-
A Local Wheeler-DeWitt Measure for the String Landscape
Authors:
Bjoern Friedrich,
Arthur Hebecker,
Manfred Salmhofer,
Jonah Cedric Strauss,
Johannes Walcher
Abstract:
According to the `Cosmological Central Dogma', de Sitter space can be viewed as a quantum mechanical system with a finite number of degrees of freedom, set by the horizon area. We use this assumption together with the Wheeler-DeWitt (WDW) equation to approach the measure problem of eternal inflation. Thus, our goal is to find a time-independent wave function of the universe on a total Hilbert spac…
▽ More
According to the `Cosmological Central Dogma', de Sitter space can be viewed as a quantum mechanical system with a finite number of degrees of freedom, set by the horizon area. We use this assumption together with the Wheeler-DeWitt (WDW) equation to approach the measure problem of eternal inflation. Thus, our goal is to find a time-independent wave function of the universe on a total Hilbert space defined as the direct sum of a variety of subspaces: A finite-dimensional subspace for each de Sitter vacuum and an infinite-dimensional subspace for each terminal Minkowski or AdS vaccuum. We argue that, to be consistent with semiclassical intuition, such a solution requires the presence of sources. These are implemented as an inhomogenous term in the WDW equation, induced by the Hartle-Hawking no-boundary or the Linde/Vilenkin tunneling proposal. Taken together, these steps unambiguously lead to what we would like to think of as a `Local WDW measure,' where `local' refers to the fact that the dS part of the resulting wave function describes a superposition of static patches. The global 3-sphere spatial section of the entire multiverse makes no appearance.
△ Less
Submitted 16 February, 2024; v1 submitted 19 May, 2022;
originally announced May 2022.
-
Crowdsourcing Felt Reports using the MyShake smartphone app
Authors:
Qingkai Kong,
Richard M. Allen,
Steve Allen,
Theron Bair,
Akie Meja,
Sarina Patel,
Jennifer Strauss,
Stephen Thompson
Abstract:
MyShake is a free citizen science smartphone app that provides a range of features related to earthquakes. Features available globally include rapid post-earthquake notifications, live maps of earthquake damage as reported by MyShake users, safety tips and various educational features. The app also uses the accelerometer to detect earthquake shaking and to record and submit waveforms to a central…
▽ More
MyShake is a free citizen science smartphone app that provides a range of features related to earthquakes. Features available globally include rapid post-earthquake notifications, live maps of earthquake damage as reported by MyShake users, safety tips and various educational features. The app also uses the accelerometer to detect earthquake shaking and to record and submit waveforms to a central archive. In addition, MyShake delivers earthquake early warning alerts in California, Oregon and Washington. In this study we compare the felt shaking reports provided by MyShake users in California with the US Geological Survey's "Did You Feel It?" intensity reports. The MyShake app simply asks "What strength of shaking did you feel" and users report on a five-level scale. When the reports are averaged in spatial bins, we find strong correlations with the Modified Mercalli Intensity scale values reported by the USGS based on the much more complex DYFI surveys. The MyShake felt reports can therefore also be used to generate shaking intensity maps.
△ Less
Submitted 25 January, 2023; v1 submitted 26 April, 2022;
originally announced April 2022.
-
Lagrangian Motion Magnification with Double Sparse Optical Flow Decomposition
Authors:
Philipp Flotho,
Cosmas Heiss,
Gabriele Steidl,
Daniel J. Strauss
Abstract:
Microexpressions are fast and spatially small facial expressions that are difficult to detect. Therefore motion magnification techniques, which aim at amplifying and hence revealing subtle motion in videos, appear useful for handling such expressions. There are basically two main approaches, namely via Eulerian or Lagrangian techniques. While the first one magnifies motion implicitly by operating…
▽ More
Microexpressions are fast and spatially small facial expressions that are difficult to detect. Therefore motion magnification techniques, which aim at amplifying and hence revealing subtle motion in videos, appear useful for handling such expressions. There are basically two main approaches, namely via Eulerian or Lagrangian techniques. While the first one magnifies motion implicitly by operating directly on image pixels, the Lagrangian approach uses optical flow (OF) techniques to extract and magnify pixel trajectories. In this paper, we propose a novel approach for local Lagrangian motion magnification of facial micro-motions. Our contribution is three-fold: first, we fine tune the recurrent all-pairs field transforms (RAFT) for OFs deep learning approach for faces by adding ground truth obtained from the variational dense inverse search (DIS) for OF algorithm applied to the CASME II video set of facial micro expressions. This enables us to produce OFs of facial videos in an efficient and sufficiently accurate way. Second, since facial micro-motions are both local in space and time, we propose to approximate the OF field by sparse components both in space and time leading to a double sparse decomposition. Third, we use this decomposition to magnify micro-motions in specific areas of the face, where we introduce a new forward war** strategy using a triangular splitting of the image grid and barycentric interpolation of the RGB vectors at the corners of the transformed triangles. We demonstrate the feasibility of our approach by various examples.
△ Less
Submitted 15 January, 2024; v1 submitted 15 April, 2022;
originally announced April 2022.
-
A data acquisition setup for data driven acoustic design
Authors:
Romana Rust,
Achilleas Xydis,
Kurt Heutschi,
Nathanaël Perraudin,
Gonzalo Casas,
Chaoyu Du,
Jürgen Strauss,
Kurt Eggenschwiler,
Fernando Perez-Cruz,
Fabio Gramazio,
Matthias Kohler
Abstract:
In this paper, we present a novel interdisciplinary approach to study the relationship between diffusive surface structures and their acoustic performance. Using computational design, surface structures are iteratively generated and 3D printed at 1:10 model scale. They originate from different fabrication typologies and are designed to have acoustic diffusion and absorption effects. An automated r…
▽ More
In this paper, we present a novel interdisciplinary approach to study the relationship between diffusive surface structures and their acoustic performance. Using computational design, surface structures are iteratively generated and 3D printed at 1:10 model scale. They originate from different fabrication typologies and are designed to have acoustic diffusion and absorption effects. An automated robotic process measures the impulse responses of these surfaces by positioning a microphone and a speaker at multiple locations. The collected data serves two purposes: first, as an exploratory catalogue of different spatio-temporal-acoustic scenarios and second, as data set for predicting the acoustic response of digitally designed surface geometries using machine learning. In this paper, we present the automated data acquisition setup, the data processing and the computational generation of diffusive surface structures. We describe first results of comparative studies of measured surface panels and conclude with steps of future research.
△ Less
Submitted 24 September, 2021;
originally announced September 2021.
-
A framework for automated anomaly detection in high frequency water-quality data from in situ sensors
Authors:
Catherine Leigh,
Omar Alsibai,
Rob J. Hyndman,
Sevvandi Kandanaarachchi,
Olivia C. King,
James M. McGree,
Catherine Neelamraju,
Jennifer Strauss,
Priyanga Dilini Talagala,
Ryan S. Turner,
Kerrie Mengersen,
Erin E. Peterson
Abstract:
River water-quality monitoring is increasingly conducted using automated in situ sensors, enabling timelier identification of unexpected values. However, anomalies caused by technical issues confound these data, while the volume and velocity of data prevent manual detection. We present a framework for automated anomaly detection in high-frequency water-quality data from in situ sensors, using turb…
▽ More
River water-quality monitoring is increasingly conducted using automated in situ sensors, enabling timelier identification of unexpected values. However, anomalies caused by technical issues confound these data, while the volume and velocity of data prevent manual detection. We present a framework for automated anomaly detection in high-frequency water-quality data from in situ sensors, using turbidity, conductivity and river level data. After identifying end-user needs and defining anomalies, we ranked their importance and selected suitable detection methods. High priority anomalies included sudden isolated spikes and level shifts, most of which were classified correctly by regression-based methods such as autoregressive integrated moving average models. However, using other water-quality variables as covariates reduced performance due to complex relationships among variables. Classification of drift and periods of anomalously low or high variability improved when we applied replaced anomalous measurements with forecasts, but this inflated false positive rates. Feature-based methods also performed well on high priority anomalies, but were also less proficient at detecting lower priority anomalies, resulting in high false negative rates. Unlike regression-based methods, all feature-based methods produced low false positive rates, but did not and require training or optimization. Rule-based methods successfully detected impossible values and missing observations. Thus, we recommend using a combination of methods to improve anomaly detection performance, whilst minimizing false detection rates. Furthermore, our framework emphasizes the importance of communication between end-users and analysts for optimal outcomes with respect to both detection performance and end-user needs. Our framework is applicable to other types of high frequency time-series data and anomaly detection applications.
△ Less
Submitted 7 February, 2019; v1 submitted 30 October, 2018;
originally announced October 2018.
-
The Dark Universe - Exercises and Proceedings from the German-Italian WE Heraeus Summer School held in 2017 in Heidelberg
Authors:
Stefan S. Brems,
Björn Malte Schäfer,
Niccolò Bucciantini,
Hannes Keppler,
Markus Pössel,
Jonah Cedric Strauß,
Matthias Taulien
Abstract:
The Heraeus Summer School series "Astronomy from four perspectives", funded by the WE Heraeus Foundation, draws together teachers and teacher students, astronomers, physicists and astronomy students from Germany and Italy. For each summer school, participants gather at one of the four participating nodes: Heidelberg, Padua, Jena, and Florence. The main goal of the series is to bring astronomy into…
▽ More
The Heraeus Summer School series "Astronomy from four perspectives", funded by the WE Heraeus Foundation, draws together teachers and teacher students, astronomers, physicists and astronomy students from Germany and Italy. For each summer school, participants gather at one of the four participating nodes: Heidelberg, Padua, Jena, and Florence. The main goal of the series is to bring astronomy into schools, which is achieved by educating and training the teachers and teacher students. In this e-print, we present the exercises, tutorials, and high-school classroom materials developed during the fifth summer school of the series, which took place at Haus der Astronomie in Heidelberg August 26 -- September 2, 2017. "The tutorials" were prepared beforehand for the participants of the Summer schools, and are suitable for use in teacher training. "Classroom materials" were developed mainly during the summer school itself, and are suitable for high-school level teaching. They include question sheets for pupils, and some pointers on where to use the material in the German high school curriculum. Both sets of materials address the summer school's four main topics: Supernova cosmology, the virial theorem, rotation curves of galaxies, and the temperature of the cosmic microwave background (CMB).
△ Less
Submitted 8 October, 2018; v1 submitted 22 August, 2018;
originally announced August 2018.
-
Fair Pipelines
Authors:
Amanda Bower,
Sarah N. Kitchen,
Laura Niss,
Martin J. Strauss,
Alexander Vargas,
Suresh Venkatasubramanian
Abstract:
This work facilitates ensuring fairness of machine learning in the real world by decoupling fairness considerations in compound decisions. In particular, this work studies how fairness propagates through a compound decision-making processes, which we call a pipeline. Prior work in algorithmic fairness only focuses on fairness with respect to one decision. However, many decision-making processes re…
▽ More
This work facilitates ensuring fairness of machine learning in the real world by decoupling fairness considerations in compound decisions. In particular, this work studies how fairness propagates through a compound decision-making processes, which we call a pipeline. Prior work in algorithmic fairness only focuses on fairness with respect to one decision. However, many decision-making processes require more than one decision. For instance, hiring is at least a two stage model: deciding who to interview from the applicant pool and then deciding who to hire from the interview pool. Perhaps surprisingly, we show that the composition of fair components may not guarantee a fair pipeline under a $(1+\varepsilon)$-equal opportunity definition of fair. However, we identify circumstances that do provide that guarantee. We also propose numerous directions for future work on more general compound machine learning decisions.
△ Less
Submitted 2 July, 2017;
originally announced July 2017.
-
Four-dimensional light sha**: manipulating ultrafast spatio-temporal foci in space and time
Authors:
Bangshan Sun,
Patrick S. Salter,
Clemens Roider,
Alexander Jesacher,
Johannes Strauss,
Johannes Heberle,
Michael Schmidt,
Martin J. Booth
Abstract:
Spectral dispersion of ultrashort pulses allows simultaneous focusing of light in both space and time creating so-called spatio-temporal foci. Such space-time coupling may be combined with existing holographic techniques to give a further dimension of control when generating focal light fields. It is shown that a phase-only hologram placed in the pupil plane of an objective and illuminated by a sp…
▽ More
Spectral dispersion of ultrashort pulses allows simultaneous focusing of light in both space and time creating so-called spatio-temporal foci. Such space-time coupling may be combined with existing holographic techniques to give a further dimension of control when generating focal light fields. It is shown that a phase-only hologram placed in the pupil plane of an objective and illuminated by a spatially chirped ultrashort pulse can be used to generate three dimensional arrays of spatio-temporally focused spots. Exploiting the pulse front tilt generated at focus when applying simultaneous spatial and temporal focusing (SSTF), it is possible to overlap neighbouring foci in time to create a smooth intensity distribution. The resulting light field displays a high level of axial confinement, with experimental demonstrations given through two-photon microscopy and non-linear laser fabrication of glass.
△ Less
Submitted 15 May, 2017;
originally announced May 2017.
-
Presenting particle physics and quantum mechanics to the general public
Authors:
J. Strauss
Abstract:
The job of a physicist is to describe Nature. General features, hypotheses and theories help to describe physics phenomena at a more abstract, fundamental level, and are sometimes tacitly assigned some sort of real existence; doing so appears to be of little harm in most of classical physics. However, missing any tangible connection to everyday experience, one better always bears in mind the descr…
▽ More
The job of a physicist is to describe Nature. General features, hypotheses and theories help to describe physics phenomena at a more abstract, fundamental level, and are sometimes tacitly assigned some sort of real existence; doing so appears to be of little harm in most of classical physics. However, missing any tangible connection to everyday experience, one better always bears in mind the descriptive nature of any efforts to grasp the quantum. And elementary particles interact in the quantum world, of course. When communicating the world of elementary particles to the general public, the Bayesian approach of an ever ongoing updating of the depiction of reality turns out to be virtually indispensable. The human experience of providing a series of increasingly better descriptions generates plenty of personal pleasures, for researchers as well as for amateurs. A suggestive analogy for improving our understanding of the world, even the seemingly paradoxical quantum world, may be found in recent insight into how congenitally blind children and young adults learn to see, after having received successful eye surgery.
△ Less
Submitted 19 May, 2015;
originally announced May 2015.
-
Observation of the rare $B^0_s\toμ^+μ^-$ decay from the combined analysis of CMS and LHCb data
Authors:
The CMS,
LHCb Collaborations,
:,
V. Khachatryan,
A. M. Sirunyan,
A. Tumasyan,
W. Adam,
T. Bergauer,
M. Dragicevic,
J. Erö,
M. Friedl,
R. Frühwirth,
V. M. Ghete,
C. Hartl,
N. Hörmann,
J. Hrubec,
M. Jeitler,
W. Kiesenhofer,
V. Knünz,
M. Krammer,
I. Krätschmer,
D. Liko,
I. Mikulec,
D. Rabady,
B. Rahbaran
, et al. (2807 additional authors not shown)
Abstract:
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six sta…
▽ More
A joint measurement is presented of the branching fractions $B^0_s\toμ^+μ^-$ and $B^0\toμ^+μ^-$ in proton-proton collisions at the LHC by the CMS and LHCb experiments. The data samples were collected in 2011 at a centre-of-mass energy of 7 TeV, and in 2012 at 8 TeV. The combined analysis produces the first observation of the $B^0_s\toμ^+μ^-$ decay, with a statistical significance exceeding six standard deviations, and the best measurement of its branching fraction so far. Furthermore, evidence for the $B^0\toμ^+μ^-$ decay is obtained with a statistical significance of three standard deviations. The branching fraction measurements are statistically compatible with SM predictions and impose stringent constraints on several theories beyond the SM.
△ Less
Submitted 17 August, 2015; v1 submitted 17 November, 2014;
originally announced November 2014.
-
For-all Sparse Recovery in Near-Optimal Time
Authors:
Anna C. Gilbert,
Yi Li,
Ely Porat,
Martin J. Strauss
Abstract:
An approximate sparse recovery system in $\ell_1$ norm consists of parameters $k$, $ε$, $N$, an $m$-by-$N$ measurement $Φ$, and a recovery algorithm, $\mathcal{R}$. Given a vector, $\mathbf{x}$, the system approximates $x$ by $\widehat{\mathbf{x}} = \mathcal{R}(Φ\mathbf{x})$, which must satisfy $\|\widehat{\mathbf{x}}-\mathbf{x}\|_1 \leq (1+ε)\|\mathbf{x}-\mathbf{x}_k\|_1$. We consider the 'for al…
▽ More
An approximate sparse recovery system in $\ell_1$ norm consists of parameters $k$, $ε$, $N$, an $m$-by-$N$ measurement $Φ$, and a recovery algorithm, $\mathcal{R}$. Given a vector, $\mathbf{x}$, the system approximates $x$ by $\widehat{\mathbf{x}} = \mathcal{R}(Φ\mathbf{x})$, which must satisfy $\|\widehat{\mathbf{x}}-\mathbf{x}\|_1 \leq (1+ε)\|\mathbf{x}-\mathbf{x}_k\|_1$. We consider the 'for all' model, in which a single matrix $Φ$, possibly 'constructed' non-explicitly using the probabilistic method, is used for all signals $\mathbf{x}$. The best existing sublinear algorithm by Porat and Strauss (SODA'12) uses $O(ε^{-3} k\log(N/k))$ measurements and runs in time $O(k^{1-α}N^α)$ for any constant $α> 0$.
In this paper, we improve the number of measurements to $O(ε^{-2} k \log(N/k))$, matching the best existing upper bound (attained by super-linear algorithms), and the runtime to $O(k^{1+β}\textrm{poly}(\log N,1/ε))$, with a modest restriction that $ε\leq (\log k/\log N)^γ$, for any constants $β,γ> 0$. When $k\leq \log^c N$ for some $c>0$, the runtime is reduced to $O(k\textrm{poly}(N,1/ε))$. With no restrictions on $ε$, we have an approximation recovery system with $m = O(k/ε\log(N/k)((\log N/\log k)^γ+ 1/ε))$ measurements.
△ Less
Submitted 7 March, 2017; v1 submitted 7 February, 2014;
originally announced February 2014.
-
L2/L2-foreach sparse recovery with low risk
Authors:
Anna C. Gilbert,
Hung Q. Ngo,
Ely Porat,
Atri Rudra,
Martin J. Strauss
Abstract:
In this paper, we consider the "foreach" sparse recovery problem with failure probability $p$. The goal of which is to design a distribution over $m \times N$ matrices $Φ$ and a decoding algorithm $\algo$ such that for every $\vx\in\R^N$, we have the following error guarantee with probability at least $1-p$ \[\|\vx-\algo(Φ\vx)\|_2\le C\|\vx-\vx_k\|_2,\] where $C$ is a constant (ideally arbitrarily…
▽ More
In this paper, we consider the "foreach" sparse recovery problem with failure probability $p$. The goal of which is to design a distribution over $m \times N$ matrices $Φ$ and a decoding algorithm $\algo$ such that for every $\vx\in\R^N$, we have the following error guarantee with probability at least $1-p$ \[\|\vx-\algo(Φ\vx)\|_2\le C\|\vx-\vx_k\|_2,\] where $C$ is a constant (ideally arbitrarily close to 1) and $\vx_k$ is the best $k$-sparse approximation of $\vx$.
Much of the sparse recovery or compressive sensing literature has focused on the case of either $p = 0$ or $p = Ω(1)$. We initiate the study of this problem for the entire range of failure probability. Our two main results are as follows: \begin{enumerate} \item We prove a lower bound on $m$, the number measurements, of $Ω(k\log(n/k)+\log(1/p))$ for $2^{-Θ(N)}\le p <1$. Cohen, Dahmen, and DeVore \cite{CDD2007:NearOptimall2l2} prove that this bound is tight. \item We prove nearly matching upper bounds for \textit{sub-linear} time decoding. Previous such results addressed only $p = Ω(1)$. \end{enumerate}
Our results and techniques lead to the following corollaries: (i) the first ever sub-linear time decoding $\lolo$ "forall" sparse recovery system that requires a $\log^γ{N}$ extra factor (for some $γ<1$) over the optimal $O(k\log(N/k))$ number of measurements, and (ii) extensions of Gilbert et al. \cite{GHRSW12:SimpleSignals} results for information-theoretically bounded adversaries.
△ Less
Submitted 23 April, 2013;
originally announced April 2013.
-
Sublinear Time, Measurement-Optimal, Sparse Recovery For All
Authors:
Ely Porat,
Martin J. Strauss
Abstract:
An approximate sparse recovery system in ell_1 norm formally consists of parameters N, k, epsilon an m-by-N measurement matrix, Phi, and a decoding algorithm, D. Given a vector, x, where x_k denotes the optimal k-term approximation to x, the system approximates x by hat_x = D(Phi.x), which must satisfy
||hat_x - x||_1 <= (1+epsilon)||x - x_k||_1.
Among the goals in designing such systems are m…
▽ More
An approximate sparse recovery system in ell_1 norm formally consists of parameters N, k, epsilon an m-by-N measurement matrix, Phi, and a decoding algorithm, D. Given a vector, x, where x_k denotes the optimal k-term approximation to x, the system approximates x by hat_x = D(Phi.x), which must satisfy
||hat_x - x||_1 <= (1+epsilon)||x - x_k||_1.
Among the goals in designing such systems are minimizing m and the runtime of D. We consider the "forall" model, in which a single matrix Phi is used for all signals x.
All previous algorithms that use the optimal number m=O(k log(N/k)) of measurements require superlinear time Omega(N log(N/k)). In this paper, we give the first algorithm for this problem that uses the optimum number of measurements (up to a constant factor) and runs in sublinear time o(N) when k=o(N), assuming access to a data structure requiring space and preprocessing O(N).
△ Less
Submitted 14 July, 2011; v1 submitted 8 December, 2010;
originally announced December 2010.
-
Approximate Sparse Recovery: Optimizing Time and Measurements
Authors:
Anna C. Gilbert,
Yi Li,
Ely Porat,
Martin J. Strauss
Abstract:
An approximate sparse recovery system consists of parameters $k,N$, an $m$-by-$N$ measurement matrix, $Φ$, and a decoding algorithm, $\mathcal{D}$. Given a vector, $x$, the system approximates $x$ by $\widehat x =\mathcal{D}(Φx)$, which must satisfy $\| \widehat x - x\|_2\le C \|x - x_k\|_2$, where $x_k$ denotes the optimal $k$-term approximation to $x$. For each vector $x$, the system must succ…
▽ More
An approximate sparse recovery system consists of parameters $k,N$, an $m$-by-$N$ measurement matrix, $Φ$, and a decoding algorithm, $\mathcal{D}$. Given a vector, $x$, the system approximates $x$ by $\widehat x =\mathcal{D}(Φx)$, which must satisfy $\| \widehat x - x\|_2\le C \|x - x_k\|_2$, where $x_k$ denotes the optimal $k$-term approximation to $x$. For each vector $x$, the system must succeed with probability at least 3/4. Among the goals in designing such systems are minimizing the number $m$ of measurements and the runtime of the decoding algorithm, $\mathcal{D}$.
In this paper, we give a system with $m=O(k \log(N/k))$ measurements--matching a lower bound, up to a constant factor--and decoding time $O(k\log^c N)$, matching a lower bound up to $\log(N)$ factors.
We also consider the encode time (i.e., the time to multiply $Φ$ by $x$), the time to update measurements (i.e., the time to multiply $Φ$ by a 1-sparse $x$), and the robustness and stability of the algorithm (adding noise before and after the measurements). Our encode and update times are optimal up to $\log(N)$ factors.
△ Less
Submitted 1 December, 2009;
originally announced December 2009.
-
Combining geometry and combinatorics: A unified approach to sparse signal recovery
Authors:
R. Berinde,
A. C. Gilbert,
P. Indyk,
H. Karloff,
M. J. Strauss
Abstract:
There are two main algorithmic approaches to sparse signal recovery: geometric and combinatorial. The geometric approach starts with a geometric constraint on the measurement matrix and then uses linear programming to decode information about the signal from its measurements. The combinatorial approach constructs the measurement matrix and a combinatorial decoding algorithm to match. We present…
▽ More
There are two main algorithmic approaches to sparse signal recovery: geometric and combinatorial. The geometric approach starts with a geometric constraint on the measurement matrix and then uses linear programming to decode information about the signal from its measurements. The combinatorial approach constructs the measurement matrix and a combinatorial decoding algorithm to match. We present a unified approach to these two classes of sparse signal recovery algorithms.
The unifying elements are the adjacency matrices of high-quality unbalanced expanders. We generalize the notion of Restricted Isometry Property (RIP), crucial to compressed sensing results for signal recovery, from the Euclidean norm to the l_p norm for p about 1, and then show that unbalanced expanders are essentially equivalent to RIP-p matrices.
From known deterministic constructions for such matrices, we obtain new deterministic measurement matrix constructions and algorithms for signal recovery which, compared to previous deterministic algorithms, are superior in either the number of measurements or in noise tolerance.
△ Less
Submitted 29 April, 2008;
originally announced April 2008.
-
Private Approximate Heavy Hitters
Authors:
Martin J. Strauss,
Xuan Zheng
Abstract:
We consider the problem of private computation of approximate Heavy Hitters. Alice and Bob each hold a vector and, in the vector sum, they want to find the B largest values along with their indices. While the exact problem requires linear communication, protocols in the literature solve this problem approximately using polynomial computation time, polylogarithmic communication, and constantly ma…
▽ More
We consider the problem of private computation of approximate Heavy Hitters. Alice and Bob each hold a vector and, in the vector sum, they want to find the B largest values along with their indices. While the exact problem requires linear communication, protocols in the literature solve this problem approximately using polynomial computation time, polylogarithmic communication, and constantly many rounds. We show how to solve the problem privately with comparable cost, in the sense that nothing is learned by Alice and Bob beyond what is implied by their input, the ideal top-B output, and goodness of approximation (equivalently, the Euclidean norm of the vector sum). We give lower bounds showing that the Euclidean norm must leak by any efficient algorithm.
△ Less
Submitted 29 September, 2006;
originally announced September 2006.
-
Algorithmic linear dimension reduction in the l_1 norm for sparse vectors
Authors:
A. C. Gilbert,
M. J. Strauss,
J. A. Tropp,
R. Vershynin
Abstract:
This paper develops a new method for recovering m-sparse signals that is simultaneously uniform and quick. We present a reconstruction algorithm whose run time, O(m log^2(m) log^2(d)), is sublinear in the length d of the signal. The reconstruction error is within a logarithmic factor (in m) of the optimal m-term approximation error in l_1. In particular, the algorithm recovers m-sparse signals p…
▽ More
This paper develops a new method for recovering m-sparse signals that is simultaneously uniform and quick. We present a reconstruction algorithm whose run time, O(m log^2(m) log^2(d)), is sublinear in the length d of the signal. The reconstruction error is within a logarithmic factor (in m) of the optimal m-term approximation error in l_1. In particular, the algorithm recovers m-sparse signals perfectly and noisy signals are recovered with polylogarithmic distortion. Our algorithm makes O(m log^2 (d)) measurements, which is within a logarithmic factor of optimal. We also present a small-space implementation of the algorithm. These sketching techniques and the corresponding reconstruction algorithms provide an algorithmic dimension reduction in the l_1 norm. In particular, vectors of support m in dimension d can be linearly embedded into O(m log^2 d) dimensions with polylogarithmic distortion. We can reconstruct a vector from its low-dimensional sketch in time O(m log^2(m) log^2(d)). Furthermore, this reconstruction is stable and robust under small perturbations.
△ Less
Submitted 18 August, 2006;
originally announced August 2006.
-
List decoding of noisy Reed-Muller-like codes
Authors:
A. R. Calderbank,
Anna C. Gilbert,
Martin J. Strauss
Abstract:
First- and second-order Reed-Muller (RM(1) and RM(2), respectively) codes are two fundamental error-correcting codes which arise in communication as well as in probabilistically-checkable proofs and learning. In this paper, we take the first steps toward extending the quick randomized decoding tools of RM(1) into the realm of quadratic binary and, equivalently, Z_4 codes. Our main algorithmic re…
▽ More
First- and second-order Reed-Muller (RM(1) and RM(2), respectively) codes are two fundamental error-correcting codes which arise in communication as well as in probabilistically-checkable proofs and learning. In this paper, we take the first steps toward extending the quick randomized decoding tools of RM(1) into the realm of quadratic binary and, equivalently, Z_4 codes. Our main algorithmic result is an extension of the RM(1) techniques from Goldreich-Levin and Kushilevitz-Mansour algorithms to the Hankel code, a code between RM(1) and RM(2). That is, given signal s of length N, we find a list that is a superset of all Hankel codewords phi with dot product to s at least (1/sqrt(k)) times the norm of s, in time polynomial in k and log(N). We also give a new and simple formulation of a known Kerdock code as a subcode of the Hankel code. As a corollary, we can list-decode Kerdock, too. Also, we get a quick algorithm for finding a sparse Kerdock approximation. That is, for k small compared with 1/sqrt{N} and for epsilon > 0, we find, in time polynomial in (k log(N)/epsilon), a k-Kerdock-term approximation s~ to s with Euclidean error at most the factor (1+epsilon+O(k^2/sqrt{N})) times that of the best such approximation.
△ Less
Submitted 2 August, 2006; v1 submitted 20 July, 2006;
originally announced July 2006.
-
Networks of strong ties
Authors:
Xiaolin Shi,
Lada A. Adamic,
Martin J. Strauss
Abstract:
Social networks transmitting covert or sensitive information cannot use all ties for this purpose. Rather, they can only use a subset of ties that are strong enough to be ``trusted''. In this paper we consider transitivity as evidence of strong ties, requiring that each tie can only be used if the individuals on either end also share at least one other contact in common. We examine the effect of…
▽ More
Social networks transmitting covert or sensitive information cannot use all ties for this purpose. Rather, they can only use a subset of ties that are strong enough to be ``trusted''. In this paper we consider transitivity as evidence of strong ties, requiring that each tie can only be used if the individuals on either end also share at least one other contact in common. We examine the effect of removing all non-transitive ties in two real social network data sets. We observe that although some individuals become disconnected, a giant connected component remains, with an average shortest path only slightly longer than that of the original network. We also evaluate the cost of forming transitive ties by deriving the conditions for the emergence and the size of the giant component in a random graph composed entirely of closed triads and the equivalent Erdos-Renyi random graph.
△ Less
Submitted 10 May, 2006;
originally announced May 2006.
-
User-Relative Names for Globally Connected Personal Devices
Authors:
Bryan Ford,
Jacob Strauss,
Chris Lesniewski-Laas,
Sean Rhea,
Frans Kaashoek,
Robert Morris
Abstract:
Nontechnical users who own increasingly ubiquitous network-enabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to-peer connectivity architecture addressing this need. Users assign UIA names by "introducing" dev…
▽ More
Nontechnical users who own increasingly ubiquitous network-enabled personal devices such as laptops, digital cameras, and smart phones need a simple, intuitive, and secure way to share information and services between their devices. User Information Architecture, or UIA, is a novel naming and peer-to-peer connectivity architecture addressing this need. Users assign UIA names by "introducing" devices to each other on a common local-area network, but these names remain securely bound to their target as devices migrate. Multiple devices owned by the same user, once introduced, automatically merge their namespaces to form a distributed "personal cluster" that the owner can access or modify from any of his devices. Instead of requiring users to allocate globally unique names from a central authority, UIA enables users to assign their own "user-relative" names both to their own devices and to other users. With UIA, for example, Alice can always access her iPod from any of her own personal devices at any location via the name "ipod", and her friend Bob can access her iPod via a relative name like "ipod.Alice".
△ Less
Submitted 18 March, 2006;
originally announced March 2006.