-
Modeling the Feedback of AI Price Estimations on Actual Market Values
Authors:
Viorel Silaghi,
Zobaida Alssadi,
Ben Mathew,
Majed Alotaibi,
Ali Alqarni,
Marius Silaghi
Abstract:
Public availability of Artificial Intelligence generated information can change the markets forever, and its factoring into economical dynamics may take economists by surprise, out-dating models and schools of thought. Real estate hyper-inflation is not a new phenomenon but its consistent and almost monotonous persistence over 12 years, coinciding with prominence of public estimation information f…
▽ More
Public availability of Artificial Intelligence generated information can change the markets forever, and its factoring into economical dynamics may take economists by surprise, out-dating models and schools of thought. Real estate hyper-inflation is not a new phenomenon but its consistent and almost monotonous persistence over 12 years, coinciding with prominence of public estimation information from Zillow, a successful Mass Real Estate Estimator (MREE), could not escape unobserved. What we model is a repetitive theoretical game between the MREE and the home owners, where each player has secret information and expertise. If the intention is to keep housing affordable and maintain old American lifestyle with broad home-ownership, new challenges are defined. Simulations show that a simple restriction of MREE-style price estimation availability to opt-in properties may help partially reduce feedback loop by acting on its likely causes, as suggested by experimental simulation models. The conjecture that the MREE pressure on real estate inflation rate is correlated with the absolute MREE estimation errors, which is logically explainable, is then validated in simulations.
△ Less
Submitted 12 March, 2024;
originally announced May 2024.
-
Speeding Up Elliptic Curve Multiplication with Mixed-base Representation for Applications to SIDH Ciphers
Authors:
Wesam Eid,
Marius C. Silaghi
Abstract:
Elliptic curve multiplications can be improved by replacing the standard ladder algorithm's base 2 representation of the scalar multiplicand, with mixed-base representations with power-of-2 bases, processing the n bits of the current digit in one optimized step. For this purpose, we also present a new methodology to compute, for Weierstrass form elliptic curves in the affine plane, operations of t…
▽ More
Elliptic curve multiplications can be improved by replacing the standard ladder algorithm's base 2 representation of the scalar multiplicand, with mixed-base representations with power-of-2 bases, processing the n bits of the current digit in one optimized step. For this purpose, we also present a new methodology to compute, for Weierstrass form elliptic curves in the affine plane, operations of the type mP+nQ where m and n are small integers. This provides implementations with the lower cost than previous algorithms, using only one inversion. In particular, the proposed techniques enable more opportunities for optimizing computations, leading to an important speed-up for applications based on elliptic curves, including the post-quantum cryptosystem Super Singular Isogeny Diffie Hellman (SIDH).
△ Less
Submitted 17 May, 2019; v1 submitted 15 May, 2019;
originally announced May 2019.
-
Privacy of Existence of Secrets: Introducing Steganographic DCOPs and Revisiting DCOP Frameworks
Authors:
Viorel D. Silaghi,
Marius C. Silaghi,
René Mandiau
Abstract:
Here we identify a type of privacy concern in Distributed Constraint Optimization (DCOPs) not previously addressed in literature, despite its importance and impact on the application field: the privacy of existence of secrets. Science only starts where metrics and assumptions are clearly defined. The area of Distributed Constraint Optimization has emerged at the intersection of the multi-agent sys…
▽ More
Here we identify a type of privacy concern in Distributed Constraint Optimization (DCOPs) not previously addressed in literature, despite its importance and impact on the application field: the privacy of existence of secrets. Science only starts where metrics and assumptions are clearly defined. The area of Distributed Constraint Optimization has emerged at the intersection of the multi-agent system community and constraint programming. For the multi-agent community, the constraint optimization problems are an elegant way to express many of the problems occurring in trading and distributed robotics. For the theoretical constraint programming community the DCOPs are a natural extension of their main object of study, the constraint satisfaction problem. As such, the understanding of the DCOP framework has been refined with the needs of the two communities, but sometimes without spelling the new assumptions formally and therefore making it difficult to compare techniques. Here we give a direction to the efforts for structuring concepts in this area.
△ Less
Submitted 15 February, 2019;
originally announced February 2019.
-
The Device War - The War Between IOT Brands In A Household
Authors:
Marius C. Silaghi,
Arianit Maraj,
Timothy Atkinson
Abstract:
Users buy compatible IOT devices from different brands with an expectation that their cooperation is smooth, but while function may superficially look friendly, cohabitation can subversively cause early battery depletion in competitor devices. The Wi-Fi Direct standard was introduced with the intention of simplifying peer-to-peer connections in home applications while hel** devices to save power…
▽ More
Users buy compatible IOT devices from different brands with an expectation that their cooperation is smooth, but while function may superficially look friendly, cohabitation can subversively cause early battery depletion in competitor devices. The Wi-Fi Direct standard was introduced with the intention of simplifying peer-to-peer connections in home applications while hel** devices to save power through centralization of effort into a single group owner device negotiated on start-up. Attacks on the group formation stage can be based on manipulating a victim device to frequently end up being assigned the group owner function, thereby depleting its batteries at faster rates than its peer devices. This manipulation is made easy by the group formation mechanism adopted by the standard. We show that group formation procedures could be better secured with features ensuring fairness by relying on commitments and by learning about the behavior observed for peer devices in the past. Simulations are used to quantify the resistance achieved against several attack strategies.
△ Less
Submitted 30 December, 2018;
originally announced December 2018.
-
POMDPs for Robotic Arm Search and Reach to Known Objects
Authors:
Marius Silaghi,
Jixing Zheng
Abstract:
We propose an approach based on probabilistic models, in particular POMDPs, to plan optimized search processes of known objects by intelligent eye in hand robotic arms. Searching and reaching for a known object (a pen, a book, or a hammer) in one's office is an operation that humans perform frequently in their daily activities. There is no reason why intelligent robotic arms would not encounter th…
▽ More
We propose an approach based on probabilistic models, in particular POMDPs, to plan optimized search processes of known objects by intelligent eye in hand robotic arms. Searching and reaching for a known object (a pen, a book, or a hammer) in one's office is an operation that humans perform frequently in their daily activities. There is no reason why intelligent robotic arms would not encounter this problem frequently in the various applications in which they are expected to serve.
The problem suffers from uncertainties coming both from the lack of information about the position of the object, from noisy sensors, imperfect models of the target object, of imperfect models of the environment, and from approximations in computations. The use of probabilistic models helps us to mitigate at least a few of these challenges, approaching optimality for this important task.
△ Less
Submitted 25 April, 2017;
originally announced April 2017.
-
Distributed Constraint Problems for Utilitarian Agents with Privacy Concerns, Recast as POMDPs
Authors:
Julien Savaux,
Julien Vion,
Sylvain Piechowiak,
René Mandiau,
Toshihiro Matsui,
Katsutoshi Hirayama,
Makoto Yokoo,
Shakre Elmane,
Marius Silaghi
Abstract:
Privacy has traditionally been a major motivation for distributed problem solving. Distributed Constraint Satisfaction Problem (DisCSP) as well as Distributed Constraint Optimization Problem (DCOP) are fundamental models used to solve various families of distributed problems. Even though several approaches have been proposed to quantify and preserve privacy in such problems, none of them is exempt…
▽ More
Privacy has traditionally been a major motivation for distributed problem solving. Distributed Constraint Satisfaction Problem (DisCSP) as well as Distributed Constraint Optimization Problem (DCOP) are fundamental models used to solve various families of distributed problems. Even though several approaches have been proposed to quantify and preserve privacy in such problems, none of them is exempt from limitations. Here we approach the problem by assuming that computation is performed among utilitarian agents. We introduce a utilitarian approach where the utility of each state is estimated as the difference between the reward for reaching an agreement on assignments of shared variables and the cost of privacy loss. We investigate extensions to solvers where agents integrate the utility function to guide their search and decide which action to perform, defining thereby their policy. We show that these extended solvers succeed in significantly reducing privacy loss without significant degradation of the solution quality.
△ Less
Submitted 20 March, 2017;
originally announced March 2017.
-
DisCSPs with Privacy Recast as Planning Problems for Utility-based Agents
Authors:
Julien Savaux,
Julien Vion,
Sylvain Piechowiak,
René Mandiau,
Toshihiro Matsui,
Katsutoshi Hirayama,
Makoto Yokoo,
Shakre Elmane,
Marius Silaghi
Abstract:
Privacy has traditionally been a major motivation for decentralized problem solving. However, even though several metrics have been proposed to quantify it, none of them is easily integrated with common solvers. Constraint programming is a fundamental paradigm used to approach various families of problems. We introduce Utilitarian Distributed Constraint Satisfaction Problems (UDisCSP) where the ut…
▽ More
Privacy has traditionally been a major motivation for decentralized problem solving. However, even though several metrics have been proposed to quantify it, none of them is easily integrated with common solvers. Constraint programming is a fundamental paradigm used to approach various families of problems. We introduce Utilitarian Distributed Constraint Satisfaction Problems (UDisCSP) where the utility of each state is estimated as the difference between the the expected rewards for agreements on assignments for shared variables, and the expected cost of privacy loss. Therefore, a traditional DisCSP with privacy requirements is viewed as a planning problem. The actions available to agents are: communication and local inference. Common decentralized solvers are evaluated here from the point of view of their interpretation as greedy planners. Further, we investigate some simple extensions where these solvers start taking into account the utility function. In these extensions we assume that the planning problem is further restricting the set of communication actions to only the communication primitives present in the corresponding solver protocols. The solvers obtained for the new type of problems propose the action (communication/inference) to be performed in each situation, defining thereby the policy.
△ Less
Submitted 22 April, 2016;
originally announced April 2016.
-
Utilitarian Distributed Constraint Optimization Problems
Authors:
Julien Savaux,
Julien Vion,
Sylvain Piechowiak,
René Mandiau,
Toshihiro Matsui,
Katsutoshi Hirayama,
Makoto Yokoo,
Shakre Elmane,
Marius Silaghi
Abstract:
Privacy has been a major motivation for distributed problem optimization. However, even though several methods have been proposed to evaluate it, none of them is widely used. The Distributed Constraint Optimization Problem (DCOP) is a fundamental model used to approach various families of distributed problems. As privacy loss does not occur when a solution is accepted, but when it is proposed, pri…
▽ More
Privacy has been a major motivation for distributed problem optimization. However, even though several methods have been proposed to evaluate it, none of them is widely used. The Distributed Constraint Optimization Problem (DCOP) is a fundamental model used to approach various families of distributed problems. As privacy loss does not occur when a solution is accepted, but when it is proposed, privacy requirements cannot be interpreted as a criteria of the objective function of the DCOP. Here we approach the problem by letting both the optimized costs found in DCOPs and the privacy requirements guide the agents' exploration of the search space. We introduce Utilitarian Distributed Constraint Optimization Problem (UDCOP) where the costs and the privacy requirements are used as parameters to a heuristic modifying the search process. Common stochastic algorithms for decentralized constraint optimization problems are evaluated here according to how well they preserve privacy. Further, we propose some extensions where these solvers modify their search process to take into account their privacy requirements, succeeding in significantly reducing their privacy loss without significant degradation of the solution quality.
△ Less
Submitted 22 April, 2016;
originally announced April 2016.
-
Recommending the Most Encompassing Opposing and Endorsing Arguments in Debates
Authors:
Marius C. Silaghi,
Roussi Roussev
Abstract:
Arguments are essential objects in DirectDemocracyP2P, where they can occur both in association with signatures for petitions, or in association with other debated decisions, such as bug sorting by importance. The arguments of a signer on a given issue are grouped into one single justification, are classified by the type of signature (e.g., supporting or opposing), and can be subject to various ty…
▽ More
Arguments are essential objects in DirectDemocracyP2P, where they can occur both in association with signatures for petitions, or in association with other debated decisions, such as bug sorting by importance. The arguments of a signer on a given issue are grouped into one single justification, are classified by the type of signature (e.g., supporting or opposing), and can be subject to various types of threading.
Given the available inputs, the two addressed problems are: (i) how to recommend the best justification, of a given type, to a new voter, (ii) how to recommend a compact list of justifications subsuming the majority of known arguments for (or against) an issue.
We investigate solutions based on weighted bipartite graphs.
△ Less
Submitted 19 November, 2014;
originally announced November 2014.
-
Branch-and-Prune Search Strategies for Numerical Constraint Solving
Authors:
Xuan-Ha Vu,
Marius-Calin Silaghi,
Djamila Sam-Haroud,
Boi Faltings
Abstract:
When solving numerical constraints such as nonlinear equations and inequalities, solvers often exploit pruning techniques, which remove redundant value combinations from the domains of variables, at pruning steps. To find the complete solution set, most of these solvers alternate the pruning steps with branching steps, which split each problem into subproblems. This forms the so-called branch-an…
▽ More
When solving numerical constraints such as nonlinear equations and inequalities, solvers often exploit pruning techniques, which remove redundant value combinations from the domains of variables, at pruning steps. To find the complete solution set, most of these solvers alternate the pruning steps with branching steps, which split each problem into subproblems. This forms the so-called branch-and-prune framework, well known among the approaches for solving numerical constraints. The basic branch-and-prune search strategy that uses domain bisections in place of the branching steps is called the bisection search. In general, the bisection search works well in case (i) the solutions are isolated, but it can be improved further in case (ii) there are continuums of solutions (this often occurs when inequalities are involved). In this paper, we propose a new branch-and-prune search strategy along with several variants, which not only allow yielding better branching decisions in the latter case, but also work as well as the bisection search does in the former case. These new search algorithms enable us to employ various pruning techniques in the construction of inner and outer approximations of the solution set. Our experiments show that these algorithms speed up the solving process often by one order of magnitude or more when solving problems with continuums of solutions, while kee** the same performance as the bisection search when the solutions are isolated.
△ Less
Submitted 8 May, 2007; v1 submitted 11 December, 2005;
originally announced December 2005.