-
Optimizing Information Access in Networks via Edge Augmentation
Authors:
Aditya Bhaskara,
Alex Crane,
Md Mumtahin Habib Ullah Mazumder,
Blair D. Sullivan,
Prasanth Yalamanchili
Abstract:
Given a graph $G = (V, E)$ and a model of information flow on that network, a fundamental question is to understand if all the nodes have sufficient access to information generated at other nodes in the graph. If not, we can ask if a small set of edge additions improve information access. Formally, the broadcast value of a network is defined to be the minimum over pairs $u,v \in V$ of the probabil…
▽ More
Given a graph $G = (V, E)$ and a model of information flow on that network, a fundamental question is to understand if all the nodes have sufficient access to information generated at other nodes in the graph. If not, we can ask if a small set of edge additions improve information access. Formally, the broadcast value of a network is defined to be the minimum over pairs $u,v \in V$ of the probability that an information cascade starting at $u$ reaches $v$. Recent work in the algorithmic fairness literature has focused on heuristics for adding a few edges to a graph to improve its broadcast. Our goal is to formally study the approximability of the Broadcast Improvement problem: given $G$ and a parameter $k$, find the best set of $k$ edges to add to $G$ in order to maximize the broadcast value of the resulting graph.
We develop efficient bicriteria approximation algorithms. If the optimal solution adds $k$ edges and achieves a broadcast of $β^*$, we develop algorithms that can (a) add $2k-1$ edges and achieve a broadcast value roughly $(β^*)^4$, or (b) add $O(k\log n)$ edges and achieve a broadcast roughly $β^*$. We also provide other trade-offs, that can be better depending on $k$ and the parameter associated with propagation in the cascade model. We complement our results by proving that unless P = NP, any algorithm that adds $O(k)$ edges must lose significantly in the approximation of $β^*$, resolving an open question.
Our techniques are inspired by connections between Broadcast Improvement and problems such as Metric $k$-Center and Diameter Reduction. However, since the objective involves information cascades, we need to develop novel probabilistic tools to reason about the existence of paths in edge-sampled graphs. Finally, we show that our techniques extend to a single-source variant, for which we show both bicriteria algorithms and inapproximability results.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Leveraging Fixed-Parameter Tractability for Robot Inspection Planning
Authors:
Yosuke Mizutani,
Daniel Coimbra Salomao,
Alex Crane,
Matthias Bentert,
Pål Grønås Drange,
Felix Reidl,
Alan Kuntz,
Blair D. Sullivan
Abstract:
Autonomous robotic inspection, where a robot moves through its environment and inspects points of interest, has applications in industrial settings, structural health monitoring, and medicine. Planning the paths for a robot to safely and efficiently perform such an inspection is an extremely difficult algorithmic challenge. In this work we consider an abstraction of the inspection planning problem…
▽ More
Autonomous robotic inspection, where a robot moves through its environment and inspects points of interest, has applications in industrial settings, structural health monitoring, and medicine. Planning the paths for a robot to safely and efficiently perform such an inspection is an extremely difficult algorithmic challenge. In this work we consider an abstraction of the inspection planning problem which we term Graph Inspection. We give two exact algorithms for this problem, using dynamic programming and integer linear programming. We analyze the performance of these methods, and present multiple approaches to achieve scalability. We demonstrate significant improvement both in path weight and inspection coverage over a state-of-the-art approach on two robotics tasks in simulation, a bridge inspection task by a UAV and a surgical inspection task using a medical robot.
△ Less
Submitted 28 June, 2024;
originally announced July 2024.
-
AlN/Si interface engineering to mitigate RF losses in MOCVD grown GaN-on-Si substrates
Authors:
Pieter Cardinael,
Sachin Yadav,
Herwig Hahn,
Ming Zhao,
Sourish Banerjee,
Babak Kazemi Esfeh,
Christof Mauder,
Barry O Sullivan,
Uthayasankaran Peralagu,
Anurag Vohra,
Robert Langer,
Nadine Collaert,
Bertrand Parvais,
Jean-Pierre Raskin
Abstract:
Fabrication of low-RF loss GaN-on-Si HEMT stacks is critical to enable competitive front-end-modules for 5G and 6G applications. The main contribution to RF losses is the interface between the III-N layer and the HR Si wafer, more specifically the AlN/Si interface. At this interface, a parasitic surface conduction layer exists in Si, which decreases the substrate effective resistivity sensed by ov…
▽ More
Fabrication of low-RF loss GaN-on-Si HEMT stacks is critical to enable competitive front-end-modules for 5G and 6G applications. The main contribution to RF losses is the interface between the III-N layer and the HR Si wafer, more specifically the AlN/Si interface. At this interface, a parasitic surface conduction layer exists in Si, which decreases the substrate effective resistivity sensed by overlying circuitry below the nominal Si resistivity. However, a clear understanding of this interface with control of the parasitic channel is lacking. In this letter, a detailed physical and electrical description of MOCVD-grown AlN/Si structures is presented. The presence of a $\text{SiC}_\text{x}\text{N}_\text{y}$ interfacial layer is revealed and its importance for RF losses is shown. Through C-V and I-V characterisation, an increase in the C concentration of this interfacial layer is linked to the formation of negative charge at the AlN/Si interface, which counteracts the positive charge present in the 0-predose limit. The variation of TMAl predose is shown to allow precise tuning of the C composition and, consequently, the resulting interface charge. Notably, a linear relationship between predose and net interface charge is observed and confirmed by the fabrication of an AlN/Si sample with close to zero net charge. In addition, a higher $D_{it}$ ($\sim 2\times 10^{12}$ cm$^\text{-2}$) for such compensated samples is observed and can contribute to low RF loss. An exceptionally high effective resistivity of above 8 k$Ω\cdot$cm is achieved, corresponding to an RF loss below 0.3 dB/mm at 10 GHz.
△ Less
Submitted 4 April, 2024; v1 submitted 3 April, 2024;
originally announced April 2024.
-
Are you Struggling? Dataset and Baselines for Struggle Determination in Assembly Videos
Authors:
Shijia Feng,
Michael Wray,
Brian Sullivan,
Youngkyoon Jang,
Casimir Ludwig,
Iain Gilchrist,
Walterio Mayol-Cuevas
Abstract:
Determining when people are struggling from video enables a finer-grained understanding of actions and opens opportunities for building intelligent support visual interfaces. In this paper, we present a new dataset with three assembly activities and corresponding performance baselines for the determination of struggle from video. Three real-world problem-solving activities including assembling plu…
▽ More
Determining when people are struggling from video enables a finer-grained understanding of actions and opens opportunities for building intelligent support visual interfaces. In this paper, we present a new dataset with three assembly activities and corresponding performance baselines for the determination of struggle from video. Three real-world problem-solving activities including assembling plumbing pipes (Pipes-Struggle), pitching cam** tents (Tent-Struggle) and solving the Tower of Hanoi puzzle (Tower-Struggle) are introduced. Video segments were scored w.r.t. the level of struggle as perceived by annotators using a forced choice 4-point scale. Each video segment was annotated by a single expert annotator in addition to crowd-sourced annotations. The dataset is the first struggle annotation dataset and contains 5.1 hours of video and 725,100 frames from 73 participants in total. We evaluate three decision-making tasks: struggle classification, struggle level regression, and struggle label distribution learning. We provide baseline results for each of the tasks utilising several mainstream deep neural networks, along with an ablation study and visualisation of results. Our work is motivated toward assistive systems that analyze struggle, support users during manual activities and encourage learning, as well as other video understanding competencies.
△ Less
Submitted 28 February, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
Autonomous Emergency Braking With Driver-In-The-Loop: Torque Vectoring for Active Learning
Authors:
Benjamin Sullivan,
**g**g Jiang,
Georgios Mavros,
Wen-Hua Chen
Abstract:
Autonomous Emergency Braking (AEB) potentially brings significant improvements in automotive safety due to its ability to autonomously prevent collisions in situations where the driver may not be able to do so. Driven by the poor performance of the state of the art in recent testing, this work provides an online solution to identify critical parameters such as the current and maximum friction coef…
▽ More
Autonomous Emergency Braking (AEB) potentially brings significant improvements in automotive safety due to its ability to autonomously prevent collisions in situations where the driver may not be able to do so. Driven by the poor performance of the state of the art in recent testing, this work provides an online solution to identify critical parameters such as the current and maximum friction coefficients. The method introduced here, namely Torque Vectoring for Active Learning (TVAL), can perform state and parameter estimation whilst following the driver's input. Importantly with less power requirements than normal driving. Our method is designed with a crucial focus on ensuring minimal disruption to the driver, allowing them to maintain full control of the vehicle. Additionally, we exploit a rain/light sensor to drive the observer resampling to maintain estimation certainty across prolonged operation. Then a scheme to modulate TVAL is introduced that considers powertrain efficiency, safety, and availability in an online fashion. Using a high-fidelity vehicle model and drive cycle we demonstrate the functionality of TVAL controller across changing road surfaces where we successfully identify the road surface whenever possible.
△ Less
Submitted 7 June, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
Correlation Clustering with Vertex Splitting
Authors:
Matthias Bentert,
Alex Crane,
Pål Grønås Drange,
Felix Reidl,
Blair D. Sullivan
Abstract:
We explore Cluster Editing and its generalization Correlation Clustering with a new operation called permissive vertex splitting which addresses finding overlap** clusters in the face of uncertain information. We determine that both problems are NP-hard, yet they exhibit significant differences in parameterized complexity and approximability. For Cluster Editing with Permissive Vertex Splitting,…
▽ More
We explore Cluster Editing and its generalization Correlation Clustering with a new operation called permissive vertex splitting which addresses finding overlap** clusters in the face of uncertain information. We determine that both problems are NP-hard, yet they exhibit significant differences in parameterized complexity and approximability. For Cluster Editing with Permissive Vertex Splitting, we show a polynomial kernel when parameterized by the solution size and develop a polynomial-time algorithm with approximation factor 7. In the case of Correlation Clustering, we establish para-NP-hardness when parameterized by solution size and demonstrate that computing an $n^{1-ε}$-approximation is NP-hard for any constant $ε> 0$. Additionally, we extend the established link between Correlation Clustering and Multicut to the setting with permissive vertex splitting.
△ Less
Submitted 15 February, 2024;
originally announced February 2024.
-
Open Problems in (Hyper)Graph Decomposition
Authors:
Deepak Ajwani,
Rob H. Bisseling,
Katrin Casel,
Ümit V. Çatalyürek,
Cédric Chevalier,
Florian Chudigiewitsch,
Marcelo Fonseca Faraj,
Michael Fellows,
Lars Gottesbüren,
Tobias Heuer,
George Karypis,
Kamer Kaya,
Jakub Lacki,
Johannes Langguth,
Xiaoye Sherry Li,
Ruben Mayer,
Johannes Meintrup,
Yosuke Mizutani,
François Pellegrini,
Fabrizio Petrini,
Frances Rosamond,
Ilya Safro,
Sebastian Schlag,
Christian Schulz,
Roohani Sharma
, et al. (4 additional authors not shown)
Abstract:
Large networks are useful in a wide range of applications. Sometimes problem instances are composed of billions of entities. Decomposing and analyzing these structures helps us gain new insights about our surroundings. Even if the final application concerns a different problem (such as traversal, finding paths, trees, and flows), decomposing large graphs is often an important subproblem for comple…
▽ More
Large networks are useful in a wide range of applications. Sometimes problem instances are composed of billions of entities. Decomposing and analyzing these structures helps us gain new insights about our surroundings. Even if the final application concerns a different problem (such as traversal, finding paths, trees, and flows), decomposing large graphs is often an important subproblem for complexity reduction or parallelization. This report is a summary of discussions that happened at Dagstuhl seminar 23331 on "Recent Trends in Graph Decomposition" and presents currently open problems and future directions in the area of (hyper)graph decomposition.
△ Less
Submitted 18 October, 2023;
originally announced October 2023.
-
An Exploration-Exploitation Approach to Anti-lock Brake Systems
Authors:
Benjamin Sullivan,
**g**g Jiang,
Georgios Mavros,
Wen-Hua Chen
Abstract:
Anti-lock Brake System (ABS) is a mandatory active safety feature on road vehicles with analogous systems for aircraft and locomotives. This feature aims to prevent locking of the wheels when braking and to improve the handling performance, as well as reduce stop** distance of the vehicle. Estimation uncertainties in the vehicle state and environment (road surface) are often neglected or handled…
▽ More
Anti-lock Brake System (ABS) is a mandatory active safety feature on road vehicles with analogous systems for aircraft and locomotives. This feature aims to prevent locking of the wheels when braking and to improve the handling performance, as well as reduce stop** distance of the vehicle. Estimation uncertainties in the vehicle state and environment (road surface) are often neglected or handled separately from the ABS controller, leading to sub-optimal braking. In this paper, a Dual Control for Exploration-Exploitation (DCEE) approach is taken toward the ABS problem which achieves both accurate state (and environment) estimation and superior braking performance. Compared with popular Extremum Seeking methods, improvements of up to $15\%$ and $8.5\%$ are shown in stop** time and stop** distance, respectively. A Regularized Particle Filter with Markov Chain Monte Carlo step is used to estimate vehicle states and parameters of the Magic Formula tyre model that includes the peak friction coefficient for the environment. The effectiveness of the DCEE approach is demonstrated across a range of driving scenarios such as low and high speeds; snow, wet and dry roads and changing road surfaces.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
Overlap** and Robust Edge-Colored Clustering in Hypergraphs
Authors:
Alex Crane,
Brian Lavallee,
Blair D. Sullivan,
Nate Veldt
Abstract:
A recent trend in data mining has explored (hyper)graph clustering algorithms for data with categorical relationship types. Such algorithms have applications in the analysis of social, co-authorship, and protein interaction networks, to name a few. Many such applications naturally have some overlap between clusters, a nuance which is missing from current combinatorial models. Additionally, existin…
▽ More
A recent trend in data mining has explored (hyper)graph clustering algorithms for data with categorical relationship types. Such algorithms have applications in the analysis of social, co-authorship, and protein interaction networks, to name a few. Many such applications naturally have some overlap between clusters, a nuance which is missing from current combinatorial models. Additionally, existing models lack a mechanism for handling noise in datasets. We address these concerns by generalizing Edge-Colored Clustering, a recent framework for categorical clustering of hypergraphs. Our generalizations allow for a budgeted number of either (a) overlap** cluster assignments or (b) node deletions. For each new model we present a greedy algorithm which approximately minimizes an edge mistake objective, as well as bicriteria approximations where the second approximation factor is on the budget. Additionally, we address the parameterized complexity of each problem, providing FPT algorithms and hardness results.
△ Less
Submitted 5 January, 2024; v1 submitted 27 May, 2023;
originally announced May 2023.
-
Coronal Heating as Determined by the Solar Flare Frequency Distribution Obtained by Aggregating Case Studies
Authors:
James Paul Mason,
Alexandra Werth,
Colin G. West,
Allison A. Youngblood,
Donald L. Woodraska,
Courtney Peck,
Kevin Lacjak,
Florian G. Frick,
Moutamen Gabir,
Reema A. Alsinan,
Thomas Jacobsen,
Mohammad Alrubaie,
Kayla M. Chizmar,
Benjamin P. Lau,
Lizbeth Montoya Dominguez,
David Price,
Dylan R. Butler,
Connor J. Biron,
Nikita Feoktistov,
Kai Dewey,
N. E. Loomis,
Michal Bodzianowski,
Connor Kuybus,
Henry Dietrick,
Aubrey M. Wolfe
, et al. (977 additional authors not shown)
Abstract:
Flare frequency distributions represent a key approach to addressing one of the largest problems in solar and stellar physics: determining the mechanism that counter-intuitively heats coronae to temperatures that are orders of magnitude hotter than the corresponding photospheres. It is widely accepted that the magnetic field is responsible for the heating, but there are two competing mechanisms th…
▽ More
Flare frequency distributions represent a key approach to addressing one of the largest problems in solar and stellar physics: determining the mechanism that counter-intuitively heats coronae to temperatures that are orders of magnitude hotter than the corresponding photospheres. It is widely accepted that the magnetic field is responsible for the heating, but there are two competing mechanisms that could explain it: nanoflares or Alfvén waves. To date, neither can be directly observed. Nanoflares are, by definition, extremely small, but their aggregate energy release could represent a substantial heating mechanism, presuming they are sufficiently abundant. One way to test this presumption is via the flare frequency distribution, which describes how often flares of various energies occur. If the slope of the power law fitting the flare frequency distribution is above a critical threshold, $α=2$ as established in prior literature, then there should be a sufficient abundance of nanoflares to explain coronal heating. We performed $>$600 case studies of solar flares, made possible by an unprecedented number of data analysts via three semesters of an undergraduate physics laboratory course. This allowed us to include two crucial, but nontrivial, analysis methods: pre-flare baseline subtraction and computation of the flare energy, which requires determining flare start and stop times. We aggregated the results of these analyses into a statistical study to determine that $α= 1.63 \pm 0.03$. This is below the critical threshold, suggesting that Alfvén waves are an important driver of coronal heating.
△ Less
Submitted 9 May, 2023;
originally announced May 2023.
-
Hybrid THz architectures for molecular polaritonics
Authors:
Ahmed Jaber,
Michael Reitz,
Avinash Singh,
Ali Maleki,
Yongbao Xin,
Brian Sullivan,
Ksenia Dolgaleva,
Robert W. Boyd,
Claudiu Genes,
Jean-Michel Ménard
Abstract:
Physical and chemical properties of materials can be modified by a resonant optical mode. Such recent demonstrations have mostly relied on a planar cavity geometry, others have relied on a plasmonic resonator. However, the combination of these two device architectures have remained largely unexplored, especially in the context of maximizing light-matter interactions. Here, we investigate several s…
▽ More
Physical and chemical properties of materials can be modified by a resonant optical mode. Such recent demonstrations have mostly relied on a planar cavity geometry, others have relied on a plasmonic resonator. However, the combination of these two device architectures have remained largely unexplored, especially in the context of maximizing light-matter interactions. Here, we investigate several schemes of electromagnetic field confinement aimed at facilitating the collective coupling of a localized photonic mode to molecular vibrations in the terahertz region. The key aspects are the use of metasurface plasmonic structures combined with standard Fabry-Perot configurations and the deposition of a thin layer of glucose, via a spray coating technique, within a tightly focused electromagnetic mode volume. More importantly, we demonstrate enhanced vacuum Rabi splittings reaching up to 200 GHz when combining plasmonic resonances, photonic cavity modes and low-energy molecular resonances. Furthermore, we demonstrate how a cavity mode can be utilized to enhance the zero-point electric field amplitude of a plasmonic resonator. Our study provides key insight into the design of polaritonic platforms with organic molecules to harvest the unique properties of hybrid light-matter states.
△ Less
Submitted 25 May, 2024; v1 submitted 7 April, 2023;
originally announced April 2023.
-
Reducing Access Disparities in Networks using Edge Augmentation
Authors:
Ashkan Bashardoust,
Sorelle A. Friedler,
Carlos E. Scheidegger,
Blair D. Sullivan,
Suresh Venkatasubramanian
Abstract:
In social networks, a node's position is a form of \it{social capital}. Better-positioned members not only benefit from (faster) access to diverse information, but innately have more potential influence on information spread. Structural biases often arise from network formation, and can lead to significant disparities in information access based on position. Further, processes such as link recomme…
▽ More
In social networks, a node's position is a form of \it{social capital}. Better-positioned members not only benefit from (faster) access to diverse information, but innately have more potential influence on information spread. Structural biases often arise from network formation, and can lead to significant disparities in information access based on position. Further, processes such as link recommendation can exacerbate this inequality by relying on network structure to augment connectivity.
We argue that one can understand and quantify this social capital through the lens of information flow in the network. We consider the setting where all nodes may be sources of distinct information, and a node's (dis)advantage deems its ability to access all information available on the network. We introduce three new measures of advantage (broadcast, influence, and control), which are quantified in terms of position in the network using \it{access signatures} -- vectors that represent a node's ability to share information. We then consider the problem of improving equity by making interventions to increase the access of the least-advantaged nodes. We argue that edge augmentation is most appropriate for mitigating bias in the network structure, and frame a budgeted intervention problem for maximizing minimum pairwise access.
Finally, we propose heuristic strategies for selecting edge augmentations and empirically evaluate their performance on a corpus of real-world social networks. We demonstrate that a small number of interventions significantly increase the broadcast measure of access for the least-advantaged nodes (over 5 times more than random), and also improve the minimum influence. Additional analysis shows that these interventions can also dramatically shrink the gap in advantage between nodes (over \%82) and reduce disparities between their access signatures.
△ Less
Submitted 15 September, 2022;
originally announced September 2022.
-
Metamaterial-based octave-wide terahertz bandpass filters
Authors:
Ali Maleki,
Avinash Singh,
Ahmed Jaber,
Wei Cui,
Yongbao Xin,
Brian T. Sullivan,
Robert W. Boyd,
Jean-Michel Menard
Abstract:
We present octave-wide bandpass filters in the terahertz (THz) region based on bilayer-metamaterial (BLMM) structures. The passband region has a super-Gaussian shape with a maximum transmittance approaching 70% and a typical stopband rejection of 20 dB. The design is based on a metasurface consisting of a metallic square-hole array deposited on a transparent polymer, which is stacked on top of an…
▽ More
We present octave-wide bandpass filters in the terahertz (THz) region based on bilayer-metamaterial (BLMM) structures. The passband region has a super-Gaussian shape with a maximum transmittance approaching 70% and a typical stopband rejection of 20 dB. The design is based on a metasurface consisting of a metallic square-hole array deposited on a transparent polymer, which is stacked on top of an identical metasurface with a sub-wavelength separation. The superimposed metasurface structures were designed using finite-difference time-domain (FDTD) simulations and fabricated using a photolithography process. Experimental characterization of these structures between 0.3 to 5.8 THz is performed with a time-domain THz spectroscopy system. Good agreement between experiment and simulation results is observed. We also demonstrate that two superimposed BLMM (2BLMM) devices increase the steepness of the roll-offs to more than 85 dB/octave and enable a superior stopband rejection approaching 40 dB while the maximum transmittance remains above 64%. This work paves the way toward new THz applications, including the detection of THz pulses centered at specific frequencies, and an enhanced time-resolved detection sensitivity towards molecular vibrations that are noise dominated by a strong, off-resonant, driving field.
△ Less
Submitted 17 August, 2022;
originally announced August 2022.
-
Improved Parameterized Complexity of Happy Set Problems
Authors:
Yosuke Mizutani,
Blair D. Sullivan
Abstract:
We present fixed-parameter tractable (FPT) algorithms for two problems, Maximum Happy Set (MaxHS) and Maximum Edge Happy Set (MaxEHS)--also known as Densest k-Subgraph. Given a graph $G$ and an integer $k$, MaxHS asks for a set $S$ of $k$ vertices such that the number of $\textit{happy vertices}$ with respect to $S$ is maximized, where a vertex $v$ is happy if $v$ and all its neighbors are in $S$.…
▽ More
We present fixed-parameter tractable (FPT) algorithms for two problems, Maximum Happy Set (MaxHS) and Maximum Edge Happy Set (MaxEHS)--also known as Densest k-Subgraph. Given a graph $G$ and an integer $k$, MaxHS asks for a set $S$ of $k$ vertices such that the number of $\textit{happy vertices}$ with respect to $S$ is maximized, where a vertex $v$ is happy if $v$ and all its neighbors are in $S$. We show that MaxHS can be solved in time $\mathcal{O}\left(2^\textsf{mw} \cdot \textsf{mw} \cdot k^2 \cdot |V(G)|\right)$ and $\mathcal{O}\left(8^\textsf{cw} \cdot k^2 \cdot |V(G)|\right)$, where $\textsf{mw}$ and $\textsf{cw}$ denote the $\textit{modular-width}$ and the $\textit{clique-width}$ of $G$, respectively. This resolves the open questions posed in literature. The MaxEHS problem is an edge-variant of MaxHS, where we maximize the number of $\textit{happy edges}$, the edges whose endpoints are in $S$. In this paper we show that MaxEHS can be solved in time $f(\textsf{nd})\cdot|V(G)|^{\mathcal{O}(1)}$ and $\mathcal{O}\left(2^{\textsf{cd}}\cdot k^2 \cdot |V(G)|\right)$, where $\textsf{nd}$ and $\textsf{cd}$ denote the $\textit{neighborhood diversity}$ and the $\textit{cluster deletion number}$ of $G$, respectively, and $f$ is some computable function. This result implies that MaxEHS is also fixed-parameter tractable by $\textit{twin cover number}$.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Faster Decomposition of Weighted Graphs into Cliques using Fisher's Inequality
Authors:
Shweta Jain,
Yosuke Mizutani,
Blair Sullivan
Abstract:
Mining groups of genes that consistently co-express is an important problem in biomedical research, where it is critical for applications such as drug-repositioning and designing new disease treatments. Recently, Cooley et al. modeled this problem as Exact Weighted Clique Decomposition (EWCD) in which, given an edge-weighted graph $G$ and a positive integer $k$, the goal is to decompose $G$ into a…
▽ More
Mining groups of genes that consistently co-express is an important problem in biomedical research, where it is critical for applications such as drug-repositioning and designing new disease treatments. Recently, Cooley et al. modeled this problem as Exact Weighted Clique Decomposition (EWCD) in which, given an edge-weighted graph $G$ and a positive integer $k$, the goal is to decompose $G$ into at most $k$ (overlap**) weighted cliques so that an edge's weight is exactly equal to the sum of weights for cliques it participates in. They show EWCD is fixed-parameter-tractable, giving a $4^k$-kernel alongside a backtracking algorithm (together called cricca) to iteratively build a decomposition. Unfortunately, because of inherent exponential growth in the space of potential solutions, cricca is typically able to decompose graphs only when $k \leq 11$.
In this work, we establish reduction rules that exponentially decrease the size of the kernel (from $4^k$ to $k2^k$) for EWCD. In addition, we use insights about the structure of potential solutions to give new search rules that speed up the decomposition algorithm. At the core of our techniques is a result from combinatorial design theory called Fisher's inequality characterizing set systems with restricted intersections. We deploy our kernelization and decomposition algorithms (together called DeCAF) on a corpus of biologically-inspired data and obtain over two orders of magnitude speed-up over cricca. As a result, DeCAF scales to instances with $k \geq 17$.
△ Less
Submitted 16 June, 2022; v1 submitted 15 June, 2022;
originally announced June 2022.
-
Parameterized Complexity of Gerrymandering
Authors:
Andrew Fraser,
Brian Lavallee,
Blair D. Sullivan
Abstract:
In a representative democracy, the electoral process involves partitioning geographical space into districts which each elect a single representative. These representatives craft and vote on legislation, incentivizing political parties to win as many districts as possible (ideally a plurality). Gerrymandering is the process by which district boundaries are manipulated to the advantage of a desired…
▽ More
In a representative democracy, the electoral process involves partitioning geographical space into districts which each elect a single representative. These representatives craft and vote on legislation, incentivizing political parties to win as many districts as possible (ideally a plurality). Gerrymandering is the process by which district boundaries are manipulated to the advantage of a desired candidate or party. We study the parameterized complexity of Gerrymandering, a graph problem (as opposed to Euclidean space) formalized by Cohen-Zemach et al. (AAMAS 2018) and Ito et al. (AAMAS 2019) where districts partition vertices into connected subgraphs. We prove that Unit Weight Gerrymandering is W[2]-hard on trees (even when the depth is two) with respect to the number of districts $k$. Moreover, we show that Unit Weight Gerrymandering remains W[2]-hard in trees with $\ell$ leaves with respect to the combined parameter $k+\ell$. In contrast, Gupta et al. (SAGT 2021) give an FPT algorithm for Gerrymandering on paths with respect to $k$. To complement our results and fill this gap, we provide an algorithm to solve Gerrymandering that is FPT in $k$ when $\ell$ is a fixed constant.
△ Less
Submitted 7 December, 2023; v1 submitted 13 May, 2022;
originally announced May 2022.
-
Zhuyi: Perception Processing Rate Estimation for Safety in Autonomous Vehicles
Authors:
Yu-Shun Hsiao,
Siva Kumar Sastry Hari,
Michał Filipiuk,
Timothy Tsai,
Michael B. Sullivan,
Vijay Janapa Reddi,
Vasu Singh,
Stephen W. Keckler
Abstract:
The processing requirement of autonomous vehicles (AVs) for high-accuracy perception in complex scenarios can exceed the resources offered by the in-vehicle computer, degrading safety and comfort. This paper proposes a sensor frame processing rate (FPR) estimation model, Zhuyi, that quantifies the minimum safe FPR continuously in a driving scenario. Zhuyi can be employed post-deployment as an onli…
▽ More
The processing requirement of autonomous vehicles (AVs) for high-accuracy perception in complex scenarios can exceed the resources offered by the in-vehicle computer, degrading safety and comfort. This paper proposes a sensor frame processing rate (FPR) estimation model, Zhuyi, that quantifies the minimum safe FPR continuously in a driving scenario. Zhuyi can be employed post-deployment as an online safety check and to prioritize work. Experiments conducted using a multi-camera state-of-the-art industry AV system show that Zhuyi's estimated FPRs are conservative, yet the system can maintain safety by processing only 36% or fewer frames compared to a default 30-FPR system in the tested scenarios.
△ Less
Submitted 6 May, 2022;
originally announced May 2022.
-
Minimizing Congestion for Balanced Dominators
Authors:
Yosuke Mizutani,
Annie Staker,
Blair D. Sullivan
Abstract:
A primary challenge in metagenomics is reconstructing individual microbial genomes from the mixture of short fragments created by sequencing. Recent work leverages the sparsity of the assembly graph to find $r$-dominating sets which enable rapid approximate queries through a dominator-centric graph partition. In this paper, we consider two problems related to reducing uncertainty and improving sca…
▽ More
A primary challenge in metagenomics is reconstructing individual microbial genomes from the mixture of short fragments created by sequencing. Recent work leverages the sparsity of the assembly graph to find $r$-dominating sets which enable rapid approximate queries through a dominator-centric graph partition. In this paper, we consider two problems related to reducing uncertainty and improving scalability in this setting.
First, we observe that nodes with multiple closest dominators necessitate arbitrary tie-breaking in the existing pipeline. As such, we propose finding $\textit{sparse}$ dominating sets which minimize this effect via a new $\textit{congestion}$ parameter. We prove minimizing congestion is NP-hard, and give an $\mathcal{O}(\sqrt{Δ^r})$ approximation algorithm, where $Δ$ is the max degree.
To improve scalability, the graph should be partitioned into uniformly sized pieces, subject to placing vertices with a closest dominator. This leads to $\textit{balanced neighborhood partitioning}$: given an $r$-dominating set, find a partition into connected subgraphs with optimal uniformity so that each vertex is co-assigned with some closest dominator. Using variance of piece sizes to measure uniformity, we show this problem is NP-hard iff $r$ is greater than $1$. We design and analyze several algorithms, including a polynomial-time approach which is exact when $r=1$ (and heuristic otherwise).
We complement our theoretical results with computational experiments on a corpus of real-world networks showing sparse dominating sets lead to more balanced neighborhood partitionings. Further, on the metagenome $\textsf{HuSB1}$, our approach maintains high query containment and similarity while reducing piece size variance.
△ Less
Submitted 1 July, 2022; v1 submitted 20 December, 2021;
originally announced December 2021.
-
Hardness of the Generalized Coloring Numbers
Authors:
Michael Breen-McKay,
Brian Lavallee,
Blair D. Sullivan
Abstract:
The generalized coloring numbers of Kierstead and Yang (Order 2003) offer an algorithmically-useful characterization of graph classes with bounded expansion. In this work, we consider the hardness and approximability of these parameters. First, we complete the work of Grohe et al. (WG 2015) by showing that computing the weak 2-coloring number is NP-hard. Our approach further establishes that deter…
▽ More
The generalized coloring numbers of Kierstead and Yang (Order 2003) offer an algorithmically-useful characterization of graph classes with bounded expansion. In this work, we consider the hardness and approximability of these parameters. First, we complete the work of Grohe et al. (WG 2015) by showing that computing the weak 2-coloring number is NP-hard. Our approach further establishes that determining if a graph has weak $r$-coloring number at most $k$ is para-NP-hard when parameterized by $k$ for all $r \geq 2$. We adapt this to determining if a graph has $r$-coloring number at most $k$ as well, proving para-NP-hardness for all $r \geq 2$. Para-NP-hardness implies that no XP algorithm (runtime $O(n^{f(k)})$) exists for testing if a generalized coloring number is at most $k$. Moreover, there exists a constant $c$ such that it is NP-hard to approximate the generalized coloring numbers within a factor of $c$. To complement these results, we give an approximation algorithm for the generalized coloring numbers, improving both the runtime and approximation factor of the existing approach of Dvořák (EuJC 2013). We prove that greedily ordering vertices with small estimated backconnectivity achieves a $(k-1)^{r-1}$-approximation for the $r$-coloring number and an $O(k^{r-1})$-approximation for the weak $r$-coloring number.
△ Less
Submitted 16 March, 2023; v1 submitted 20 December, 2021;
originally announced December 2021.
-
Parameterized algorithms for identifying gene co-expression modules via weighted clique decomposition
Authors:
Madison Cooley,
Casey S. Greene,
Davis Issac,
Milton Pividori,
Blair D. Sullivan
Abstract:
We present a new combinatorial model for identifying regulatory modules in gene co-expression data using a decomposition into weighted cliques. To capture complex interaction effects, we generalize the previously-studied weighted edge clique partition problem. As a first step, we restrict ourselves to the noise-free setting, and show that the problem is fixed parameter tractable when parameterized…
▽ More
We present a new combinatorial model for identifying regulatory modules in gene co-expression data using a decomposition into weighted cliques. To capture complex interaction effects, we generalize the previously-studied weighted edge clique partition problem. As a first step, we restrict ourselves to the noise-free setting, and show that the problem is fixed parameter tractable when parameterized by the number of modules (cliques). We present two new algorithms for finding these decompositions, using linear programming and integer partitioning to determine the clique weights. Further, we implement these algorithms in Python and test them on a biologically-inspired synthetic corpus generated using real-world data from transcription factors and a latent variable analysis of co-expression in varying cell types.
△ Less
Submitted 7 September, 2021; v1 submitted 1 June, 2021;
originally announced June 2021.
-
Electronic transport descriptors for the rapid screening of thermoelectric materials
Authors:
Tianqi Deng,
Jose Recatala-Gomez,
Masato Ohnishi,
D. V. Maheshwar Repaka,
Pawan Kumar,
Ady Suwardi,
Anas Abutaha,
Iris Nandhakumar,
Kanishka Biswas,
Michael B. Sullivan,
Gang Wu,
Junichiro Shiomi,
Shuo-Wang Yang,
Kedar Hippalgaonkar
Abstract:
The discovery of novel materials for thermoelectric energy conversion has potential to be accelerated by data-driven screening combined with high-throughput calculations. One way to increase the efficacy of successfully choosing a candidate material is through its evaluation using transport descriptors. Using a data-driven screening, we selected 12 potential candidates in the trigonal ABX2 family,…
▽ More
The discovery of novel materials for thermoelectric energy conversion has potential to be accelerated by data-driven screening combined with high-throughput calculations. One way to increase the efficacy of successfully choosing a candidate material is through its evaluation using transport descriptors. Using a data-driven screening, we selected 12 potential candidates in the trigonal ABX2 family, followed by charge transport property simulations from first principles. The results suggest that carrier scattering processes in these materials are dominated by ionised impurities and polar optical phonons, contrary to the oft-assumed acoustic-phonon-dominated scattering. Combined with calculations of thermal conductivity based on three-phonon scattering, we predict p-type AgBiS2 and TlBiTe2 as potential high-performance thermoelectrics in the intermediate temperature range for low grade waste heat harvesting, with a predicted zT above 1 at 500 K. Using these data, we further derive ground-state transport descriptors for the carrier mobility and the thermoelectric power factor. In addition to low carrier mass, high dielectric constant was found to be an important factor towards high carrier mobility. A quadratic correlation between dielectric constant and transport performance was established and further validated with literature. Looking ahead, dielectric constant can potentially be exploited as an independent tuning knob for improving the thermoelectric performance.
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
Information access representations and social capital in networks
Authors:
Ashkan Bashardoust,
Hannah C. Beilinson,
Sorelle A. Friedler,
Jiajie Ma,
Jade Rousseau,
Carlos E. Scheidegger,
Blair D. Sullivan,
Nasanbayar Ulzii-Orshikh,
Suresh Venkatasubramanian
Abstract:
Social network position confers power and social capital. In the setting of online social networks that have massive reach, creating mathematical representations of social capital is an important step towards understanding how network position can differentially confer advantage to different groups and how network position can itself be a source of advantage. In this paper, we use well established…
▽ More
Social network position confers power and social capital. In the setting of online social networks that have massive reach, creating mathematical representations of social capital is an important step towards understanding how network position can differentially confer advantage to different groups and how network position can itself be a source of advantage. In this paper, we use well established models for information flow on networks as a base to propose a formal descriptor of the network position of a node as represented by its information access. Combining these descriptors allows a full representation of social capital across the network. Using real-world networks, we demonstrate that this representation allows the identification of differences between groups based on network specific measures of inequality of access.
△ Less
Submitted 16 October, 2023; v1 submitted 23 October, 2020;
originally announced October 2020.
-
Real-Time Face & Eye Tracking and Blink Detection using Event Cameras
Authors:
Cian Ryan,
Brian O Sullivan,
Amr Elrasad,
Joe Lemley,
Paul Kielty,
Christoph Posch,
Etienne Perot
Abstract:
Event cameras contain emerging, neuromorphic vision sensors that capture local light intensity changes at each pixel, generating a stream of asynchronous events. This way of acquiring visual information constitutes a departure from traditional frame based cameras and offers several significant advantages: low energy consumption, high temporal resolution, high dynamic range and low latency. Driver…
▽ More
Event cameras contain emerging, neuromorphic vision sensors that capture local light intensity changes at each pixel, generating a stream of asynchronous events. This way of acquiring visual information constitutes a departure from traditional frame based cameras and offers several significant advantages: low energy consumption, high temporal resolution, high dynamic range and low latency. Driver monitoring systems (DMS) are in-cabin safety systems designed to sense and understand a drivers physical and cognitive state. Event cameras are particularly suited to DMS due to their inherent advantages. This paper proposes a novel method to simultaneously detect and track faces and eyes for driver monitoring. A unique, fully convolutional recurrent neural network architecture is presented. To train this network, a synthetic event-based dataset is simulated with accurate bounding box annotations, called Neuromorphic HELEN. Additionally, a method to detect and analyse drivers eye blinks is proposed, exploiting the high temporal resolution of event cameras. Behaviour of blinking provides greater insights into a driver level of fatigue or drowsiness. We show that blinks have a unique temporal signature that can be better captured by event cameras.
△ Less
Submitted 16 October, 2020;
originally announced October 2020.
-
Making Convolutions Resilient via Algorithm-Based Error Detection Techniques
Authors:
Siva Kumar Sastry Hari,
Michael B. Sullivan,
Timothy Tsai,
Stephen W. Keckler
Abstract:
The ability of Convolutional Neural Networks (CNNs) to accurately process real-time telemetry has boosted their use in safety-critical and high-performance computing systems. As such systems require high levels of resilience to errors, CNNs must execute correctly in the presence of hardware faults. Full duplication provides the needed assurance but incurs a prohibitive 100% overhead. Algorithmic t…
▽ More
The ability of Convolutional Neural Networks (CNNs) to accurately process real-time telemetry has boosted their use in safety-critical and high-performance computing systems. As such systems require high levels of resilience to errors, CNNs must execute correctly in the presence of hardware faults. Full duplication provides the needed assurance but incurs a prohibitive 100% overhead. Algorithmic techniques are known to offer low-cost solutions, but the practical feasibility and performance of such techniques have never been studied for CNN deployment platforms (e.g., TensorFlow or TensorRT on GPUs). In this paper, we focus on algorithmically verifying Convolutions, which are the most resource-demanding operations in CNNs. We use checksums to verify convolutions, adding a small amount of redundancy, far less than full-duplication. We first identify the challenges that arise in employing Algorithm-Based Error Detection (ABED) for Convolutions in optimized inference platforms that fuse multiple network layers and use reduced-precision operations, and demonstrate how to overcome them. We propose and evaluate variations of ABED techniques that offer implementation complexity, runtime overhead, and coverage trade-offs. Results show that ABED can detect all transient hardware errors that might otherwise corrupt output and does so while incurring low runtime overheads (6-23%), offering at least 1.6X throughput to workloads compared to full duplication.
△ Less
Submitted 8 June, 2020;
originally announced June 2020.
-
Ultra-high-Q resonances in plasmonic metasurfaces
Authors:
M. Saad Bin-Alam,
Orad Reshef,
Yaryna Mamchur,
M. Zahirul Alam,
Graham Carlow,
Jeremy Upham,
Brian T. Sullivan,
Jean-Michel Ménard,
Mikko J. Huttunen,
Robert W. Boyd,
Ksenia Dolgaleva
Abstract:
Plasmonic nanostructures hold promise for the realization of ultra-thin sub-wavelength devices, reducing power operating thresholds and enabling nonlinear optical functionality in metasurfaces. However, this promise is substantially undercut by absorption introduced by resistive losses, causing the metasurface community to turn away from plasmonics in favour of alternative material platforms (e.g.…
▽ More
Plasmonic nanostructures hold promise for the realization of ultra-thin sub-wavelength devices, reducing power operating thresholds and enabling nonlinear optical functionality in metasurfaces. However, this promise is substantially undercut by absorption introduced by resistive losses, causing the metasurface community to turn away from plasmonics in favour of alternative material platforms (e.g., dielectrics) that provide weaker field enhancement, but more tolerable losses. Here, we report a plasmonic metasurface with a quality-factor (Q-factor) of 2340 in the telecommunication C band by exploiting surface lattice resonances (SLRs), exceeding the record by an order of magnitude. Additionally, we show that SLRs retain many of the same benefits as localized plasmonic resonances, such as field enhancement and strong confinement of light along the metal surface. Our results demonstrate that SLRs provide an exciting and unexplored method to tailor incident light fields, and could pave the way to flexible wavelength-scale devices for any optical resonating application.
△ Less
Submitted 24 February, 2021; v1 submitted 10 April, 2020;
originally announced April 2020.
-
HarDNN: Feature Map Vulnerability Evaluation in CNNs
Authors:
Abdulrahman Mahmoud,
Siva Kumar Sastry Hari,
Christopher W. Fletcher,
Sarita V. Adve,
Charbel Sakr,
Naresh Shanbhag,
Pavlo Molchanov,
Michael B. Sullivan,
Timothy Tsai,
Stephen W. Keckler
Abstract:
As Convolutional Neural Networks (CNNs) are increasingly being employed in safety-critical applications, it is important that they behave reliably in the face of hardware errors. Transient hardware errors may percolate undesirable state during execution, resulting in software-manifested errors which can adversely affect high-level decision making. This paper presents HarDNN, a software-directed ap…
▽ More
As Convolutional Neural Networks (CNNs) are increasingly being employed in safety-critical applications, it is important that they behave reliably in the face of hardware errors. Transient hardware errors may percolate undesirable state during execution, resulting in software-manifested errors which can adversely affect high-level decision making. This paper presents HarDNN, a software-directed approach to identify vulnerable computations during a CNN inference and selectively protect them based on their propensity towards corrupting the inference output in the presence of a hardware error. We show that HarDNN can accurately estimate relative vulnerability of a feature map (fmap) in CNNs using a statistical error injection campaign, and explore heuristics for fast vulnerability assessment. Based on these results, we analyze the tradeoff between error coverage and computational overhead that the system designers can use to employ selective protection. Results show that the improvement in resilience for the added computation is superlinear with HarDNN. For example, HarDNN improves SqueezeNet's resilience by 10x with just 30% additional computations.
△ Less
Submitted 25 February, 2020; v1 submitted 22 February, 2020;
originally announced February 2020.
-
A color-avoiding approach to subgraph counting in bounded expansion classes
Authors:
Felix Reidl,
Blair D. Sullivan
Abstract:
We present an algorithm to count the number of occurrences of a pattern graph $H$ as an induced subgraph in a host graph $G$. If $G$ belongs to a bounded expansion class, the algorithm runs in linear time. Our design choices are motivated by the need for an approach that can be engineered into a practical implementation for sparse host graphs.
Specifically, we introduce a decomposition of the pa…
▽ More
We present an algorithm to count the number of occurrences of a pattern graph $H$ as an induced subgraph in a host graph $G$. If $G$ belongs to a bounded expansion class, the algorithm runs in linear time. Our design choices are motivated by the need for an approach that can be engineered into a practical implementation for sparse host graphs.
Specifically, we introduce a decomposition of the pattern $H$ called a counting dag $\vec C(H)$ which encodes an order-aware, inclusion-exclusion counting method for $H$. Given such a counting dag and a suitable linear ordering $\mathbb G$ of $G$ as input, our algorithm can count the number of times $H$ appears as an induced subgraph in $G$ in time $O(\|\vec C\| \cdot h \text{wcol}_{h}(\mathbb G)^{h-1} |G|)$, where $\text{wcol}_h(\mathbb G)$ denotes the maximum size of the weakly $h$-reachable sets in $\mathbb G$. This implies, combined with previous results, an algorithm with running time $O(4^{h^2}h (\text{wcol}_h(G)+1)^{h^3} |G|)$ which only takes $H$ and $G$ as input.
We note that with a small modification, our algorithm can instead use strongly $h$-reachable sets with running time $O(\|\vec C\| \cdot h \text{col}_{h}(\mathbb G)^{h-1} |G|)$, resulting in an overall complexity of $O(4^{h^2}h \text{col}_h(G)^{h^2} |G|)$ when only given $H$ and $G$.
Because orderings with small weakly/strongly reachable sets can be computed relatively efficiently in practice [11], our algorithm provides a promising alternative to algorithms using the traditional $p$-treedepth colouring framework [13]. We describe preliminary experimental results from an initial open source implementation which highlight its potential.
△ Less
Submitted 15 January, 2020;
originally announced January 2020.
-
Approximating Vertex Cover using Structural Rounding
Authors:
Brian Lavallee,
Hayley Russell,
Blair D. Sullivan,
Andrew van der Poel
Abstract:
In this work, we provide the first practical evaluation of the structural rounding framework for approximation algorithms. Structural rounding works by first editing to a well-structured class, efficiently solving the edited instance, and "lifting" the partial solution to recover an approximation on the input. We focus on the well-studied Vertex Cover problem, and edit to the class of bipartite gr…
▽ More
In this work, we provide the first practical evaluation of the structural rounding framework for approximation algorithms. Structural rounding works by first editing to a well-structured class, efficiently solving the edited instance, and "lifting" the partial solution to recover an approximation on the input. We focus on the well-studied Vertex Cover problem, and edit to the class of bipartite graphs (where Vertex Cover has an exact polynomial time algorithm). In addition to the naive lifting strategy for Vertex Cover described by Demaine et al., we introduce a suite of new lifting strategies and measure their effectiveness on a large corpus of synthetic graphs. We find that in this setting, structural rounding significantly outperforms standard 2-approximations. Further, simpler lifting strategies are extremely competitive with the more sophisticated approaches. The implementations are available as an open-source Python package, and all experiments are replicable.
△ Less
Submitted 31 October, 2019; v1 submitted 10 September, 2019;
originally announced September 2019.
-
The role of the anti-regular graph in the spectral analysis of threshold graphs
Authors:
Cesar O. Aguilar,
Matthew Ficarra,
Natalie Schurman,
Brittany Sullivan
Abstract:
The purpose of this paper is to highlight the role played by the anti-regular graph within the class of threshold graphs. Using the fact that every threshold graph contains a maximal anti-regular graph, we show that some known results, and new ones, on the spectral properties of threshold graphs can be deduced from (i) the known results on the eigenvalues of anti-regular graphs, (ii) the subgraph…
▽ More
The purpose of this paper is to highlight the role played by the anti-regular graph within the class of threshold graphs. Using the fact that every threshold graph contains a maximal anti-regular graph, we show that some known results, and new ones, on the spectral properties of threshold graphs can be deduced from (i) the known results on the eigenvalues of anti-regular graphs, (ii) the subgraph structure of threshold graphs, and (iii) eigenvalue interlacing. In particular, we prove a strengthened version of the recently proved fact that no threshold graph contains an eigenvalue in the interval $Ω= [\frac{-1-\sqrt{2}}{2},\frac{-1+\sqrt{2}}{2}]$, except possibly the trivial eigenvalues $-1$ and/or $0$, determine the inertia of a threshold graph, and give partial results on a conjecture regarding the optimality of the non-trivial eigenvalues of an anti-regular graph within the class of threshold graphs.
△ Less
Submitted 9 December, 2019; v1 submitted 11 August, 2019;
originally announced August 2019.
-
ML-based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection
Authors:
Saurabh Jha,
Subho S. Banerjee,
Timothy Tsai,
Siva K. S. Hari,
Michael B. Sullivan,
Zbigniew T. Kalbarczyk,
Stephen W. Keckler,
Ravishankar K. Iyer
Abstract:
The safety and resilience of fully autonomous vehicles (AVs) are of significant concern, as exemplified by several headline-making accidents. While AV development today involves verification, validation, and testing, end-to-end assessment of AV systems under accidental faults in realistic driving scenarios has been largely unexplored. This paper presents DriveFI, a machine learning-based fault inj…
▽ More
The safety and resilience of fully autonomous vehicles (AVs) are of significant concern, as exemplified by several headline-making accidents. While AV development today involves verification, validation, and testing, end-to-end assessment of AV systems under accidental faults in realistic driving scenarios has been largely unexplored. This paper presents DriveFI, a machine learning-based fault injection engine, which can mine situations and faults that maximally impact AV safety, as demonstrated on two industry-grade AV technology stacks (from NVIDIA and Baidu). For example, DriveFI found 561 safety-critical faults in less than 4 hours. In comparison, random injection experiments executed over several weeks could not find any safety-critical faults
△ Less
Submitted 1 July, 2019;
originally announced July 2019.
-
Multi-resonant high-Q plasmonic metasurfaces
Authors:
Orad Reshef,
Md Saad-Bin-Alam,
Mikko J. Huttunen,
Graham Carlow,
Brian T. Sullivan,
Jean-Michel Ménard,
Ksenia Dolgaleva,
Robert W. Boyd
Abstract:
Resonant metasurfaces are devices composed of nanostructured sub-wavelength scatterers that generate narrow optical resonances, enabling applications in filtering, nonlinear optics, and molecular fingerprinting. It is highly desirable for these applications to incorporate such devices with multiple, high-quality-factor resonances; however, it can be challenging to obtain more than a pair of narrow…
▽ More
Resonant metasurfaces are devices composed of nanostructured sub-wavelength scatterers that generate narrow optical resonances, enabling applications in filtering, nonlinear optics, and molecular fingerprinting. It is highly desirable for these applications to incorporate such devices with multiple, high-quality-factor resonances; however, it can be challenging to obtain more than a pair of narrow resonances in a single plasmonic surface. Here, we demonstrate a multi-resonant metasurface that operates by extending the functionality of surface lattice resonances, which are the collective responses of arrays of metallic nanoparticles. This device features a series of resonances with high quality factors (Q ~ 40), an order of magnitude larger than what is typically achievable with plasmonic nanoparticles, as well as a narrow free spectral range. This design methodology can be used to better tailor the transmission spectrum of resonant metasurfaces and represents an important step towards the miniaturization of optical devices.
△ Less
Submitted 15 August, 2019; v1 submitted 30 June, 2019;
originally announced July 2019.
-
Faster Biclique Mining in Near-Bipartite Graphs
Authors:
Blair D. Sullivan,
Andrew van der Poel,
Trey Woodlief
Abstract:
Identifying dense bipartite subgraphs is a common graph data mining task. Many applications focus on the enumeration of all maximal bicliques (MBs), though sometimes the stricter variant of maximal induced bicliques (MIBs) is of interest. Recent work of Kloster et al. introduced a MIB-enumeration approach designed for "near-bipartite" graphs, where the runtime is parameterized by the size k of an…
▽ More
Identifying dense bipartite subgraphs is a common graph data mining task. Many applications focus on the enumeration of all maximal bicliques (MBs), though sometimes the stricter variant of maximal induced bicliques (MIBs) is of interest. Recent work of Kloster et al. introduced a MIB-enumeration approach designed for "near-bipartite" graphs, where the runtime is parameterized by the size k of an odd cycle transversal (OCT), a vertex set whose deletion results in a bipartite graph. Their algorithm was shown to outperform the previously best known algorithm even when k was logarithmic in |V|. In this paper, we introduce two new algorithms optimized for near-bipartite graphs - one which enumerates MIBs in time O(M_I |V||E| k), and another based on the approach of Alexe et al. which enumerates MBs in time O(M_B |V||E| k), where M_I and M_B denote the number of MIBs and MBs in the graph, respectively. We implement all of our algorithms in open-source C++ code and experimentally verify that the OCT-based approaches are faster in practice than the previously existing algorithms on graphs with a wide variety of sizes, densities, and OCT decompositions.
△ Less
Submitted 4 March, 2019;
originally announced March 2019.
-
Cluster Editing with Vertex Splitting
Authors:
Faisal N. Abu-Khzam,
Emmanuel Arrighi,
Matthias Bentert,
Pål Grønås Drange,
Judith Egan,
Serge Gaspers,
Alexis Shaw,
Peter Shaw,
Blair D. Sullivan,
Petra Wolf
Abstract:
Cluster Editing, also known as Correlation Clustering, is a well-studied graph modification problem. In this problem, one is given a graph and the task is to perform up to $k$ edge additions or deletions to transform it into a cluster graph, i.e., a graph consisting of a disjoint union of cliques. However, in real-world networks, clusters are often overlap**. For example in social networks, a pe…
▽ More
Cluster Editing, also known as Correlation Clustering, is a well-studied graph modification problem. In this problem, one is given a graph and the task is to perform up to $k$ edge additions or deletions to transform it into a cluster graph, i.e., a graph consisting of a disjoint union of cliques. However, in real-world networks, clusters are often overlap**. For example in social networks, a person might belong to several communities - e.g. those corresponding to work, school, or neighborhood. Other strong motivations come from biological network analysis and from language networks. Trying to cluster words with similar usage in the latter can be confounded by homonyms, that is, words with multiple meanings like "bat." In this paper, we introduce a new variant of Cluster Editing whereby a vertex can be split into two or more vertices. First used in the context of graph drawing, this operation allows a vertex $v$ to be replaced by two vertices whose combined neighborhood is the neighborhood of $v$ (and thus $v$ can belong to more than one cluster). We call the new problem Cluster Editing with Vertex Splitting and we initiate the study of it. We show that it is NP-complete and fixed-parameter tractable when parameterized by the total number $k$ of allowed vertex-splitting and edge-editing operations. In particular, we obtain an $O(2^{9k log k} + n + m)$-time algorithm and a $6k$-vertex kernel.
△ Less
Submitted 2 November, 2023; v1 submitted 1 January, 2019;
originally announced January 2019.
-
Mining Maximal Induced Bicliques using Odd Cycle Transversals
Authors:
Kyle Kloster,
Blair D. Sullivan,
Andrew van der Poel
Abstract:
Many common graph data mining tasks take the form of identifying dense subgraphs (e.g. clustering, clique-finding, etc). In biological applications, the natural model for these dense substructures is often a complete bipartite graph (biclique), and the problem requires enumerating all maximal bicliques (instead of just identifying the largest or densest). The best known algorithm in general graphs…
▽ More
Many common graph data mining tasks take the form of identifying dense subgraphs (e.g. clustering, clique-finding, etc). In biological applications, the natural model for these dense substructures is often a complete bipartite graph (biclique), and the problem requires enumerating all maximal bicliques (instead of just identifying the largest or densest). The best known algorithm in general graphs is due to Dias et al., and runs in time O(M |V|^4 ), where M is the number of maximal induced bicliques (MIBs) in the graph. When the graph being searched is itself bipartite, Zhang et al. give a faster algorithm where the time per MIB depends on the number of edges in the graph. In this work, we present a new algorithm for enumerating MIBs in general graphs, whose run time depends on how "close to bipartite" the input is. Specifically, the runtime is parameterized by the size k of an odd cycle transversal (OCT), a vertex set whose deletion results in a bipartite graph. Our algorithm runs in time O(M |V||E|k^2 3^(k/3) ), which is an improvement on Dias et al. whenever k <= 3log_3(|V|). We implement our algorithm alongside a variant of Dias et al.'s in open-source C++ code, and experimentally verify that the OCT-based approach is faster in practice on graphs with a wide variety of sizes, densities, and OCT decompositions.
△ Less
Submitted 24 January, 2019; v1 submitted 26 October, 2018;
originally announced October 2018.
-
A Relaxation-based Network Decomposition Algorithm for Parallel Transient Stability Simulation with Improved Convergence
Authors:
Jian Shi,
Brian Sullivan,
Mike Mazzola,
Babak Saravi,
Uttam Adhikari,
Tomaz Haupt
Abstract:
Transient stability simulation of a large-scale and interconnected electric power system involves solving a large set of differential algebraic equations (DAEs) at every simulation time-step. With the ever-growing size and complexity of power grids, dynamic simulation becomes more time-consuming and computationally difficult using conventional sequential simulation techniques. To cope with this ch…
▽ More
Transient stability simulation of a large-scale and interconnected electric power system involves solving a large set of differential algebraic equations (DAEs) at every simulation time-step. With the ever-growing size and complexity of power grids, dynamic simulation becomes more time-consuming and computationally difficult using conventional sequential simulation techniques. To cope with this challenge, this paper aims to develop a fully distributed approach intended for implementation on High Performance Computer (HPC) clusters. A novel, relaxation-based domain decomposition algorithm known as Parallel-General-Norton with Multiple-port Equivalent (PGNME) is proposed as the core technique of a two-stage decomposition approach to divide the overall dynamic simulation problem into a set of subproblems that can be solved concurrently to exploit parallelism and scalability. While the convergence property has traditionally been a concern for relaxation-based decomposition, an estimation mechanism based on multiple-port network equivalent is adopted as the preconditioner to enhance the convergence of the proposed algorithm. The proposed algorithm is illustrated using rigorous mathematics and validated both in terms of speed-up and capability. Moreover, a complexity analysis is performed to support the observation that PGNME scales well when the size of the subproblems are sufficiently large.
△ Less
Submitted 5 October, 2018;
originally announced October 2018.
-
Benchmarking treewidth as a practical component of tensor-network--based quantum simulation
Authors:
Eugene F. Dumitrescu,
Allison L. Fisher,
Timothy D. Goodrich,
Travis S. Humble,
Blair D. Sullivan,
Andrew L. Wright
Abstract:
Tensor networks are powerful factorization techniques which reduce resource requirements for numerically simulating principal quantum many-body systems and algorithms. The computational complexity of a tensor network simulation depends on the tensor ranks and the order in which they are contracted. Unfortunately, computing optimal contraction sequences (orderings) in general is known to be a compu…
▽ More
Tensor networks are powerful factorization techniques which reduce resource requirements for numerically simulating principal quantum many-body systems and algorithms. The computational complexity of a tensor network simulation depends on the tensor ranks and the order in which they are contracted. Unfortunately, computing optimal contraction sequences (orderings) in general is known to be a computationally difficult (NP-complete) task. In 2005, Markov and Shi showed that optimal contraction sequences correspond to optimal (minimum width) tree decompositions of a tensor network's line graph, relating the contraction sequence problem to a rich literature in structural graph theory. While treewidth-based methods have largely been ignored in favor of dataset-specific algorithms in the prior tensor networks literature, we demonstrate their practical relevance for problems arising from two distinct methods used in quantum simulation: multi-scale entanglement renormalization ansatz (MERA) datasets and quantum circuits generated by the quantum approximate optimization algorithm (QAOA). We exhibit multiple regimes where treewidth-based algorithms outperform domain-specific algorithms, while demonstrating that the optimal choice of algorithm has a complex dependence on the network density, expected contraction complexity, and user run time requirements. We further provide an open source software framework designed with an emphasis on accessibility and extendability, enabling replicable experimental evaluations and future exploration of competing methods by practitioners.
△ Less
Submitted 12 July, 2018;
originally announced July 2018.
-
Structural Rounding: Approximation Algorithms for Graphs Near an Algorithmically Tractable Class
Authors:
Erik D. Demaine,
Timothy D. Goodrich,
Kyle Kloster,
Brian Lavallee,
Quanquan C. Liu,
Blair D. Sullivan,
Ali Vakilian,
Andrew van der Poel
Abstract:
We develop a new framework for generalizing approximation algorithms from the structural graph algorithm literature so that they apply to graphs somewhat close to that class (a scenario we expect is common when working with real-world networks) while still guaranteeing approximation ratios. The idea is to $\textit{edit}$ a given graph via vertex- or edge-deletions to put the graph into an algorith…
▽ More
We develop a new framework for generalizing approximation algorithms from the structural graph algorithm literature so that they apply to graphs somewhat close to that class (a scenario we expect is common when working with real-world networks) while still guaranteeing approximation ratios. The idea is to $\textit{edit}$ a given graph via vertex- or edge-deletions to put the graph into an algorithmically tractable class, apply known approximation algorithms for that class, and then $\textit{lift}$ the solution to apply to the original graph. We give a general characterization of when an optimization problem is amenable to this approach, and show that it includes many well-studied graph problems, such as Independent Set, Vertex Cover, Feedback Vertex Set, Minimum Maximal Matching, Chromatic Number, ($\ell$-)Dominating Set, Edge ($\ell$-)Dominating Set, and Connected Dominating Set.
To enable this framework, we develop new editing algorithms that find the approximately-fewest edits required to bring a given graph into one of several important graph classes (in some cases, also approximating the target parameter of the family). For bounded degeneracy, we obtain a bicriteria $(4,4)$-approximation which also extends to a smoother bicriteria trade-off. For bounded treewidth, we obtain a bicriteria $(O(\log^{1.5} n), O(\sqrt{\log w}))$-approximation, and for bounded pathwidth, we obtain a bicriteria $(O(\log^{1.5} n), O(\sqrt{\log w} \cdot \log n))$-approximation. For treedepth $2$ (also related to bounded expansion), we obtain a $4$-approximation. We also prove complementary hardness-of-approximation results assuming $\mathrm{P} \neq \mathrm{NP}$: in particular, these problems are all log-factor inapproximable, except the last which is not approximable below some constant factor ($2$ assuming UGC).
△ Less
Submitted 9 December, 2018; v1 submitted 7 June, 2018;
originally announced June 2018.
-
An Updated Experimental Evaluation of Graph Bipartization Methods
Authors:
Timothy D. Goodrich,
Eric Horton,
Blair D. Sullivan
Abstract:
We experimentally evaluate the practical state-of-the-art in graph bipartization (Odd Cycle Transversal), motivated by recent advances in near-term quantum computing hardware and the related embedding problems. We assemble a preprocessing suite of fast input reduction routines from the Odd Cycle Transversal (OCT) and Vertex Cover (VC) literature, and compare algorithm implementations using Quadrat…
▽ More
We experimentally evaluate the practical state-of-the-art in graph bipartization (Odd Cycle Transversal), motivated by recent advances in near-term quantum computing hardware and the related embedding problems. We assemble a preprocessing suite of fast input reduction routines from the Odd Cycle Transversal (OCT) and Vertex Cover (VC) literature, and compare algorithm implementations using Quadratic Unconstrained Binary Optimization problems from the quantum literature. We also generate a corpus of frustrated cluster loop graphs, which have previously been used to benchmark quantum annealing hardware. The diversity of these graphs leads to harder OCT instances than in existing benchmarks.
In addition to combinatorial branching algorithms for solving OCT directly, we study various reformulations into other NP-hard problems such as VC and Integer Linear Programming (ILP), enabling the use of solvers such as CPLEX. We find that for heuristic solutions with time constraints under a second, iterative compression routines jump-started with a heuristic solution perform best, after which point using a highly tuned solver like CPLEX is worthwhile. Results on exact solvers are split between using ILP formulations on CPLEX and solving VC formulations with a branch-and-reduce solver. We extend our results with a large corpus of synthetic graphs, establishing robustness and potential to generalize to other domain data. In total, over 8000 graph instances are evaluated, compared to the previous canonical corpus of 100 graphs.
Finally, we provide all code and data in an open source suite, including a Python API for accessing reduction routines and branching algorithms, along with scripts for fully replicating our results.
△ Less
Submitted 19 March, 2021; v1 submitted 2 May, 2018;
originally announced May 2018.
-
Subgraph centrality and walk-regularity
Authors:
Eric Horton,
Kyle Kloster,
Blair D. Sullivan
Abstract:
Matrix-based centrality measures have enjoyed significant popularity in network analysis, in no small part due to our ability to rigorously analyze their behavior as parameters vary. Recent work has considered the relationship between subgraph centrality, which is defined using the matrix exponential $f(x) = \exp(x)$, and the walk structure of a network. In a walk-regular graph, the number of clos…
▽ More
Matrix-based centrality measures have enjoyed significant popularity in network analysis, in no small part due to our ability to rigorously analyze their behavior as parameters vary. Recent work has considered the relationship between subgraph centrality, which is defined using the matrix exponential $f(x) = \exp(x)$, and the walk structure of a network. In a walk-regular graph, the number of closed walks of each length must be the same for all nodes, implying uniform $f$-subgraph centralities for any $f$ (or maximum $f$-$\textit{walk entropy}$). We consider when non--walk-regular graphs can achieve maximum entropy, calling such graphs $\textit{entropic}$. For parameterized measures, we are also interested in which values of the parameter witness this uniformity. To date, only one entropic graph has been identified, with only two witnessing parameter values, raising the question of how many such graphs and parameters exist. We resolve these questions by constructing infinite families of entropic graphs, as well as a family of witnessing parameters with a limit point at zero.
△ Less
Submitted 4 February, 2019; v1 submitted 16 April, 2018;
originally announced April 2018.
-
Polynomial Treedepth Bounds in Linear Colorings
Authors:
Jeremy Kun,
Michael P. O'Brien,
Marcin Pilipczuk,
Blair D. Sullivan
Abstract:
Low-treedepth colorings are an important tool for algorithms that exploit structure in classes of bounded expansion; they guarantee subgraphs that use few colors have bounded treedepth. These colorings have an implicit tradeoff between the total number of colors used and the treedepth bound, and prior empirical work suggests that the former dominates the run time of existing algorithms in practice…
▽ More
Low-treedepth colorings are an important tool for algorithms that exploit structure in classes of bounded expansion; they guarantee subgraphs that use few colors have bounded treedepth. These colorings have an implicit tradeoff between the total number of colors used and the treedepth bound, and prior empirical work suggests that the former dominates the run time of existing algorithms in practice. We introduce $p$-linear colorings as an alternative to the commonly used $p$-centered colorings. They can be efficiently computed in bounded expansion classes and use at most as many colors as $p$-centered colorings. Although a set of $k<p$ colors from a $p$-centered coloring induces a subgraph of treedepth at most $k$, the same number of colors from a $p$-linear coloring may induce subgraphs of larger treedepth. We establish a polynomial upper bound on the treedepth in general graphs, and give tighter bounds in trees and interval graphs via constructive coloring algorithms. We also give a co-NP-completeness reduction for recognizing $p$-linear colorings and discuss ways to overcome this limitation in practice. This preprint extends results that appeared in [9]; for full proofs omitted from [9], see previous versions of this preprint.
△ Less
Submitted 24 July, 2018; v1 submitted 26 February, 2018;
originally announced February 2018.
-
An Experimental Evaluation of a Bounded Expansion Algorithmic Pipeline
Authors:
Michael P. O'Brien,
Blair D. Sullivan
Abstract:
Previous work has suggested that the structural restrictions of graphs from classes of bounded expansion--locally dense pockets in a globally sparse graph--naturally coincide with common properties of real-world networks such as clustering and heavy-tailed degree distributions. As such, fixed-parameter tractable algorithms for bounded expansion classes may offer a promising framework for network a…
▽ More
Previous work has suggested that the structural restrictions of graphs from classes of bounded expansion--locally dense pockets in a globally sparse graph--naturally coincide with common properties of real-world networks such as clustering and heavy-tailed degree distributions. As such, fixed-parameter tractable algorithms for bounded expansion classes may offer a promising framework for network analysis where other approaches have struggled to scale. However, there has been little work done in implementing and evaluating the performance of these structure-based algorithms. To this end we introduce CONCUSS, a proof-of-concept implementation of a generic algorithmic pipeline for classes of bounded expansion. In particular, we focus on using CONCUSS for subgraph isomorphism counting (also called motif or graphlet counting), which has been used extensively as a tool for analyzing biological and social networks. Through a broad set of experiments we first evaluate the interactions between implementation/engineering choices at multiple stages of the pipeline and their effects on overall run time. From there, we establish viability of the bounded expansion framework by demonstrating that in some scenarios CONCUSS achieves run times competitive with a popular algorithm for subgraph isomorphism counting that does not exploit graph structure. Finally, we empirically identify two particular ways in which future theoretical advances could alleviate bottlenecks in the algorithmic pipeline.
△ Less
Submitted 23 April, 2018; v1 submitted 18 December, 2017;
originally announced December 2017.
-
Walk entropy and walk-regularity
Authors:
Kyle Kloster,
Daniel Král',
Blair D. Sullivan
Abstract:
A graph is said to be walk-regular if, for each $\ell \geq 1$, every vertex is contained in the same number of closed walks of length $\ell$. We construct a $24$-vertex graph $H_4$ that is not walk-regular yet has maximized walk entropy, $S^V(H_4,β) = \log 24$, for some $β>0$. This graph is a counterexample to a conjecture of Benzi [Linear Algebra Appl.~443 (2014), 395--399, Conjecture 3.1]. We al…
▽ More
A graph is said to be walk-regular if, for each $\ell \geq 1$, every vertex is contained in the same number of closed walks of length $\ell$. We construct a $24$-vertex graph $H_4$ that is not walk-regular yet has maximized walk entropy, $S^V(H_4,β) = \log 24$, for some $β>0$. This graph is a counterexample to a conjecture of Benzi [Linear Algebra Appl.~443 (2014), 395--399, Conjecture 3.1]. We also show that there exist infinitely many temperatures $β_0>0$ so that $S^V(G,β_0)=\log n_G$ if and only if a graph $G$ is walk-regular.
△ Less
Submitted 7 February, 2018; v1 submitted 31 August, 2017;
originally announced August 2017.
-
A practical fpt algorithm for Flow Decomposition and transcript assembly
Authors:
Kyle Kloster,
Philipp Kuinke,
Michael P. O'Brien,
Felix Reidl,
Fernando Sánchez Villaamil,
Blair D. Sullivan,
Andrew van der Poel
Abstract:
The Flow Decomposition problem, which asks for the smallest set of weighted paths that "covers" a flow on a DAG, has recently been used as an important computational step in transcript assembly. We prove the problem is in FPT when parameterized by the number of paths by giving a practical linear fpt algorithm. Further, we implement and engineer a Flow Decomposition solver based on this algorithm,…
▽ More
The Flow Decomposition problem, which asks for the smallest set of weighted paths that "covers" a flow on a DAG, has recently been used as an important computational step in transcript assembly. We prove the problem is in FPT when parameterized by the number of paths by giving a practical linear fpt algorithm. Further, we implement and engineer a Flow Decomposition solver based on this algorithm, and evaluate its performance on RNA-sequence data. Crucially, our solver finds exact solutions while achieving runtimes competitive with a state-of-the-art heuristic. Finally, we contextualize our design choices with two hardness results related to preprocessing and weight recovery. Specifically, $k$-Flow Decomposition does not admit polynomial kernels under standard complexity assumptions, and the related problem of assigning (known) weights to a given set of paths is NP-hard.
△ Less
Submitted 30 August, 2017; v1 submitted 23 June, 2017;
originally announced June 2017.
-
Being even slightly shallow makes life hard
Authors:
Irene Muzi,
Michael P. O'Brien,
Felix Reidl,
Blair D. Sullivan
Abstract:
We study the computational complexity of identifying dense substructures, namely $r/2$-shallow topological minors and $r$-subdivisions. Of particular interest is the case when $r=1$, when these substructures correspond to very localized relaxations of subgraphs. Since Densest Subgraph can be solved in polynomial time, we ask whether these slight relaxations also admit efficient algorithms.
In th…
▽ More
We study the computational complexity of identifying dense substructures, namely $r/2$-shallow topological minors and $r$-subdivisions. Of particular interest is the case when $r=1$, when these substructures correspond to very localized relaxations of subgraphs. Since Densest Subgraph can be solved in polynomial time, we ask whether these slight relaxations also admit efficient algorithms.
In the following, we provide a negative answer: Dense $r/2$-Shallow Topological Minor and Dense $r$-Subdivsion are already NP-hard for $r = 1$ in very sparse graphs. Further, they do not admit algorithms with running time $2^{o(\mathbf{tw}^2)} n^{O(1)}$ when parameterized by the treewidth of the input graph for $r \geq 2$ unless ETH fails.
△ Less
Submitted 18 May, 2017;
originally announced May 2017.
-
Optimizing Adiabatic Quantum Program Compilation using a Graph-Theoretic Framework
Authors:
Timothy D. Goodrich,
Travis S. Humble,
Blair D. Sullivan
Abstract:
Adiabatic quantum computing has evolved in recent years from a theoretical field into an immensely practical area, a change partially sparked by D-Wave System's quantum annealing hardware. These multimillion-dollar quantum annealers offer the potential to solve optimization problems millions of times faster than classical heuristics, prompting researchers at Google, NASA and Lockheed Martin to stu…
▽ More
Adiabatic quantum computing has evolved in recent years from a theoretical field into an immensely practical area, a change partially sparked by D-Wave System's quantum annealing hardware. These multimillion-dollar quantum annealers offer the potential to solve optimization problems millions of times faster than classical heuristics, prompting researchers at Google, NASA and Lockheed Martin to study how these computers can be applied to complex real-world problems such as NASA rover missions. Unfortunately, compiling (embedding) an optimization problem into the annealing hardware is itself a difficult optimization problem and a major bottleneck currently preventing widespread adoption. Additionally, while finding a single embedding is difficult, no generalized method is known for tuning embeddings to use minimal hardware resources. To address these barriers, we introduce a graph-theoretic framework for develo** structured embedding algorithms. Using this framework, we introduce a biclique virtual hardware layer to provide a simplified interface to the physical hardware. Additionally, we exploit bipartite structure in quantum programs using odd cycle transversal (OCT) decompositions. By coupling an OCT-based embedding algorithm with new, generalized reduction methods, we develop a new baseline for embedding a wide range of optimization problems into fault-free D-Wave annealing hardware. To encourage the reuse and extension of these techniques, we provide an implementation of the framework and embedding algorithms.
△ Less
Submitted 27 July, 2017; v1 submitted 6 April, 2017;
originally announced April 2017.
-
Global Fishing Watch: Bringing Transparency to Global Commercial Fisheries
Authors:
Wessley Merten,
Adam Reyer,
Jackie Savitz,
John Amos,
Paul Woods,
Brian Sullivan
Abstract:
Across all major industrial fishing sectors, overfishing due to overcapacity and lack of compliance in fishery governance has led to a decline in biomass of many global fish stocks. Overfishing threatens ocean biodiversity, global food security, and the livelihoods of law abiding fishermen. To address this issue, Global Fishing Watch (GFW) was created to bring transparency to global fisheries usin…
▽ More
Across all major industrial fishing sectors, overfishing due to overcapacity and lack of compliance in fishery governance has led to a decline in biomass of many global fish stocks. Overfishing threatens ocean biodiversity, global food security, and the livelihoods of law abiding fishermen. To address this issue, Global Fishing Watch (GFW) was created to bring transparency to global fisheries using computer science and big data analytics. A product of a partnership between Oceana, SkyTruth and Google, GFW uses the Automatic Identification System, or AIS, to analyze the movement of vessels at sea. AIS provides vessel location data, and GFW uses this information to track global vessel movement and apply algorithms to classify vessel behavior as "fishing" or "non-fishing" activity. Now publicly available, anyone with an internet connection can monitor when and where trackable commercial fishing appears to be occurring around the world. Hundreds of millions of people around the world depend on our ocean for their livelihoods, and many more rely on it for food. Collectively, the various applications of GFW will help reduce overfishing and illegal fishing, restore the ocean's abundance, and ensure sustainability through better monitoring and governance of our marine resources.
△ Less
Submitted 27 September, 2016;
originally announced September 2016.
-
Asymptotic Analysis of Equivalences and Core-Structures in Kronecker-Style Graph Models
Authors:
Alex J. Chin,
Timothy D. Goodrich,
Michael P. O'Brien,
Felix Reidl,
Blair D. Sullivan,
Andrew van der Poel
Abstract:
Growing interest in modeling large, complex networks has spurred significant research into generative graph models. Kronecker-style models (SKG and R-MAT) are often used due to their scalability and ability to mimic key properties of real-world networks. Although a few papers theoretically establish these models' behavior for specific parameters, many claims used to justify their use are supported…
▽ More
Growing interest in modeling large, complex networks has spurred significant research into generative graph models. Kronecker-style models (SKG and R-MAT) are often used due to their scalability and ability to mimic key properties of real-world networks. Although a few papers theoretically establish these models' behavior for specific parameters, many claims used to justify their use are supported only empirically. In this work, we prove several results using asymptotic analysis which illustrate that empirical studies may not fully capture the true behavior of the models.
Paramount to the widespread adoption of Kronecker-style models was the introduction of a linear-time edge-sampling variant (R-MAT), which existing literature typically treats as interchangeable with SKG. We prove that although several R-MAT formulations are asymptotically equivalent, their behavior diverges from that of SKG. Further, we show these results are observable even at relatively small graph sizes. Second, we consider a case where asymptotic analysis reveals unexpected behavior within a given model.
△ Less
Submitted 16 September, 2016;
originally announced September 2016.
-
The 3x3 rooks graph is the unique smallest graph with lazy cop number 3
Authors:
Brendan W. Sullivan,
Nikolas Townsend,
Mikayla Werzanski
Abstract:
In the ordinary version of the pursuit-evasion game "cops and robbers", a team of cops and a robber occupy vertices of a graph and alternately move along the graph's edges, with perfect information about each other. If a cop lands on the robber, the cops win; if the robber can evade the cops indefinitely, he wins. In the variant "lazy cops and robbers", the cops may only choose one member of their…
▽ More
In the ordinary version of the pursuit-evasion game "cops and robbers", a team of cops and a robber occupy vertices of a graph and alternately move along the graph's edges, with perfect information about each other. If a cop lands on the robber, the cops win; if the robber can evade the cops indefinitely, he wins. In the variant "lazy cops and robbers", the cops may only choose one member of their squad to make a move when it's their turn. The minimum number of cops (respectively lazy cops) required to catch the robber is called the "cop number" (resp. "lazy cop number") of G and is denoted $c(G)$ (resp. $c_L(G)$). Previous work by Beveridge at al. has shown that the Petersen graph is the unique graph on ten vertices with $c(G)=3$, and all graphs on nine or fewer vertices have $c(G)\leq 2$. (This was a self-contained mathematical proof of a result found by computational search by Baird and Bonato.) In this article, we prove a similar result for lazy cops, namely that the 3x3 rooks graph ($K_3\square K_3$) is the unique graph on nine vertices which requires three lazy cops, and a graph on eight or fewer vertices requires at most two lazy cops.
△ Less
Submitted 27 June, 2016;
originally announced June 2016.
-
A Fast Parameterized Algorithm for Co-Path Set
Authors:
Blair D. Sullivan,
Andrew van der Poel
Abstract:
The k-CO-PATH SET problem asks, given a graph G and a positive integer k, whether one can delete k edges from G so that the remainder is a collection of disjoint paths. We give a linear-time fpt algorithm with complexity O^*(1.588^k) for deciding k-CO-PATH SET, significantly improving the previously best known O^*(2.17^k) of Feng, Zhou, and Wang (2015). Our main tool is a new O^*(4^{tw(G)}) algori…
▽ More
The k-CO-PATH SET problem asks, given a graph G and a positive integer k, whether one can delete k edges from G so that the remainder is a collection of disjoint paths. We give a linear-time fpt algorithm with complexity O^*(1.588^k) for deciding k-CO-PATH SET, significantly improving the previously best known O^*(2.17^k) of Feng, Zhou, and Wang (2015). Our main tool is a new O^*(4^{tw(G)}) algorithm for CO-PATH SET using the Cut&Count framework, where tw(G) denotes treewidth. In general graphs, we combine this with a branching algorithm which refines a 6k-kernel into reduced instances, which we prove have bounded treewidth.
△ Less
Submitted 27 July, 2016; v1 submitted 14 March, 2016;
originally announced March 2016.
-
Rapid Evolution of the Photosystem II Electronic Structure during Water Splitting
Authors:
Katherine M. Davis,
Brendan T. Sullivan,
Mark Palenik,
Lifen Yan,
Vatsal Purohit,
Gregory Robison,
Irina Kosheleva,
Robert W. Henning,
Gerald T. Seidler,
Yulia Pushkar
Abstract:
Photosynthetic water oxidation is a fundamental process that sustains the biosphere. A Mn$_{4}$Ca cluster embedded in the photosystem II protein environment is responsible for the production of atmospheric oxygen. Here, time-resolved x-ray emission spectroscopy (XES) was used to observe the process of oxygen formation in real time. These experiments reveal that the oxygen evolution step, initiated…
▽ More
Photosynthetic water oxidation is a fundamental process that sustains the biosphere. A Mn$_{4}$Ca cluster embedded in the photosystem II protein environment is responsible for the production of atmospheric oxygen. Here, time-resolved x-ray emission spectroscopy (XES) was used to observe the process of oxygen formation in real time. These experiments reveal that the oxygen evolution step, initiated by three sequential laser flashes, is accompanied by rapid (within 50 $μ$s) changes to the Mn K$β$ XES spectrum. However, no oxidation of the Mn$_{4}$Ca core above the all Mn$^{\text{IV}}$ state was detected to precede O-O bond formation. A new mechanism featuring Mn$^{\text{IV}}$=O formation in the S$_{3}$ state is proposed to explain the spectroscopic results. This chemical formulation is consistent with the unique reactivity of the S$_{3}$ state and explains facilitation of the following S$_{3}$ to S$_{0}$ transition, resolving in part the kinetic limitations associated with O-O bond formation. In the proposed mechanism, O-O bond formation precedes transfer of the final (4$^{\text{th}}$) electron from the Mn$_{4}$Ca cluster, in agreement with experiment.
△ Less
Submitted 29 June, 2015;
originally announced June 2015.