillating gas mixture at room temperature and atmospheric pressure, equipp…
▽ More
The CYGNO experiment aims to build a large ($\mathcal{O}(10)$ m$^3$) directional detector for rare event searches, such as nuclear recoils (NRs) induced by dark matter (DM), such as weakly interactive massive particles (WIMPs). The detector concept comprises a time projection chamber (TPC), filled with a He:CF$_4$ 60/40 scintillating gas mixture at room temperature and atmospheric pressure, equipped with an amplification stage made of a stack of three gas electron multipliers (GEMs) which are coupled to an optical readout. The latter consists in scientific CMOS (sCMOS) cameras and photomultipliers tubes (PMTs). The maximisation of the light yield of the amplification stage plays a major role in the determination of the energy threshold of the experiment. In this paper, we simulate the effect of the addition of a strong electric field below the last GEM plane on the GEM field structure and we experimentally test it by means of a 10$\times$10 cm$^2$ readout area prototype. The experimental measurements analyse stacks of different GEMs and helium concentrations in the gas mixture combined with this extra electric field, studying their performances in terms of light yield, energy resolution and intrinsic diffusion. It is found that the use of this additional electric field permits large light yield increases without degrading intrinsic characteristics of the amplification stage with respect to the regular use of GEMs.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
Charge Amplification in Low Pressure CF4:SF6:He Mixtures with a Multi-Mesh ThGEM for Directional Dark Matter Searches
Authors:
F. D. Amaro,
E. Baracchini,
L. Benussi,
S. Bianco,
F. Borra,
C. Capoccia,
M. Caponero,
D. S. Cardoso,
G. Cavoto,
I. A. Costa,
T. Crane,
E. Dane,
M. DAstolfo,
G. Dho,
F. Di Giambattista,
G. DImperio,
E. Di Marco,
J. M. F. Dos Santos,
A. C. Ezeribe,
D. Fiorina,
F. Iacoangeli,
H. P. Lima Junior,
G. S. P. Lopes,
G. Maccarrone,
R. D. P. Mano
, et al. (24 additional authors not shown)
Abstract:
The CYGNO collaboration is develo** next generation directional Dark Matter (DM) detection experiments, using gaseous Time Projection Chambers (TPCs), as a robust method for identifying Weakly Interacting Massive Particles (WIMPs) below the Neutrino Fog. SF6 is potentially ideal for this since it provides a high fluorine content, enhancing sensitivity to spin-dependent interactions and, as a Neg…
▽ More
The CYGNO collaboration is develo** next generation directional Dark Matter (DM) detection experiments, using gaseous Time Projection Chambers (TPCs), as a robust method for identifying Weakly Interacting Massive Particles (WIMPs) below the Neutrino Fog. SF6 is potentially ideal for this since it provides a high fluorine content, enhancing sensitivity to spin-dependent interactions and, as a Negative Ion Drift (NID) gas, reduces charge diffusion leading to improved positional resolution. CF4, although not a NID gas, has also been identified as a favourable gas target as it provides a scintillation signal which can be used for a complimentary light/charge readout approach. These gases can operate at low pressures to elongate Nuclear Recoil (NR) tracks and facilitate directional measurements. In principle, He could be added to low pressure SF6/CF4 without significant detriment to the length of 16S, 12C, and 19F recoils. This would improve the target mass, sensitivity to lower WIMP masses, and offer the possibility of atmospheric operation; potentially reducing the cost of a containment vessel. In this article, we present gas gain and energy resolution measurements, taken with a Multi-Mesh Thick Gaseous Electron Multiplier (MMThGEM), in low pressure SF6 and CF4:SF6 mixtures following the addition of He. We find that the CF4:SF6:He mixtures tested were able to produce gas gains on the order of 10^4 up to a total pressure of 100 Torr. These results demonstrate an order of magnitude improvement in charge amplification in NID gas mixtures with a He component.
△ Less
Submitted 28 May, 2024;
originally announced May 2024.
-
Intergenerational Insurance
Authors:
Francesco Lancia,
Alessia Russo,
Tim Worrall
Abstract:
How should successive generations insure each other when the young can default on previously promised transfers to the old? This paper studies intergenerational insurance that maximizes the expected discounted utility of all generations subject to participation constraints for each generation. If complete insurance is unattainable, the optimal intergenerational insurance is history-dependent even…
▽ More
How should successive generations insure each other when the young can default on previously promised transfers to the old? This paper studies intergenerational insurance that maximizes the expected discounted utility of all generations subject to participation constraints for each generation. If complete insurance is unattainable, the optimal intergenerational insurance is history-dependent even when the environment is stationary. The risk from a generational shock is spread into the future, with periodic resetting. Interpreting intergenerational insurance in terms of debt, the fiscal reaction function is nonlinear and the risk premium on debt is lower than the risk premium with complete insurance.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Status of the production of GEM chambers for the CMS experiment at Large Hadron Collider
Authors:
L. Benussi,
S. Bianco,
R. Campagnola,
M. Caponero,
S. Colafranceschi,
S. Meola,
E. Paoletti,
L. Passamonti,
D. Piccolo,
D. Pierluigi,
A. Russo,
G. Saviano,
R. Tesauro
Abstract:
The High Luminosity LHC phase includes an upgrade to the muon stations for the CMS Experiment. CMS trigger and muon identification performance will be crucial, and it is, therefore, necessary to install new GEM stations to extend acceptance in the high-η region. An explanation of the quality control test and an update on the status of production will be provided.
The High Luminosity LHC phase includes an upgrade to the muon stations for the CMS Experiment. CMS trigger and muon identification performance will be crucial, and it is, therefore, necessary to install new GEM stations to extend acceptance in the high-η region. An explanation of the quality control test and an update on the status of production will be provided.
△ Less
Submitted 28 March, 2024;
originally announced April 2024.
-
A quantum oscillator interacting with a classical oscillator
Authors:
Muhammad Sajjad,
Andrea Russo,
Maite Arcos,
Andrzej Grudka,
Jonathan Oppenheim
Abstract:
We study a quantum oscillator interacting and back-reacting on a classical oscillator. This can be done consistently provided the quantum system decoheres, while the backreaction has a stochastic component which causes the classical system to undergo diffusion. Nonetheless the state of the quantum oscillator can remain pure conditioned on the trajectory of the classical oscillator. We solve the sy…
▽ More
We study a quantum oscillator interacting and back-reacting on a classical oscillator. This can be done consistently provided the quantum system decoheres, while the backreaction has a stochastic component which causes the classical system to undergo diffusion. Nonetheless the state of the quantum oscillator can remain pure conditioned on the trajectory of the classical oscillator. We solve the system using the classical-quantum path integral formulation, and investigate slow moving regimes of either the classical or quantum oscillator. Lastly, we study the correlators of this classicalquantum setup. We are able to identify the free correlators of the theory and compute the full partition function perturbatively up to second order. This serves as a toy model for a number of other systems in which one system can be treated as effectively classical, such as a scalar quantum field interacting with another field undergoing decoherence, or a system emitting radiation, one of which is treated classically.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Requirements for building effective Hamiltonians using quantum-enhanced density matrix downfolding
Authors:
Shivesh Pathak,
Antonio E. Russo,
Stefan Seritan,
Alicia B. Magann,
Eric Bobrow,
Andrew J. Landahl,
Andrew D. Baczewski
Abstract:
Density matrix downfolding (DMD) is a technique for regressing low-energy effective Hamiltonians from quantum many-body Hamiltonians. One limiting factor in the accuracy of classical implementations of DMD is the presence of difficult-to-quantify systematic errors attendant to sampling the observables of quantum many-body systems on an approximate low-energy subspace. We propose a hybrid quantum-c…
▽ More
Density matrix downfolding (DMD) is a technique for regressing low-energy effective Hamiltonians from quantum many-body Hamiltonians. One limiting factor in the accuracy of classical implementations of DMD is the presence of difficult-to-quantify systematic errors attendant to sampling the observables of quantum many-body systems on an approximate low-energy subspace. We propose a hybrid quantum-classical protocol for circumventing this limitation, relying on the prospective ability of quantum computers to efficiently prepare and sample from states in well-defined low-energy subspaces with systematically improvable accuracy. We introduce three requirements for when this is possible, including a notion of compressibility that quantifies features of Hamiltonians and low-energy subspaces thereof for which quantum DMD might be efficient. Assuming that these requirements are met, we analyze design choices for our protocol and provide resource estimates for implementing quantum-enhanced DMD on both the doped 2-D Fermi-Hubbard model and an ab initio model of a cuprate superconductor.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Dimensionality reduction techniques to support insider trading detection
Authors:
Adele Ravagnani,
Fabrizio Lillo,
Paola Deriu,
Piero Mazzarisi,
Francesca Medda,
Antonio Russo
Abstract:
Identification of market abuse is an extremely complicated activity that requires the analysis of large and complex datasets. We propose an unsupervised machine learning method for contextual anomaly detection, which allows to support market surveillance aimed at identifying potential insider trading activities. This method lies in the reconstruction-based paradigm and employs principal component…
▽ More
Identification of market abuse is an extremely complicated activity that requires the analysis of large and complex datasets. We propose an unsupervised machine learning method for contextual anomaly detection, which allows to support market surveillance aimed at identifying potential insider trading activities. This method lies in the reconstruction-based paradigm and employs principal component analysis and autoencoders as dimensionality reduction techniques. The only input of this method is the trading position of each investor active on the asset for which we have a price sensitive event (PSE). After determining reconstruction errors related to the trading profiles, several conditions are imposed in order to identify investors whose behavior could be suspicious of insider trading related to the PSE. As a case study, we apply our method to investor resolved data of Italian stocks around takeover bids.
△ Less
Submitted 8 May, 2024; v1 submitted 1 March, 2024;
originally announced March 2024.
-
Anomalous contribution to galactic rotation curves due to stochastic spacetime
Authors:
Jonathan Oppenheim,
Andrea Russo
Abstract:
We consider a proposed alternative to quantum gravity, in which the spacetime metric is treated as classical, even while matter fields remain quantum. Consistency of the theory necessarily requires that the metric evolve stochastically. Here, we show that this stochastic behaviour leads to a modification of general relativity at low accelerations. In the low acceleration regime, the variance in th…
▽ More
We consider a proposed alternative to quantum gravity, in which the spacetime metric is treated as classical, even while matter fields remain quantum. Consistency of the theory necessarily requires that the metric evolve stochastically. Here, we show that this stochastic behaviour leads to a modification of general relativity at low accelerations. In the low acceleration regime, the variance in the acceleration produced by the gravitational field is high in comparison to that produced by the Newtonian potential, and acts as an entropic force, causing a deviation from Einstein's theory of general relativity. We show that in this "diffusion regime", the entropic force acts from a gravitational point of view, as if it were a contribution to the matter distribution. We compute modifications to the expectation value of the metric via the path integral formalism, and find a stochastic contribution which corresponds to a cosmological constant, anti-correlated with a contribution which has been used to fit galactic rotation curves without dark matter. We caution that a greater understanding of this effect is needed before conclusions can be drawn, most likely through numerical simulations, and provide a template for computing the deviation from general relativity which serves as an experimental signature of the Brownian motion of spacetime.
△ Less
Submitted 1 May, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
Renormalisation of postquantum-classical gravity
Authors:
Andrzej Grudka,
Jonathan Oppenheim,
Andrea Russo,
Muhammad Sajjad
Abstract:
One of the obstacles to reconciling quantum theory with general relativity, is constructing a theory which is both consistent with observation, and and gives finite answers at high energy, so that the theory holds at arbitrarily short distances. Quantum field theory achieves this through the process of renormalisation, but famously, perturbative quantum gravity fails to be renormalisable. Recently…
▽ More
One of the obstacles to reconciling quantum theory with general relativity, is constructing a theory which is both consistent with observation, and and gives finite answers at high energy, so that the theory holds at arbitrarily short distances. Quantum field theory achieves this through the process of renormalisation, but famously, perturbative quantum gravity fails to be renormalisable. Recently, an alternative to quantum gravity has been proposed, in which the geometry of spacetime is taken to be classical rather than quantum, while still being coupled to quantum matter fields. This can be done consistently, provided that the dynamics is fundamentally stochastic. Here, we show that this theory is renormalisable in the gravitational degrees of freedom. We do so via the path integral formulation by relating the classical-quantum action to that of quadratic gravity. Because the action induces stochastic dynamics of spacetime, rather than deterministic evolution of a quantum field, the theory is able to remain renormalisable, while being free of tachyons and negative norm ghosts. The scale invariant and asymptotically free theory appears to be favoured through considerations of complete positivity. The results presented here have a number of implications for inflation, CMB data, and experiments to test the quantum nature of spacetime. They also point to a possible resolution of the black hole singularity.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
The Role of Foundation Models in Neuro-Symbolic Learning and Reasoning
Authors:
Daniel Cunnington,
Mark Law,
Jorge Lobo,
Alessandra Russo
Abstract:
Neuro-Symbolic AI (NeSy) holds promise to ensure the safe deployment of AI systems, as interpretable symbolic techniques provide formal behaviour guarantees. The challenge is how to effectively integrate neural and symbolic computation, to enable learning and reasoning from raw data. Existing pipelines that train the neural and symbolic components sequentially require extensive labelling, whereas…
▽ More
Neuro-Symbolic AI (NeSy) holds promise to ensure the safe deployment of AI systems, as interpretable symbolic techniques provide formal behaviour guarantees. The challenge is how to effectively integrate neural and symbolic computation, to enable learning and reasoning from raw data. Existing pipelines that train the neural and symbolic components sequentially require extensive labelling, whereas end-to-end approaches are limited in terms of scalability, due to the combinatorial explosion in the symbol grounding problem. In this paper, we leverage the implicit knowledge within foundation models to enhance the performance in NeSy tasks, whilst reducing the amount of data labelling and manual engineering. We introduce a new architecture, called NeSyGPT, which fine-tunes a vision-language foundation model to extract symbolic features from raw data, before learning a highly expressive answer set program to solve a downstream task. Our comprehensive evaluation demonstrates that NeSyGPT has superior accuracy over various baselines, and can scale to complex NeSy tasks. Finally, we highlight the effective use of a large language model to generate the programmatic interface between the neural and symbolic components, significantly reducing the amount of manual engineering required.
△ Less
Submitted 2 February, 2024;
originally announced February 2024.
-
Topics evolution through multilayer networks; Analysing 2M tweets from 2022 Qatar FIFA World Cup
Authors:
Andrea Russo,
Vincenzo Miracula,
Antonio Picone
Abstract:
In this study, we conducted a comprehensive data collection on the 2022 Qatar FIFA World Cup event and used a multilayer network approach to visualize the main topics, while considering their context and meaning relationships. We structured the data into layers that corresponded with the stages of the tournament and utilized Gephi software to generate the multilayer networks. Our visualizations di…
▽ More
In this study, we conducted a comprehensive data collection on the 2022 Qatar FIFA World Cup event and used a multilayer network approach to visualize the main topics, while considering their context and meaning relationships. We structured the data into layers that corresponded with the stages of the tournament and utilized Gephi software to generate the multilayer networks. Our visualizations displayed both the relationships between topics and words, showing the word-context relationship, as well as the dynamics and changes over time by layer of the most frequently discussed topics.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
HasTEE+ : Confidential Cloud Computing and Analytics with Haskell
Authors:
Abhiroop Sarkar,
Alejandro Russo
Abstract:
Confidential computing is a security paradigm that enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs). By integrating TEEs with a Remote Attestation protocol, confidential computing allows a third party to establish the integrity of an \textit{enclave} hosted within an untrus…
▽ More
Confidential computing is a security paradigm that enables the protection of confidential code and data in a co-tenanted cloud deployment using specialized hardware isolation units called Trusted Execution Environments (TEEs). By integrating TEEs with a Remote Attestation protocol, confidential computing allows a third party to establish the integrity of an \textit{enclave} hosted within an untrusted cloud. However, TEE solutions, such as Intel SGX and ARM TrustZone, offer low-level C/C++-based toolchains that are susceptible to inherent memory safety vulnerabilities and lack language constructs to monitor explicit and implicit information-flow leaks. Moreover, the toolchains involve complex multi-project hierarchies and the deployment of hand-written attestation protocols for verifying \textit{enclave} integrity.
We address the above with HasTEE+, a domain-specific language (DSL) embedded in Haskell that enables programming TEEs in a high-level language with strong type-safety. HasTEE+ assists in multi-tier cloud application development by (1) introducing a \textit{tierless} programming model for expressing distributed client-server interactions as a single program, (2) integrating a general remote-attestation architecture that removes the necessity to write application-specific cross-cutting attestation code, and (3) employing a dynamic information flow control mechanism to prevent explicit as well as implicit data leaks. We demonstrate the practicality of HasTEE+ through a case study on confidential data analytics, presenting a data-sharing pattern applicable to mutually distrustful participants and providing overall performance metrics.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Diffeomorphism invariant classical-quantum path integrals for Nordstrom gravity
Authors:
Jonathan Oppenheim,
Andrea Russo,
Zachary Weller-Davies
Abstract:
When classical degrees of freedom and quantum degrees of freedom are consistently coupled, the former diffuse, while the latter undergo decoherence. Here, we construct a theory of quantum matter fields and Nordstrom gravity in which the space-time metric is treated classically. The dynamics is constructed via the classical-quantum path integral and is completely positive, trace preserving (CPTP),…
▽ More
When classical degrees of freedom and quantum degrees of freedom are consistently coupled, the former diffuse, while the latter undergo decoherence. Here, we construct a theory of quantum matter fields and Nordstrom gravity in which the space-time metric is treated classically. The dynamics is constructed via the classical-quantum path integral and is completely positive, trace preserving (CPTP), and respects the classical-quantum split. The weak field limit of the model matches the Newtonian limit of the full covariant path integral but it is easier to show that the theory is both diffeomorphism invariant, CPTP, and has the appropriate classical limit.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
Mutually elusive: vectorlike antileptons and leptoquarks
Authors:
Innes Bigaran,
Bogdan A. Dobrescu,
Alessandro Russo
Abstract:
We study the properties of vectorlike fermions that have the same gauge charges as the Standard Model lepton doublets, but opposite lepton number. These antileptons undergo decays mediated by heavier scalar leptoquarks, while the symmetries of this renormalizable model protect the vectorlike fermions and the leptoquarks from standard decays probed so far at colliders. If the new particles couple p…
▽ More
We study the properties of vectorlike fermions that have the same gauge charges as the Standard Model lepton doublets, but opposite lepton number. These antileptons undergo decays mediated by heavier scalar leptoquarks, while the symmetries of this renormalizable model protect the vectorlike fermions and the leptoquarks from standard decays probed so far at colliders. If the new particles couple predominantly to second-generation quarks, then their collider probes involve multiple jets and two taus or neutrinos, and are hampered by large backgrounds. If couplings to third-generation quarks are large, then the collider signals involve top quarks, and can be probed more efficiently at the LHC. Even in that case, both the vectorlike fermion doublet and the leptoquarks remain more elusive than in models with standard decays.
△ Less
Submitted 21 March, 2024; v1 submitted 14 December, 2023;
originally announced December 2023.
-
Cycle-consistent Generative Adversarial Network Synthetic CT for MR-only Adaptive Radiation Therapy on MR-Linac
Authors:
Gabriel L. Asher,
Bassem I. Zaki,
Gregory A. Russo,
Gobind S. Gill,
Charles R. Thomas,
Temiloluwa O. Prioleau,
Rongxiao Zhang,
Brady Hunt
Abstract:
Purpose: This study assesses the effectiveness of Deep Learning (DL) for creating synthetic CT (sCT) images in MR-guided adaptive radiation therapy (MRgART).
Methods: A Cycle-GAN model was trained with MRI and CT scan slices from MR-LINAC treatments, generating sCT volumes. The analysis involved retrospective treatment plan data from patients with various tumors. sCT images were compared with st…
▽ More
Purpose: This study assesses the effectiveness of Deep Learning (DL) for creating synthetic CT (sCT) images in MR-guided adaptive radiation therapy (MRgART).
Methods: A Cycle-GAN model was trained with MRI and CT scan slices from MR-LINAC treatments, generating sCT volumes. The analysis involved retrospective treatment plan data from patients with various tumors. sCT images were compared with standard CT scans using mean absolute error in Hounsfield Units (HU) and image similarity metrics (SSIM, PSNR, NCC). sCT volumes were integrated into a clinical treatment system for dosimetric re-evaluation.
Results: The model, trained on 8405 frames from 57 patients and tested on 357 sCT frames from 17 patients, showed sCTs comparable to dCTs in electron density and structural similarity with MRI scans. The MAE between sCT and dCT was 49.2 +/- 13.2 HU, with sCT NCC exceeding dCT by 0.06, and SSIM and PSNR at 0.97 +/- 0.01 and 19.9 +/- 1.6 respectively. Dosimetric evaluations indicated minimal differences between sCTs and dCTs, with sCTs showing better air-bubble reconstruction.
Conclusions: DL-based sCT generation on MR-Linacs is accurate for dose calculation and optimization in MRgART. This could facilitate MR-only treatment planning, enhancing simulation and adaptive planning efficiency on MR-Linacs.
△ Less
Submitted 2 December, 2023;
originally announced December 2023.
-
A Unifying Framework for Learning Argumentation Semantics
Authors:
Zlatina Mileva,
Antonis Bikakis,
Fabio Aurelio D'Asaro,
Mark Law,
Alessandra Russo
Abstract:
Argumentation is a very active research field of Artificial Intelligence concerned with the representation and evaluation of arguments used in dialogues between humans and/or artificial agents. Acceptability semantics of formal argumentation systems define the criteria for the acceptance or rejection of arguments. Several software systems, known as argumentation solvers, have been developed to com…
▽ More
Argumentation is a very active research field of Artificial Intelligence concerned with the representation and evaluation of arguments used in dialogues between humans and/or artificial agents. Acceptability semantics of formal argumentation systems define the criteria for the acceptance or rejection of arguments. Several software systems, known as argumentation solvers, have been developed to compute the accepted/rejected arguments using such criteria. These include systems that learn to identify the accepted arguments using non-interpretable methods. In this paper we present a novel framework, which uses an Inductive Logic Programming approach to learn the acceptability semantics for several abstract and structured argumentation frameworks in an interpretable way. Through an empirical evaluation we show that our framework outperforms existing argumentation solvers, thus opening up new future research directions in the area of formal argumentation and human-machine dialogues.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
NeuralFastLAS: Fast Logic-Based Learning from Raw Data
Authors:
Theo Charalambous,
Yaniv Aspis,
Alessandra Russo
Abstract:
Symbolic rule learners generate interpretable solutions, however they require the input to be encoded symbolically. Neuro-symbolic approaches overcome this issue by map** raw data to latent symbolic concepts using a neural network. Training the neural and symbolic components jointly is difficult, due to slow and unstable learning, hence many existing systems rely on hand-engineered rules to trai…
▽ More
Symbolic rule learners generate interpretable solutions, however they require the input to be encoded symbolically. Neuro-symbolic approaches overcome this issue by map** raw data to latent symbolic concepts using a neural network. Training the neural and symbolic components jointly is difficult, due to slow and unstable learning, hence many existing systems rely on hand-engineered rules to train the network. We introduce NeuralFastLAS, a scalable and fast end-to-end approach that trains a neural network jointly with a symbolic learner. For a given task, NeuralFastLAS computes a relevant set of rules, proved to contain an optimal symbolic solution, trains a neural network using these rules, and finally finds an optimal symbolic solution to the task while taking network predictions into account. A key novelty of our approach is learning a posterior distribution on rules while training the neural network to improve stability during training. We provide theoretical results for a sufficient condition on network training to guarantee correctness of the final solution. Experimental results demonstrate that NeuralFastLAS is able to achieve state-of-the-art accuracy in arithmetic and logical tasks, with a training time that is up to two orders of magnitude faster than other jointly trained neuro-symbolic methods.
△ Less
Submitted 8 October, 2023;
originally announced October 2023.
-
Constrained Deep Reinforcement Learning for Fronthaul Compression Optimization
Authors:
Axel Grönland,
Alessio Russo,
Yassir Jedra,
Bleron Klaiqi,
Xavier Gelabert
Abstract:
In the Centralized-Radio Access Network (C-RAN) architecture, functions can be placed in the central or distributed locations. This architecture can offer higher capacity and cost savings but also puts strict requirements on the fronthaul (FH). Adaptive FH compression schemes that adapt the compression amount to varying FH traffic are promising approaches to deal with stringent FH requirements. In…
▽ More
In the Centralized-Radio Access Network (C-RAN) architecture, functions can be placed in the central or distributed locations. This architecture can offer higher capacity and cost savings but also puts strict requirements on the fronthaul (FH). Adaptive FH compression schemes that adapt the compression amount to varying FH traffic are promising approaches to deal with stringent FH requirements. In this work, we design such a compression scheme using a model-free off policy deep reinforcement learning algorithm which accounts for FH latency and packet loss constraints. Furthermore, this algorithm is designed for model transparency and interpretability which is crucial for AI trustworthiness in performance critical domains. We show that our algorithm can successfully choose an appropriate compression scheme while satisfying the constraints and exhibits a roughly 70\% increase in FH utilization compared to a reference scheme.
△ Less
Submitted 28 September, 2023; v1 submitted 26 September, 2023;
originally announced September 2023.
-
Proceedings 39th International Conference on Logic Programming
Authors:
Enrico Pontelli,
Stefania Costantini,
Carmine Dodaro,
Sarah Gaggl,
Roberta Calegari,
Artur D'Avila Garcez,
Francesco Fabiano,
Alessandra Mileo,
Alessandra Russo,
Francesca Toni
Abstract:
This volume contains the Technical Communications presented at the 39th International Conference on Logic Programming (ICLP 2023), held at Imperial College London, UK from July 9 to July 15, 2023. Technical Communications included here concern the Main Track, the Doctoral Consortium, the Application and Systems/Demo track, the Recently Published Research Track, the Birds-of-a-Feather track, the Th…
▽ More
This volume contains the Technical Communications presented at the 39th International Conference on Logic Programming (ICLP 2023), held at Imperial College London, UK from July 9 to July 15, 2023. Technical Communications included here concern the Main Track, the Doctoral Consortium, the Application and Systems/Demo track, the Recently Published Research Track, the Birds-of-a-Feather track, the Thematic Tracks on Logic Programming and Machine Learning, and Logic Programming and Explainability, Ethics, and Trustworthiness.
△ Less
Submitted 28 August, 2023;
originally announced August 2023.
-
Matter relative to quantum hypersurfaces
Authors:
Philipp A. Hoehn,
Andrea Russo,
Alexander R. H. Smith
Abstract:
We explore the canonical description of a scalar field as a parameterized field theory on an extended phase space that includes additional embedding fields that characterize spacetime hypersurfaces $\mathsf{X}$ relative to which the scalar field is described. This theory is quantized via the Dirac prescription and physical states of the theory are used to define conditional wave functionals…
▽ More
We explore the canonical description of a scalar field as a parameterized field theory on an extended phase space that includes additional embedding fields that characterize spacetime hypersurfaces $\mathsf{X}$ relative to which the scalar field is described. This theory is quantized via the Dirac prescription and physical states of the theory are used to define conditional wave functionals $|ψ_φ[\mathsf{X}]\rangle$ interpreted as the state of the field relative to the hypersurface $\mathsf{X}$, thereby extending the Page-Wootters formalism to quantum field theory. It is shown that this conditional wave functional satisfies the Tomonaga-Schwinger equation, thus demonstrating the formal equivalence between this extended Page-Wootters formalism and standard quantum field theory. We also construct relational Dirac observables and define a quantum deparameterization of the physical Hilbert space leading to a relational Heisenberg picture, which are both shown to be unitarily equivalent to the Page-Wootters formalism. Moreover, by treating hypersurfaces as quantum reference frames, we extend recently developed quantum frame transformations to changes between classical and nonclassical hypersurfaces. This allows us to exhibit the transformation properties of a quantum field under a larger class of transformations, which leads to a frame-dependent particle creation effect.
△ Less
Submitted 23 November, 2023; v1 submitted 24 August, 2023;
originally announced August 2023.
-
A three-component giant radio halo: the puzzling case of the galaxy cluster Abell 2142
Authors:
L. Bruno,
A. Botteon,
T. Shimwell,
V. Cuciti,
F. de Gasperin,
G. Brunetti,
D. Dallacasa,
F. Gastaldello,
M. Rossetti,
R. J. van Weeren,
T. Venturi,
S. A. Russo,
G. Taffoni,
R. Cassano,
N. Biava,
G. Lusetti,
A. Bonafede,
S. Ghizzardi,
S. De Grandi
Abstract:
Turbulence introduced into the intra-cluster medium (ICM) through cluster merger events transfers energy to non-thermal components, and can trigger the formation of diffuse synchrotron radio sources. Typical diffuse sources in the forms of giant radio halos and mini-halos are found in merging and relaxed cool core galaxy clusters, respectively. On the other hand, recent observations have revealed…
▽ More
Turbulence introduced into the intra-cluster medium (ICM) through cluster merger events transfers energy to non-thermal components, and can trigger the formation of diffuse synchrotron radio sources. Typical diffuse sources in the forms of giant radio halos and mini-halos are found in merging and relaxed cool core galaxy clusters, respectively. On the other hand, recent observations have revealed an increasing complexity of the non-thermal phenomenology. Abell 2142 (A2142) is a mildly disturbed cluster that exhibits uncommon thermal and non-thermal properties. It is known to host a hybrid halo consisting of two components (H1 and H2), namely a mini-halo-like and an enigmatic elongated radio halo-like structure. We aim to investigate the properties, origin, and connections of each component. We present deep LOFAR observations of A2142 in the frequency ranges $30-78$ MHz and $120-168$ MHz. With complementary multi-frequency radio and X-ray data, we analyse the radio spectral properties of the halo and assess the connection between the non-thermal and thermal components of the ICM. We detected a third radio component (H3), which extends over the cluster volume on scales $\sim 2$ Mpc, embeds H1 and H2, and has a morphology that roughly follows the thermal ICM distribution. The radio spectral index is moderately steep in H1 ($α=1.09\pm 0.02$) and H2 ($α=1.15\pm 0.02$), but is steeper ($α=1.57\pm 0.20$) in H3. The analysis of the thermal and non-thermal properties allowed us to discuss possible formation scenarios for each radio component. Turbulence from sloshing motions of low-entropy gas on different scales may be responsible for the origin of H1 and H2. We classified H3 as a giant ultra-steep spectrum radio halo, which could trace the residual activity from an old energetic merger and/or inefficient turbulent re-acceleration induced by ongoing minor mergers.
△ Less
Submitted 15 August, 2023;
originally announced August 2023.
-
HasTEE: Programming Trusted Execution Environments with Haskell
Authors:
Abhiroop Sarkar,
Robert Krook,
Alejandro Russo,
Koen Claessen
Abstract:
Trusted Execution Environments (TEEs) are hardware-enforced memory isolation units, emerging as a pivotal security solution for security-critical applications. TEEs, like Intel SGX and ARM TrustZone, allow the isolation of confidential code and data within an untrusted host environment, such as the cloud and IoT. Despite strong security guarantees, TEE adoption has been hindered by an awkward prog…
▽ More
Trusted Execution Environments (TEEs) are hardware-enforced memory isolation units, emerging as a pivotal security solution for security-critical applications. TEEs, like Intel SGX and ARM TrustZone, allow the isolation of confidential code and data within an untrusted host environment, such as the cloud and IoT. Despite strong security guarantees, TEE adoption has been hindered by an awkward programming model. This model requires manual application partitioning and the use of error-prone, memory-unsafe, and potentially information-leaking low-level C/C++ libraries.
We address the above with \textit{HasTEE}, a domain-specific language (DSL) embedded in Haskell for programming TEE applications. HasTEE includes a port of the GHC runtime for the Intel-SGX TEE. HasTEE uses Haskell's type system to automatically partition an application and to enforce \textit{Information Flow Control} on confidential data. The DSL, being embedded in Haskell, allows for the usage of higher-order functions, monads, and a restricted set of I/O operations to write any standard Haskell application. Contrary to previous work, HasTEE is lightweight, simple, and is provided as a \emph{simple security library}; thus avoiding any GHC modifications. We show the applicability of HasTEE by implementing case studies on federated learning, an encrypted password wallet, and a differentially-private data clean room.
△ Less
Submitted 24 July, 2023;
originally announced July 2023.
-
What influences occupants' behavior in residential buildings: An experimental study on window operation in the KTH Live-In Lab
Authors:
Mahsa Farjadnia,
Angela Fontan,
Alessio Russo,
Karl Henrik Johansson,
Marco Molinari
Abstract:
Window-opening and window-closing behaviors play an important role in indoor environmental conditions and therefore have an impact on building energy efficiency. On the other hand, the same environmental conditions drive occupants to interact with windows. Understanding this mutual relationship of interaction between occupants and the residential building is thus crucial to improve energy efficien…
▽ More
Window-opening and window-closing behaviors play an important role in indoor environmental conditions and therefore have an impact on building energy efficiency. On the other hand, the same environmental conditions drive occupants to interact with windows. Understanding this mutual relationship of interaction between occupants and the residential building is thus crucial to improve energy efficiency without disregarding occupants' comfort. This paper investigates the influence of physical environmental variables (i.e., indoor and outside climate parameters) and categorical variables (i.e., time of the day) on occupants' behavior patterns related to window operation, utilizing a multivariate logistic regression analysis. The data considered in this study are collected during winter months, when the effect on the energy consumption of the window operation is the highest, at a Swedish residential building, the KTH Live-In Lab, accommodating four occupants in separate studio apartments. Although all the occupants seem to share a sensitivity to some common factors, such as air quality and time of the day, we can also observe individual variability with respect to the most significant drivers influencing window operation behaviors.
△ Less
Submitted 16 July, 2023;
originally announced July 2023.
-
Error mitigation, optimization, and extrapolation on a trapped ion testbed
Authors:
Oliver G. Maupin,
Ashlyn D. Burch,
Brandon Ruzic,
Christopher G. Yale,
Antonio Russo,
Daniel S. Lobser,
Melissa C. Revelle,
Matthew N. Chow,
Susan M. Clark,
Andrew J. Landahl,
Peter J. Love
Abstract:
Current noisy intermediate-scale quantum (NISQ) trapped-ion devices are subject to errors which can significantly impact the accuracy of calculations if left unchecked. A form of error mitigation called zero noise extrapolation (ZNE) can decrease an algorithm's sensitivity to these errors without increasing the number of required qubits. Here, we explore different methods for integrating this erro…
▽ More
Current noisy intermediate-scale quantum (NISQ) trapped-ion devices are subject to errors which can significantly impact the accuracy of calculations if left unchecked. A form of error mitigation called zero noise extrapolation (ZNE) can decrease an algorithm's sensitivity to these errors without increasing the number of required qubits. Here, we explore different methods for integrating this error mitigation technique into the Variational Quantum Eigensolver (VQE) algorithm for calculating the ground state of the HeH+ molecule at 0.8 Angstrom in the presence of realistic noise. Using the Quantum Scientific Computing Open User Testbed (QSCOUT) trapped-ion device, we test three methods of scaling noise for extrapolation: time-stretching the two-qubit gates, scaling the sideband amplitude parameter, and inserting two-qubit gate identity operations into the ansatz circuit. We find time-stretching and sideband amplitude scaling fail to scale the noise on our particular hardware in a way that can be directly extrapolated to zero noise. Scaling our noise with global gate identity insertions and extrapolating after variational optimization, we achieve an estimate of the ground state energy within -0.004 +- 0.04 Hartree; outside chemical accuracy, but greatly improved over our non-error-mitigated estimate with error 0.127 +- 0.008 Hartree. Our results show that the efficacy of this error mitigation technique depends on choosing the correct implementation for a given device architecture.
△ Less
Submitted 3 April, 2024; v1 submitted 13 July, 2023;
originally announced July 2023.
-
Reasoning over the Behaviour of Objects in Video-Clips for Adverb-Type Recognition
Authors:
Amrit Diggavi Seshadri,
Alessandra Russo
Abstract:
In this work, following the intuition that adverbs describing scene-sequences are best identified by reasoning over high-level concepts of object-behavior, we propose the design of a new framework that reasons over object-behaviours extracted from raw-video-clips to recognize the clip's corresponding adverb-types. Importantly, while previous works for general scene adverb-recognition assume knowle…
▽ More
In this work, following the intuition that adverbs describing scene-sequences are best identified by reasoning over high-level concepts of object-behavior, we propose the design of a new framework that reasons over object-behaviours extracted from raw-video-clips to recognize the clip's corresponding adverb-types. Importantly, while previous works for general scene adverb-recognition assume knowledge of the clips underlying action-types, our method is directly applicable in the more general problem setting where the action-type of a video-clip is unknown. Specifically, we propose a novel pipeline that extracts human-interpretable object-behaviour-facts from raw video clips and propose novel symbolic and transformer based reasoning methods that operate over these extracted facts to identify adverb-types. Experiment results demonstrate that our proposed methods perform favourably against the previous state-of-the-art. Additionally, to support efforts in symbolic video-processing, we release two new datasets of object-behaviour-facts extracted from raw video clips - the MSR-VTT-ASP and ActivityNet-ASP datasets.
△ Less
Submitted 27 March, 2024; v1 submitted 9 July, 2023;
originally announced July 2023.
-
The weak field limit of quantum matter back-reacting on classical spacetime
Authors:
Isaac Layton,
Jonathan Oppenheim,
Andrea Russo,
Zachary Weller-Davies
Abstract:
Consistent coupling of quantum and classical degrees of freedom exists so long as there is both diffusion of the classical degrees of freedom and decoherence of the quantum system. In this paper, we derive the Newtonian limit of such classical-quantum (CQ) theories of gravity. Our results are obtained both via the gauge fixing of the recently proposed path integral theory of CQ general relativity…
▽ More
Consistent coupling of quantum and classical degrees of freedom exists so long as there is both diffusion of the classical degrees of freedom and decoherence of the quantum system. In this paper, we derive the Newtonian limit of such classical-quantum (CQ) theories of gravity. Our results are obtained both via the gauge fixing of the recently proposed path integral theory of CQ general relativity and via the CQ master equation approach. In each case, we find the same weak field dynamics. We find that the Newtonian potential diffuses by an amount lower bounded by the decoherence rate into mass eigenstates. We also present our results as an unravelled system of stochastic differential equations for the trajectory of the hybrid classical-quantum state and provide a series of kernels for constructing figures of merit, which can be used to rule out part of the parameter space of classical-quantum theories of gravity by experimentally testing it via the decoherence-diffusion trade-off. We compare and contrast the weak field limit to previous models of classical Newtonian gravity coupled to quantum systems. Here, we find that the Newtonian potential and quantum state change in lock-step, with the flow of time being stochastic.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
RECAP-KG: Mining Knowledge Graphs from Raw GP Notes for Remote COVID-19 Assessment in Primary Care
Authors:
Rakhilya Lee Mekhtieva,
Brandon Forbes,
Dalal Alrajeh,
Brendan Delaney,
Alessandra Russo
Abstract:
Clinical decision-making is a fundamental stage in delivering appropriate care to patients. In recent years several decision-making systems designed to aid the clinician in this process have been developed. However, technical solutions currently in use are based on simple regression models and are only able to take into account simple pre-defined multiple-choice features, such as patient age, pre-…
▽ More
Clinical decision-making is a fundamental stage in delivering appropriate care to patients. In recent years several decision-making systems designed to aid the clinician in this process have been developed. However, technical solutions currently in use are based on simple regression models and are only able to take into account simple pre-defined multiple-choice features, such as patient age, pre-existing conditions, smoker status, etc. One particular source of patient data, that available decision-making systems are incapable of processing is the collection of patient consultation GP notes. These contain crucial signs and symptoms - the information used by clinicians in order to make a final decision and direct the patient to the appropriate care. Extracting information from GP notes is a technically challenging problem, as they tend to include abbreviations, typos, and incomplete sentences.
This paper addresses this open challenge. We present a framework that performs knowledge graph construction from raw GP medical notes written during or after patient consultations. By relying on support phrases mined from the SNOMED ontology, as well as predefined supported facts from values used in the RECAP (REmote COVID-19 Assessment in Primary Care) patient risk prediction tool, our graph generative framework is able to extract structured knowledge graphs from the highly unstructured and inconsistent format that consultation notes are written in. Our knowledge graphs include information about existing patient symptoms, their duration, and their severity.
We apply our framework to consultation notes of COVID-19 patients in the UK COVID-19 Clinical Assesment Servcie (CCAS) patient dataset. We provide a quantitative evaluation of the performance of our framework, demonstrating that our approach has better accuracy than traditional NLP methods when answering questions about patients.
△ Less
Submitted 9 October, 2023; v1 submitted 17 June, 2023;
originally announced June 2023.
-
LIME -- a gas TPC prototype for directional Dark Matter search for the CYGNO experiment
Authors:
Fernando Domingues Amaro,
Elisabetta Baracchini,
Luigi Benussi,
Stefano Bianco,
Cesidio Capoccia,
Michele Caponero,
Danilo Santos Cardoso,
Gianluca Cavoto,
André Cortez,
Igor Abritta Costa,
Emiliano Dané,
Giorgio Dho,
Flaminia Di Giambattista,
Emanuele Di Marco,
Giulia D'Imperio,
Francesco Iacoangeli,
Herman Pessoa Lima Junior,
Guilherme Sebastiao Pinheiro Lopes,
Giovanni Maccarrone,
Rui Daniel Passos Mano,
Robert Renz Marcelo Gregorio,
David José Gaspar Marques,
Giovanni Mazzitelli,
Alasdair Gregor McLean,
Andrea Messina
, et al. (22 additional authors not shown)
Abstract:
The CYGNO experiment aims at the development of a large gaseous TPC with GEM-based amplification and an optical readout by means of PMTs and scientific CMOS cameras for 3D tracking down to O(keV) energies, for the directional detection of rare events such as low mass Dark Matter and solar neutrino interactions. The largest prototype built so far towards the realisation of the CYGNO experiment demo…
▽ More
The CYGNO experiment aims at the development of a large gaseous TPC with GEM-based amplification and an optical readout by means of PMTs and scientific CMOS cameras for 3D tracking down to O(keV) energies, for the directional detection of rare events such as low mass Dark Matter and solar neutrino interactions. The largest prototype built so far towards the realisation of the CYGNO experiment demonstrator is the 50 L active volume LIME, with 4 PMTs and a single sCMOS imaging a 33$\times$33 cm\textsuperscript{2} area for 50 cm drift, that has been installed in underground Laboratori Nazionali del Gran Sasso in February 2022. We will illustrate LIME performances as evaluated overground in Laboratori Nazionali di Frascati by means of radioactive X-ray sources, and in particular the detector stability, energy response and energy resolution. We will discuss the MC simulation developed to reproduce the detector response and show the comparison with actual data. We will furthermore examine the background simulation worked out for LIME underground data taking and illustrate the foreseen expected measurement and results in terms of natural and materials intrinsic radioactivity characterisation and measurement of the LNGS underground natural neutron flux. The results that will be obtained by underground LIME installation will be paramount in the optimisation of the CYGNO demonstrator, since this is foreseen to be composed by multiple modules with the same LIME dimensions and characteristics.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
The CYGNO experiment, a directional detector for direct Dark Matter searches
Authors:
F. D. Amaro,
E. Baracchini,
L. Benussi,
S. Bianco,
C. Capoccia,
M. Caponero,
D. S. Cardoso,
G. Cavoto,
A. Cortez,
I. A. Costa,
E. Dané,
G. Dho,
F. Di Giambattista,
E. Di Marco,
G. D'Imperio,
F. Iacoangeli,
H. P. L. Jùnior,
G. S. P. Lopes,
G. Maccarrone,
R. D. P. Mano,
R. R. M. Gregorio,
D. J. G. Marques,
G. Mazzitelli,
A. G. McLean,
A. Messina
, et al. (22 additional authors not shown)
Abstract:
The CYGNO project aims at the development of a high precision optical readout gaseous Tima Projection Chamber (TPC) for directional dark matter (DM) searches, to be hosted at Laboratori Nazionali del Gran Sasso (LNGS). CYGNO employs a He:CF$_4$ gas mixture at atmospheric pressure with a Gas Electron Multiplier (GEM) based amplification structure coupled to an optical readout comprised of sCMOS cam…
▽ More
The CYGNO project aims at the development of a high precision optical readout gaseous Tima Projection Chamber (TPC) for directional dark matter (DM) searches, to be hosted at Laboratori Nazionali del Gran Sasso (LNGS). CYGNO employs a He:CF$_4$ gas mixture at atmospheric pressure with a Gas Electron Multiplier (GEM) based amplification structure coupled to an optical readout comprised of sCMOS cameras and photomultiplier tubes (PMTs). This experimental setup allows to achieve 3D tracking and background rejection down to O(1) keV energy, to boost sensitivity to low WIMP masses. The characteristics of the optical readout approach in terms of the light yield will be illustrated along with the particle identification properties. The project timeline foresees, in the next 2-3 years, the realisation and installation of a 0.4 m$^3$ TPC in the underground laboratories at LNGS to act as a demonstrator. Finally, the studies of the expected DM sensitivities of the CYGNO demonstrator will be presented.
△ Less
Submitted 7 June, 2023;
originally announced June 2023.
-
JaqalPaw: A Guide to Defining Pulses and Waveforms for Jaqal
Authors:
Daniel Lobser,
Joshua Goldberg,
Andrew J. Landahl,
Peter Maunz,
Benjamin C. A. Morrison,
Kenneth Rudinger,
Antonio Russo,
Brandon Ruzic,
Daniel Stick,
Jay Van Der Wall,
Susan M. Clark
Abstract:
One of the many challenges of develo** an open user testbed such as QSCOUT is providing an interface that maintains simplicity without compromising expressibility or control. This interface comprises two distinct elements: a quantum assembly language designed for specifying quantum circuits at the gate level, and a low-level counterpart used for describing gates in terms of waveforms that realiz…
▽ More
One of the many challenges of develo** an open user testbed such as QSCOUT is providing an interface that maintains simplicity without compromising expressibility or control. This interface comprises two distinct elements: a quantum assembly language designed for specifying quantum circuits at the gate level, and a low-level counterpart used for describing gates in terms of waveforms that realize specific quantum operations. Jaqal, or "Just another quantum assembly language," is the language used in QSCOUT for gate-level descriptions of quantum circuits. JaqalPaw, or "Jaqal pulses and waveforms," is its pulse-level counterpart. This document concerns the latter, and presents a description of the tools needed for precisely defining the underlying waveforms associated with a gate primitive.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.
-
Bent & Broken Bicycles: Leveraging synthetic data for damaged object re-identification
Authors:
Luca Piano,
Filippo Gabriele Pratticò,
Alessandro Sebastian Russo,
Lorenzo Lanari,
Lia Morra,
Fabrizio Lamberti
Abstract:
Instance-level object re-identification is a fundamental computer vision task, with applications from image retrieval to intelligent monitoring and fraud detection. In this work, we propose the novel task of damaged object re-identification, which aims at distinguishing changes in visual appearance due to deformations or missing parts from subtle intra-class variations. To explore this task, we le…
▽ More
Instance-level object re-identification is a fundamental computer vision task, with applications from image retrieval to intelligent monitoring and fraud detection. In this work, we propose the novel task of damaged object re-identification, which aims at distinguishing changes in visual appearance due to deformations or missing parts from subtle intra-class variations. To explore this task, we leverage the power of computer-generated imagery to create, in a semi-automatic fashion, high-quality synthetic images of the same bike before and after a damage occurs. The resulting dataset, Bent & Broken Bicycles (BBBicycles), contains 39,200 images and 2,800 unique bike instances spanning 20 different bike models. As a baseline for this task, we propose TransReI3D, a multi-task, transformer-based deep network unifying damage detection (framed as a multi-label classification task) with object re-identification. The BBBicycles dataset is available at https://huggingface.co/datasets/GrainsPolito/BBBicycles
△ Less
Submitted 16 April, 2023;
originally announced April 2023.
-
Towards preserving word order importance through Forced Invalidation
Authors:
Hadeel Al-Negheimish,
Pranava Madhyastha,
Alessandra Russo
Abstract:
Large pre-trained language models such as BERT have been widely used as a framework for natural language understanding (NLU) tasks. However, recent findings have revealed that pre-trained language models are insensitive to word order. The performance on NLU tasks remains unchanged even after randomly permuting the word of a sentence, where crucial syntactic information is destroyed. To help preser…
▽ More
Large pre-trained language models such as BERT have been widely used as a framework for natural language understanding (NLU) tasks. However, recent findings have revealed that pre-trained language models are insensitive to word order. The performance on NLU tasks remains unchanged even after randomly permuting the word of a sentence, where crucial syntactic information is destroyed. To help preserve the importance of word order, we propose a simple approach called Forced Invalidation (FI): forcing the model to identify permuted sequences as invalid samples. We perform an extensive evaluation of our approach on various English NLU and QA based tasks over BERT-based and attention-based models over word embeddings. Our experiments demonstrate that Forced Invalidation significantly improves the sensitivity of the models to word order.
△ Less
Submitted 11 April, 2023;
originally announced April 2023.
-
Conformal Off-Policy Evaluation in Markov Decision Processes
Authors:
Daniele Foffano,
Alessio Russo,
Alexandre Proutiere
Abstract:
Reinforcement Learning aims at identifying and evaluating efficient control policies from data. In many real-world applications, the learner is not allowed to experiment and cannot gather data in an online manner (this is the case when experimenting is expensive, risky or unethical). For such applications, the reward of a given policy (the target policy) must be estimated using historical data gat…
▽ More
Reinforcement Learning aims at identifying and evaluating efficient control policies from data. In many real-world applications, the learner is not allowed to experiment and cannot gather data in an online manner (this is the case when experimenting is expensive, risky or unethical). For such applications, the reward of a given policy (the target policy) must be estimated using historical data gathered under a different policy (the behavior policy). Most methods for this learning task, referred to as Off-Policy Evaluation (OPE), do not come with accuracy and certainty guarantees. We present a novel OPE method based on Conformal Prediction that outputs an interval containing the true reward of the target policy with a prescribed level of certainty. The main challenge in OPE stems from the distribution shift due to the discrepancies between the target and the behavior policies. We propose and empirically evaluate different ways to deal with this shift. Some of these methods yield conformalized intervals with reduced length compared to existing approaches, while maintaining the same certainty level.
△ Less
Submitted 19 September, 2023; v1 submitted 5 April, 2023;
originally announced April 2023.
-
Quantitative study of the stabilization parameter in the virtual element method
Authors:
Alessandro Russo,
N. Sukumar
Abstract:
The choice of stabilization term is a critical component of the virtual element method (VEM). However, the theory of VEM provides only asymptotic guidance for selecting the stabilization term, which ensures convergence as the mesh size approaches zero, but does not provide a unique prescription for its exact form. Thus, the selection of a suitable stabilization term is often guided by numerical ex…
▽ More
The choice of stabilization term is a critical component of the virtual element method (VEM). However, the theory of VEM provides only asymptotic guidance for selecting the stabilization term, which ensures convergence as the mesh size approaches zero, but does not provide a unique prescription for its exact form. Thus, the selection of a suitable stabilization term is often guided by numerical experimentation and analysis of the resulting solution, including factors such as stability, accuracy, and efficiency. In this paper, we establish a new link between VEM and generalized barycentric coordinates, in particular isoparametric finite elements as a specific case. This connection enables the interpretation of the stability as the energy of a particular function in the discrete space, commonly known as the `hourglass mode.' Through this approach, this study sheds light on how the virtual element solution depends on the stabilization term, providing insights into the behavior of the method in more general scenarios.
△ Less
Submitted 31 March, 2023;
originally announced April 2023.
-
Neuro-symbolic Rule Learning in Real-world Classification Tasks
Authors:
Kexin Gu Baugh,
Nuri Cingillioglu,
Alessandra Russo
Abstract:
Neuro-symbolic rule learning has attracted lots of attention as it offers better interpretability than pure neural models and scales better than symbolic rule learning. A recent approach named pix2rule proposes a neural Disjunctive Normal Form (neural DNF) module to learn symbolic rules with feed-forward layers. Although proved to be effective in synthetic binary classification, pix2rule has not b…
▽ More
Neuro-symbolic rule learning has attracted lots of attention as it offers better interpretability than pure neural models and scales better than symbolic rule learning. A recent approach named pix2rule proposes a neural Disjunctive Normal Form (neural DNF) module to learn symbolic rules with feed-forward layers. Although proved to be effective in synthetic binary classification, pix2rule has not been applied to more challenging tasks such as multi-label and multi-class classifications over real-world data. In this paper, we address this limitation by extending the neural DNF module to (i) support rule learning in real-world multi-class and multi-label classification tasks, (ii) enforce the symbolic property of mutual exclusivity (i.e. predicting exactly one class) in multi-class classification, and (iii) explore its scalability over large inputs and outputs. We train a vanilla neural DNF model similar to pix2rule's neural DNF module for multi-label classification, and we propose a novel extended model called neural DNF-EO (Exactly One) which enforces mutual exclusivity in multi-class classification. We evaluate the classification performance, scalability and interpretability of our neural DNF-based models, and compare them against pure neural models and a state-of-the-art symbolic rule learner named FastLAS. We demonstrate that our neural DNF-based models perform similarly to neural networks, but provide better interpretability by enabling the extraction of logical rules. Our models also scale well when the rule search space grows in size, in contrast to FastLAS, which fails to learn in multi-class classification tasks with 200 classes and in all multi-label settings.
△ Less
Submitted 29 March, 2023;
originally announced March 2023.
-
The nonconforming virtual element method with curved edges
Authors:
Lourenco Beirão Da Veiga,
Yi Liu,
Lorenzo Mascotto,
Alessandro Russo
Abstract:
We introduce a nonconforming virtual element method for the Poisson equation on domains with curved boundary and internal interfaces. We prove arbitrary order optimal convergence in the energy and $L^2$ norms, and validate the theoretical results with numerical experiments. Compared to existing nodal virtual elements on curved domains, the proposed scheme has the advantage that it can be designed…
▽ More
We introduce a nonconforming virtual element method for the Poisson equation on domains with curved boundary and internal interfaces. We prove arbitrary order optimal convergence in the energy and $L^2$ norms, and validate the theoretical results with numerical experiments. Compared to existing nodal virtual elements on curved domains, the proposed scheme has the advantage that it can be designed in any dimension.
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Learning Reward Machines in Cooperative Multi-Agent Tasks
Authors:
Leo Ardon,
Daniel Furelos-Blanco,
Alessandra Russo
Abstract:
This paper presents a novel approach to Multi-Agent Reinforcement Learning (MARL) that combines cooperative task decomposition with the learning of reward machines (RMs) encoding the structure of the sub-tasks. The proposed method helps deal with the non-Markovian nature of the rewards in partially observable environments and improves the interpretability of the learnt policies required to complet…
▽ More
This paper presents a novel approach to Multi-Agent Reinforcement Learning (MARL) that combines cooperative task decomposition with the learning of reward machines (RMs) encoding the structure of the sub-tasks. The proposed method helps deal with the non-Markovian nature of the rewards in partially observable environments and improves the interpretability of the learnt policies required to complete the cooperative task. The RMs associated with each sub-task are learnt in a decentralised manner and then used to guide the behaviour of each agent. By doing so, the complexity of a cooperative multi-agent problem is reduced, allowing for more effective learning. The results suggest that our approach is a promising direction for future research in MARL, especially in complex environments with large state spaces and multiple agents.
△ Less
Submitted 24 May, 2023; v1 submitted 24 March, 2023;
originally announced March 2023.
-
Requirements analysis for HPC\&HTC infrastructures integration in ESCAPE Science Analysis Platform
Authors:
S. Bertocco,
D. Goz,
S. A. Russo,
M. Moliaro,
G. Taffoni
Abstract:
ESCAPE (European Science Cluster of Astronomy and Particle physics ESFRI research infrastructures) is a project to set up a cluster of ESFRI (European Strategy Forum on Research Infrastructures) facilities for astronomy, astroparticle and particle physics to face the challenges emerging through the modern multi-disciplinary data driven science. One of the main goal of ESCAPE is the building of ESA…
▽ More
ESCAPE (European Science Cluster of Astronomy and Particle physics ESFRI research infrastructures) is a project to set up a cluster of ESFRI (European Strategy Forum on Research Infrastructures) facilities for astronomy, astroparticle and particle physics to face the challenges emerging through the modern multi-disciplinary data driven science. One of the main goal of ESCAPE is the building of ESAP (ESFRI Science Analysis Platform), a science platform for the analysis of open access data available through the EOSC (European Open Science Cloud) environment. ESAP will allow EOSC researchers to identify and stage existing data collections for analysis, share data, share and run scientific workflows. For many of the concerned ESFRIs and RIs, the data scales involved require significant computational resources (storage and compute) to support processing and analysis. The EOSC-ESFRI science platform therefore must implement appropriate interfaces to an underlying HPC (High Performance Computing) or HTC (High Throughput Computing) infrastructure to take advantage of it. This poster describes the analysis done to identify the main requirements for the implementation of the interfaces enabling the ESAP data access and computation resources integration in HPC and HTC computation infrastructures in terms of authentication and authorization policies, data management, workflow deployment and run.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Improving Blockchain Scalability with the Setchain Data-type
Authors:
Margarita Capretto,
Martín Ceresa,
Antonio Fernández Anta,
Antonio Russo,
César Sánchez
Abstract:
Blockchain technologies are facing a scalability challenge, which must be overcome to guarantee a wider adoption of the technology. This scalability issue is due to the use of consensus algorithms to guarantee the total order of the chain of blocks and of the transactions within each block. However, total order is often not fully necessary, since important advanced applications of smart-contracts…
▽ More
Blockchain technologies are facing a scalability challenge, which must be overcome to guarantee a wider adoption of the technology. This scalability issue is due to the use of consensus algorithms to guarantee the total order of the chain of blocks and of the transactions within each block. However, total order is often not fully necessary, since important advanced applications of smart-contracts do not require a total order among all operations. A much higher scalability can potentially be achieved if a more relaxed order can be exploited. In this paper, we propose a novel distributed concurrent data type, called Setchain, which improves scalability significantly. A Setchain implements a grow-only set whose elements are not ordered, unlike conventional blockchain operations. When convenient, the Setchain allows forcing a synchronization barrier that assigns permanently an epoch number to a subset of the latest elements added, agreed by consensus. Therefore, two operations in the same epoch are not ordered, while two operations in different epochs are ordered by their respective epoch number. We present different Byzantine-tolerant implementations of Setchain, prove their correctness and report on an empirical evaluation of a prototype implementation. Our results show that Setchain is orders of magnitude faster than consensus-based ledgers, since it implements grow-only sets with epoch synchronization instead of total order. Since Setchain barriers can be synchronized with the underlying blockchain, Setchain objects can be used as a sidechain to implement many decentralized solutions with much faster operations than direct implementations on top of blockchains. Finally, we also present an algorithm that encompasses in a single process the combined behavior of Byzantine servers, which simplifies correctness proofs by encoding the general attacker in a concrete implementation.
△ Less
Submitted 9 February, 2023;
originally announced February 2023.
-
The Planck clusters in the LOFAR sky. II. LoTSS-DR2: Recovering diffuse extended emission with LOFAR
Authors:
L. Bruno,
G. Brunetti,
A. Botteon,
V. Cuciti,
D. Dallacasa,
R. Cassano,
R. J. van Weeren,
T. Shimwell,
G. Taffoni,
S. A. Russo,
A. Bonafede,
M. Brüggen,
D. N. Hoang,
H. J. A. Röttgering,
C. Tasse
Abstract:
Extended radio sources in the sky require a dense sampling of short baselines to be properly imaged by interferometers. This problem arises in many areas of radio astronomy, such as in the study of galaxy clusters, which may host Mpc-scale diffuse synchrotron sources in the form of radio halos. In clusters where no radio halos are detected, owing to intrinsic absence of emission or extrinsic (inst…
▽ More
Extended radio sources in the sky require a dense sampling of short baselines to be properly imaged by interferometers. This problem arises in many areas of radio astronomy, such as in the study of galaxy clusters, which may host Mpc-scale diffuse synchrotron sources in the form of radio halos. In clusters where no radio halos are detected, owing to intrinsic absence of emission or extrinsic (instrumental and/or observational) effects, it is possible to determine upper limits. We consider a sample of Planck galaxy clusters from the Second Data Release of the LOFAR Two Meter Sky Survey (LoTSS-DR2) where no radio halos are detected. We use this sample to test the capabilities of LOFAR to recover diffuse extended emission and derive upper limits. Through the injection technique, we simulate radio halos with various surface brightness profiles. We then predict the corresponding visibilities and image them along with the real visibilities. This method allows us to test the fraction of flux density losses owing to inadequate uv-coverage and obtain thresholds at which the mock emission becomes undetectable by visual inspection. The dense uv-coverage of LOFAR at short spacings allows to recover $\gtrsim90\%$ of the flux density of targets with sizes up to $\sim 15'$. We find a relation that provides upper limits based on the image noise and extent (in terms of number of beams) of the mock halo. This relation can be safely adopted to obtain upper limits without injecting when artifacts introduced by the subtraction of the discrete sources are negligible in the central region of the cluster. Otherwise, the injection process and visual inspection of the images are necessary to determine more reliable limits. Through these methods, we obtain upper limits for 75 clusters to be exploited in ongoing statistical studies.
△ Less
Submitted 31 January, 2023; v1 submitted 19 January, 2023;
originally announced January 2023.
-
Network analysis on political election; populist vs social emergent behaviour
Authors:
Andrea Russo,
Vincenzo Miracula,
Antonio Picone
Abstract:
Social networks play an important role in people's daily socialization, particularly through social media platforms, which have become key channels for communication and information dissemination. The digital ecosystem does not only evolve communication on multi-network (like TV, social media, and online newspapers) but also provides the social researcher with useful data to explain social-complex…
▽ More
Social networks play an important role in people's daily socialization, particularly through social media platforms, which have become key channels for communication and information dissemination. The digital ecosystem does not only evolve communication on multi-network (like TV, social media, and online newspapers) but also provides the social researcher with useful data to explain social-complex dynamics. Our work focus on cultural dynamics-reactions that occurred during the 2020 Emilia-Romagna elections'' in Italy, where a stronghold culture felt in danger of losing against the strong populism and Euro-scepticism present in digital ecosystems. We would like to show how the interaction between parts of the society, during cultural and/or political shifting, can lead to or induce emerging behaviour from society, creating groups that react against or improve the status quo. We developed a word-entry network based on three different levels of participation: pro, con, and neutral. We have analyzed the tweets collected (as text) with the word embedding tools, to see, the most used words (which may suggest the main topics) and the most related words among the various groups. We show how a careful analysis of groups through networks, can give important information about the current event.
△ Less
Submitted 13 January, 2023;
originally announced January 2023.
-
Quantify how space mission influence geopolitical dynamics? A security and social policy approach
Authors:
Andrea Russo,
Davide Coco
Abstract:
We present a computational method to quantify the geopolitical impact of a space mission, based on the national budget and data logs of previous missions, and evidencing how even if some missions succeed, they can bring negative effects to the sponsored country. The objective of this research is to study how the success (or failure) of a space mission can bring an economical and political benefit…
▽ More
We present a computational method to quantify the geopolitical impact of a space mission, based on the national budget and data logs of previous missions, and evidencing how even if some missions succeed, they can bring negative effects to the sponsored country. The objective of this research is to study how the success (or failure) of a space mission can bring an economical and political benefit (or loss) to a country. By retrieving various data, including sentiment from #hashtags related to the considered space missions, national budgets for space exploration, and the reliability of space launch systems, from social networks, public institutions, and online repositories, we propose an equation to evaluate the geopolitical importance of a space mission for a particular country or space agency. The geopolitical equation can be used by public institutions or private companies to estimate the potential impact of a space mission on public opinion and international relationships, which can be either positive or negative, as even successful missions may negatively affect international relationships and negotiations with some countries and their partners. Also we combine the ideology of classic social policy with a security and space mission point of view, to enlighten cultural, institutional, and political limits in public spending decisions.
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
Organised Firestorm as strategy for business cyber-attacks
Authors:
Andrea Russo
Abstract:
Having a good reputation is paramount for most organisations and companies. In fact, having an optimal corporate image allows them to have better transaction relationships with various customers and partners. However, such reputation is hard to build and easy to destroy for all kind of business commercial activities (B2C, B2B, B2B2C, B2G). A misunderstanding during the communication process to the…
▽ More
Having a good reputation is paramount for most organisations and companies. In fact, having an optimal corporate image allows them to have better transaction relationships with various customers and partners. However, such reputation is hard to build and easy to destroy for all kind of business commercial activities (B2C, B2B, B2B2C, B2G). A misunderstanding during the communication process to the customers, or just a bad communication strategy, can lead to a disaster for the entire company. This is emphasised by the reaction of millions of people on social networks, which can be very detrimental for the corporate image if they react negatively to a certain event. This is called a firestorm.
In this paper, I propose a well-organised strategy for firestorm attacks on organisations, also showing how an adversary can leverage them to obtain private information on the attacked firm. Standard business security procedures are not designed to operate against multi-domain attacks; therefore, I will show how it is possible to bypass the classic and advised security procedures by operating different kinds of attack. I also propose a different firestorm attack, targeting a specific business company network in an efficient way. Finally, I present defensive procedures to reduce the negative effect of firestorms on a company.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
Further characterizations of integral input-to-state stability for hybrid systems
Authors:
Shenyu Liu,
Antonio Russo
Abstract:
In this work we present further characterizations of integral input-to-state stability (iISS) for hybrid systems. In particular, the equivalence between 0-input uniform global asymptotic stability (0-UGAS) plus uniform bounded energy bounded state (UBEBS) and iISS is examined. In order to show this equivalence, some necessary conditions for 0-UGAS and UBEBS are provided. In addition, a non-smooth…
▽ More
In this work we present further characterizations of integral input-to-state stability (iISS) for hybrid systems. In particular, the equivalence between 0-input uniform global asymptotic stability (0-UGAS) plus uniform bounded energy bounded state (UBEBS) and iISS is examined. In order to show this equivalence, some necessary conditions for 0-UGAS and UBEBS are provided. In addition, a non-smooth Lyapunov characterization for hybrid systems is proposed and proven. With the help of the aforementioned equivalence, the combination of local iISS and practical iISS, which are defined in this work, is also shown to be equivalent to iISS under one condition on the local and practical quantifiers.
△ Less
Submitted 20 November, 2023; v1 submitted 13 December, 2022;
originally announced December 2022.
-
A machine learning approach to support decision in insider trading detection
Authors:
Piero Mazzarisi,
Adele Ravagnani,
Paola Deriu,
Fabrizio Lillo,
Francesca Medda,
Antonio Russo
Abstract:
Identifying market abuse activity from data on investors' trading activity is very challenging both for the data volume and for the low signal to noise ratio. Here we propose two complementary unsupervised machine learning methods to support market surveillance aimed at identifying potential insider trading activities. The first one uses clustering to identify, in the vicinity of a price sensitive…
▽ More
Identifying market abuse activity from data on investors' trading activity is very challenging both for the data volume and for the low signal to noise ratio. Here we propose two complementary unsupervised machine learning methods to support market surveillance aimed at identifying potential insider trading activities. The first one uses clustering to identify, in the vicinity of a price sensitive event such as a takeover bid, discontinuities in the trading activity of an investor with respect to his/her own past trading history and on the present trading activity of his/her peers. The second unsupervised approach aims at identifying (small) groups of investors that act coherently around price sensitive events, pointing to potential insider rings, i.e. a group of synchronised traders displaying strong directional trading in rewarding position in a period before the price sensitive event. As a case study, we apply our methods to investor resolved data of Italian stocks around takeover bids.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
Entropy-rate as prediction method for newspapers and information diffusion
Authors:
Andrea Russo,
Antonio Picone,
Vincenzo Miracula,
Giovanni Giuffrida,
Francesco Mazzeo Rinaldi
Abstract:
This paper aims to show how some popular topics on social networks can be used to predict online newspaper views, related to the topics. Newspapers site and many social networks, become a good source of data to analyse and explain complex phenomena. Understanding the entropy of a topic, could help all organizations that need to share information like government, institution, newspaper or company,…
▽ More
This paper aims to show how some popular topics on social networks can be used to predict online newspaper views, related to the topics. Newspapers site and many social networks, become a good source of data to analyse and explain complex phenomena. Understanding the entropy of a topic, could help all organizations that need to share information like government, institution, newspaper or company, to expect an higher activity over their channels, and in some cases predict what the receiver expect from the senders or what is wrong about the communication. For some organization such political party, leaders, company and many others, the reputation and the communication are (for most of them) the key part of a more and complex huge system. To reach our goal, we use gathering tools and information theory to detect and analyse trends topic on social networks, with the purpose of proved a method that helps organization, newspapers to predict how many articles or communication they will have to do on a topic, and how much flow of views they will have in a given period, starting with the entropy-article ratio. Our work address the issue to explore in which entropy-rate, and through which dynamics, a suitable information diffusion performance is expected on social network and then on newspaper. We have identified some cross-cutting dynamics that, associated with the contexts, might explain how people discuss about a topic, can move on to argue and informs on newspapers sites.
△ Less
Submitted 29 November, 2022;
originally announced December 2022.
-
On the Sample Complexity of Representation Learning in Multi-task Bandits with Global and Local structure
Authors:
Alessio Russo,
Alexandre Proutiere
Abstract:
We investigate the sample complexity of learning the optimal arm for multi-task bandit problems. Arms consist of two components: one that is shared across tasks (that we call representation) and one that is task-specific (that we call predictor). The objective is to learn the optimal (representation, predictor)-pair for each task, under the assumption that the optimal representation is common to a…
▽ More
We investigate the sample complexity of learning the optimal arm for multi-task bandit problems. Arms consist of two components: one that is shared across tasks (that we call representation) and one that is task-specific (that we call predictor). The objective is to learn the optimal (representation, predictor)-pair for each task, under the assumption that the optimal representation is common to all tasks. Within this framework, efficient learning algorithms should transfer knowledge across tasks. We consider the best-arm identification problem for a fixed confidence, where, in each round, the learner actively selects both a task, and an arm, and observes the corresponding reward. We derive instance-specific sample complexity lower bounds satisfied by any $(δ_G,δ_H)$-PAC algorithm (such an algorithm identifies the best representation with probability at least $1-δ_G$, and the best predictor for a task with probability at least $1-δ_H$). We devise an algorithm OSRL-SC whose sample complexity approaches the lower bound, and scales at most as $H(G\log(1/δ_G)+ X\log(1/δ_H))$, with $X,G,H$ being, respectively, the number of tasks, representations and predictors. By comparison, this scaling is significantly better than the classical best-arm identification algorithm that scales as $HGX\log(1/δ)$.
△ Less
Submitted 28 November, 2022;
originally announced November 2022.