-
Broadband Entangled-Photon Pair Generation with Integrated Photonics: Guidelines and A Materials Comparison
Authors:
Liao Duan,
Trevor J. Steiner,
Paolo Pintus,
Lillian Thiel,
Joshua E. Castro,
John E. Bowers,
Galan Moody
Abstract:
Correlated photon-pair sources are key components for quantum computing, networking, and sensing applications. Integrated photonics has enabled chip-scale sources using nonlinear processes, producing high-rate entanglement with sub-100 microwatt power at telecom wavelengths. Many quantum systems operate in the visible or near-infrared ranges, necessitating broadband visible-telecom entangled-pair…
▽ More
Correlated photon-pair sources are key components for quantum computing, networking, and sensing applications. Integrated photonics has enabled chip-scale sources using nonlinear processes, producing high-rate entanglement with sub-100 microwatt power at telecom wavelengths. Many quantum systems operate in the visible or near-infrared ranges, necessitating broadband visible-telecom entangled-pair sources for connecting remote systems via entanglement swap** and teleportation. This study evaluates broadband entanglement generation through spontaneous four-wave mixing in various nonlinear integrated photonic materials, including silicon nitride, lithium niobate, aluminum gallium arsenide, indium gallium phosphide, and gallium nitride. We demonstrate how geometric dispersion engineering facilitates phase-matching for each platform and reveals unexpected results, such as robust designs to fabrication variations and a Type-1 cross-polarized phase-matching condition for III-V materials that expands the operational bandwidth. With experimentally attainable parameters, integrated photonic microresonators with optimized designs can achieve pair generation rates greater than ~1 THz/mW$^2$.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Wafer-Scale Fabrication of InGaP-on-Insulator for Nonlinear and Quantum Photonic Applications
Authors:
Lillian Thiel,
Joshua E. Castro,
Trevor J. Steiner,
Catherine L. Nguyen,
Audrey Pechilis,
Liao Duan,
Nicholas Lewis,
Garrett D. Cole,
John E. Bowers,
Galan Moody
Abstract:
The development of manufacturable and scalable integrated nonlinear photonic materials is driving key technologies in diverse areas such as high-speed communications, signal processing, sensing, and quantum information. Here, we demonstrate a novel nonlinear platform -- InGaP-on-insulator -- optimized for visible-to-telecommunication wavelength $χ^{\left(2\right)}$ nonlinear optical processes. In…
▽ More
The development of manufacturable and scalable integrated nonlinear photonic materials is driving key technologies in diverse areas such as high-speed communications, signal processing, sensing, and quantum information. Here, we demonstrate a novel nonlinear platform -- InGaP-on-insulator -- optimized for visible-to-telecommunication wavelength $χ^{\left(2\right)}$ nonlinear optical processes. In this work, we detail our 100-mm wafer-scale InGaP-on-insulator fabrication process realized via wafer bonding, optical lithography, and dry-etching techniques. The resulting wafers yield 1000s of components in each fabrication cycle, with initial designs that include chip-to-fiber couplers, 12.5-cm-long nested spiral waveguides, and arrays of microring resonators with free-spectral ranges spanning 400-900 GHz. We demonstrate intrinsic resonator quality factors as high as 324,000 (440,000) for single-resonance (split-resonance) modes near 1550 nm corresponding to 1.56 dB cm$^{-1}$ (1.22 dB cm$^{-1}$) propagation loss. We analyze the loss versus waveguide width and resonator radius to establish the operating regime for optimal 775-to-1550 nm phase matching. By combining the high $χ^{\left(2\right)}$ and $χ^{\left(3\right)}$ optical nonlinearity of InGaP with wafer-scale fabrication and low propagation loss, these results open promising possibilities for entangled-photon, multi-photon, and squeezed light generation.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Continual Counting with Gradual Privacy Expiration
Authors:
Joel Daniel Andersson,
Monika Henzinger,
Rasmus Pagh,
Teresa Anna Steiner,
Jalaj Upadhyay
Abstract:
Differential privacy with gradual expiration models the setting where data items arrive in a stream and at a given time $t$ the privacy loss guaranteed for a data item seen at time $(t-d)$ is $εg(d)$, where $g$ is a monotonically non-decreasing function. We study the fundamental $\textit{continual (binary) counting}$ problem where each data item consists of a bit, and the algorithm needs to output…
▽ More
Differential privacy with gradual expiration models the setting where data items arrive in a stream and at a given time $t$ the privacy loss guaranteed for a data item seen at time $(t-d)$ is $εg(d)$, where $g$ is a monotonically non-decreasing function. We study the fundamental $\textit{continual (binary) counting}$ problem where each data item consists of a bit, and the algorithm needs to output at each time step the sum of all the bits streamed so far. For a stream of length $T$ and privacy $\textit{without}$ expiration continual counting is possible with maximum (over all time steps) additive error $O(\log^2(T)/\varepsilon)$ and the best known lower bound is $Ω(\log(T)/\varepsilon)$; closing this gap is a challenging open problem.
We show that the situation is very different for privacy with gradual expiration by giving upper and lower bounds for a large set of expiration functions $g$. Specifically, our algorithm achieves an additive error of $ O(\log(T)/ε)$ for a large set of privacy expiration functions. We also give a lower bound that shows that if $C$ is the additive error of any $ε$-DP algorithm for this problem, then the product of $C$ and the privacy expiration function after $2C$ steps must be $Ω(\log(T)/ε)$. Our algorithm matches this lower bound as its additive error is $O(\log(T)/ε)$, even when $g(2C) = O(1)$.
Our empirical evaluation shows that we achieve a slowly growing privacy loss with significantly smaller empirical privacy loss for large values of $d$ than a natural baseline algorithm.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Private graph colouring with limited defectiveness
Authors:
Aleksander B. G. Christiansen,
Eva Rotenberg,
Teresa Anna Steiner,
Juliette Vlieghe
Abstract:
Differential privacy is the gold standard in the problem of privacy preserving data analysis, which is crucial in a wide range of disciplines. Vertex colouring is one of the most fundamental questions about a graph. In this paper, we study the vertex colouring problem in the differentially private setting.
To be edge-differentially private, a colouring algorithm needs to be defective: a colourin…
▽ More
Differential privacy is the gold standard in the problem of privacy preserving data analysis, which is crucial in a wide range of disciplines. Vertex colouring is one of the most fundamental questions about a graph. In this paper, we study the vertex colouring problem in the differentially private setting.
To be edge-differentially private, a colouring algorithm needs to be defective: a colouring is d-defective if a vertex can share a colour with at most d of its neighbours. Without defectiveness, the only differentially private colouring algorithm needs to assign n different colours to the n different vertices. We show the following lower bound for the defectiveness: a differentially private c-edge colouring algorithm of a graph of maximum degree Δ > 0 has defectiveness at least d = Ω (log n / (log c+log Δ)).
We also present an ε-differentially private algorithm to Θ ( Δ / log n + 1 / ε)-colour a graph with defectiveness at most Θ(log n).
△ Less
Submitted 29 April, 2024;
originally announced April 2024.
-
Differentially Private Approximate Pattern Matching
Authors:
Teresa Anna Steiner
Abstract:
In this paper, we consider the $k$-approximate pattern matching problem under differential privacy, where the goal is to report or count all substrings of a given string $S$ which have a Hamming distance at most $k$ to a pattern $P$, or decide whether such a substring exists. In our definition of privacy, individual positions of the string $S$ are protected. To be able to answer queries under diff…
▽ More
In this paper, we consider the $k$-approximate pattern matching problem under differential privacy, where the goal is to report or count all substrings of a given string $S$ which have a Hamming distance at most $k$ to a pattern $P$, or decide whether such a substring exists. In our definition of privacy, individual positions of the string $S$ are protected. To be able to answer queries under differential privacy, we allow some slack on $k$, i.e. we allow reporting or counting substrings of $S$ with a distance at most $(1+γ)k+α$ to $P$, for a multiplicative error $γ$ and an additive error $α$. We analyze which values of $α$ and $γ$ are necessary or sufficient to solve the $k$-approximate pattern matching problem while satisfying $ε$-differential privacy. Let $n$ denote the length of $S$. We give 1) an $ε$-differentially private algorithm with an additive error of $O(ε^{-1}\log n)$ and no multiplicative error for the existence variant; 2) an $ε$-differentially private algorithm with an additive error $O(ε^{-1}\max(k,\log n)\cdot\log n)$ for the counting variant; 3) an $ε$-differentially private algorithm with an additive error of $O(ε^{-1}\log n)$ and multiplicative error $O(1)$ for the reporting variant for a special class of patterns. The error bounds hold with high probability. All of these algorithms return a witness, that is, if there exists a substring of $S$ with distance at most $k$ to $P$, then the algorithm returns a substring of $S$ with distance at most $(1+γ)k+α$ to $P$. Further, we complement these results by a lower bound, showing that any algorithm for the existence variant which also returns a witness must have an additive error of $Ω(ε^{-1}\log n)$ with constant probability.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Continuous Entanglement Distribution from an AlGaAs-on-Insulator Microcomb for Quantum Communications
Authors:
Trevor J. Steiner,
Maximilian Shen,
Joshua E. Castro,
John E. Bowers,
Galan Moody
Abstract:
Using an aluminum gallium arsenide microring resonator, we demonstrate a bright quantum optical microcomb with $>300$ nm bandwidth and more than 20 sets of time-energy entangled modes, enabling spectral demultiplexing with simple, off-the-shelf commercial telecom components. We report high-rate continuous entanglement distribution for two sets of entangled-photon pair frequency modes exhibiting up…
▽ More
Using an aluminum gallium arsenide microring resonator, we demonstrate a bright quantum optical microcomb with $>300$ nm bandwidth and more than 20 sets of time-energy entangled modes, enabling spectral demultiplexing with simple, off-the-shelf commercial telecom components. We report high-rate continuous entanglement distribution for two sets of entangled-photon pair frequency modes exhibiting up to $20$ GHz/mW$^2$ pair generation rate. As an illustrative example of entanglement distribution, we perform a continuous-wave time-bin quantum key distribution protocol with 8 kbps raw key rates while maintaining less than 10$\%$ error rate and sufficient two-photon visibility to ensure security of the channel. When the $>$20 frequency modes are multiplexed, we estimate $>$100 kbps entanglement-based key rates or the creation of a multi-user quantum communications network. The entire system requires less than 110 $μ$W of on-chip optical power, demonstrating an efficient source of entangled frequency modes for quantum communications. As a proof of principle, a quantum key is distributed across 12 km of deployed fiber on the UCSB campus and used to transmit a 21 kB image with $<9\%$ error.
△ Less
Submitted 21 October, 2023;
originally announced October 2023.
-
Wide-Area Geolocalization with a Limited Field of View Camera in Challenging Urban Environments
Authors:
Lena M. Downes,
Ted J. Steiner,
Rebecca L. Russell,
Jonathan P. How
Abstract:
Cross-view geolocalization, a supplement or replacement for GPS, localizes an agent within a search area by matching ground-view images to overhead images. Significant progress has been made assuming a panoramic ground camera. Panoramic cameras' high complexity and cost make non-panoramic cameras more widely applicable, but also more challenging since they yield less scene overlap between ground a…
▽ More
Cross-view geolocalization, a supplement or replacement for GPS, localizes an agent within a search area by matching ground-view images to overhead images. Significant progress has been made assuming a panoramic ground camera. Panoramic cameras' high complexity and cost make non-panoramic cameras more widely applicable, but also more challenging since they yield less scene overlap between ground and overhead images. This paper presents Restricted FOV Wide-Area Geolocalization (ReWAG), a cross-view geolocalization approach that combines a neural network and particle filter to globally localize a mobile agent with only odometry and a non-panoramic camera. ReWAG creates pose-aware embeddings and provides a strategy to incorporate particle pose into the Siamese network, improving localization accuracy by a factor of 100 compared to a vision transformer baseline. This extended work also presents ReWAG*, which improves upon ReWAG's generalization ability in previously unseen environments. ReWAG* repeatedly converges accurately on a dataset of images we have collected in Boston with a 72 degree field of view (FOV) camera, a location and FOV that ReWAG* was not trained on.
△ Less
Submitted 14 August, 2023;
originally announced August 2023.
-
Differentially Private Histogram, Predecessor, and Set Cardinality under Continual Observation
Authors:
Monika Henzinger,
A. R. Sricharan,
Teresa Anna Steiner
Abstract:
Differential privacy is the de-facto privacy standard in data analysis. The classic model of differential privacy considers the data to be static. The dynamic setting, called differential privacy under continual observation, captures many applications more realistically. In this work we consider several natural dynamic data structure problems under continual observation, where we want to maintain…
▽ More
Differential privacy is the de-facto privacy standard in data analysis. The classic model of differential privacy considers the data to be static. The dynamic setting, called differential privacy under continual observation, captures many applications more realistically. In this work we consider several natural dynamic data structure problems under continual observation, where we want to maintain information about a changing data set such that we can answer certain sets of queries at any given time while satisfying $ε$-differential privacy. The problems we consider include (a) maintaining a histogram and various extensions of histogram queries such as quantile queries, (b) maintaining a predecessor search data structure of a dynamically changing set in a given ordered universe, and (c) maintaining the cardinality of a dynamically changing set. For (a) we give new error bounds parameterized in the maximum output of any query $c_{\max}$: our algorithm gives an upper bound of $O(d\log^2dc_{\max}+\log T)$ for computing histogram, the maximum and minimum column sum, quantiles on the column sums, and related queries. The bound holds for unknown $c_{\max}$ and $T$. For (b), we give a general reduction to orthogonal range counting. Further, we give an improvement for the case where only insertions are allowed. We get a data structure which for a given query, returns an interval that contains the predecessor, and at most $O(\log^2 u \sqrt{\log T})$ more elements, where $u$ is the size of the universe. The bound holds for unknown $T$. Lastly, for (c), we give a parameterized upper bound of $O(\min(d,\sqrt{K\log T}))$, where $K$ is an upper bound on the number of updates. We show a matching lower bound. Finally, we show how to extend the bound for (c) for unknown $K$ and $T$.
△ Less
Submitted 17 June, 2023;
originally announced June 2023.
-
Compressed Indexing for Consecutive Occurrences
Authors:
Paweł Gawrychowski,
Garance Gourdel,
Tatiana Starikovskaya,
Teresa Anna Steiner
Abstract:
The fundamental question considered in algorithms on strings is that of indexing, that is, preprocessing a given string for specific queries. By now we have a number of efficient solutions for this problem when the queries ask for an exact occurrence of a given pattern $P$. However, practical applications motivate the necessity of considering more complex queries, for example concerning near occur…
▽ More
The fundamental question considered in algorithms on strings is that of indexing, that is, preprocessing a given string for specific queries. By now we have a number of efficient solutions for this problem when the queries ask for an exact occurrence of a given pattern $P$. However, practical applications motivate the necessity of considering more complex queries, for example concerning near occurrences of two patterns. Recently, Bille et al. [CPM 2021] introduced a variant of such queries, called gapped consecutive occurrences, in which a query consists of two patterns $P_{1}$ and $P_{2}$ and a range $[a,b]$, and one must find all consecutive occurrences $(q_1,q_2)$ of $P_{1}$ and $P_{2}$ such that $q_2-q_1 \in [a,b]$. By their results, we cannot hope for a very efficient indexing structure for such queries, even if $a=0$ is fixed (although at the same time they provided a non-trivial upper bound). Motivated by this, we focus on a text given as a straight-line program (SLP) and design an index taking space polynomial in the size of the grammar that answers such queries in time optimal up to polylog factors.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Differentially Private Data Structures under Continual Observation for Histograms and Related Queries
Authors:
Monika Henzinger,
A. R. Sricharan,
Teresa Anna Steiner
Abstract:
Binary counting under continual observation is a well-studied fundamental problem in differential privacy. A natural extension is maintaining column sums, also known as histogram, over a stream of rows from $\{0,1\}^d$, and answering queries about those sums, e.g. the maximum column sum or the median, while satisfying differential privacy. Jain et al. (2021) showed that computing the maximum colum…
▽ More
Binary counting under continual observation is a well-studied fundamental problem in differential privacy. A natural extension is maintaining column sums, also known as histogram, over a stream of rows from $\{0,1\}^d$, and answering queries about those sums, e.g. the maximum column sum or the median, while satisfying differential privacy. Jain et al. (2021) showed that computing the maximum column sum under continual observation while satisfying event-level differential privacy requires an error either polynomial in the dimension $d$ or the stream length $T$. On the other hand, no $o(d\log^2 T)$ upper bound for $ε$-differential privacy or $o(\sqrt{d}\log^{3/2} T)$ upper bound for $(ε,δ)$-differential privacy are known. In this work, we give new parameterized upper bounds for maintaining histogram, maximum column sum, quantiles of the column sums, and any set of at most $d$ low-sensitivity, monotone, real valued queries on the column sums. Our solutions achieve an error of approximately $O(d\log^2 c_{\max}+\log T)$ for $ε$-differential privacy and approximately $O(\sqrt{d}\log^{3/2}c_{\max}+\log T)$ for $(ε,δ)$-differential privacy, where $c_{\max}$ is the maximum value that the queries we want to answer can assume on the given data set.
Furthermore, we show that such an improvement is not possible for a slightly expanded notion of neighboring streams by giving a lower bound of $Ω(d \log T)$. This explains why our improvement cannot be achieved with the existing mechanisms for differentially private histograms, as they remain differentially private even for this expanded notion of neighboring streams.
△ Less
Submitted 22 February, 2023;
originally announced February 2023.
-
Vision-Based Terrain Relative Navigation on High-Altitude Balloon and Sub-Orbital Rocket
Authors:
Dominic Maggio,
Courtney Mario,
Brett Streetman,
Ted Steiner,
Luca Carlone
Abstract:
We present an experimental analysis on the use of a camera-based approach for high-altitude navigation by associating mapped landmarks from a satellite image database to camera images, and by leveraging inertial sensors between camera frames. We evaluate performance of both a sideways-tilted and downward-facing camera on data collected from a World View Enterprises high-altitude balloon with data…
▽ More
We present an experimental analysis on the use of a camera-based approach for high-altitude navigation by associating mapped landmarks from a satellite image database to camera images, and by leveraging inertial sensors between camera frames. We evaluate performance of both a sideways-tilted and downward-facing camera on data collected from a World View Enterprises high-altitude balloon with data beginning at an altitude of 33 km and descending to near ground level (4.5 km) with 1.5 hours of flight time. We demonstrate less than 290 meters of average position error over a trajectory of more than 150 kilometers. In addition to showing performance across a range of altitudes, we also demonstrate the robustness of the Terrain Relative Navigation (TRN) method to rapid rotations of the balloon, in some cases exceeding 20 degrees per second, and to camera obstructions caused by both cloud coverage and cords swaying underneath the balloon. Additionally, we evaluate performance on data collected by two cameras inside the capsule of Blue Origin's New Shepard rocket on payload flight NS-23, traveling at speeds up to 880 km/hr, and demonstrate less than 55 meters of average position error.
△ Less
Submitted 15 February, 2023;
originally announced February 2023.
-
Gapped String Indexing in Subquadratic Space and Sublinear Query Time
Authors:
Philip Bille,
Inge Li Gørtz,
Moshe Lewenstein,
Solon P. Pissis,
Eva Rotenberg,
Teresa Anna Steiner
Abstract:
In Gapped String Indexing, the goal is to compactly represent a string $S$ of length $n$ such that for any query consisting of two strings $P_1$ and $P_2$, called patterns, and an integer interval $[α, β]$, called gap range, we can quickly find occurrences of $P_1$ and $P_2$ in $S$ with distance in $[α, β]$. Gapped String Indexing is a central problem in computational biology and text mining and h…
▽ More
In Gapped String Indexing, the goal is to compactly represent a string $S$ of length $n$ such that for any query consisting of two strings $P_1$ and $P_2$, called patterns, and an integer interval $[α, β]$, called gap range, we can quickly find occurrences of $P_1$ and $P_2$ in $S$ with distance in $[α, β]$. Gapped String Indexing is a central problem in computational biology and text mining and has thus received significant research interest, including parameterized and heuristic approaches. Despite this interest, the best-known time-space trade-offs for Gapped String Indexing are the straightforward $O(n)$ space and $O(n+occ)$ query time or $Ω(n^2)$ space and $\tilde{O}(|P_1| + |P_2| + occ)$ query time.
We break through this barrier obtaining the first interesting trade-offs with polynomially subquadratic space and polynomially sublinear query time. In particular, we show that, for every $0\leq δ\leq 1$, there is a data structure for Gapped String Indexing with either $\tilde{O}(n^{2-δ/3})$ or $\tilde{O}(n^{3-2δ})$ space and $\tilde{O}(|P_1| + |P_2| + n^δ\cdot (occ+1))$ query time, where $occ$ is the number of reported occurrences.
As a new tool towards obtaining our main result, we introduce the Shifted Set Intersection problem. We show that this problem is equivalent to the indexing variant of 3SUM (3SUM Indexing). Via a series of reductions, we obtain a solution to the Gapped String Indexing problem. Furthermore, we enhance our data structure for deciding Shifted Set Intersection, so that we can support the reporting variant of the problem. Via the obtained equivalence to 3SUM Indexing, we thus give new improved data structures for the reporting variant of 3SUM Indexing, and we show how this improves upon the state-of-the-art solution for Jumbled Indexing for any alphabet of constant size $σ>5$.
△ Less
Submitted 5 March, 2024; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Wide-Area Geolocalization with a Limited Field of View Camera
Authors:
Lena M. Downes,
Ted J. Steiner,
Rebecca L. Russell,
Jonathan P. How
Abstract:
Cross-view geolocalization, a supplement or replacement for GPS, localizes an agent within a search area by matching images taken from a ground-view camera to overhead images taken from satellites or aircraft. Although the viewpoint disparity between ground and overhead images makes cross-view geolocalization challenging, significant progress has been made assuming that the ground agent has access…
▽ More
Cross-view geolocalization, a supplement or replacement for GPS, localizes an agent within a search area by matching images taken from a ground-view camera to overhead images taken from satellites or aircraft. Although the viewpoint disparity between ground and overhead images makes cross-view geolocalization challenging, significant progress has been made assuming that the ground agent has access to a panoramic camera. For example, our prior work (WAG) introduced changes in search area discretization, training loss, and particle filter weighting that enabled city-scale panoramic cross-view geolocalization. However, panoramic cameras are not widely used in existing robotic platforms due to their complexity and cost. Non-panoramic cross-view geolocalization is more applicable for robotics, but is also more challenging. This paper presents Restricted FOV Wide-Area Geolocalization (ReWAG), a cross-view geolocalization approach that generalizes WAG for use with standard, non-panoramic ground cameras by creating pose-aware embeddings and providing a strategy to incorporate particle pose into the Siamese network. ReWAG is a neural network and particle filter system that is able to globally localize a mobile agent in a GPS-denied environment with only odometry and a 90 degree FOV camera, achieving similar localization accuracy as what WAG achieved with a panoramic camera and improving localization accuracy by a factor of 100 compared to a baseline vision transformer (ViT) approach. A video highlight that demonstrates ReWAG's convergence on a test path of several dozen kilometers is available at https://youtu.be/U_OBQrt8qCE.
△ Less
Submitted 18 May, 2023; v1 submitted 23 September, 2022;
originally announced September 2022.
-
Code Comment Inconsistency Detection with BERT and Longformer
Authors:
Theo Steiner,
Rui Zhang
Abstract:
Comments, or natural language descriptions of source code, are standard practice among software developers. By communicating important aspects of the code such as functionality and usage, comments help with software project maintenance. However, when the code is modified without an accompanying correction to the comment, an inconsistency between the comment and code can arise, which opens up the p…
▽ More
Comments, or natural language descriptions of source code, are standard practice among software developers. By communicating important aspects of the code such as functionality and usage, comments help with software project maintenance. However, when the code is modified without an accompanying correction to the comment, an inconsistency between the comment and code can arise, which opens up the possibility for developer confusion and bugs. In this paper, we propose two models based on BERT (Devlin et al., 2019) and Longformer (Beltagy et al., 2020) to detect such inconsistencies in a natural language inference (NLI) context. Through an evaluation on a previously established corpus of comment-method pairs both during and after code changes, we demonstrate that our models outperform multiple baselines and yield comparable results to the state-of-the-art models that exclude linguistic and lexical features. We further discuss ideas for future research in using pretrained language models for both inconsistency detection and automatic comment updating.
△ Less
Submitted 28 July, 2022;
originally announced July 2022.
-
Expanding the Quantum Photonic Toolbox in AlGaAsOI
Authors:
Joshua E. Castro,
Trevor J. Steiner,
Lillian Thiel,
Alex Dinkelacker,
Corey McDonald,
Paolo Pintus,
Lin Chang,
John E. Bowers,
Galan Moody
Abstract:
Aluminum gallium arsenide-on-insulator (AlGaAsOI) exhibits large $χ^\left(2\right)$ and $χ^\left(3\right)$ optical nonlinearities, a wide tunable bandgap, low waveguide propagation loss, and a large thermo-optic coefficient, making it an exciting platform for integrated quantum photonics. With ultrabright sources of quantum light established in AlGaAsOI, the next step is to develop the critical bu…
▽ More
Aluminum gallium arsenide-on-insulator (AlGaAsOI) exhibits large $χ^\left(2\right)$ and $χ^\left(3\right)$ optical nonlinearities, a wide tunable bandgap, low waveguide propagation loss, and a large thermo-optic coefficient, making it an exciting platform for integrated quantum photonics. With ultrabright sources of quantum light established in AlGaAsOI, the next step is to develop the critical building blocks for chip-scale quantum photonic circuits. Here we expand the quantum photonic toolbox for AlGaAsOI by demonstrating edge couplers, 3-dB splitters, tunable interferometers, and waveguide crossings with performance comparable to or exceeding silicon and silicon-nitride quantum photonic platforms. As a demonstration, we demultiplex photonic qubits through an unbalanced interferometer, paving the route toward ultra-efficient and high-rate chip-scale demonstrations of photonic quantum computation and information applications.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
City-wide Street-to-Satellite Image Geolocalization of a Mobile Ground Agent
Authors:
Lena M. Downes,
Dong-Ki Kim,
Ted J. Steiner,
Jonathan P. How
Abstract:
Cross-view image geolocalization provides an estimate of an agent's global position by matching a local ground image to an overhead satellite image without the need for GPS. It is challenging to reliably match a ground image to the correct satellite image since the images have significant viewpoint differences. Existing works have demonstrated localization in constrained scenarios over small areas…
▽ More
Cross-view image geolocalization provides an estimate of an agent's global position by matching a local ground image to an overhead satellite image without the need for GPS. It is challenging to reliably match a ground image to the correct satellite image since the images have significant viewpoint differences. Existing works have demonstrated localization in constrained scenarios over small areas but have not demonstrated wider-scale localization. Our approach, called Wide-Area Geolocalization (WAG), combines a neural network with a particle filter to achieve global position estimates for agents moving in GPS-denied environments, scaling efficiently to city-scale regions. WAG introduces a trinomial loss function for a Siamese network to robustly match non-centered image pairs and thus enables the generation of a smaller satellite image database by coarsely discretizing the search area. A modified particle filter weighting scheme is also presented to improve localization accuracy and convergence. Taken together, WAG's network training and particle filter weighting approach achieves city-scale position estimation accuracies on the order of 20 meters, a 98% reduction compared to a baseline training and weighting approach. Applied to a smaller-scale testing area, WAG reduces the final position estimation error by 64% compared to a state-of-the-art baseline from the literature. WAG's search space discretization additionally significantly reduces storage and processing requirements.
△ Less
Submitted 5 July, 2022; v1 submitted 10 March, 2022;
originally announced March 2022.
-
Bayesian Ridge Regression Based Model to Predict Fault Location in HVdc Network
Authors:
Timothy Flavin,
Thomas Steiner,
Bhaskar Mitra,
Vidhyashree nagaraju
Abstract:
This paper discusses a method for accurately estimating the fault location in multi-terminal High Voltage direct current (HVdc) transmission network using single ended current and voltage measurements. The post-fault voltage and current signatures are a function of multiple factors and thus accurately locating faults on a multi-terminal network is challenging. We discuss a novel data-driven Bayes…
▽ More
This paper discusses a method for accurately estimating the fault location in multi-terminal High Voltage direct current (HVdc) transmission network using single ended current and voltage measurements. The post-fault voltage and current signatures are a function of multiple factors and thus accurately locating faults on a multi-terminal network is challenging. We discuss a novel data-driven Bayes Regression based method for accurately predicting fault locations. The sensitivity of the proposed algorithm to measurement noise, fault location, resistance and current limiting inductance are performed on a radial three-terminal MTdc network. The test system is designed in Power System Computer Aided Design (PSCAD)/Electromagnetic Transients including dc (EMTdc).
△ Less
Submitted 25 February, 2022;
originally announced February 2022.
-
Engineering the Electronic Structure of Two-Dimensional Materials with Near-Field Electrostatic Effects of Self-Assembled Organic Layers
Authors:
Qunfei Zhou,
Bukuru Anaclet,
Trevor Steiner,
Michele Kotiuga,
Pierre Darancet
Abstract:
We compute the electronic structure of two-dimensional (2D) materials decorated with self-assembled organic monolayers using density functional theory. We find that 2D materials are strongly impacted by near-field electrostatic effects resulting from high multipoles of the organic layer electronic density. We show that this effect can lead to significant (~0.5V) modulation of the in-plane potentia…
▽ More
We compute the electronic structure of two-dimensional (2D) materials decorated with self-assembled organic monolayers using density functional theory. We find that 2D materials are strongly impacted by near-field electrostatic effects resulting from high multipoles of the organic layer electronic density. We show that this effect can lead to significant (~0.5V) modulation of the in-plane potential experienced by electrons in 2D materials within ~4Åfrom the molecular layer, with a transition between near- and far-field depending on the lateral extent of the molecules. We develop a theory of this effect, showing that the electrostatic potential of the molecular layer can be approximated by a discretized planar charge density derived from the molecular structure and multipoles. Solving this model computationally and analytically, we propose implementations of this effect to generate novel electronic properties for electrons in 2D materials, such as band gap opening and anisotropic group velocity modulation for monolayer graphene from experimentally achievable molecular assemblies.
△ Less
Submitted 21 September, 2021;
originally announced September 2021.
-
The Fine-Grained Complexity of Episode Matching
Authors:
Philip Bille,
Inge Li Gørtz,
Shay Mozes,
Teresa Anna Steiner,
Oren Weimann
Abstract:
Given two strings $S$ and $P$, the Episode Matching problem is to find the shortest substring of $S$ that contains $P$ as a subsequence. The best known upper bound for this problem is $\tilde O(nm)$ by Das et al. (1997) , where $n,m$ are the lengths of $S$ and $P$, respectively. Although the problem is well studied and has many applications in data mining, this bound has never been improved. In th…
▽ More
Given two strings $S$ and $P$, the Episode Matching problem is to find the shortest substring of $S$ that contains $P$ as a subsequence. The best known upper bound for this problem is $\tilde O(nm)$ by Das et al. (1997) , where $n,m$ are the lengths of $S$ and $P$, respectively. Although the problem is well studied and has many applications in data mining, this bound has never been improved. In this paper we show why this is the case by proving that no $O((nm)^{1-ε})$ algorithm (even for binary strings) exists, unless the Strong Exponential Time Hypothesis (SETH) is false. We then consider the indexing version of the problem, where $S$ is preprocessed into a data structure for answering episode matching queries $P$. We show that for any $τ$, there is a data structure using $O(n+\left(\frac{n}τ\right)^k)$ space that answers episode matching queries for any $P$ of length $k$ in $O(k\cdot τ\cdot \log \log n )$ time. We complement this upper bound with an almost matching lower bound, showing that any data structure that answers episode matching queries for patterns of length $k$ in time $O(n^δ)$, must use $Ω(n^{k-kδ-o(1)})$ space, unless the Strong $k$-Set Disjointness Conjecture is false. Finally, for the special case of $k=2$, we present a faster construction of the data structure using fast min-plus multiplication of bounded integer matrices.
△ Less
Submitted 14 February, 2024; v1 submitted 19 August, 2021;
originally announced August 2021.
-
Accessing HID Devices on the Web With the WebHID API: How to play the Chrome Dino Game by Jum** With a Nintendo Joy-Con Controller in One's Pocket
Authors:
Thomas Steiner,
François Beaufort
Abstract:
In this demonstration, we show how special hardware like Nintendo Joy-Con controllers can be made accessible from the Web through the new WebHID API. This novel technology proposal allows developers to write Web drivers in pure JavaScript that talk to Human Interface Device (HID) devices via the HID protocol. One such example of a driver has been realized in the project Joy-Con-WebHID, which allow…
▽ More
In this demonstration, we show how special hardware like Nintendo Joy-Con controllers can be made accessible from the Web through the new WebHID API. This novel technology proposal allows developers to write Web drivers in pure JavaScript that talk to Human Interface Device (HID) devices via the HID protocol. One such example of a driver has been realized in the project Joy-Con-WebHID, which allows for fun pastimes like playing the Google Chrome browser's offline dinosaur game by jum**. This works thanks to the accelerometers built into Joy-Con controllers whose signals are read out by the driver and used to control the game character in the browser. A video of the experience is available.
△ Less
Submitted 6 April, 2021;
originally announced April 2021.
-
Gapped Indexing for Consecutive Occurrences
Authors:
Philip Bille,
Inge Li Gørtz,
Max Rishøj Pedersen,
Teresa Anna Steiner
Abstract:
The classic string indexing problem is to preprocess a string S into a compact data structure that supports efficient pattern matching queries. Typical queries include existential queries (decide if the pattern occurs in S), reporting queries (return all positions where the pattern occurs), and counting queries (return the number of occurrences of the pattern). In this paper we consider a variant…
▽ More
The classic string indexing problem is to preprocess a string S into a compact data structure that supports efficient pattern matching queries. Typical queries include existential queries (decide if the pattern occurs in S), reporting queries (return all positions where the pattern occurs), and counting queries (return the number of occurrences of the pattern). In this paper we consider a variant of string indexing, where the goal is to compactly represent the string such that given two patterns P1 and P2 and a gap range [α,β] we can quickly find the consecutive occurrences of P1 and P2 with distance in [α,β], i.e., pairs of occurrences immediately following each other and with distance within the range. We present data structures that use Õ(n) space and query time Õ(|P1|+|P2|+n^(2/3)) for existence and counting and Õ(|P1|+|P2|+n^(2/3)*occ^(1/3)) for reporting. We complement this with a conditional lower bound based on the set intersection problem showing that any solution using Õ(n) space must use \tildeΩ}(|P1|+|P2|+\sqrt{n}) query time. To obtain our results we develop new techniques and ideas of independent interest including a new suffix tree decomposition and hardness of a variant of the set intersection problem.
△ Less
Submitted 4 February, 2021;
originally announced February 2021.
-
Ultra-bright entangled-photon pair generation from an AlGaAs-on-insulator microring resonator
Authors:
Trevor J. Steiner,
Joshua E. Castro,
Lin Chang,
Quynh Dang,
Weiqiang Xie,
Justin Norman,
John E. Bowers,
Galan Moody
Abstract:
Entangled-photon pairs are an essential resource for quantum information technologies. Chip-scale sources of entangled pairs have been integrated with various photonic platforms, including silicon, nitrides, indium phosphide, and lithium niobate, but each has fundamental limitations that restrict the photon-pair brightness and quality, including weak optical nonlinearity or high waveguide loss. He…
▽ More
Entangled-photon pairs are an essential resource for quantum information technologies. Chip-scale sources of entangled pairs have been integrated with various photonic platforms, including silicon, nitrides, indium phosphide, and lithium niobate, but each has fundamental limitations that restrict the photon-pair brightness and quality, including weak optical nonlinearity or high waveguide loss. Here, we demonstrate a novel, ultra-low-loss AlGaAs-on-insulator platform capable of generating time-energy entangled photons in a $Q$ $>1$ million microring resonator with nearly 1,000-fold improvement in brightness compared to existing sources. The waveguide-integrated source exhibits an internal generation rate greater than $20\times 10^9$ pairs sec$^{-1}$ mW$^{-2}$, emits near 1550 nm, produces heralded single photons with $>99\%$ purity, and violates Bell's inequality by more than 40 standard deviations with visibility $>97\%$. Combined with the high optical nonlinearity and optical gain of AlGaAs for active component integration, these are all essential features for a scalable quantum photonic platform.
△ Less
Submitted 28 September, 2020;
originally announced September 2020.
-
Lunar Terrain Relative Navigation Using a Convolutional Neural Network for Visual Crater Detection
Authors:
Lena M. Downes,
Ted J. Steiner,
Jonathan P. How
Abstract:
Terrain relative navigation can improve the precision of a spacecraft's position estimate by detecting global features that act as supplementary measurements to correct for drift in the inertial navigation system. This paper presents a system that uses a convolutional neural network (CNN) and image processing methods to track the location of a simulated spacecraft with an extended Kalman filter (E…
▽ More
Terrain relative navigation can improve the precision of a spacecraft's position estimate by detecting global features that act as supplementary measurements to correct for drift in the inertial navigation system. This paper presents a system that uses a convolutional neural network (CNN) and image processing methods to track the location of a simulated spacecraft with an extended Kalman filter (EKF). The CNN, called LunaNet, visually detects craters in the simulated camera frame and those detections are matched to known lunar craters in the region of the current estimated spacecraft position. These matched craters are treated as features that are tracked using the EKF. LunaNet enables more reliable position tracking over a simulated trajectory due to its greater robustness to changes in image brightness and more repeatable crater detections from frame to frame throughout a trajectory. LunaNet combined with an EKF produces a decrease of 60% in the average final position estimation error and a decrease of 25% in average final velocity estimation error compared to an EKF using an image processing-based crater detection method when tested on trajectories using images of standard brightness.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
String Indexing for Top-$k$ Close Consecutive Occurrences
Authors:
Philip Bille,
Inge Li Gørtz,
Max Rishøj Pedersen,
Eva Rotenberg,
Teresa Anna Steiner
Abstract:
The classic string indexing problem is to preprocess a string $S$ into a compact data structure that supports efficient subsequent pattern matching queries, that is, given a pattern string $P$, report all occurrences of $P$ within $S$. In this paper, we study a basic and natural extension of string indexing called the string indexing for top-$k$ close consecutive occurrences problem (SITCCO). Here…
▽ More
The classic string indexing problem is to preprocess a string $S$ into a compact data structure that supports efficient subsequent pattern matching queries, that is, given a pattern string $P$, report all occurrences of $P$ within $S$. In this paper, we study a basic and natural extension of string indexing called the string indexing for top-$k$ close consecutive occurrences problem (SITCCO). Here, a consecutive occurrence is a pair $(i,j)$, $i < j$, such that $P$ occurs at positions $i$ and $j$ in $S$ and there is no occurrence of $P$ between $i$ and $j$, and their distance is defined as $j-i$. Given a pattern $P$ and a parameter $k$, the goal is to report the top-$k$ consecutive occurrences of $P$ in $S$ of minimal distance. The challenge is to compactly represent $S$ while supporting queries in time close to the length of $P$ and $k$. We give three time-space trade-offs for the problem. Let $n$ be the length of $S$, $m$ the length of $P$, and $ε\in(0,1]$. Our first result achieves $O(n\log n)$ space and optimal query time of $O(m+k)$. Our second and third results achieve linear space and query times either $O(m+k^{1+ε})$ or $O(m + k \log^{1+ε} n)$. Along the way, we develop several techniques of independent interest, including a new translation of the problem into a line segment intersection problem and a new recursive clustering technique for trees.
△ Less
Submitted 14 February, 2024; v1 submitted 8 July, 2020;
originally announced July 2020.
-
Collision Probabilities for Continuous-Time Systems Without Sampling [with Appendices]
Authors:
Kristoffer M. Frey,
Ted J. Steiner,
Jonathan P. How
Abstract:
Demand for high-performance, robust, and safe autonomous systems has grown substantially in recent years. These objectives motivate the desire for efficient safety-theoretic reasoning that can be embedded in core decision-making tasks such as motion planning, particularly in constrained environments. On one hand, Monte-Carlo (MC) and other sampling-based techniques provide accurate collision proba…
▽ More
Demand for high-performance, robust, and safe autonomous systems has grown substantially in recent years. These objectives motivate the desire for efficient safety-theoretic reasoning that can be embedded in core decision-making tasks such as motion planning, particularly in constrained environments. On one hand, Monte-Carlo (MC) and other sampling-based techniques provide accurate collision probability estimates for a wide variety of motion models but are cumbersome in the context of continuous optimization. On the other, "direct" approximations aim to compute (or upper-bound) the failure probability as a smooth function of the decision variables, and thus are convenient for optimization. However, existing direct approaches fundamentally assume discrete-time dynamics and can perform unpredictably when applied to continuous-time systems ubiquitous in the real world, often manifesting as severe conservatism. State-of-the-art attempts to address this within a conventional discrete-time framework require additional Gaussianity approximations that ultimately produce inconsistency of their own. In this paper we take a fundamentally different approach, deriving a risk approximation framework directly in continuous time and producing a lightweight estimate that actually converges as the underlying discretization is refined. Our approximation is shown to significantly outperform state-of-the-art techniques in replicating the MC estimate while maintaining the functional and computational benefits of a direct method. This enables robust, risk-aware, continuous motion-planning for a broad class of nonlinear and/or partially-observable systems.
△ Less
Submitted 24 December, 2022; v1 submitted 1 June, 2020;
originally announced June 2020.
-
String Indexing with Compressed Patterns
Authors:
Philip Bille,
Inge Li Gørtz,
Teresa Anna Steiner
Abstract:
Given a string $S$ of length $n$, the classic string indexing problem is to preprocess $S$ into a compact data structure that supports efficient subsequent pattern queries. In this paper we consider the basic variant where the pattern is given in compressed form and the goal is to achieve query time that is fast in terms of the compressed size of the pattern. This captures the common client-server…
▽ More
Given a string $S$ of length $n$, the classic string indexing problem is to preprocess $S$ into a compact data structure that supports efficient subsequent pattern queries. In this paper we consider the basic variant where the pattern is given in compressed form and the goal is to achieve query time that is fast in terms of the compressed size of the pattern. This captures the common client-server scenario, where a client submits a query and communicates it in compressed form to a server. Instead of the server decompressing the query before processing it, we consider how to efficiently process the compressed query directly. Our main result is a novel linear space data structure that achieves near-optimal query time for patterns compressed with the classic Lempel-Ziv compression scheme. Along the way we develop several data structural techniques of independent interest, including a novel data structure that compactly encodes all LZ77 compressed suffixes of a string in linear space and a general decomposition of tries that reduces the search time from logarithmic in the size of the trie to logarithmic in the length of the pattern.
△ Less
Submitted 14 February, 2024; v1 submitted 26 September, 2019;
originally announced September 2019.
-
Towards Online Observability-Aware Trajectory Optimization for Landmark-based Estimators
Authors:
Kristoffer M. Frey,
Ted J. Steiner,
Jonathan P. How
Abstract:
As autonomous systems increasingly rely on onboard sensing for localization and perception, the parallel tasks of motion planning and state estimation become more strongly coupled. This coupling is well-captured by augmenting the planning objective with a posterior-covariance penalty -- however, prediction of the estimator covariance is challenging when the observation model depends on unknown lan…
▽ More
As autonomous systems increasingly rely on onboard sensing for localization and perception, the parallel tasks of motion planning and state estimation become more strongly coupled. This coupling is well-captured by augmenting the planning objective with a posterior-covariance penalty -- however, prediction of the estimator covariance is challenging when the observation model depends on unknown landmarks, as is the case in Simultaneous Localization and Map** (SLAM). This paper addresses these challenges in the case of landmark- and SLAM-based estimators, enabling efficient prediction (and ultimately minimization) of this performance metric. First, we provide an interval-based filtering approximation of the SLAM inference process which allows for recursive propagation of the ego-covariance while avoiding the quadratic complexity of explicitly tracking landmark uncertainty. Secondly, we introduce a Lie-derivative measurement bundling scheme that simplifies the recursive "bundled" update, representing significant computational savings for high-rate sensors such as cameras. Finally, we identify a large class of measurement models (which includes orthographic camera projection) for which the contributions from each landmark can be directly combined, making evaluation of the information gained at each timestep (nearly) independent of the number of landmarks. This also enables the generalization from finite sets of landmarks $\{\ell^{(n)} \}$ to distributions, foregoing the need for fully-specified linearization points at planning time and allowing for new landmarks to be anticipated. Taken together, these contributions allow SLAM performance to be accurately and efficiently predicted, paving the way for online, observability-aware trajectory optimization in unknown space.
△ Less
Submitted 10 September, 2020; v1 submitted 10 August, 2019;
originally announced August 2019.
-
Efficient Constellation-Based Map-Merging for Semantic SLAM
Authors:
Kristoffer M. Frey,
Ted J. Steiner,
Jonathan P. How
Abstract:
Data association in SLAM is fundamentally challenging, and handling ambiguity well is crucial to achieve robust operation in real-world environments. When ambiguous measurements arise, conservatism often mandates that the measurement is discarded or a new landmark is initialized rather than risking an incorrect association. To address the inevitable `duplicate' landmarks that arise, we present an…
▽ More
Data association in SLAM is fundamentally challenging, and handling ambiguity well is crucial to achieve robust operation in real-world environments. When ambiguous measurements arise, conservatism often mandates that the measurement is discarded or a new landmark is initialized rather than risking an incorrect association. To address the inevitable `duplicate' landmarks that arise, we present an efficient map-merging framework to detect duplicate constellations of landmarks, providing a high-confidence loop-closure mechanism well-suited for object-level SLAM. This approach uses an incrementally-computable approximation of landmark uncertainty that only depends on local information in the SLAM graph, avoiding expensive recovery of the full system covariance matrix. This enables a search based on geometric consistency (GC) (rather than full joint compatibility (JC)) that inexpensively reduces the search space to a handful of `best' hypotheses. Furthermore, we reformulate the commonly-used interpretation tree to allow for more efficient integration of clique-based pairwise compatibility, accelerating the branch-and-bound max-cardinality search. Our method is demonstrated to match the performance of full JC methods at significantly-reduced computational cost, facilitating robust object-based loop-closure over large SLAM problems.
△ Less
Submitted 5 March, 2019; v1 submitted 25 September, 2018;
originally announced September 2018.
-
Complexity Analysis and Efficient Measurement Selection Primitives for High-Rate Graph SLAM
Authors:
Kristoffer M. Frey,
Ted J. Steiner,
Jonathan P. How
Abstract:
Sparsity has been widely recognized as crucial for efficient optimization in graph-based SLAM. Because the sparsity and structure of the SLAM graph reflect the set of incorporated measurements, many methods for sparsification have been proposed in hopes of reducing computation. These methods often focus narrowly on reducing edge count without regard for structure at a global level. Such structural…
▽ More
Sparsity has been widely recognized as crucial for efficient optimization in graph-based SLAM. Because the sparsity and structure of the SLAM graph reflect the set of incorporated measurements, many methods for sparsification have been proposed in hopes of reducing computation. These methods often focus narrowly on reducing edge count without regard for structure at a global level. Such structurally-naive techniques can fail to produce significant computational savings, even after aggressive pruning. In contrast, simple heuristics such as measurement decimation and keyframing are known empirically to produce significant computation reductions. To demonstrate why, we propose a quantitative metric called elimination complexity (EC) that bridges the existing analytic gap between graph structure and computation. EC quantifies the complexity of the primary computational bottleneck: the factorization step of a Gauss-Newton iteration. Using this metric, we show rigorously that decimation and keyframing impose favorable global structures and therefore achieve computation reductions on the order of $r^2/9$ and $r^3$, respectively, where $r$ is the pruning rate. We additionally present numerical results showing EC provides a good approximation of computation in both batch and incremental (iSAM2) optimization and demonstrate that pruning methods promoting globally-efficient structure outperform those that do not.
△ Less
Submitted 2 March, 2018; v1 submitted 20 September, 2017;
originally announced September 2017.
-
Wikipedia Tools for Google Spreadsheets
Authors:
Thomas Steiner
Abstract:
In this paper, we introduce the Wikipedia Tools for Google Spreadsheets. Google Spreadsheets is part of a free, Web-based software office suite offered by Google within its Google Docs service. It allows users to create and edit spreadsheets online, while collaborating with other users in realtime. Wikipedia is a free-access, free-content Internet encyclopedia, whose content and data is available,…
▽ More
In this paper, we introduce the Wikipedia Tools for Google Spreadsheets. Google Spreadsheets is part of a free, Web-based software office suite offered by Google within its Google Docs service. It allows users to create and edit spreadsheets online, while collaborating with other users in realtime. Wikipedia is a free-access, free-content Internet encyclopedia, whose content and data is available, among other means, through an API. With the Wikipedia Tools for Google Spreadsheets, we have created a toolkit that facilitates working with Wikipedia data from within a spreadsheet context. We make these tools available as open-source on GitHub [https://github.com/tomayac/wikipedia-tools-for-google-spreadsheets], released under the permissive Apache 2.0 license.
△ Less
Submitted 8 February, 2016;
originally announced February 2016.
-
The Pragmatic Proof: Hypermedia API Composition and Execution
Authors:
Ruben Verborgh,
Dörthe Arndt,
Sofie Van Hoecke,
Jos De Roo,
Giovanni Mels,
Thomas Steiner,
Joaquim Gabarro
Abstract:
Machine clients are increasingly making use of the Web to perform tasks. While Web services traditionally mimic remote procedure calling interfaces, a new generation of so-called hypermedia APIs works through hyperlinks and forms, in a way similar to how people browse the Web. This means that existing composition techniques, which determine a procedural plan upfront, are not sufficient to consume…
▽ More
Machine clients are increasingly making use of the Web to perform tasks. While Web services traditionally mimic remote procedure calling interfaces, a new generation of so-called hypermedia APIs works through hyperlinks and forms, in a way similar to how people browse the Web. This means that existing composition techniques, which determine a procedural plan upfront, are not sufficient to consume hypermedia APIs, which need to be navigated at runtime. Clients instead need a more dynamic plan that allows them to follow hyperlinks and use forms with a preset goal. Therefore, in this article, we show how compositions of hypermedia APIs can be created by generic Semantic Web reasoners. This is achieved through the generation of a proof based on semantic descriptions of the APIs' functionality. To pragmatically verify the applicability of compositions, we introduce the notion of pre-execution and post-execution proofs. The runtime interaction between a client and a server is guided by proofs but driven by hypermedia, allowing the client to react to the application's actual state indicated by the server's response. We describe how to generate compositions from descriptions, discuss a computer-assisted process to generate descriptions, and verify reasoner performance on various composition tasks using a benchmark suite. The experimental results lead to the conclusion that proof-based consumption of hypermedia APIs is a feasible strategy at Web scale.
△ Less
Submitted 24 December, 2015;
originally announced December 2015.
-
Disaster Monitoring with Wikipedia and Online Social Networking Sites: Structured Data and Linked Data Fragments to the Rescue?
Authors:
Thomas Steiner,
Ruben Verborgh
Abstract:
In this paper, we present the first results of our ongoing early-stage research on a realtime disaster detection and monitoring tool. Based on Wikipedia, it is language-agnostic and leverages user-generated multimedia content shared on online social networking sites to help disaster responders prioritize their efforts. We make the tool and its source code publicly available as we make progress on…
▽ More
In this paper, we present the first results of our ongoing early-stage research on a realtime disaster detection and monitoring tool. Based on Wikipedia, it is language-agnostic and leverages user-generated multimedia content shared on online social networking sites to help disaster responders prioritize their efforts. We make the tool and its source code publicly available as we make progress on it. Furthermore, we strive to publish detected disasters and accompanying multimedia content following the Linked Data principles to facilitate its wide consumption, redistribution, and evaluation of its usefulness.
△ Less
Submitted 26 January, 2015;
originally announced January 2015.
-
Telling Breaking News Stories from Wikipedia with Social Multimedia: A Case Study of the 2014 Winter Olympics
Authors:
Thomas Steiner
Abstract:
With the ability to watch Wikipedia and Wikidata edits in realtime, the online encyclopedia and the knowledge base have become increasingly used targets of research for the detection of breaking news events. In this paper, we present a case study of the 2014 Winter Olympics, where we tell the story of breaking news events in the context of the Olympics with the help of social multimedia stemming f…
▽ More
With the ability to watch Wikipedia and Wikidata edits in realtime, the online encyclopedia and the knowledge base have become increasingly used targets of research for the detection of breaking news events. In this paper, we present a case study of the 2014 Winter Olympics, where we tell the story of breaking news events in the context of the Olympics with the help of social multimedia stemming from multiple social network sites. Therefore, we have extended the application Wikipedia Live Monitor-a tool for the detection of breaking news events-with the capability of automatically creating media galleries that illustrate events. Athletes winning an Olympic competition, a new country leading the medal table, or simply the Olympics themselves are all events newsworthy enough for people to concurrently edit Wikipedia and Wikidata-around the world in many languages. The Olympics being an event of common interest, an even bigger majority of people share the event in a multitude of languages on global social network sites, which makes the event an ideal subject of study. With this work, we connect the world of Wikipedia and Wikidata with the world of social network sites, in order to convey the spirit of the 2014 Winter Olympics, to tell the story of victory and defeat, and always following the Olympic motto Citius, Altius, Fortius. The proposed system-generalized for all sort of breaking news stories-has been put in production in form of the Twitter bot @mediagalleries, available and archived at https://twitter.com/mediagalleries.
△ Less
Submitted 17 March, 2014;
originally announced March 2014.
-
Bots vs. Wikipedians, Anons vs. Logged-Ins
Authors:
Thomas Steiner
Abstract:
Wikipedia is a global crowdsourced encyclopedia that at time of writing is available in 287 languages. Wikidata is a likewise global crowdsourced knowledge base that provides shared facts to be used by Wikipedias. In the context of this research, we have developed an application and an underlying Application Programming Interface (API) capable of monitoring realtime edit activity of all language v…
▽ More
Wikipedia is a global crowdsourced encyclopedia that at time of writing is available in 287 languages. Wikidata is a likewise global crowdsourced knowledge base that provides shared facts to be used by Wikipedias. In the context of this research, we have developed an application and an underlying Application Programming Interface (API) capable of monitoring realtime edit activity of all language versions of Wikipedia and Wikidata. This application allows us to easily analyze edits in order to answer questions such as "Bots vs. Wikipedians, who edits more?", "Which is the most anonymously edited Wikipedia?", or "Who are the bots and what do they edit?". To the best of our knowledge, this is the first time such an analysis could be done in realtime for Wikidata and for really all Wikipedias--large and small. Our application is available publicly online at the URL http://wikipedia-edits.herokuapp.com/, its code has been open-sourced under the Apache 2.0 license.
△ Less
Submitted 5 February, 2014; v1 submitted 3 February, 2014;
originally announced February 2014.
-
MJ no more: Using Concurrent Wikipedia Edit Spikes with Social Network Plausibility Checks for Breaking News Detection
Authors:
Thomas Steiner,
Seth van Hooland,
Ed Summers
Abstract:
We have developed an application called Wikipedia Live Monitor that monitors article edits on different language versions of Wikipedia, as they happen in realtime. Wikipedia articles in different languages are highly interlinked. For example, the English article en:2013_Russian_meteor_event on the topic of the February 15 meteoroid that exploded over the region of Chelyabinsk Oblast, Russia, is in…
▽ More
We have developed an application called Wikipedia Live Monitor that monitors article edits on different language versions of Wikipedia, as they happen in realtime. Wikipedia articles in different languages are highly interlinked. For example, the English article en:2013_Russian_meteor_event on the topic of the February 15 meteoroid that exploded over the region of Chelyabinsk Oblast, Russia, is interlinked with the Russian article on the same topic. As we monitor multiple language versions of Wikipedia in parallel, we can exploit this fact to detect concurrent edit spikes of Wikipedia articles covering the same topics, both in only one, and in different languages. We treat such concurrent edit spikes as signals for potential breaking news events, whose plausibility we then check with full-text cross-language searches on multiple social networks. Unlike the reverse approach of monitoring social networks first, and potentially checking plausibility on Wikipedia second, the approach proposed in this paper has the advantage of being less prone to false-positive alerts, while being equally sensitive to true-positive events, however, at only a fraction of the processing cost.
△ Less
Submitted 21 March, 2013; v1 submitted 19 March, 2013;
originally announced March 2013.
-
Extraction of many-body configurations from nonlinear absorption in semiconductor quantum wells
Authors:
R. P. Smith,
J. K. Wahlstrand,
A. C. Funk,
R. P. Mirin,
S. T. Cundiff,
J. T. Steiner,
M. Schafer,
M. Kira,
S. W. Koch
Abstract:
Detailed electronic many-body configurations are extracted from quantitatively measured timeresolved nonlinear absorption spectra of resonantly excited GaAs quantum wells. The microscopic theory assigns the observed spectral changes to a unique mixture of electron-hole plasma, exciton, and polarization effects. Strong transient gain is observed only under co-circular pump-probe conditions and is…
▽ More
Detailed electronic many-body configurations are extracted from quantitatively measured timeresolved nonlinear absorption spectra of resonantly excited GaAs quantum wells. The microscopic theory assigns the observed spectral changes to a unique mixture of electron-hole plasma, exciton, and polarization effects. Strong transient gain is observed only under co-circular pump-probe conditions and is attributed to the transfer of pump-induced coherences to the probe.
△ Less
Submitted 15 December, 2009;
originally announced December 2009.
-
Yield Curve Shapes and the Asymptotic Short Rate Distribution in Affine One-Factor Models
Authors:
Martin Keller-Ressel,
Thomas Steiner
Abstract:
We consider a model for interest rates, where the short rate is given by a time-homogenous, one-dimensional affine process in the sense of Duffie, Filipovic and Schachermayer. We show that in such a model yield curves can only be normal, inverse or humped (i.e. endowed with a single local maximum). Each case can be characterized by simple conditions on the present short rate. We give conditions…
▽ More
We consider a model for interest rates, where the short rate is given by a time-homogenous, one-dimensional affine process in the sense of Duffie, Filipovic and Schachermayer. We show that in such a model yield curves can only be normal, inverse or humped (i.e. endowed with a single local maximum). Each case can be characterized by simple conditions on the present short rate. We give conditions under which the short rate process will converge to a limit distribution and describe the limit distribution in terms of its cumulant generating function. We apply our results to the Vasicek model, the CIR model, a CIR model with added jumps and a model of Ornstein-Uhlenbeck type.
△ Less
Submitted 26 November, 2007; v1 submitted 4 April, 2007;
originally announced April 2007.