-
Variational Best-of-N Alignment
Authors:
Afra Amini,
Tim Vieira,
Ryan Cotterell
Abstract:
Best-of-N (BoN) is a popular and effective algorithm for aligning language models to human preferences. The algorithm works as follows: at inference time, N samples are drawn from the language model, and the sample with the highest reward, as judged by a reward model, is returned as the output. Despite its effectiveness, BoN is computationally expensive; it reduces sampling throughput by a factor…
▽ More
Best-of-N (BoN) is a popular and effective algorithm for aligning language models to human preferences. The algorithm works as follows: at inference time, N samples are drawn from the language model, and the sample with the highest reward, as judged by a reward model, is returned as the output. Despite its effectiveness, BoN is computationally expensive; it reduces sampling throughput by a factor of N. To make BoN more efficient at inference time, one strategy is to fine-tune the language model to mimic what BoN does during inference. To achieve this, we derive the distribution induced by the BoN algorithm. We then propose to fine-tune the language model to minimize backward KL divergence to the BoN distribution. Our approach is analogous to mean-field variational inference and, thus, we term it variational BoN (vBoN). To the extent this fine-tuning is successful and we end up with a good approximation, we have reduced the inference cost by a factor of N. Our experiments on a controlled generation task suggest that while variational BoN is not as effective as BoN in aligning language models, it is close to BoN performance as vBoN appears more often on the Pareto frontier of reward and KL divergence compared to models trained with KL-constrained RL objective.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
S+t-SNE -- Bringing dimensionality reduction to data streams
Authors:
Pedro C. Vieira,
João P. Montrezol,
João T. Vieira,
João Gama
Abstract:
We present S+t-SNE, an adaptation of the t-SNE algorithm designed to handle infinite data streams. The core idea behind S+t-SNE is to update the t-SNE embedding incrementally as new data arrives, ensuring scalability and adaptability to handle streaming scenarios. By selecting the most important points at each step, the algorithm ensures scalability while kee** informative visualisations. Employ…
▽ More
We present S+t-SNE, an adaptation of the t-SNE algorithm designed to handle infinite data streams. The core idea behind S+t-SNE is to update the t-SNE embedding incrementally as new data arrives, ensuring scalability and adaptability to handle streaming scenarios. By selecting the most important points at each step, the algorithm ensures scalability while kee** informative visualisations. Employing a blind method for drift management adjusts the embedding space, facilitating continuous visualisation of evolving data dynamics. Our experimental evaluations demonstrate the effectiveness and efficiency of S+t-SNE. The results highlight its ability to capture patterns in a streaming scenario. We hope our approach offers researchers and practitioners a real-time tool for understanding and interpreting high-dimensional data.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Direct Preference Optimization with an Offset
Authors:
Afra Amini,
Tim Vieira,
Ryan Cotterell
Abstract:
Direct preference optimization (DPO) is a successful fine-tuning strategy for aligning large language models with human preferences without the need to train a reward model or employ reinforcement learning. DPO, as originally formulated, relies on binary preference data and fine-tunes a language model to increase the likelihood of a preferred response over a dispreferred response. However, not all…
▽ More
Direct preference optimization (DPO) is a successful fine-tuning strategy for aligning large language models with human preferences without the need to train a reward model or employ reinforcement learning. DPO, as originally formulated, relies on binary preference data and fine-tunes a language model to increase the likelihood of a preferred response over a dispreferred response. However, not all preference pairs are equal. Sometimes, the preferred response is only slightly better than the dispreferred one. In other cases, the preference is much stronger. For instance, if a response contains harmful or toxic content, the annotator will have a strong preference for that response. In this paper, we propose a generalization of DPO, termed DPO with an offset (ODPO), that does not treat every preference pair equally during fine-tuning. Intuitively, ODPO requires the difference between the likelihood of the preferred and dispreferred response to be greater than an offset value. The offset is determined based on the extent to which one response is preferred over another. Our experiments on various tasks suggest that ODPO significantly outperforms DPO in aligning language models, especially when the number of preference pairs is limited.
△ Less
Submitted 6 June, 2024; v1 submitted 16 February, 2024;
originally announced February 2024.
-
An Exploration of Left-Corner Transformations
Authors:
Andreas Opedal,
Eleftheria Tsipidi,
Tiago Pimentel,
Ryan Cotterell,
Tim Vieira
Abstract:
The left-corner transformation (Rosenkrantz and Lewis, 1970) is used to remove left recursion from context-free grammars, which is an important step towards making the grammar parsable top-down with simple techniques. This paper generalizes prior left-corner transformations to support semiring-weighted production rules and to provide finer-grained control over which left corners may be moved. Our…
▽ More
The left-corner transformation (Rosenkrantz and Lewis, 1970) is used to remove left recursion from context-free grammars, which is an important step towards making the grammar parsable top-down with simple techniques. This paper generalizes prior left-corner transformations to support semiring-weighted production rules and to provide finer-grained control over which left corners may be moved. Our generalized left-corner transformation (GLCT) arose from unifying the left-corner transformation and speculation transformation (Eisner and Blatz, 2007), originally for logic programming. Our new transformation and speculation define equivalent weighted languages. Yet, their derivation trees are structurally different in an important way: GLCT replaces left recursion with right recursion, and speculation does not. We also provide several technical results regarding the formal relationships between the outputs of GLCT, speculation, and the original grammar. Lastly, we empirically investigate the efficiency of GLCT for left-recursion elimination from grammars of nine languages.
△ Less
Submitted 27 November, 2023;
originally announced November 2023.
-
Efficient Algorithms for Recognizing Weighted Tree-Adjoining Languages
Authors:
Alexandra Butoi,
Tim Vieira,
Ryan Cotterell,
David Chiang
Abstract:
The class of tree-adjoining languages can be characterized by various two-level formalisms, consisting of a context-free grammar (CFG) or pushdown automaton (PDA) controlling another CFG or PDA. These four formalisms are equivalent to tree-adjoining grammars (TAG), linear indexed grammars (LIG), pushdown-adjoining automata (PAA), and embedded pushdown automata (EPDA). We define semiring-weighted v…
▽ More
The class of tree-adjoining languages can be characterized by various two-level formalisms, consisting of a context-free grammar (CFG) or pushdown automaton (PDA) controlling another CFG or PDA. These four formalisms are equivalent to tree-adjoining grammars (TAG), linear indexed grammars (LIG), pushdown-adjoining automata (PAA), and embedded pushdown automata (EPDA). We define semiring-weighted versions of the above two-level formalisms, and we design new algorithms for computing their stringsums (the weight of all derivations of a string) and allsums (the weight of all derivations). From these, we also immediately obtain stringsum and allsum algorithms for TAG, LIG, PAA, and EPDA. For LIG, our algorithm is more time-efficient by a factor of $\mathcal{O}(n|\mathcal{N}|)$ (where $n$ is the string length and $|\mathcal{N}|$ is the size of the nonterminal set) and more space-efficient by a factor of $\mathcal{O}(|Γ|)$ (where $|Γ|$ is the size of the stack alphabet) than the algorithm of Vijay-Shanker and Weir (1989). For EPDA, our algorithm is both more space-efficient and time-efficient than the algorithm of Alonso et al. (2001) by factors of $\mathcal{O}(|Γ|^2)$ and $\mathcal{O}(|Γ|^3)$, respectively. Finally, we give the first PAA stringsum and allsum algorithms.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Recognizing Handwritten Mathematical Expressions of Vertical Addition and Subtraction
Authors:
Daniel Rosa,
Filipe R. Cordeiro,
Ruan Carvalho,
Everton Souza,
Sergio Chevtchenko,
Luiz Rodrigues,
Marcelo Marinho,
Thales Vieira,
Valmir Macario
Abstract:
Handwritten Mathematical Expression Recognition (HMER) is a challenging task with many educational applications. Recent methods for HMER have been developed for complex mathematical expressions in standard horizontal format. However, solutions for elementary mathematical expression, such as vertical addition and subtraction, have not been explored in the literature. This work proposes a new handwr…
▽ More
Handwritten Mathematical Expression Recognition (HMER) is a challenging task with many educational applications. Recent methods for HMER have been developed for complex mathematical expressions in standard horizontal format. However, solutions for elementary mathematical expression, such as vertical addition and subtraction, have not been explored in the literature. This work proposes a new handwritten elementary mathematical expression dataset composed of addition and subtraction expressions in a vertical format. We also extended the MNIST dataset to generate artificial images with this structure. Furthermore, we proposed a solution for offline HMER, able to recognize vertical addition and subtraction expressions. Our analysis evaluated the object detection algorithms YOLO v7, YOLO v8, YOLO-NAS, NanoDet and FCOS for identifying the mathematical symbols. We also proposed a transcription method to map the bounding boxes from the object detection stage to a mathematical expression in the LATEX markup sequence. Results show that our approach is efficient, achieving a high expression recognition rate. The code and dataset are available at https://github.com/Danielgol/HME-VAS
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
Efficient Semiring-Weighted Earley Parsing
Authors:
Andreas Opedal,
Ran Zmigrod,
Tim Vieira,
Ryan Cotterell,
Jason Eisner
Abstract:
This paper provides a reference description, in the form of a deduction system, of Earley's (1970) context-free parsing algorithm with various speed-ups. Our presentation includes a known worst-case runtime improvement from Earley's $O (N^3|G||R|)$, which is unworkable for the large grammars that arise in natural language processing, to $O (N^3|G|)$, which matches the runtime of CKY on a binarized…
▽ More
This paper provides a reference description, in the form of a deduction system, of Earley's (1970) context-free parsing algorithm with various speed-ups. Our presentation includes a known worst-case runtime improvement from Earley's $O (N^3|G||R|)$, which is unworkable for the large grammars that arise in natural language processing, to $O (N^3|G|)$, which matches the runtime of CKY on a binarized version of the grammar $G$. Here $N$ is the length of the sentence, $|R|$ is the number of productions in $G$, and $|G|$ is the total length of those productions. We also provide a version that achieves runtime of $O (N^3|M|)$ with $|M| \leq |G|$ when the grammar is represented compactly as a single finite-state automaton $M$ (this is partly novel). We carefully treat the generalization to semiring-weighted deduction, preprocessing the grammar like Stolcke (1995) to eliminate deduction cycles, and further generalize Stolcke's method to compute the weights of sentence prefixes. We also provide implementation details for efficient execution, ensuring that on a preprocessed grammar, the semiring-weighted versions of our methods have the same asymptotic runtime and space requirements as the unweighted methods, including sub-cubic runtime on some grammars.
△ Less
Submitted 6 July, 2023;
originally announced July 2023.
-
A Formal Perspective on Byte-Pair Encoding
Authors:
Vilém Zouhar,
Clara Meister,
Juan Luis Gastaldi,
Li Du,
Tim Vieira,
Mrinmaya Sachan,
Ryan Cotterell
Abstract:
Byte-Pair Encoding (BPE) is a popular algorithm used for tokenizing data in NLP, despite being devised initially as a compression method. BPE appears to be a greedy algorithm at face value, but the underlying optimization problem that BPE seeks to solve has not yet been laid down. We formalize BPE as a combinatorial optimization problem. Via submodular functions, we prove that the iterative greedy…
▽ More
Byte-Pair Encoding (BPE) is a popular algorithm used for tokenizing data in NLP, despite being devised initially as a compression method. BPE appears to be a greedy algorithm at face value, but the underlying optimization problem that BPE seeks to solve has not yet been laid down. We formalize BPE as a combinatorial optimization problem. Via submodular functions, we prove that the iterative greedy version is a $\frac{1}{σ(\boldsymbolμ^\star)}(1-e^{-{σ(\boldsymbolμ^\star)}})$-approximation of an optimal merge sequence, where ${σ(\boldsymbolμ^\star)}$ is the total backward curvature with respect to the optimal merge sequence $\boldsymbolμ^\star$. Empirically the lower bound of the approximation is $\approx 0.37$.
We provide a faster implementation of BPE which improves the runtime complexity from $\mathcal{O}\left(N M\right)$ to $\mathcal{O}\left(N \log M\right)$, where $N$ is the sequence length and $M$ is the merge count. Finally, we optimize the brute-force algorithm for optimal BPE using memoization.
△ Less
Submitted 29 June, 2023;
originally announced June 2023.
-
Automatic Design of Telecom Networks with Genetic Algorithms
Authors:
João Correia,
Gustavo Gama,
João Tiago Guerrinha,
Ricardo Cadime,
Pedro Antero Carvalhido,
Tiago Vieira,
Nuno Lourenço
Abstract:
With the increasing demand for high-quality internet services, deploying GPON/Fiber-to-the-Home networks is one of the biggest challenges that internet providers have to deal with due to the significant investments involved. Automated network design usage becomes more critical to aid with planning the network by minimising the costs of planning and deployment. The main objective is to tackle this…
▽ More
With the increasing demand for high-quality internet services, deploying GPON/Fiber-to-the-Home networks is one of the biggest challenges that internet providers have to deal with due to the significant investments involved. Automated network design usage becomes more critical to aid with planning the network by minimising the costs of planning and deployment. The main objective is to tackle this problem of optimisation of networks that requires taking into account multiple factors such as the equipment placement and their configuration, the optimisation of the cable routes, the optimisation of the clients' allocation and other constraints involved in the minimisation problem. An AI-based solution is proposed to automate network design, which is a task typically done manually by teams of engineers. It is a difficult task requiring significant time to complete manually. To alleviate this tiresome task, we proposed a Genetic Algorithm using a two-level representation to design the networks automatically. To validate the approach, we compare the quality of the generated solutions with the handmade design ones that are deployed in the real world. The results show that our method can save costs and time in finding suitable and better solutions than existing ones, indicating its potential as a support design tool of solutions for GPON/Fiber-to-the-Home networks. In concrete, in the two scenarios where we validate our proposal, our approach can cut costs by 31% and by 52.2%, respectively, when compared with existing handmade ones, showcasing and validating the potential of the proposed approach.
△ Less
Submitted 2 April, 2023;
originally announced April 2023.
-
Algorithms for Acyclic Weighted Finite-State Automata with Failure Arcs
Authors:
Anej Svete,
Benjamin Dayan,
Tim Vieira,
Ryan Cotterell,
Jason Eisner
Abstract:
Weighted finite-state automata (WSFAs) are commonly used in NLP. Failure transitions are a useful extension for compactly representing backoffs or interpolation in $n$-gram models and CRFs, which are special cases of WFSAs. The pathsum in ordinary acyclic WFSAs is efficiently computed by the backward algorithm in time $O(|E|)$, where $E$ is the set of transitions. However, this does not allow fail…
▽ More
Weighted finite-state automata (WSFAs) are commonly used in NLP. Failure transitions are a useful extension for compactly representing backoffs or interpolation in $n$-gram models and CRFs, which are special cases of WFSAs. The pathsum in ordinary acyclic WFSAs is efficiently computed by the backward algorithm in time $O(|E|)$, where $E$ is the set of transitions. However, this does not allow failure transitions, and preprocessing the WFSA to eliminate failure transitions could greatly increase $|E|$. We extend the backward algorithm to handle failure transitions directly. Our approach is efficient when the average state has outgoing arcs for only a small fraction $s \ll 1$ of the alphabet $Σ$. We propose an algorithm for general acyclic WFSAs which runs in $O{\left(|E| + s |Σ| |Q| T_\text{max} \log{|Σ|}\right)}$, where $Q$ is the set of states and $T_\text{max}$ is the size of the largest connected component of failure transitions. When the failure transition topology satisfies a condition exemplified by CRFs, the $T_\text{max}$ factor can be dropped, and when the weight semiring is a ring, the $\log{|Σ|}$ factor can be dropped. In the latter case (ring-weighted acyclic WFSAs), we also give an alternative algorithm with complexity $\displaystyle O{\left(|E| + |Σ| |Q| \min(1,sπ_\text{max}) \right)}$, where $π_\text{max}$ is the size of the longest failure path.
△ Less
Submitted 11 July, 2023; v1 submitted 17 January, 2023;
originally announced January 2023.
-
Algorithms for Weighted Pushdown Automata
Authors:
Alexandra Butoi,
Brian DuSell,
Tim Vieira,
Ryan Cotterell,
David Chiang
Abstract:
Weighted pushdown automata (WPDAs) are at the core of many natural language processing tasks, like syntax-based statistical machine translation and transition-based dependency parsing. As most existing dynamic programming algorithms are designed for context-free grammars (CFGs), algorithms for PDAs often resort to a PDA-to-CFG conversion. In this paper, we develop novel algorithms that operate dir…
▽ More
Weighted pushdown automata (WPDAs) are at the core of many natural language processing tasks, like syntax-based statistical machine translation and transition-based dependency parsing. As most existing dynamic programming algorithms are designed for context-free grammars (CFGs), algorithms for PDAs often resort to a PDA-to-CFG conversion. In this paper, we develop novel algorithms that operate directly on WPDAs. Our algorithms are inspired by Lang's algorithm, but use a more general definition of pushdown automaton and either reduce the space requirements by a factor of $|Γ|$ (the size of the stack alphabet) or reduce the runtime by a factor of more than $|Q|$ (the number of states). When run on the same class of PDAs as Lang's algorithm, our algorithm is both more space-efficient by a factor of $|Γ|$ and more time-efficient by a factor of $|Q| \cdot |Γ|$.
△ Less
Submitted 18 November, 2022; v1 submitted 13 October, 2022;
originally announced October 2022.
-
On the Intersection of Context-Free and Regular Languages
Authors:
Clemente Pasti,
Andreas Opedal,
Tiago Pimentel,
Tim Vieira,
Jason Eisner,
Ryan Cotterell
Abstract:
The Bar-Hillel construction is a classic result in formal language theory. It shows, by a simple construction, that the intersection of a context-free language and a regular language is itself context-free. In the construction, the regular language is specified by a finite-state automaton. However, neither the original construction (Bar-Hillel et al., 1961) nor its weighted extension (Nederhof and…
▽ More
The Bar-Hillel construction is a classic result in formal language theory. It shows, by a simple construction, that the intersection of a context-free language and a regular language is itself context-free. In the construction, the regular language is specified by a finite-state automaton. However, neither the original construction (Bar-Hillel et al., 1961) nor its weighted extension (Nederhof and Satta, 2003) can handle finite-state automata with $\varepsilon$-arcs. While it is possible to remove $\varepsilon$-arcs from a finite-state automaton efficiently without modifying the language, such an operation modifies the automaton's set of paths. We give a construction that generalizes the Bar-Hillel in the case where the desired automaton has $\varepsilon$-arcs, and further prove that our generalized construction leads to a grammar that encodes the structure of both the input automaton and grammar while retaining the asymptotic size of the original construction.
△ Less
Submitted 18 May, 2023; v1 submitted 14 September, 2022;
originally announced September 2022.
-
Exact Paired-Permutation Testing for Structured Test Statistics
Authors:
Ran Zmigrod,
Tim Vieira,
Ryan Cotterell
Abstract:
Significance testing -- especially the paired-permutation test -- has played a vital role in develo** NLP systems to provide confidence that the difference in performance between two systems (i.e., the test statistic) is not due to luck. However, practitioners rely on Monte Carlo approximation to perform this test due to a lack of a suitable exact algorithm. In this paper, we provide an efficien…
▽ More
Significance testing -- especially the paired-permutation test -- has played a vital role in develo** NLP systems to provide confidence that the difference in performance between two systems (i.e., the test statistic) is not due to luck. However, practitioners rely on Monte Carlo approximation to perform this test due to a lack of a suitable exact algorithm. In this paper, we provide an efficient exact algorithm for the paired-permutation test for a family of structured test statistics. Our algorithm runs in $\mathcal{O}(GN (\log GN )(\log N ))$ time where $N$ is the dataset size and $G$ is the range of the test statistic. We found that our exact algorithm was $10$x faster than the Monte Carlo approximation with $20000$ samples on a common dataset.
△ Less
Submitted 4 May, 2022; v1 submitted 3 May, 2022;
originally announced May 2022.
-
Automatic evaluation of scientific abstracts through natural language processing
Authors:
Lucas G. O. Lopes,
Thales M. A. Vieira,
William W. M. Lira
Abstract:
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems…
▽ More
This work presents a framework to classify and evaluate distinct research abstract texts which are focused on the description of processes and their applications. In this context, this paper proposes natural language processing algorithms to classify, segment and evaluate the results of scientific work. Initially, the proposed framework categorize the abstract texts into according to the problems intended to be solved by employing a text classification approach. Then, the abstract text is segmented into problem description, methodology and results. Finally, the methodology of the abstract is ranked based on the sentiment analysis of its results. The proposed framework allows us to quickly rank the best methods to solve specific problems. To validate the proposed framework, oil production anomaly abstracts were experimented and achieved promising results.
△ Less
Submitted 14 November, 2021;
originally announced December 2021.
-
Conditional Poisson Stochastic Beam Search
Authors:
Clara Meister,
Afra Amini,
Tim Vieira,
Ryan Cotterell
Abstract:
Beam search is the default decoding strategy for many sequence generation tasks in NLP. The set of approximate K-best items returned by the algorithm is a useful summary of the distribution for many applications; however, the candidates typically exhibit high overlap and may give a highly biased estimate for expectations under our model. These problems can be addressed by instead using stochastic…
▽ More
Beam search is the default decoding strategy for many sequence generation tasks in NLP. The set of approximate K-best items returned by the algorithm is a useful summary of the distribution for many applications; however, the candidates typically exhibit high overlap and may give a highly biased estimate for expectations under our model. These problems can be addressed by instead using stochastic decoding strategies. In this work, we propose a new method for turning beam search into a stochastic process: Conditional Poisson stochastic beam search. Rather than taking the maximizing set at each iteration, we sample K candidates without replacement according to the conditional Poisson sampling design. We view this as a more natural alternative to Kool et. al. 2019's stochastic beam search (SBS). Furthermore, we show how samples generated under the CPSBS design can be used to build consistent estimators and sample diverse sets from sequence models. In our experiments, we observe CPSBS produces lower variance and more efficient estimators than SBS, even showing improvements in high entropy settings.
△ Less
Submitted 1 March, 2023; v1 submitted 22 September, 2021;
originally announced September 2021.
-
Searching for More Efficient Dynamic Programs
Authors:
Tim Vieira,
Ryan Cotterell,
Jason Eisner
Abstract:
Computational models of human language often involve combinatorial problems. For instance, a probabilistic parser may marginalize over exponentially many trees to make predictions. Algorithms for such problems often employ dynamic programming and are not always unique. Finding one with optimal asymptotic runtime can be unintuitive, time-consuming, and error-prone. Our work aims to automate this la…
▽ More
Computational models of human language often involve combinatorial problems. For instance, a probabilistic parser may marginalize over exponentially many trees to make predictions. Algorithms for such problems often employ dynamic programming and are not always unique. Finding one with optimal asymptotic runtime can be unintuitive, time-consuming, and error-prone. Our work aims to automate this laborious process. Given an initial correct declarative program, we search for a sequence of semantics-preserving transformations to improve its running time as much as possible. To this end, we describe a set of program transformations, a simple metric for assessing the efficiency of a transformed program, and a heuristic search procedure to improve this metric. We show that in practice, automated search -- like the mental search performed by human programmers -- can find substantial improvements to the initial program. Empirically, we show that many common speed-ups described in the NLP literature could have been discovered automatically by our system.
△ Less
Submitted 14 September, 2021;
originally announced September 2021.
-
Efficient Sampling of Dependency Structures
Authors:
Ran Zmigrod,
Tim Vieira,
Ryan Cotterell
Abstract:
Probabilistic distributions over spanning trees in directed graphs are a fundamental model of dependency structure in natural language processing, syntactic dependency trees. In NLP, dependency trees often have an additional root constraint: only one edge may emanate from the root. However, no sampling algorithm has been presented in the literature to account for this additional constraint. In thi…
▽ More
Probabilistic distributions over spanning trees in directed graphs are a fundamental model of dependency structure in natural language processing, syntactic dependency trees. In NLP, dependency trees often have an additional root constraint: only one edge may emanate from the root. However, no sampling algorithm has been presented in the literature to account for this additional constraint. In this paper, we adapt two spanning tree sampling algorithms to faithfully sample dependency trees from a graph subject to the root constraint. Wilson (1996)'s sampling algorithm has a running time of $\mathcal{O}(H)$ where $H$ is the mean hitting time of the graph. Colbourn (1996)'s sampling algorithm has a running time of $\mathcal{O}(N^3)$, which is often greater than the mean hitting time of a directed graph. Additionally, we build upon Colbourn's algorithm and present a novel extension that can sample $K$ trees without replacement in $\mathcal{O}(K N^3 + K^2 N)$ time. To the best of our knowledge, no algorithm has been given for sampling spanning trees without replacement from a directed graph.
△ Less
Submitted 8 July, 2022; v1 submitted 14 September, 2021;
originally announced September 2021.
-
On Finding the $K$-best Non-projective Dependency Trees
Authors:
Ran Zmigrod,
Tim Vieira,
Ryan Cotterell
Abstract:
The connection between the maximum spanning tree in a directed graph and the best dependency tree of a sentence has been exploited by the NLP community. However, for many dependency parsing schemes, an important detail of this approach is that the spanning tree must have exactly one edge emanating from the root. While work has been done to efficiently solve this problem for finding the one-best de…
▽ More
The connection between the maximum spanning tree in a directed graph and the best dependency tree of a sentence has been exploited by the NLP community. However, for many dependency parsing schemes, an important detail of this approach is that the spanning tree must have exactly one edge emanating from the root. While work has been done to efficiently solve this problem for finding the one-best dependency tree, no research has attempted to extend this solution to finding the $K$-best dependency trees. This is arguably a more important extension as a larger proportion of decoded trees will not be subject to the root constraint of dependency trees. Indeed, we show that the rate of root constraint violations increases by an average of $13$ times when decoding with $K\!=\!50$ as opposed to $K\!=\!1$. In this paper, we provide a simplification of the $K$-best spanning tree algorithm of Camerini et al. (1980). Our simplification allows us to obtain a constant time speed-up over the original algorithm. Furthermore, we present a novel extension of the algorithm for decoding the $K$-best dependency trees of a graph which are subject to a root constraint.
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Higher-order Derivatives of Weighted Finite-state Machines
Authors:
Ran Zmigrod,
Tim Vieira,
Ryan Cotterell
Abstract:
Weighted finite-state machines are a fundamental building block of NLP systems. They have withstood the test of time -- from their early use in noisy channel models in the 1990s up to modern-day neurally parameterized conditional random fields. This work examines the computation of higher-order derivatives with respect to the normalization constant for weighted finite-state machines. We provide a…
▽ More
Weighted finite-state machines are a fundamental building block of NLP systems. They have withstood the test of time -- from their early use in noisy channel models in the 1990s up to modern-day neurally parameterized conditional random fields. This work examines the computation of higher-order derivatives with respect to the normalization constant for weighted finite-state machines. We provide a general algorithm for evaluating derivatives of all orders, which has not been previously described in the literature. In the case of second-order derivatives, our scheme runs in the optimal $\mathcal{O}(A^2 N^4)$ time where $A$ is the alphabet size and $N$ is the number of states. Our algorithm is significantly faster than prior algorithms. Additionally, our approach leads to a significantly faster algorithm for computing second-order expectations, such as covariance matrices and gradients of first-order expectations.
△ Less
Submitted 27 September, 2023; v1 submitted 1 June, 2021;
originally announced June 2021.
-
User-oriented Natural Human-Robot Control with Thin-Plate Splines and LRCN
Authors:
Bruno Lima,
Lucas Amaral,
Givanildo Nascimento-Jr,
Victor Mafra,
Bruno Georgevich Ferreira,
Tiago Vieira,
Thales Vieira
Abstract:
We propose a real-time vision-based teleoperation approach for robotic arms that employs a single depth-based camera, exempting the user from the need for any wearable devices. By employing a natural user interface, this novel approach leverages the conventional fine-tuning control, turning it into a direct body pose capture process. The proposed approach is comprised of two main parts. The first…
▽ More
We propose a real-time vision-based teleoperation approach for robotic arms that employs a single depth-based camera, exempting the user from the need for any wearable devices. By employing a natural user interface, this novel approach leverages the conventional fine-tuning control, turning it into a direct body pose capture process. The proposed approach is comprised of two main parts. The first is a nonlinear customizable pose map** based on Thin-Plate Splines (TPS), to directly transfer human body motion to robotic arm motion in a nonlinear fashion, thus allowing matching dissimilar bodies with different workspace shapes and kinematic constraints. The second is a Deep Neural Network hand-state classifier based on Long-term Recurrent Convolutional Networks (LRCN) that exploits the temporal coherence of the acquired depth data. We validate, evaluate and compare our approach through both classical cross-validation experiments of the proposed hand state classifier; and user studies over a set of practical experiments involving variants of pick-and-place and manufacturing tasks. Results revealed that LRCN networks outperform single image Convolutional Neural Networks; and that users' learning curves were steep, thus allowing the successful completion of the proposed tasks. When compared to a previous approach, the TPS approach revealed no increase in task complexity and similar times of completion, while providing more precise operation in regions closer to workspace boundaries.
△ Less
Submitted 19 April, 2022; v1 submitted 23 May, 2021;
originally announced May 2021.
-
Evaluation of Logic Programs with Built-Ins and Aggregation: A Calculus for Bag Relations
Authors:
Matthew Francis-Landau,
Tim Vieira,
Jason Eisner
Abstract:
We present a scheme for translating logic programs, which may use aggregation and arithmetic, into algebraic expressions that denote bag relations over ground terms of the Herbrand universe. To evaluate queries against these relations, we develop an operational semantics based on term rewriting of the algebraic expressions. This approach can exploit arithmetic identities and recovers a range of us…
▽ More
We present a scheme for translating logic programs, which may use aggregation and arithmetic, into algebraic expressions that denote bag relations over ground terms of the Herbrand universe. To evaluate queries against these relations, we develop an operational semantics based on term rewriting of the algebraic expressions. This approach can exploit arithmetic identities and recovers a range of useful strategies, including lazy strategies that defer work until it becomes possible or necessary.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
If beam search is the answer, what was the question?
Authors:
Clara Meister,
Tim Vieira,
Ryan Cotterell
Abstract:
Quite surprisingly, exact maximum a posteriori (MAP) decoding of neural language generators frequently leads to low-quality results. Rather, most state-of-the-art results on language generation tasks are attained using beam search despite its overwhelmingly high search error rate. This implies that the MAP objective alone does not express the properties we desire in text, which merits the question…
▽ More
Quite surprisingly, exact maximum a posteriori (MAP) decoding of neural language generators frequently leads to low-quality results. Rather, most state-of-the-art results on language generation tasks are attained using beam search despite its overwhelmingly high search error rate. This implies that the MAP objective alone does not express the properties we desire in text, which merits the question: if beam search is the answer, what was the question? We frame beam search as the exact solution to a different decoding objective in order to gain insights into why high probability under a model alone may not indicate adequacy. We find that beam search enforces uniform information density in text, a property motivated by cognitive science. We suggest a set of decoding objectives that explicitly enforce this property and find that exact decoding with these objectives alleviates the problems encountered when decoding poorly calibrated language generation models. Additionally, we analyze the text produced using various decoding strategies and see that, in our neural machine translation experiments, the extent to which this property is adhered to strongly correlates with BLEU.
△ Less
Submitted 17 January, 2021; v1 submitted 6 October, 2020;
originally announced October 2020.
-
Please Mind the Root: Decoding Arborescences for Dependency Parsing
Authors:
Ran Zmigrod,
Tim Vieira,
Ryan Cotterell
Abstract:
The connection between dependency trees and spanning trees is exploited by the NLP community to train and to decode graph-based dependency parsers. However, the NLP literature has missed an important difference between the two structures: only one edge may emanate from the root in a dependency tree. We analyzed the output of state-of-the-art parsers on many languages from the Universal Dependency…
▽ More
The connection between dependency trees and spanning trees is exploited by the NLP community to train and to decode graph-based dependency parsers. However, the NLP literature has missed an important difference between the two structures: only one edge may emanate from the root in a dependency tree. We analyzed the output of state-of-the-art parsers on many languages from the Universal Dependency Treebank: although these parsers are often able to learn that trees which violate the constraint should be assigned lower probabilities, their ability to do so unsurprisingly de-grades as the size of the training set decreases. In fact, the worst constraint-violation rate we observe is 24%. Prior work has proposed an inefficient algorithm to enforce the constraint, which adds a factor of n to the decoding runtime. We adapt an algorithm due to Gabow and Tarjan (1984) to dependency parsing, which satisfies the constraint without compromising the original runtime.
△ Less
Submitted 7 October, 2020; v1 submitted 6 October, 2020;
originally announced October 2020.
-
A type language for message passing component-based systems
Authors:
Zorica Savanović,
Letterio Galletta,
Hugo Torres Vieira
Abstract:
Component-based development is challenging in a distributed setting, for starters considering programming a task may involve the assembly of loosely-coupled remote components. In order for the task to be fulfilled, the supporting interaction among components should follow a well-defined protocol. In this paper we address a model for message passing component-based systems where components are asse…
▽ More
Component-based development is challenging in a distributed setting, for starters considering programming a task may involve the assembly of loosely-coupled remote components. In order for the task to be fulfilled, the supporting interaction among components should follow a well-defined protocol. In this paper we address a model for message passing component-based systems where components are assembled together with the protocol itself. Components can therefore be independent from the protocol, and reactive to messages in a flexible way. Our contribution is at the level of the type language that allows to capture component behaviour so as to check its compatibility with a protocol. We show the correspondence of component and type behaviours, which entails a progress property for components.
△ Less
Submitted 16 September, 2020;
originally announced September 2020.
-
Efficient Computation of Expectations under Spanning Tree Distributions
Authors:
Ran Zmigrod,
Tim Vieira,
Ryan Cotterell
Abstract:
We give a general framework for inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. These algorithms are easy to imple…
▽ More
We give a general framework for inference in spanning tree models. We propose unified algorithms for the important cases of first-order expectations and second-order expectations in edge-factored, non-projective spanning-tree models. Our algorithms exploit a fundamental connection between gradients and expectations, which allows us to derive efficient algorithms. These algorithms are easy to implement with or without automatic differentiation software. We motivate the development of our framework with several \emph{cautionary tales} of previous research, which has developed numerous inefficient algorithms for computing expectations and their gradients. We demonstrate how our framework efficiently computes several quantities with known algorithms, including the expected attachment score, entropy, and generalized expectation criteria. As a bonus, we give algorithms for quantities that are missing in the literature, including the KL divergence. In all cases, our approach matches the efficiency of existing algorithms and, in several cases, reduces the runtime complexity by a factor of the sentence length. We validate the implementation of our framework through runtime experiments. We find our algorithms are up to 15 and 9 times faster than previous algorithms for computing the Shannon entropy and the gradient of the generalized expectation objective, respectively.
△ Less
Submitted 25 March, 2021; v1 submitted 29 August, 2020;
originally announced August 2020.
-
Best-First Beam Search
Authors:
Clara Meister,
Tim Vieira,
Ryan Cotterell
Abstract:
Decoding for many NLP tasks requires an effective heuristic algorithm for approximating exact search since the problem of searching the full output space is often intractable, or impractical in many settings. The default algorithm for this job is beam search -- a pruned version of breadth-first search. Quite surprisingly, beam search often returns better results than exact inference due to benefic…
▽ More
Decoding for many NLP tasks requires an effective heuristic algorithm for approximating exact search since the problem of searching the full output space is often intractable, or impractical in many settings. The default algorithm for this job is beam search -- a pruned version of breadth-first search. Quite surprisingly, beam search often returns better results than exact inference due to beneficial search bias for NLP tasks. In this work, we show that the standard implementation of beam search can be made up to 10x faster in practice. Our method assumes that the scoring function is monotonic in the sequence length, which allows us to safely prune hypotheses that cannot be in the final set of hypotheses early on. We devise effective monotonic approximations to popular nonmonontic scoring functions, including length normalization and mutual information decoding. Lastly, we propose a memory-reduced variant of Best-First Beam Search, which has a similar beneficial search bias in terms of downstream performance, but runs in a fraction of the time.
△ Less
Submitted 15 November, 2022; v1 submitted 8 July, 2020;
originally announced July 2020.
-
LRCN-RetailNet: A recurrent neural network architecture for accurate people counting
Authors:
Lucas Massa,
Adriano Barbosa,
Krerley Oliveira,
Thales Vieira
Abstract:
Measuring and analyzing the flow of customers in retail stores is essential for a retailer to better comprehend customers' behavior and support decision-making. Nevertheless, not much attention has been given to the development of novel technologies for automatic people counting. We introduce LRCN-RetailNet: a recurrent neural network architecture capable of learning a non-linear regression model…
▽ More
Measuring and analyzing the flow of customers in retail stores is essential for a retailer to better comprehend customers' behavior and support decision-making. Nevertheless, not much attention has been given to the development of novel technologies for automatic people counting. We introduce LRCN-RetailNet: a recurrent neural network architecture capable of learning a non-linear regression model and accurately predicting the people count from videos captured by low-cost surveillance cameras. The input video format follows the recently proposed RGBP image format, which is comprised of color and people (foreground) information. Our architecture is capable of considering two relevant aspects: spatial features extracted through convolutional layers from the RGBP images; and the temporal coherence of the problem, which is exploited by recurrent layers. We show that, through a supervised learning approach, the trained models are capable of predicting the people count with high accuracy. Additionally, we present and demonstrate that a straightforward modification of the methodology is effective to exclude salespeople from the people count. Comprehensive experiments were conducted to validate, evaluate and compare the proposed architecture. Results corroborated that LRCN-RetailNet remarkably outperforms both the previous RetailNet architecture, which was limited to evaluating a single image per iteration; and a state-of-the-art neural network for object detection. Finally, computational performance experiments confirmed that the entire methodology is effective to estimate people count in real-time.
△ Less
Submitted 12 May, 2020; v1 submitted 20 April, 2020;
originally announced April 2020.
-
Design and performance of a 35-ton liquid argon time projection chamber as a prototype for future very large detectors
Authors:
D. L. Adams,
M. Baird,
G. Barr,
N. Barros,
A. Blake,
E. Blaufuss,
A. Booth,
D. Brailsford,
N. Buchanan,
B. Carls,
H. Chen,
M. Convery,
G. De Geronimo,
T. Dealtry,
R. Dharmapalan,
Z. Djurcic,
J. Fowler,
S. Glavin,
R. A. Gomes,
M. C. Goodman,
M. Graham,
L. Greenler,
A. Hahn,
J. Hartnell,
R. Herbst
, et al. (49 additional authors not shown)
Abstract:
Liquid argon time projection chamber technology is an attractive choice for large neutrino detectors, as it provides a high-resolution active target and it is expected to be scalable to very large masses. Consequently, it has been chosen as the technology for the first module of the DUNE far detector. However, the fiducial mass required for "far detectors" of the next generation of neutrino oscill…
▽ More
Liquid argon time projection chamber technology is an attractive choice for large neutrino detectors, as it provides a high-resolution active target and it is expected to be scalable to very large masses. Consequently, it has been chosen as the technology for the first module of the DUNE far detector. However, the fiducial mass required for "far detectors" of the next generation of neutrino oscillation experiments far exceeds what has been demonstrated so far. Scaling to this larger mass, as well as the requirement for underground construction places a number of additional constraints on the design. A prototype 35-ton cryostat was built at Fermi National Acccelerator Laboratory to test the functionality of the components foreseen to be used in a very large far detector. The Phase I run, completed in early 2014, demonstrated that liquid argon could be maintained at sufficient purity in a membrane cryostat. A time projection chamber was installed for the Phase II run, which collected data in February and March of 2016. The Phase II run was a test of the modular anode plane assemblies with wrapped wires, cold readout electronics, and integrated photon detection systems. While the details of the design do not match exactly those chosen for the DUNE far detector, the 35-ton TPC prototype is a demonstration of the functionality of the basic components. Measurements are performed using the Phase II data to extract signal and noise characteristics and to align the detector components. A measurement of the electron lifetime is presented, and a novel technique for measuring a track's position based on pulse properties is described.
△ Less
Submitted 2 March, 2020; v1 submitted 18 December, 2019;
originally announced December 2019.
-
The Universal Decompositional Semantics Dataset and Decomp Toolkit
Authors:
Aaron Steven White,
Elias Stengel-Eskin,
Siddharth Vashishtha,
Venkata Govindarajan,
Dee Ann Reisinger,
Tim Vieira,
Keisuke Sakaguchi,
Sheng Zhang,
Francis Ferraro,
Rachel Rudinger,
Kyle Rawlins,
Benjamin Van Durme
Abstract:
We present the Universal Decompositional Semantics (UDS) dataset (v1.0), which is bundled with the Decomp toolkit (v0.1). UDS1.0 unifies five high-quality, decompositional semantics-aligned annotation sets within a single semantic graph specification---with graph structures defined by the predicative patterns produced by the PredPatt tool and real-valued node and edge attributes constructed using…
▽ More
We present the Universal Decompositional Semantics (UDS) dataset (v1.0), which is bundled with the Decomp toolkit (v0.1). UDS1.0 unifies five high-quality, decompositional semantics-aligned annotation sets within a single semantic graph specification---with graph structures defined by the predicative patterns produced by the PredPatt tool and real-valued node and edge attributes constructed using sophisticated normalization procedures. The Decomp toolkit provides a suite of Python 3 tools for querying UDS graphs using SPARQL. Both UDS1.0 and Decomp0.1 are publicly available at http://decomp.io.
△ Less
Submitted 30 September, 2019;
originally announced September 2019.
-
Operation Control Protocols in Power Distribution Grids
Authors:
Yehia Abd Alrahman,
Hugo Torres Vieira
Abstract:
Future power distribution grids will comprise a large number of components, each potentially able to carry out operations autonomously. Clearly, in order to ensure safe operation of the grid, individual operations must be coordinated among the different components. Since operation safety is a global property, modelling component coordination typically involves reasoning about systems at a global l…
▽ More
Future power distribution grids will comprise a large number of components, each potentially able to carry out operations autonomously. Clearly, in order to ensure safe operation of the grid, individual operations must be coordinated among the different components. Since operation safety is a global property, modelling component coordination typically involves reasoning about systems at a global level. In this paper, we propose a language for specifying grid operation control protocols from a global point of view. We show how such global specifications can be used to automatically generate local controllers of individual components, and that the distributed implementation yielded by such controllers operationally corresponds to the global specification. We showcase our development by modelling a fault management scenario in power grids.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.
-
SAMplus: adaptive optics at optical wavelengths for SOAR
Authors:
D. M. Faes,
A. Tokovinin,
T. Vieira,
A. Mello,
M. Domingues,
D. Andrade,
B. C. Quint,
J. B. Santos
Abstract:
Adaptive Optics (AO) is an innovative technique that substantially improves the optical performance of ground-based telescopes. The SOAR Adaptive Module (SAM) is a laser-assisted AO instrument, designed to compensate ground-layer atmospheric turbulence in near-IR and visible wavelengths over a large Field of View. Here we detail our proposal to upgrade SAM, dubbed SAMplus, that is focused on enhan…
▽ More
Adaptive Optics (AO) is an innovative technique that substantially improves the optical performance of ground-based telescopes. The SOAR Adaptive Module (SAM) is a laser-assisted AO instrument, designed to compensate ground-layer atmospheric turbulence in near-IR and visible wavelengths over a large Field of View. Here we detail our proposal to upgrade SAM, dubbed SAMplus, that is focused on enhancing its performance in visible wavelengths and increasing the instrument reliability. As an illustration, for a seeing of 0.62 arcsec at 500 nm and a typical turbulence profile, current SAM improves the PSF FWHM to 0.40 arcsec, and with the upgrade we expect to deliver images with a FWHM of $\approx0.34$ arcsec -- up to 0.23 arcsec FWHM PSF under good seeing conditions. Such capabilities will be fully integrated with the latest SAM instruments, putting SOAR in an unique position as observatory facility.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
A Calculus for Modeling Floating Authorizations
Authors:
Jovanka Pantovic,
Ivan Prokic,
Hugo Torres Vieira
Abstract:
Controlling resource usage in distributed systems is a challenging task given the dynamics involved in access granting. Consider, for instance, the setting of floating licenses where access can be granted if the request originates in a licensed domain and the number of active users is within the license limits, and where licenses can be interchanged. Access granting in such scenarios is given in t…
▽ More
Controlling resource usage in distributed systems is a challenging task given the dynamics involved in access granting. Consider, for instance, the setting of floating licenses where access can be granted if the request originates in a licensed domain and the number of active users is within the license limits, and where licenses can be interchanged. Access granting in such scenarios is given in terms of floating authorizations, addressed in this paper as first class entities of a process calculus model, encompassing the notions of domain, accounting and delegation. We present the operational semantics of the model in two equivalent alternative ways, each informing on the specific nature of authorizations. We also introduce a ty** discipline to single out systems that never get stuck due to lacking authorizations, addressing configurations where authorization assignment is not statically prescribed in the system specification.
△ Less
Submitted 16 February, 2018;
originally announced February 2018.
-
Choreographies for Reactive Programming
Authors:
Marco Carbone,
Fabrizio Montesi,
Hugo Torres Vieira
Abstract:
Modular programming is a cornerstone in software development, as it allows to build complex systems from the assembly of simpler components, and support reusability and substitution principles. In a distributed setting, component assembly is supported by communication that is often required to follow a prescribed protocol of interaction. In this paper, we present a language for the modular develop…
▽ More
Modular programming is a cornerstone in software development, as it allows to build complex systems from the assembly of simpler components, and support reusability and substitution principles. In a distributed setting, component assembly is supported by communication that is often required to follow a prescribed protocol of interaction. In this paper, we present a language for the modular development of distributed systems, where the assembly of components is supported by a choreography that specifies the communication protocol. Our language allows to separate component behaviour, given in terms of reactive data ports, and choreographies, specified as first class entities. This allows us to consider reusability and substitution principles for both components and choreographies. We show how our model can be compiled into a more operational perspective in a provably-correct way, and we present a ty** discipline that addresses communication safety and progress of systems, where a notion of substitutability naturally arises.
△ Less
Submitted 24 January, 2018;
originally announced January 2018.
-
Structured Light by linking together diffraction-resistant spatially shaped beams: "LEGO-BEAMS"
Authors:
Michel Zamboni-Rached,
Erasmo Recami,
Tarcio A. Vieira,
Marcos R. R. Gesualdi,
J. N. Pereira
Abstract:
In this paper we present a theoretical method, together with its experimental confirmation, to obtain structures of light by connecting diffraction-resistant cylindrical beams of finite lengths and different radii. The resulting "Lego-beams" can assume, on demand, various unprecedented spatial configurations. We also experimentally generate some of them on using a computational holographic techniq…
▽ More
In this paper we present a theoretical method, together with its experimental confirmation, to obtain structures of light by connecting diffraction-resistant cylindrical beams of finite lengths and different radii. The resulting "Lego-beams" can assume, on demand, various unprecedented spatial configurations. We also experimentally generate some of them on using a computational holographic technique and a spatial light modulator. Our new, interesting method of linking together various "pieces of light" can find applications in all fields where structured light beams are needed: in particular, such as optical tweezers, e.g. for biological manipulations, optical guiding of atoms, light orbital angular momentum control, holography, lithography, non-linear-optics, interaction of electromagnetic radiation with Bose-Einstein condensates, and so on, besides the field in general of Localized Waves (non-diffracting beams and pulses).
△ Less
Submitted 4 April, 2018; v1 submitted 30 November, 2017;
originally announced December 2017.
-
The Single-Phase ProtoDUNE Technical Design Report
Authors:
B. Abi,
R. Acciarri,
M. A. Acero,
M. Adamowski,
C. Adams,
D. L. Adams,
P. Adamson,
M. Adinolfi,
Z. Ahmad,
C. H. Albright,
T. Alion,
J. Anderson,
K. Anderson,
C. Andreopoulos,
M. P. Andrews,
R. A. Andrews,
J. dos Anjos,
A. Ankowski,
J. Anthony,
M. Antonello,
A. Aranda Fernandez,
A. Ariga,
T. Ariga,
E. Arrieta Diaz,
J. Asaadi
, et al. (806 additional authors not shown)
Abstract:
ProtoDUNE-SP is the single-phase DUNE Far Detector prototype that is under construction and will be operated at the CERN Neutrino Platform (NP) starting in 2018. ProtoDUNE-SP, a crucial part of the DUNE effort towards the construction of the first DUNE 10-kt fiducial mass far detector module (17 kt total LAr mass), is a significant experiment in its own right. With a total liquid argon (LAr) mass…
▽ More
ProtoDUNE-SP is the single-phase DUNE Far Detector prototype that is under construction and will be operated at the CERN Neutrino Platform (NP) starting in 2018. ProtoDUNE-SP, a crucial part of the DUNE effort towards the construction of the first DUNE 10-kt fiducial mass far detector module (17 kt total LAr mass), is a significant experiment in its own right. With a total liquid argon (LAr) mass of 0.77 kt, it represents the largest monolithic single-phase LArTPC detector to be built to date. It's technical design is given in this report.
△ Less
Submitted 27 July, 2017; v1 submitted 21 June, 2017;
originally announced June 2017.
-
Proceedings 9th Interaction and Concurrency Experience
Authors:
Massimo Bartoletti,
Ludovic Henrio,
Sophia Knight,
Hugo Torres Vieira
Abstract:
This volume contains the proceedings of ICE 2016, the 9th Interaction and Concurrency Experience, which was held in Heraklion, Greece on the 8th and 9th of June 2016 as a satellite event of DisCoTec 2016. The ICE procedure for paper selection allows PC members to interact, anonymously, with authors. During the review phase, each submitted paper is published on a discussion forum whose access is re…
▽ More
This volume contains the proceedings of ICE 2016, the 9th Interaction and Concurrency Experience, which was held in Heraklion, Greece on the 8th and 9th of June 2016 as a satellite event of DisCoTec 2016. The ICE procedure for paper selection allows PC members to interact, anonymously, with authors. During the review phase, each submitted paper is published on a discussion forum whose access is restricted to the authors and to all the PC members not declaring a conflict of interest. The PC members post comments and questions that the authors reply to. For the first time, the 2016 edition of ICE included a feature targeting review transparency: reviews of accepted papers were made public on the workshop website and workshop participants in particular were able to access them during the workshop. Each paper was reviewed by three PC members, and altogether nine papers were accepted for publication (the workshop also featured three brief announcements which are not part of this volume). We were proud to host two invited talks, by Alexandra Silva and Uwe Nestmann. The abstracts of these two talks are included in this volume together with the regular papers.
△ Less
Submitted 10 August, 2016;
originally announced August 2016.
-
A Typed Model for Dynamic Authorizations
Authors:
Silvia Ghilezan,
Svetlana Jakšić,
Jovanka Pantović,
Jorge A. Pérez,
Hugo Torres Vieira
Abstract:
Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling. We build upon the pi-calculus so as to e…
▽ More
Security requirements in distributed software systems are inherently dynamic. In the case of authorization policies, resources are meant to be accessed only by authorized parties, but the authorization to access a resource may be dynamically granted/yielded. We describe ongoing work on a model for specifying communication and dynamic authorization handling. We build upon the pi-calculus so as to enrich communication-based systems with authorization specification and delegation; here authorizations regard channel usage and delegation refers to the act of yielding an authorization to another party. Our model includes: (i) a novel sco** construct for authorization, which allows to specify authorization boundaries, and (ii) communication primitives for authorizations, which allow to pass around authorizations to act on a given channel. An authorization error may consist in, e.g., performing an action along a name which is not under an appropriate authorization scope. We introduce a ty** discipline that ensures that processes never reduce to authorization errors, even when authorizations are dynamically delegated.
△ Less
Submitted 10 February, 2016;
originally announced February 2016.
-
Long-Baseline Neutrino Facility (LBNF) and Deep Underground Neutrino Experiment (DUNE) Conceptual Design Report Volume 1: The LBNF and DUNE Projects
Authors:
R. Acciarri,
M. A. Acero,
M. Adamowski,
C. Adams,
P. Adamson,
S. Adhikari,
Z. Ahmad,
C. H. Albright,
T. Alion,
E. Amador,
J. Anderson,
K. Anderson,
C. Andreopoulos,
M. Andrews,
R. Andrews,
I. Anghel,
J. d. Anjos,
A. Ankowski,
M. Antonello,
A. ArandaFernandez,
A. Ariga,
T. Ariga,
D. Aristizabal,
E. Arrieta-Diaz,
K. Aryal
, et al. (780 additional authors not shown)
Abstract:
This document presents the Conceptual Design Report (CDR) put forward by an international neutrino community to pursue the Deep Underground Neutrino Experiment at the Long-Baseline Neutrino Facility (LBNF/DUNE), a groundbreaking science experiment for long-baseline neutrino oscillation studies and for neutrino astrophysics and nucleon decay searches. The DUNE far detector will be a very large modu…
▽ More
This document presents the Conceptual Design Report (CDR) put forward by an international neutrino community to pursue the Deep Underground Neutrino Experiment at the Long-Baseline Neutrino Facility (LBNF/DUNE), a groundbreaking science experiment for long-baseline neutrino oscillation studies and for neutrino astrophysics and nucleon decay searches. The DUNE far detector will be a very large modular liquid argon time-projection chamber (LArTPC) located deep underground, coupled to the LBNF multi-megawatt wide-band neutrino beam. DUNE will also have a high-resolution and high-precision near detector.
△ Less
Submitted 20 January, 2016;
originally announced January 2016.
-
Long-Baseline Neutrino Facility (LBNF) and Deep Underground Neutrino Experiment (DUNE) Conceptual Design Report, Volume 4 The DUNE Detectors at LBNF
Authors:
R. Acciarri,
M. A. Acero,
M. Adamowski,
C. Adams,
P. Adamson,
S. Adhikari,
Z. Ahmad,
C. H. Albright,
T. Alion,
E. Amador,
J. Anderson,
K. Anderson,
C. Andreopoulos,
M. Andrews,
R. Andrews,
I. Anghel,
J. d. Anjos,
A. Ankowski,
M. Antonello,
A. ArandaFernandez,
A. Ariga,
T. Ariga,
D. Aristizabal,
E. Arrieta-Diaz,
K. Aryal
, et al. (779 additional authors not shown)
Abstract:
A description of the proposed detector(s) for DUNE at LBNF
A description of the proposed detector(s) for DUNE at LBNF
△ Less
Submitted 12 January, 2016;
originally announced January 2016.
-
Long-Baseline Neutrino Facility (LBNF) and Deep Underground Neutrino Experiment (DUNE) Conceptual Design Report Volume 2: The Physics Program for DUNE at LBNF
Authors:
DUNE Collaboration,
R. Acciarri,
M. A. Acero,
M. Adamowski,
C. Adams,
P. Adamson,
S. Adhikari,
Z. Ahmad,
C. H. Albright,
T. Alion,
E. Amador,
J. Anderson,
K. Anderson,
C. Andreopoulos,
M. Andrews,
R. Andrews,
I. Anghel,
J. d. Anjos,
A. Ankowski,
M. Antonello,
A. ArandaFernandez,
A. Ariga,
T. Ariga,
D. Aristizabal,
E. Arrieta-Diaz
, et al. (780 additional authors not shown)
Abstract:
The Physics Program for the Deep Underground Neutrino Experiment (DUNE) at the Fermilab Long-Baseline Neutrino Facility (LBNF) is described.
The Physics Program for the Deep Underground Neutrino Experiment (DUNE) at the Fermilab Long-Baseline Neutrino Facility (LBNF) is described.
△ Less
Submitted 22 January, 2016; v1 submitted 18 December, 2015;
originally announced December 2015.
-
Optical generation of non-diffracting beams via photorefractive holography
Authors:
Tarcio A. Vieira,
Rafael A. B. Suarez,
Marcos R. R. Gesualdi,
Michel Zamboni-Rached
Abstract:
This work presents, for the first time the optical generation of non-diffracting beams via photorefractive holography. Optical generation of non-diffracting beams using conventional optics components is difficult and, in some instances, unfeasible, as it is wave fields given by superposition of non-diffracting beams. It is known that computer generated holograms and spatial light modulators (SLMs)…
▽ More
This work presents, for the first time the optical generation of non-diffracting beams via photorefractive holography. Optical generation of non-diffracting beams using conventional optics components is difficult and, in some instances, unfeasible, as it is wave fields given by superposition of non-diffracting beams. It is known that computer generated holograms and spatial light modulators (SLMs) successfully generate such beams. With photorefractive holography technique, the hologram of a non-diffracting beam is constructed (recorded) and reconstructed (reading) optically in a nonlinear photorefractive medium. The experimental realization of a non-diffracting beam was made in a photorefractive holography setup using a photorefractive Bi12SiO20 (BSO) crystal as the holographic recording medium, where the non-diffracting beams, the Bessel beam arrays and superposition of co-propagating Bessel beams (Frozen Waves) were obtained experimentally. The experimental results are in agreement with the theoretically predicted results, presenting excellent prospects for implementation of this technique for dynamical systems at applications in optics and photonics.
△ Less
Submitted 28 November, 2015;
originally announced November 2015.
-
Photorefractive and computational holography in the experimental generation of Airy beams
Authors:
Rafael A. B. Suarez,
Tarcio A. Vieira,
Indira S. V. Yepes,
Marcos R. R. Gesualdi
Abstract:
In this paper, we present the experimental generation of Airy beams via computational and photorefractive holography. Experimental generation of Airy beams using conventional optical components presents several difficulties and are practically infeasible. Thus, the optical generation of Airy beams has been made from the optical reconstruction of a computer generated hologram implemented in a spati…
▽ More
In this paper, we present the experimental generation of Airy beams via computational and photorefractive holography. Experimental generation of Airy beams using conventional optical components presents several difficulties and are practically infeasible. Thus, the optical generation of Airy beams has been made from the optical reconstruction of a computer generated hologram implemented in a spatial light modulators. In the photorefractive holography technique, being used for the first time to our knowledge, the hologram of an Airy beam is constructed (recorded) and reconstructed (reading) optically in a nonlinear photorefractive medium. The Airy beam experimental realization was made by a setup of computational and photorefractive holography using a photorefractive Bi_{12}TiO_{20} crystal as holographic recording medium. Airy beams and Airy beam arrays were obtained experimentally as in accordance with the predicted theory; and present excellent prospects for applications in optical trap** and optical communications systems.
△ Less
Submitted 6 November, 2015;
originally announced November 2015.
-
Combining behavioural types with security analysis
Authors:
Massimo Bartoletti,
Ilaria Castellani,
Pierre-Malo Deniélou,
Mariangiola Dezani-Ciancaglini,
Silvia Ghilezan,
Jovanka Pantovic,
Jorge A. Pérez,
Peter Thiemann,
Bernardo Toninho,
Hugo Torres Vieira
Abstract:
Today's software systems are highly distributed and interconnected, and they increasingly rely on communication to achieve their goals; due to their societal importance, security and trustworthiness are crucial aspects for the correctness of these systems. Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforc…
▽ More
Today's software systems are highly distributed and interconnected, and they increasingly rely on communication to achieve their goals; due to their societal importance, security and trustworthiness are crucial aspects for the correctness of these systems. Behavioural types, which extend data types by describing also the structured behaviour of programs, are a widely studied approach to the enforcement of correctness properties in communicating systems. This paper offers a unified overview of proposals based on behavioural types which are aimed at the analysis of security properties.
△ Less
Submitted 8 October, 2015;
originally announced October 2015.
-
Production of Dynamic Frozen Waves: Controlling shape, location (and speed) of diffraction-resistant beams
Authors:
Tárcio A. Vieira,
Marcos R. R. Gesualdi,
Michel Zamboni-Rached,
Erasmo Recami
Abstract:
In recent times, we experimentally realized a quite efficient modeling of the shape of diffraction-resistant optical beams; thus generating for the first time the so-called Frozen Waves (FW), whose longitudinal intensity pattern can be arbitrarily chosen, within a prefixed space interval of the propagation axis. Such waves possess a host of potential applications: in medicine, biomedical optics, o…
▽ More
In recent times, we experimentally realized a quite efficient modeling of the shape of diffraction-resistant optical beams; thus generating for the first time the so-called Frozen Waves (FW), whose longitudinal intensity pattern can be arbitrarily chosen, within a prefixed space interval of the propagation axis. Such waves possess a host of potential applications: in medicine, biomedical optics, optical tweezers, atom guiding, remote sensing, tractor beams, optical communications or metrology, and other topics in photonic areas. In this work, we extend our theory of FWs -- which led to beams endowed with a static envelope -- through a dynamic modeling of the FWs, whose shape is now allowed to evolve in time in a predetermined way. And we experimentally create such dynamic FWs in Optics, via a computational holographic technique and a spatial light modulator. Experimental results are here presented for two cases of dynamic FWs, one of the zeroth and the other of higher order, the last one being the most interesting, consisting in a cylindrical surface of light whose geometry changes in space and time.
△ Less
Submitted 24 September, 2015; v1 submitted 21 September, 2015;
originally announced September 2015.
-
Proceedings 8th Interaction and Concurrency Experience
Authors:
Sophia Knight,
Ivan Lanese,
Alberto Lluch Lafuente,
Hugo Torres Vieira
Abstract:
This volume contains the proceedings of ICE 2015, the 8th Interaction and Concurrency Experience, which was held in Grenoble, France on the 4th and 5th of June 2015 as a satellite event of DisCoTec 2015. The ICE procedure for paper selection allows PC members to interact, anonymously, with authors. During the review phase, each submitted paper is published on a discussion forum with access restric…
▽ More
This volume contains the proceedings of ICE 2015, the 8th Interaction and Concurrency Experience, which was held in Grenoble, France on the 4th and 5th of June 2015 as a satellite event of DisCoTec 2015. The ICE procedure for paper selection allows PC members to interact, anonymously, with authors. During the review phase, each submitted paper is published on a discussion forum with access restricted to the authors and to all the PC members not declaring a conflict of interest. The PC members post comments and questions to which the authors reply. Each paper was reviewed by three PC members, and altogether 9 papers, including 1 short paper, were accepted for publication (the workshop also featured 4 brief announcements which are not part of this volume). We were proud to host three invited talks, by Leslie Lamport (shared with the FRIDA workshop), Joseph Sifakis and Steve Ross-Talbot. The abstracts of the last two talks are included in this volume together with the regular papers.
△ Less
Submitted 19 August, 2015;
originally announced August 2015.
-
Information entropy of classical versus explosive percolation
Authors:
T. M. Vieira,
G. M. Viswanathan,
L. R. da Silva
Abstract:
We study the Shannon entropy of the cluster size distribution in classical as well as explosive percolation, in order to estimate the uncertainty in the sizes of randomly chosen clusters. At the critical point the cluster size distribution is a power-law, i.e. there are clusters of all sizes, so one expects the information entropy to attain a maximum. As expected, our results show that the entropy…
▽ More
We study the Shannon entropy of the cluster size distribution in classical as well as explosive percolation, in order to estimate the uncertainty in the sizes of randomly chosen clusters. At the critical point the cluster size distribution is a power-law, i.e. there are clusters of all sizes, so one expects the information entropy to attain a maximum. As expected, our results show that the entropy attains a maximum at this point for classical percolation. Surprisingly, for explosive percolation the maximum entropy does not match the critical point. Moreover, we show that it is possible determine the critical point without using the conventional order parameter, just analysing the entropy's derivatives.
△ Less
Submitted 14 August, 2015; v1 submitted 21 November, 2014;
originally announced November 2014.
-
How to efficiently destroy a network with limited information
Authors:
T. M. Vieira,
G. M. Viswanathan,
L. R. da Silva
Abstract:
We address the general problem of how best to attack and destroy a network by node removal, given limited or no prior information about the edges. We consider a family of strategies in which nodes are randomly chosen, but not removed. Instead, a random acquaintance (i.e., a first neighbour) of the chosen node is removed from the network. By assigning an informal cost to the information about the n…
▽ More
We address the general problem of how best to attack and destroy a network by node removal, given limited or no prior information about the edges. We consider a family of strategies in which nodes are randomly chosen, but not removed. Instead, a random acquaintance (i.e., a first neighbour) of the chosen node is removed from the network. By assigning an informal cost to the information about the network structure, we show using cost-benefit analysis that acquaintance removal is the optimal strategy to destroy networks efficiently.
△ Less
Submitted 10 November, 2014;
originally announced November 2014.
-
Proceedings 7th Interaction and Concurrency Experience
Authors:
Ivan Lanese,
Alberto Lluch Lafuente,
Ana Sokolova,
Hugo Torres Vieira
Abstract:
This volume contains the proceedings of ICE 2014, the 7th Interaction and Concurrency Experience, which was held in Berlin, Germany on the 6th of June 2014 as a satellite event of DisCoTec 2014. The ICE procedure for paper selection allows PC members to interact, anonymously, with authors. During the review phase, each submitted paper is published on a Wiki and associated with a discussion forum w…
▽ More
This volume contains the proceedings of ICE 2014, the 7th Interaction and Concurrency Experience, which was held in Berlin, Germany on the 6th of June 2014 as a satellite event of DisCoTec 2014. The ICE procedure for paper selection allows PC members to interact, anonymously, with authors. During the review phase, each submitted paper is published on a Wiki and associated with a discussion forum whose access is restricted to the authors and to all the PC members not declaring a conflict of interests. The PC members post comments and questions that the authors reply to. Each paper was reviewed by three PC members, and altogether 8 papers (including 3 short papers) were accepted for publication. We were proud to host two invited talks, by Pavol Cerny and Kim Larsen, whose abstracts are included in this volume together with the regular papers.
△ Less
Submitted 26 October, 2014;
originally announced October 2014.
-
Dynamic Role Authorization in Multiparty Conversations
Authors:
Silvia Ghilezan,
Svetlana Jakšić,
Jovanka Pantović,
Jorge A. Pérez,
Hugo Torres Vieira
Abstract:
Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at ru…
▽ More
Protocol specifications often identify the roles involved in communications. In multiparty protocols that involve task delegation it is often useful to consider settings in which different sites may act on behalf of a single role. It is then crucial to control the roles that the different parties are authorized to represent, including the case in which role authorizations are determined only at runtime. Building on previous work on conversation types with flexible role assignment, here we report initial results on a typed framework for the analysis of multiparty communications with dynamic role authorization and delegation. In the underlying process model, communication prefixes are annotated with role authorizations and authorizations can be passed around. We extend the conversation type system so as to statically distinguish processes that never incur in authorization errors. The proposed static discipline guarantees that processes are always authorized to communicate on behalf of an intended role, also covering the case in which authorizations are dynamically passed around in messages.
△ Less
Submitted 25 August, 2014;
originally announced August 2014.
-
Why should we keep measuring zenital dependence of muon flux? Results obtained at Campinas (SP) BR
Authors:
B. Daniel,
L. M. Santos,
M. Nunes,
T. V. Vieira,
E. Kemp
Abstract:
The zenital dependence of muon flux which reaches the earth's surface is well known as proportional to cos^n(θ). Generally, for practical purposes and simplicity in calculations, n is taken as 2. However, compilations of measurements show dependence on the geographical location of the experiments as well as the muons energy range. Since analytical solutions appear to be increasingly less necessary…
▽ More
The zenital dependence of muon flux which reaches the earth's surface is well known as proportional to cos^n(θ). Generally, for practical purposes and simplicity in calculations, n is taken as 2. However, compilations of measurements show dependence on the geographical location of the experiments as well as the muons energy range. Since analytical solutions appear to be increasingly less necessary because of the higher accessibility to low cost computational power, accurate and precise determination of the value of the exponent n, under different conditions, can be useful in the necessary calculations to estimate signals and backgrounds, either for terrestrial and underground experiments. In this work we discuss a method for measuring n using a simple muon telescope and the results obtained for measurements taken at Campinas (SP), Brazil. After validation of the method, we intend to extend the measurements for different geographic locations due to the simplicity of the method, and thus collect more values of n that currently exist in compilations of general data on cosmic rays.
△ Less
Submitted 8 October, 2013;
originally announced October 2013.