-
Stepwise Alignment for Constrained Language Model Policy Optimization
Authors:
Akifumi Wachi,
Thien Q. Tran,
Rei Sato,
Takumi Tanabe,
Youhei Akimoto
Abstract:
Safety and trustworthiness are indispensable requirements for real-world applications of AI systems using large language models (LLMs). This paper formulates human value alignment as an optimization problem of the language model policy to maximize reward under a safety constraint, and then proposes an algorithm, Stepwise Alignment for Constrained Policy Optimization (SACPO). One key idea behind SA…
▽ More
Safety and trustworthiness are indispensable requirements for real-world applications of AI systems using large language models (LLMs). This paper formulates human value alignment as an optimization problem of the language model policy to maximize reward under a safety constraint, and then proposes an algorithm, Stepwise Alignment for Constrained Policy Optimization (SACPO). One key idea behind SACPO, supported by theory, is that the optimal policy incorporating reward and safety can be directly obtained from a reward-aligned policy. Building on this key idea, SACPO aligns LLMs step-wise with each metric while leveraging simple yet powerful alignment algorithms such as direct preference optimization (DPO). SACPO offers several advantages, including simplicity, stability, computational efficiency, and flexibility of algorithms and datasets. Under mild assumptions, our theoretical analysis provides the upper bounds on optimality and safety constraint violation. Our experimental results show that SACPO can fine-tune Alpaca-7B better than the state-of-the-art method in terms of both helpfulness and harmlessness.
△ Less
Submitted 22 May, 2024; v1 submitted 16 April, 2024;
originally announced April 2024.
-
The Strong Lefschetz Property of Gorenstein Algebras Generated by Relative Invariants
Authors:
Takahiro Nagaoka,
Akihito Wachi
Abstract:
We prove the strong Lefschetz property for Artinian Gorenstein algebras generated by the relative invariants of prehomogeneous vector spaces of commutative parabolic type.
We prove the strong Lefschetz property for Artinian Gorenstein algebras generated by the relative invariants of prehomogeneous vector spaces of commutative parabolic type.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
A Survey of Constraint Formulations in Safe Reinforcement Learning
Authors:
Akifumi Wachi,
Xun Shen,
Yanan Sui
Abstract:
Safety is critical when applying reinforcement learning (RL) to real-world problems. As a result, safe RL has emerged as a fundamental and powerful paradigm for optimizing an agent's policy while incorporating notions of safety. A prevalent safe RL approach is based on a constrained criterion, which seeks to maximize the expected cumulative reward subject to specific safety constraints. Despite re…
▽ More
Safety is critical when applying reinforcement learning (RL) to real-world problems. As a result, safe RL has emerged as a fundamental and powerful paradigm for optimizing an agent's policy while incorporating notions of safety. A prevalent safe RL approach is based on a constrained criterion, which seeks to maximize the expected cumulative reward subject to specific safety constraints. Despite recent effort to enhance safety in RL, a systematic understanding of the field remains difficult. This challenge stems from the diversity of constraint representations and little exploration of their interrelations. To bridge this knowledge gap, we present a comprehensive review of representative constraint formulations, along with a curated selection of algorithms designed specifically for each formulation. In addition, we elucidate the theoretical underpinnings that reveal the mathematical mutual relations among common problem formulations. We conclude with a discussion of the current state and future directions of safe reinforcement learning research.
△ Less
Submitted 7 May, 2024; v1 submitted 2 February, 2024;
originally announced February 2024.
-
Long-term Safe Reinforcement Learning with Binary Feedback
Authors:
Akifumi Wachi,
Wataru Hashimoto,
Kazumune Hashimoto
Abstract:
Safety is an indispensable requirement for applying reinforcement learning (RL) to real problems. Although there has been a surge of safe RL algorithms proposed in recent years, most existing work typically 1) relies on receiving numeric safety feedback; 2) does not guarantee safety during the learning process; 3) limits the problem to a priori known, deterministic transition dynamics; and/or 4) a…
▽ More
Safety is an indispensable requirement for applying reinforcement learning (RL) to real problems. Although there has been a surge of safe RL algorithms proposed in recent years, most existing work typically 1) relies on receiving numeric safety feedback; 2) does not guarantee safety during the learning process; 3) limits the problem to a priori known, deterministic transition dynamics; and/or 4) assume the existence of a known safe policy for any states. Addressing the issues mentioned above, we thus propose Long-term Binaryfeedback Safe RL (LoBiSaRL), a safe RL algorithm for constrained Markov decision processes (CMDPs) with binary safety feedback and an unknown, stochastic state transition function. LoBiSaRL optimizes a policy to maximize rewards while guaranteeing a long-term safety that an agent executes only safe state-action pairs throughout each episode with high probability. Specifically, LoBiSaRL models the binary safety function via a generalized linear model (GLM) and conservatively takes only a safe action at every time step while inferring its effect on future safety under proper assumptions. Our theoretical results show that LoBiSaRL guarantees the long-term safety constraint, with high probability. Finally, our empirical results demonstrate that our algorithm is safer than existing methods without significantly compromising performance in terms of reward.
△ Less
Submitted 11 January, 2024; v1 submitted 8 January, 2024;
originally announced January 2024.
-
Verbosity Bias in Preference Labeling by Large Language Models
Authors:
Keita Saito,
Akifumi Wachi,
Koki Wataoka,
Youhei Akimoto
Abstract:
In recent years, Large Language Models (LLMs) have witnessed a remarkable surge in prevalence, altering the landscape of natural language processing and machine learning. One key factor in improving the performance of LLMs is alignment with humans achieved with Reinforcement Learning from Human Feedback (RLHF), as for many LLMs such as GPT-4, Bard, etc. In addition, recent studies are investigatin…
▽ More
In recent years, Large Language Models (LLMs) have witnessed a remarkable surge in prevalence, altering the landscape of natural language processing and machine learning. One key factor in improving the performance of LLMs is alignment with humans achieved with Reinforcement Learning from Human Feedback (RLHF), as for many LLMs such as GPT-4, Bard, etc. In addition, recent studies are investigating the replacement of human feedback with feedback from other LLMs named Reinforcement Learning from AI Feedback (RLAIF). We examine the biases that come along with evaluating LLMs with other LLMs and take a closer look into verbosity bias -- a bias where LLMs sometimes prefer more verbose answers even if they have similar qualities. We see that in our problem setting, GPT-4 prefers longer answers more than humans. We also propose a metric to measure this bias.
△ Less
Submitted 16 October, 2023;
originally announced October 2023.
-
Safe Exploration in Reinforcement Learning: A Generalized Formulation and Algorithms
Authors:
Akifumi Wachi,
Wataru Hashimoto,
Xun Shen,
Kazumune Hashimoto
Abstract:
Safe exploration is essential for the practical use of reinforcement learning (RL) in many real-world scenarios. In this paper, we present a generalized safe exploration (GSE) problem as a unified formulation of common safe exploration problems. We then propose a solution of the GSE problem in the form of a meta-algorithm for safe exploration, MASE, which combines an unconstrained RL algorithm wit…
▽ More
Safe exploration is essential for the practical use of reinforcement learning (RL) in many real-world scenarios. In this paper, we present a generalized safe exploration (GSE) problem as a unified formulation of common safe exploration problems. We then propose a solution of the GSE problem in the form of a meta-algorithm for safe exploration, MASE, which combines an unconstrained RL algorithm with an uncertainty quantifier to guarantee safety in the current episode while properly penalizing unsafe explorations before actual safety violation to discourage them in future episodes. The advantage of MASE is that we can optimize a policy while guaranteeing with a high probability that no safety constraint will be violated under proper assumptions. Specifically, we present two variants of MASE with different constructions of the uncertainty quantifier: one based on generalized linear models with theoretical guarantees of safety and near-optimality, and another that combines a Gaussian process to ensure safety with a deep RL algorithm to maximize the reward. Finally, we demonstrate that our proposed algorithm achieves better performance than state-of-the-art algorithms on grid-world and Safety Gym benchmarks without violating any safety constraints, even during training.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Bayesian Meta-Learning on Control Barrier Functions with Data from On-Board Sensors
Authors:
Wataru Hashimoto,
Kazumune Hashimoto,
Akifumi Wachi,
Xun Shen,
Masako Kishida,
Shigemasa Takai
Abstract:
In this paper, we consider a way to safely navigate the robots in unknown environments using measurement data from sensory devices. The control barrier function (CBF) is one of the promising approaches to encode safety requirements of the system and the recent progress on learning-based approaches for CBF realizes online synthesis of CBF-based safe controllers with sensor measurements. However, th…
▽ More
In this paper, we consider a way to safely navigate the robots in unknown environments using measurement data from sensory devices. The control barrier function (CBF) is one of the promising approaches to encode safety requirements of the system and the recent progress on learning-based approaches for CBF realizes online synthesis of CBF-based safe controllers with sensor measurements. However, the existing methods are inefficient in the sense that the trained CBF cannot be generalized to different environments and the re-synthesis of the controller is necessary when changes in the environment occur. Thus, this paper considers a way to learn CBF that can quickly adapt to a new environment with few amount of data by utilizing the currently developed Bayesian meta-learning framework. The proposed scheme realizes efficient online synthesis of the controller as shown in the simulation study and provides probabilistic safety guarantees on the resulting controller.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Safe Policy Optimization with Local Generalized Linear Function Approximations
Authors:
Akifumi Wachi,
Yunyue Wei,
Yanan Sui
Abstract:
Safe exploration is a key to applying reinforcement learning (RL) in safety-critical systems. Existing safe exploration methods guaranteed safety under the assumption of regularity, and it has been difficult to apply them to large-scale real problems. We propose a novel algorithm, SPO-LF, that optimizes an agent's policy while learning the relation between a locally available feature obtained by s…
▽ More
Safe exploration is a key to applying reinforcement learning (RL) in safety-critical systems. Existing safe exploration methods guaranteed safety under the assumption of regularity, and it has been difficult to apply them to large-scale real problems. We propose a novel algorithm, SPO-LF, that optimizes an agent's policy while learning the relation between a locally available feature obtained by sensors and environmental reward/safety using generalized linear function approximations. We provide theoretical guarantees on its safety and optimality. We experimentally show that our algorithm is 1) more efficient in terms of sample complexity and computational cost and 2) more applicable to large-scale problems than previous safe RL methods with theoretical guarantees, and 3) comparably sample-efficient and safer compared with existing advanced deep RL methods with safety constraints.
△ Less
Submitted 8 November, 2021;
originally announced November 2021.
-
Learning-based Event-triggered MPC with Gaussian processes under terminal constraints
Authors:
Yuga Onoue,
Kazumune Hashimoto,
Akifumi Wachi
Abstract:
Event-triggered control strategy is capable of significantly reducing the number of control task executions without sacrificing control performance. In this paper, we propose a novel learning-based approach towards an event-triggered model predictive control (MPC) for nonlinear control systems whose dynamics are unknown apriori. In particular, the optimal control problems (OCPs) are formulated bas…
▽ More
Event-triggered control strategy is capable of significantly reducing the number of control task executions without sacrificing control performance. In this paper, we propose a novel learning-based approach towards an event-triggered model predictive control (MPC) for nonlinear control systems whose dynamics are unknown apriori. In particular, the optimal control problems (OCPs) are formulated based on predictive states learned by Gaussian process (GP) regression under a terminal constraint constructed by a symbolic abstraction. The event-triggered condition proposed in this paper is derived from the recursive feasibility so that the OCPs are solved only when an error between the predictive and the actual states exceeds a certain threshold. Based on the event-triggered condition, we analyze the stability of the closed-loop system and show that the finite-time convergence to the terminal set is achieved as the uncertainty of the GP model becomes smaller. Moreover, in order to reduce the uncertainty of the GP model and increase efficiency to find the optimal solution, we provide an overall learning-based event-triggered MPC algorithm based on an iterative task. Finally, we demonstrate the proposed approach through a tracking control problem.
△ Less
Submitted 1 January, 2024; v1 submitted 23 October, 2021;
originally announced October 2021.
-
LOA: Logical Optimal Actions for Text-based Interaction Games
Authors:
Daiki Kimura,
Subhajit Chaudhury,
Masaki Ono,
Michiaki Tatsubori,
Don Joven Agravante,
Asim Munawar,
Akifumi Wachi,
Ryosuke Kohita,
Alexander Gray
Abstract:
We present Logical Optimal Actions (LOA), an action decision architecture of reinforcement learning applications with a neuro-symbolic framework which is a combination of neural network and symbolic knowledge acquisition approach for natural language interaction games. The demonstration for LOA experiments consists of a web-based interactive platform for text-based games and visualization for acqu…
▽ More
We present Logical Optimal Actions (LOA), an action decision architecture of reinforcement learning applications with a neuro-symbolic framework which is a combination of neural network and symbolic knowledge acquisition approach for natural language interaction games. The demonstration for LOA experiments consists of a web-based interactive platform for text-based games and visualization for acquired knowledge for improving interpretability for trained rules. This demonstration also provides a comparison module with other neuro-symbolic approaches as well as non-symbolic state-of-the-art agent models on the same text-based games. Our LOA also provides open-sourced implementation in Python for the reinforcement learning environment to facilitate an experiment for studying neuro-symbolic agents. Code: https://github.com/ibm/loa
△ Less
Submitted 21 October, 2021;
originally announced October 2021.
-
Neuro-Symbolic Reinforcement Learning with First-Order Logic
Authors:
Daiki Kimura,
Masaki Ono,
Subhajit Chaudhury,
Ryosuke Kohita,
Akifumi Wachi,
Don Joven Agravante,
Michiaki Tatsubori,
Asim Munawar,
Alexander Gray
Abstract:
Deep reinforcement learning (RL) methods often require many trials before convergence, and no direct interpretability of trained policies is provided. In order to achieve fast convergence and interpretability for the policy in RL, we propose a novel RL method for text-based games with a recent neuro-symbolic framework called Logical Neural Network, which can learn symbolic and interpretable rules…
▽ More
Deep reinforcement learning (RL) methods often require many trials before convergence, and no direct interpretability of trained policies is provided. In order to achieve fast convergence and interpretability for the policy in RL, we propose a novel RL method for text-based games with a recent neuro-symbolic framework called Logical Neural Network, which can learn symbolic and interpretable rules in their differentiable network. The method is first to extract first-order logical facts from text observation and external word meaning network (ConceptNet), then train a policy in the network with directly interpretable logical operators. Our experimental results show RL training with the proposed method converges significantly faster than other state-of-the-art neuro-symbolic methods in a TextWorld benchmark.
△ Less
Submitted 21 October, 2021;
originally announced October 2021.
-
Reinforcement Learning with External Knowledge by using Logical Neural Networks
Authors:
Daiki Kimura,
Subhajit Chaudhury,
Akifumi Wachi,
Ryosuke Kohita,
Asim Munawar,
Michiaki Tatsubori,
Alexander Gray
Abstract:
Conventional deep reinforcement learning methods are sample-inefficient and usually require a large number of training trials before convergence. Since such methods operate on an unconstrained action set, they can lead to useless actions. A recent neuro-symbolic framework called the Logical Neural Networks (LNNs) can simultaneously provide key-properties of both neural networks and symbolic logic.…
▽ More
Conventional deep reinforcement learning methods are sample-inefficient and usually require a large number of training trials before convergence. Since such methods operate on an unconstrained action set, they can lead to useless actions. A recent neuro-symbolic framework called the Logical Neural Networks (LNNs) can simultaneously provide key-properties of both neural networks and symbolic logic. The LNNs functions as an end-to-end differentiable network that minimizes a novel contradiction loss to learn interpretable rules. In this paper, we utilize LNNs to define an inference graph using basic logical operations, such as AND and NOT, for faster convergence in reinforcement learning. Specifically, we propose an integrated method that enables model-free reinforcement learning from external knowledge sources in an LNNs-based logical constrained framework such as action shielding and guide. Our results empirically demonstrate that our method converges faster compared to a model-free reinforcement learning method that doesn't have such logical constraints.
△ Less
Submitted 3 March, 2021;
originally announced March 2021.
-
Q-learning with Language Model for Edit-based Unsupervised Summarization
Authors:
Ryosuke Kohita,
Akifumi Wachi,
Yang Zhao,
Ryuki Tachibana
Abstract:
Unsupervised methods are promising for abstractive text summarization in that the parallel corpora is not required. However, their performance is still far from being satisfied, therefore research on promising solutions is on-going. In this paper, we propose a new approach based on Q-learning with an edit-based summarization. The method combines two key modules to form an Editorial Agent and Langu…
▽ More
Unsupervised methods are promising for abstractive text summarization in that the parallel corpora is not required. However, their performance is still far from being satisfied, therefore research on promising solutions is on-going. In this paper, we propose a new approach based on Q-learning with an edit-based summarization. The method combines two key modules to form an Editorial Agent and Language Model converter (EALM). The agent predicts edit actions (e.t., delete, keep, and replace), and then the LM converter deterministically generates a summary on the basis of the action signals. Q-learning is leveraged to train the agent to produce proper edit actions. Experimental results show that EALM delivered competitive performance compared with the previous encoder-decoder-based methods, even with truly zero paired data (i.e., no validation set). Defining the task as Q-learning enables us not only to develop a competitive method but also to make the latest techniques in reinforcement learning available for unsupervised summarization. We also conduct qualitative analysis, providing insights into future study on unsupervised summarizers.
△ Less
Submitted 9 October, 2020;
originally announced October 2020.
-
Safe Reinforcement Learning in Constrained Markov Decision Processes
Authors:
Akifumi Wachi,
Yanan Sui
Abstract:
Safe reinforcement learning has been a promising approach for optimizing the policy of an agent that operates in safety-critical applications. In this paper, we propose an algorithm, SNO-MDP, that explores and optimizes Markov decision processes under unknown safety constraints. Specifically, we take a stepwise approach for optimizing safety and cumulative reward. In our method, the agent first le…
▽ More
Safe reinforcement learning has been a promising approach for optimizing the policy of an agent that operates in safety-critical applications. In this paper, we propose an algorithm, SNO-MDP, that explores and optimizes Markov decision processes under unknown safety constraints. Specifically, we take a stepwise approach for optimizing safety and cumulative reward. In our method, the agent first learns safety constraints by expanding the safe region, and then optimizes the cumulative reward in the certified safe region. We provide theoretical guarantees on both the satisfaction of the safety constraint and the near-optimality of the cumulative reward under proper regularity assumptions. In our experiments, we demonstrate the effectiveness of SNO-MDP through two experiments: one uses a synthetic data in a new, openly-available environment named GP-SAFETY-GYM, and the other simulates Mars surface exploration by using real observation data.
△ Less
Submitted 14 August, 2020;
originally announced August 2020.
-
Enhanced zeta distributions and its functional equations
Authors:
Kyo Nishiyama,
Bent Ørsted,
Akihito Wachi
Abstract:
We consider an ``enhanced symmetric space'', which is a prehomogeneous vector space. This vector space is intimately related to a double flag variety studied in \cite{NO.2018}. On a distinguished open orbit called ``enhanced positive cone'', we consider a zeta integral with two complex variables, which is analytically continued to meromorphic family of tempered distributions. One of the main resul…
▽ More
We consider an ``enhanced symmetric space'', which is a prehomogeneous vector space. This vector space is intimately related to a double flag variety studied in \cite{NO.2018}. On a distinguished open orbit called ``enhanced positive cone'', we consider a zeta integral with two complex variables, which is analytically continued to meromorphic family of tempered distributions. One of the main results of this paper is to establish a precise formula for the meromorphic continuation which clarifies the location of poles (and may be useful to obtain residues). We also compute the Fourier transform of the zeta distribution and obtain a functional equation with explicit gamma factors.
△ Less
Submitted 5 May, 2019;
originally announced May 2019.
-
Failure-Scenario Maker for Rule-Based Agent using Multi-agent Adversarial Reinforcement Learning and its Application to Autonomous Driving
Authors:
Akifumi Wachi
Abstract:
We examine the problem of adversarial reinforcement learning for multi-agent domains including a rule-based agent. Rule-based algorithms are required in safety-critical applications for them to work properly in a wide range of situations. Hence, every effort is made to find failure scenarios during the development phase. However, as the software becomes complicated, finding failure cases becomes d…
▽ More
We examine the problem of adversarial reinforcement learning for multi-agent domains including a rule-based agent. Rule-based algorithms are required in safety-critical applications for them to work properly in a wide range of situations. Hence, every effort is made to find failure scenarios during the development phase. However, as the software becomes complicated, finding failure cases becomes difficult. Especially in multi-agent domains, such as autonomous driving environments, it is much harder to find useful failure scenarios that help us improve the algorithm. We propose a method for efficiently finding failure scenarios; this method trains the adversarial agents using multi-agent reinforcement learning such that the tested rule-based agent fails. We demonstrate the effectiveness of our proposed method using a simple environment and autonomous driving simulator.
△ Less
Submitted 24 May, 2019; v1 submitted 25 March, 2019;
originally announced March 2019.
-
Safe Exploration in Markov Decision Processes with Time-Variant Safety using Spatio-Temporal Gaussian Process
Authors:
Akifumi Wachi,
Hiroshi Ka**o,
Asim Munawar
Abstract:
In many real-world applications (e.g., planetary exploration, robot navigation), an autonomous agent must be able to explore a space with guaranteed safety. Most safe exploration algorithms in the field of reinforcement learning and robotics have been based on the assumption that the safety features are a priori known and time-invariant. This paper presents a learning algorithm called ST-SafeMDP f…
▽ More
In many real-world applications (e.g., planetary exploration, robot navigation), an autonomous agent must be able to explore a space with guaranteed safety. Most safe exploration algorithms in the field of reinforcement learning and robotics have been based on the assumption that the safety features are a priori known and time-invariant. This paper presents a learning algorithm called ST-SafeMDP for exploring Markov decision processes (MDPs) that is based on the assumption that the safety features are a priori unknown and time-variant. In this setting, the agent explores MDPs while constraining the probability of entering unsafe states defined by a safety function being below a threshold. The unknown and time-variant safety values are modeled using a spatio-temporal Gaussian process. However, there remains an issue that an agent may have no viable action in a shrinking true safe space. To address this issue, we formulate a problem maximizing the cumulative number of safe states in the worst case scenario with respect to future observations. The effectiveness of this approach was demonstrated in two simulation settings, including one using real lunar terrain data.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
The strong Lefschetz property for complete intersections defined by products of linear forms
Authors:
Tadahito Harima,
Akihito Wachi,
Junzo Watanabe
Abstract:
We prove the strong Lefschetz property for certain complete intersections defined by products of linear forms, using a characterization of the strong Lefschetz property in terms of central simple modules.
We prove the strong Lefschetz property for certain complete intersections defined by products of linear forms, using a characterization of the strong Lefschetz property in terms of central simple modules.
△ Less
Submitted 15 June, 2018;
originally announced June 2018.
-
Lefschetz properties for complete intersection ideals generated by products of linear forms
Authors:
Martina Juhnke-Kubitzke,
Rosa M. Miró-Roig,
Satoshi Murai,
Akihito Wachi
Abstract:
In this paper, we study the strong Lefschetz property of artinian complete intersection ideals generated by products of linear forms. We prove the strong Lefschetz property for a class of such ideals with binomial generators.
In this paper, we study the strong Lefschetz property of artinian complete intersection ideals generated by products of linear forms. We prove the strong Lefschetz property for a class of such ideals with binomial generators.
△ Less
Submitted 7 August, 2017;
originally announced August 2017.
-
A characterization of the Macaulay dual generators for quadratic complete intersections
Authors:
Tadahito Harima,
Akihito Wachi,
Junzo Watanabe
Abstract:
Let $F$ be a homogeneous polynomial in $n$ variables of degree $d$ over a field $K$. Let $A(F)$ be the associated Artinian graded $K$-algebra. If $B \subset A(F)$ is a subalgebra of $A(F)$ which is Gorenstein with the same socle degree as $A(F)$, we describe the Macaulay dual generator for $B$ in terms of $F$. Furthermore when $n=d$, we give necessary and sufficient conditions on the polynomial…
▽ More
Let $F$ be a homogeneous polynomial in $n$ variables of degree $d$ over a field $K$. Let $A(F)$ be the associated Artinian graded $K$-algebra. If $B \subset A(F)$ is a subalgebra of $A(F)$ which is Gorenstein with the same socle degree as $A(F)$, we describe the Macaulay dual generator for $B$ in terms of $F$. Furthermore when $n=d$, we give necessary and sufficient conditions on the polynomial $F$ for $A(F)$ to be a complete intersection.
△ Less
Submitted 3 April, 2017; v1 submitted 21 March, 2017;
originally announced March 2017.
-
The resultants of quadratic binomial complete intersections
Authors:
Tadahito Harima,
Akihito Wachi,
Junzo Watanabe
Abstract:
We compute the resultants for quadratic binomial complete intersections. As an application we show that any quadratic binomial complete intersection can have the set of square-free monomials as a vector space basis if the generators are put in a normal form.
We compute the resultants for quadratic binomial complete intersections. As an application we show that any quadratic binomial complete intersection can have the set of square-free monomials as a vector space basis if the generators are put in a normal form.
△ Less
Submitted 8 November, 2016;
originally announced November 2016.
-
The EGH Conjecture and the Sperner property of complete intersections
Authors:
Tadahito Harima,
Akihito Wachi,
Junzo Watanabe
Abstract:
Let $A$ be a graded complete intersection over a field and $B$ the monomial complete intersection with the generators of the same degrees as $A$. The EGH conjecture says that if $I$ is a graded ideal in $A$, then there should be an ideal $J$ in $B$ such that $B/J$ and $A/I$ have the same Hilbert function. We show that if the EGH conjecture is true, then it can be used to prove that every graded co…
▽ More
Let $A$ be a graded complete intersection over a field and $B$ the monomial complete intersection with the generators of the same degrees as $A$. The EGH conjecture says that if $I$ is a graded ideal in $A$, then there should be an ideal $J$ in $B$ such that $B/J$ and $A/I$ have the same Hilbert function. We show that if the EGH conjecture is true, then it can be used to prove that every graded complete intersection over any field has the Sperner property.
△ Less
Submitted 26 January, 2016;
originally announced January 2016.
-
The quadratic complete intersections with the action of the symmetric group
Authors:
Tadahito Harima,
Akihito Wachi,
Junzo Watanabe
Abstract:
We prove that any quadratic complete intersection with certain action of the symmetric group has the strong Lefschetz property over a field of characteristic zero. As a consequence of it we construct a new class of homogeneous complete intersections with generators of higher degrees which have the strong Lefschetz property.
We prove that any quadratic complete intersection with certain action of the symmetric group has the strong Lefschetz property over a field of characteristic zero. As a consequence of it we construct a new class of homogeneous complete intersections with generators of higher degrees which have the strong Lefschetz property.
△ Less
Submitted 10 May, 2015; v1 submitted 27 January, 2015;
originally announced January 2015.
-
Codimension one connectedness of the graph of associated varieties
Authors:
Kyo Nishiyama,
Peter Trapa,
Akihito Wachi
Abstract:
Let $ π$ be an irreducible Harish-Chandra $ (\mathfrak{g}, K) $-module, and denote its associated variety by $ AV(π) $. If $ AV(π) $ is reducible, then each irreducible component must contain codimension one boundary component. Thus we are interested in the codimension one adjacency of nilpotent orbits for a symmetric pair $ (G, K) $. We define the notion of orbit graph and associated graph for…
▽ More
Let $ π$ be an irreducible Harish-Chandra $ (\mathfrak{g}, K) $-module, and denote its associated variety by $ AV(π) $. If $ AV(π) $ is reducible, then each irreducible component must contain codimension one boundary component. Thus we are interested in the codimension one adjacency of nilpotent orbits for a symmetric pair $ (G, K) $. We define the notion of orbit graph and associated graph for $ π$, and study its structure for classical symmetric pairs; number of vertices, edges, connected components, etc. As a result, we prove that the orbit graph is connecetd for even nilpotent orbits.
Finally, for indefinite unitary group $ U(p, q) $, we prove that for each connected component of the orbit graph $ Γ_K(O_λ) $ thus defined, there is an irreducible Harish-Chandra module $ π$ whose associated graph is exactly equal to the connceted component.
△ Less
Submitted 8 October, 2014; v1 submitted 31 March, 2014;
originally announced March 2014.
-
Generic initial ideals of some monomial complete intersections in four variables
Authors:
Tadahito Harima,
Sho Sakaki,
Akihito Wachi
Abstract:
Let $R = K[x_1, x_2, x_3, x_4]$ be the polynomial ring over a field of characteristic zero. For the ideal $(x_1^a, x_2^b, x_3^c, x_4^d) \subset R$, where at least one of $a$, $b$, $c$ and $d$ is equal to two, we prove that its generic initial ideal with respect to the reverse lexicographic order is the almost revlex ideal corresponding to the same Hilbert function.
Let $R = K[x_1, x_2, x_3, x_4]$ be the polynomial ring over a field of characteristic zero. For the ideal $(x_1^a, x_2^b, x_3^c, x_4^d) \subset R$, where at least one of $a$, $b$, $c$ and $d$ is equal to two, we prove that its generic initial ideal with respect to the reverse lexicographic order is the almost revlex ideal corresponding to the same Hilbert function.
△ Less
Submitted 2 September, 2009;
originally announced September 2009.
-
Strong Lefschetz elements of the coinvariant rings of finite Coxeter groups
Authors:
Toshiaki Maeno,
Yasuhide Numata,
Akihito Wachi
Abstract:
For the coinvariant rings of finite Coxeter groups of types other than H$_4$, we show that a homogeneous element of degree one is a strong Lefschetz element if and only if it is not fixed by any reflections. We also give the necessary and sufficient condition for strong Lefschetz elements in the invariant subrings of the coinvariant rings of Weyl groups.
For the coinvariant rings of finite Coxeter groups of types other than H$_4$, we show that a homogeneous element of degree one is a strong Lefschetz element if and only if it is not fixed by any reflections. We also give the necessary and sufficient condition for strong Lefschetz elements in the invariant subrings of the coinvariant rings of Weyl groups.
△ Less
Submitted 21 September, 2008;
originally announced September 2008.
-
A note on the Capelli identities for symmetric pairs of Hermitian type
Authors:
Kyo Nishiyama,
Akihito Wachi
Abstract:
We get several identities of differential operators in determinantal form. These identities are non-commutative versions of the formula of Cauchy-Binet or Laplace expansions of determinants, and if we take principal symbols, they are reduced to such classical formulas. These identities are naturally arising from the generators of the rings of invariant differential operators over symmetric space…
▽ More
We get several identities of differential operators in determinantal form. These identities are non-commutative versions of the formula of Cauchy-Binet or Laplace expansions of determinants, and if we take principal symbols, they are reduced to such classical formulas. These identities are naturally arising from the generators of the rings of invariant differential operators over symmetric spaces, and have strong resemblance to the classical Capelli identities. Thus we call those identities the Capelli identities for symmetric pairs.
△ Less
Submitted 5 August, 2008;
originally announced August 2008.
-
Generic initial ideals, graded Betti numbers and $k$-Lefschetz properties
Authors:
Tadahito Harima,
Akihito Wachi
Abstract:
We introduce the $k$-strong Lefschetz property ($k$-SLP) and the $k$-weak Lefschetz property ($k$-WLP) for graded Artinian $K$-algebras, which are generalizations of the Lefschetz properties. The main results obtained in this paper are as follows:
1. Let $I$ be a graded ideal of $R=K[x_1, x_2, x_3]$ whose quotient ring $R/I$ has the SLP. Then the generic initial ideal of $I$ is the unique almo…
▽ More
We introduce the $k$-strong Lefschetz property ($k$-SLP) and the $k$-weak Lefschetz property ($k$-WLP) for graded Artinian $K$-algebras, which are generalizations of the Lefschetz properties. The main results obtained in this paper are as follows:
1. Let $I$ be a graded ideal of $R=K[x_1, x_2, x_3]$ whose quotient ring $R/I$ has the SLP. Then the generic initial ideal of $I$ is the unique almost revlex ideal with the same Hilbert function as $R/I$.
2. Let $I$ be a graded ideal of $R=K[x_1, x_2, ..., x_n]$ whose quotient ring $R/I$ has the $n$-SLP. Suppose that all $k$-th differences of the Hilbert function of $R/I$ are quasi-symmetric. Then the generic initial ideal of $I$ is the unique almost revlex ideal with the same Hilbert function as $R/I$.
3. We give a sharp upper bound on the graded Betti numbers of Artinian $K$-algebras with the $k$-WLP and a fixed Hilbert function.
△ Less
Submitted 19 July, 2007; v1 submitted 15 July, 2007;
originally announced July 2007.
-
The strong Lefschetz property of the coinvariant ring of the Coxeter group of type H4
Authors:
Yasuhide Numata,
Akihito Wachi
Abstract:
We prove that the coinvariant ring of the irreducible Coxeter group of type H4 has the strong Lefschetz property.
We prove that the coinvariant ring of the irreducible Coxeter group of type H4 has the strong Lefschetz property.
△ Less
Submitted 28 February, 2007;
originally announced March 2007.
-
Intersection of harmonics and Capelli identities for symmetric pairs
Authors:
Soo Teck Lee,
Kyo Nishiyama,
Akihito Wachi
Abstract:
We consider a see-saw pair consisting of a Hermitian symmetric pair (G_R, K_R) and a compact symmetric pair (M_R, H_R), where (G_R, H_R) and (K_R, M_R) form real reductive dual pairs in a large symplectic group. In this setting, we get Capelli identities which explicitly represent certain K_C-invariant elements in U(Lie(G)_C) in terms of H_C-invariant elements in U(Lie(M)_C). The corresponding H…
▽ More
We consider a see-saw pair consisting of a Hermitian symmetric pair (G_R, K_R) and a compact symmetric pair (M_R, H_R), where (G_R, H_R) and (K_R, M_R) form real reductive dual pairs in a large symplectic group. In this setting, we get Capelli identities which explicitly represent certain K_C-invariant elements in U(Lie(G)_C) in terms of H_C-invariant elements in U(Lie(M)_C). The corresponding H_C-invariant elements are called Capelli elements.
We also give a decomposition of the intersection of O_{2n}-harmonics and Sp_{2n}-harmonics as a module of GL_n = O_{2n} \cap Sp_{2n}, and construct a basis for the GL_n highest weight vectors. This intersection is in the kernel of our Capelli elements.
△ Less
Submitted 3 October, 2005;
originally announced October 2005.