Skip to main content

Showing 101–150 of 166 results for author: Wattenhofer, R

.
  1. arXiv:2101.04547  [pdf, other

    cs.CL cs.AI

    Of Non-Linearity and Commutativity in BERT

    Authors: Sumu Zhao, Damian Pascual, Gino Brunner, Roger Wattenhofer

    Abstract: In this work we provide new insights into the transformer architecture, and in particular, its best-known variant, BERT. First, we propose a method to measure the degree of non-linearity of different elements of transformers. Next, we focus our investigation on the feed-forward networks (FFN) inside transformers, which contain 2/3 of the model parameters and have so far not received much attention… ▽ More

    Submitted 7 May, 2021; v1 submitted 12 January, 2021; originally announced January 2021.

    Comments: Accepted at IJCNN 2021

  2. arXiv:2101.00419  [pdf, other

    cs.CL

    KM-BART: Knowledge Enhanced Multimodal BART for Visual Commonsense Generation

    Authors: Yiran Xing, Zai Shi, Zhao Meng, Gerhard Lakemeyer, Yunpu Ma, Roger Wattenhofer

    Abstract: We present Knowledge Enhanced Multimodal BART (KM-BART), which is a Transformer-based sequence-to-sequence model capable of reasoning about commonsense knowledge from multimodal inputs of images and texts. We adapt the generative BART architecture to a multimodal model with visual and textual inputs. We further develop novel pretraining tasks to improve the model performance on the Visual Commonse… ▽ More

    Submitted 15 July, 2021; v1 submitted 2 January, 2021; originally announced January 2021.

    Comments: ACL-IJCNLP 2021 main conference. The first three authors contribute equally to this work

  3. arXiv:2012.15416  [pdf, other

    cs.CL cs.AI cs.LG

    Directed Beam Search: Plug-and-Play Lexically Constrained Language Generation

    Authors: Damian Pascual, Beni Egressy, Florian Bolli, Roger Wattenhofer

    Abstract: Large pre-trained language models are capable of generating realistic text. However, controlling these models so that the generated text satisfies lexical constraints, i.e., contains specific words, is a challenging problem. Given that state-of-the-art language models are too large to be trained from scratch in a manageable time, it is desirable to control these models without re-training them. Me… ▽ More

    Submitted 30 December, 2020; originally announced December 2020.

    Comments: Preprint. Work in progress

  4. arXiv:2011.10485  [pdf, ps, other

    cs.CE q-fin.RM

    Sequential Defaulting in Financial Networks

    Authors: Pál András Papp, Roger Wattenhofer

    Abstract: We consider financial networks, where banks are connected by contracts such as debts or credit default swaps. We study the clearing problem in these systems: we want to know which banks end up in a default, and what portion of their liabilities can these defaulting banks fulfill. We analyze these networks in a sequential model where banks announce their default one at a time, and the system evolve… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    MSC Class: 91B74; 68Q99 ACM Class: J.4

  5. Space Complexity of Streaming Algorithms on Universal Quantum Computers

    Authors: Yanglin Hu, Darya Melnyk, Yuyi Wang, Roger Wattenhofer

    Abstract: Universal quantum computers are the only general purpose quantum computers known that can be implemented as of today. These computers consist of a classical memory component which controls the quantum memory. In this paper, the space complexity of some data stream problems, such as PartialMOD and Equality, is investigated on universal quantum computers. The quantum algorithms for these problems ar… ▽ More

    Submitted 31 October, 2020; originally announced November 2020.

    Journal ref: In: Chen J., Feng Q., Xu J. (eds) Theory and Applications of Models of Computation. TAMC 2020. Lecture Notes in Computer Science, vol 12337. Springer, Cham (2020)

  6. arXiv:2010.13663  [pdf, other

    cs.LG

    Contrastive Graph Neural Network Explanation

    Authors: Lukas Faber, Amin K. Moghaddam, Roger Wattenhofer

    Abstract: Graph Neural Networks achieve remarkable results on problems with structured data but come as black-box predictors. Transferring existing explanation techniques, such as occlusion, fails as even removing a single node or edge can lead to drastic changes in the graph. The resulting graphs can differ from all training examples, causing model confusion and wrong explanations. Thus, we argue that expl… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: ICML 2020 Workshop on Graph Representation Learning and Beyond (GRL+)

  7. arXiv:2010.01345  [pdf, other

    cs.CL

    A Geometry-Inspired Attack for Generating Natural Language Adversarial Examples

    Authors: Zhao Meng, Roger Wattenhofer

    Abstract: Generating adversarial examples for natural language is hard, as natural language consists of discrete symbols, and examples are often of variable lengths. In this paper, we propose a geometry-inspired attack for generating natural language adversarial examples. Our attack generates adversarial examples by iteratively approximating the decision boundary of Deep Neural Networks (DNNs). Experiments… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: COLING 2020 Long Paper

  8. arXiv:2009.04765  [pdf, other

    cs.CL cs.LG q-bio.NC

    Brain2Word: Decoding Brain Activity for Language Generation

    Authors: Nicolas Affolter, Beni Egressy, Damian Pascual, Roger Wattenhofer

    Abstract: Brain decoding, understood as the process of map** brain activities to the stimuli that generated them, has been an active research area in the last years. In the case of language stimuli, recent studies have shown that it is possible to decode fMRI scans into an embedding of the word a subject is reading. However, such word embeddings are designed for natural language processing tasks rather th… ▽ More

    Submitted 11 November, 2020; v1 submitted 10 September, 2020; originally announced September 2020.

    Comments: Preprint. Work in progress

  9. arXiv:2009.02235  [pdf, other

    cs.DC

    FnF-BFT: Exploring Performance Limits of BFT Protocols

    Authors: Zeta Avarikioti, Lioba Heimbach, Roland Schmid, Laurent Vanbever, Roger Wattenhofer, Patrick Wintermeyer

    Abstract: We introduce FnF-BFT, a parallel-leader byzantine fault-tolerant state-machine replication protocol for the partially synchronous model with theoretical performance bounds during synchrony. By allowing all replicas to act as leaders and propose requests independently, FnF-BFT parallelizes the execution of requests. Leader parallelization distributes the load over the entire network -- increasing t… ▽ More

    Submitted 10 March, 2021; v1 submitted 4 September, 2020; originally announced September 2020.

    Comments: 31 pages, 25 figures (including algorithms)

  10. arXiv:2008.11159  [pdf, other

    cs.SD cs.LG eess.AS

    Medley2K: A Dataset of Medley Transitions

    Authors: Lukas Faber, Sandro Luck, Damian Pascual, Andreas Roth, Gino Brunner, Roger Wattenhofer

    Abstract: The automatic generation of medleys, i.e., musical pieces formed by different songs concatenated via smooth transitions, is not well studied in the current literature. To facilitate research on this topic, we make available a dataset called Medley2K that consists of 2,000 medleys and 7,712 labeled transitions. Our dataset features a rich variety of song transitions across different music genres. W… ▽ More

    Submitted 25 August, 2020; originally announced August 2020.

    Comments: MML 2020 - 13th Int. Workshop on Machine Learning and Music at ECML-PKDD 2020

  11. arXiv:2005.12725  [pdf, other

    cs.DC

    Asynchronous Byzantine Agreement in Incomplete Networks [Technical Report]

    Authors: Ye Wang, Roger Wattenhofer

    Abstract: The Byzantine agreement problem is considered to be a core problem in distributed systems. For example, Byzantine agreement is needed to build a blockchain, a totally ordered log of records. Blockchains are asynchronous distributed systems, fault-tolerant against Byzantine nodes. In the literature, the asynchronous byzantine agreement problem is studied in a fully connected network model where e… ▽ More

    Submitted 26 May, 2020; originally announced May 2020.

  12. arXiv:2005.09561  [pdf, other

    cs.LG stat.ML

    Normalized Attention Without Probability Cage

    Authors: Oliver Richter, Roger Wattenhofer

    Abstract: Attention architectures are widely used; they recently gained renewed popularity with Transformers yielding a streak of state of the art results. Yet, the geometrical implications of softmax-attention remain largely unexplored. In this work we highlight the limitations of constraining attention weights to the probability simplex and the resulting convex hull of value vectors. We show that Transfor… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: Preprint, work in progress. Feedback welcome

    MSC Class: 14R10; 15A63; 14L24; 15A69 ACM Class: I.5.2; I.2.6; E.1

  13. On the Hardness of Red-Blue Pebble Games

    Authors: Pál András Papp, Roger Wattenhofer

    Abstract: Red-blue pebble games model the computation cost of a two-level memory hierarchy. We present various hardness results in different red-blue pebbling variants, with a focus on the oneshot model. We first study the relationship between previously introduced red-blue pebble models (base, oneshot, nodel). We also analyze a new variant (compcost) to obtain a more realistic model of computation. We then… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    MSC Class: 68Q17 ACM Class: F.1.1; F.1.3

  14. arXiv:2004.09185  [pdf, ps, other

    cs.DM

    A General Stabilization Bound for Influence Propagation in Graphs

    Authors: Pál András Papp, Roger Wattenhofer

    Abstract: We study the stabilization time of a wide class of processes on graphs, in which each node can only switch its state if it is motivated to do so by at least a $\frac{1+λ}{2}$ fraction of its neighbors, for some $0 < λ< 1$. Two examples of such processes are well-studied dynamically changing colorings in graphs: in majority processes, nodes switch to the most frequent color in their neighborhood, w… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    MSC Class: 68R10 ACM Class: G.2.2; C.2.4

  15. arXiv:2004.07085  [pdf, other

    cs.LG cs.NE stat.ML

    Neural Status Registers

    Authors: Lukas Faber, Roger Wattenhofer

    Abstract: Standard Neural Networks can learn mathematical operations, but they do not extrapolate. Extrapolation means that the model can apply to larger numbers, well beyond those observed during training. Recent architectures tackle arithmetic operations and can extrapolate; however, the equally important problem of quantitative reasoning remains unaddressed. In this work, we propose a novel architectural… ▽ More

    Submitted 11 March, 2021; v1 submitted 15 April, 2020; originally announced April 2020.

  16. arXiv:2004.05916  [pdf, other

    cs.LG cs.CL

    Telling BERT's full story: from Local Attention to Global Aggregation

    Authors: Damian Pascual, Gino Brunner, Roger Wattenhofer

    Abstract: We take a deep look into the behavior of self-attention heads in the transformer architecture. In light of recent work discouraging the use of attention distributions for explaining a model's behavior, we show that attention distributions can nevertheless provide insights into the local behavior of attention heads. This way, we propose a distinction between local patterns revealed by attention and… ▽ More

    Submitted 13 January, 2021; v1 submitted 9 April, 2020; originally announced April 2020.

    Comments: Accepted at EACL 2021

  17. arXiv:2002.07741  [pdf, ps, other

    cs.CE cs.CC q-fin.MF

    Default Ambiguity: Finding the Best Solution to the Clearing Problem

    Authors: Pál András Papp, Roger Wattenhofer

    Abstract: We study financial networks with debt contracts and credit default swaps between specific pairs of banks. Given such a financial system, we want to decide which of the banks are in default, and how much of their liabilities can these defaulting banks pay. There can easily be multiple different solutions to this problem, leading to a situation of default ambiguity, and a range of possible solutions… ▽ More

    Submitted 8 October, 2021; v1 submitted 18 February, 2020; originally announced February 2020.

    MSC Class: 91G45; 68Q17 ACM Class: J.4

  18. arXiv:2002.07566  [pdf, ps, other

    q-fin.RM cs.GT

    Network-Aware Strategies in Financial Systems

    Authors: Pál András Papp, Roger Wattenhofer

    Abstract: We study the incentives of banks in a financial network, where the network consists of debt contracts and credit default swaps (CDSs) between banks. One of the most important questions in such a system is the problem of deciding which of the banks are in default, and how much of their liabilities these banks can pay. We study the payoff and preferences of the banks in the different solutions to th… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    MSC Class: 91A43; 91B74 ACM Class: J.4

  19. arXiv:1912.04797  [pdf, other

    cs.GT

    Ride the Lightning: The Game Theory of Payment Channels

    Authors: Zeta Avarikioti, Lioba Heimbach, Yuyi Wang, Roger Wattenhofer

    Abstract: Payment channels were introduced to solve various eminent cryptocurrency scalability issues. Multiple payment channels build a network on top of a blockchain, the so-called layer 2. In this work, we analyze payment networks through the lens of network creation games. We identify betweenness and closeness centrality as central concepts regarding payment networks. We study the topologies that emerge… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: In Proceedings of Financial Cryptography and Data Security (FC) 2020

  20. arXiv:1910.10434  [pdf, other

    cs.DC

    Divide and Scale: Formalization and Roadmap to Robust Sharding

    Authors: Georgia Avarikioti, Antoine Desjardins, Eleftherios Kokoris-Kogias, Roger Wattenhofer

    Abstract: Sharding distributed ledgers is a promising on-chain solution for scaling blockchains but lacks formal grounds, nurturing skepticism on whether such complex systems can scale blockchains securely. We fill this gap by introducing the first formal framework as well as a roadmap to robust sharding. In particular, we first define the properties sharded distributed ledgers should fulfill. We build upon… ▽ More

    Submitted 22 May, 2023; v1 submitted 23 October, 2019; originally announced October 2019.

  21. arXiv:1909.10926  [pdf, ps, other

    cs.CR

    ABC: Proof-of-Stake without Consensus

    Authors: Jakub Sliwinski, Roger Wattenhofer

    Abstract: We introduce a new permissionless blockchain architecture called ABC. ABC is completely asynchronous, and does rely on neither randomness nor proof-of-work. ABC can be parallelized, and transactions have finality within one round trip of communication. However, ABC satisfies only a relaxed form of consensus by introducing a weaker termination property. Without full consensus, ABC cannot support ce… ▽ More

    Submitted 20 July, 2020; v1 submitted 24 September, 2019; originally announced September 2019.

  22. arXiv:1908.04211  [pdf, other

    cs.CL cs.LG

    On Identifiability in Transformers

    Authors: Gino Brunner, Yang Liu, Damián Pascual, Oliver Richter, Massimiliano Ciaramita, Roger Wattenhofer

    Abstract: In this paper we delve deep in the Transformer architecture by investigating two of its core components: self-attention and contextual embeddings. In particular, we study the identifiability of attention weights and token embeddings, and the aggregation of context into hidden tokens. We show that, for sequences longer than the attention head dimension, attention weights are not identifiable. We pr… ▽ More

    Submitted 7 February, 2020; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: Published as a conference paper at ICLR 2020

    MSC Class: I.2.7; I.7.0 ACM Class: I.2.7; I.7.0

  23. arXiv:1908.00436  [pdf, other

    cs.GT

    Payment Networks as Creation Games

    Authors: Georgia Avarikioti, Rolf Scheuner, Roger Wattenhofer

    Abstract: Payment networks were introduced to address the limitation on the transaction throughput of popular blockchains. To open a payment channel one has to publish a transaction on-chain and pay the appropriate transaction fee. A transaction can be routed in the network, as long as there is a path of channels with the necessary capital. The intermediate nodes on this path can ask for a fee to forward th… ▽ More

    Submitted 5 August, 2019; v1 submitted 1 August, 2019; originally announced August 2019.

    Comments: To appear in 3rd International Workshop on Cryptocurrencies and Blockchain Technology (CBT) 2019

  24. arXiv:1908.00432  [pdf, ps, other

    cs.DS cs.DC

    Online Payment Network Design

    Authors: Georgia Avarikioti, Kenan Besic, Yuyi Wang, Roger Wattenhofer

    Abstract: Payment channels allow transactions between participants of the blockchain to be executed securely off-chain, and thus provide a promising solution for the scalability problem of popular blockchains. We study the online network design problem for payment channels, assuming a central coordinator. We focus on a single channel, where the coordinator desires to maximize the number of accepted transact… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.

    Comments: To appear in 3rd International Workshop on Cryptocurrencies and Blockchain Technology (CBT) 2019

  25. arXiv:1908.00427  [pdf, ps, other

    cs.CR

    Bitcoin Security under Temporary Dishonest Majority

    Authors: Georgia Avarikioti, Lukas Kaeppeli, Yuyi Wang, Roger Wattenhofer

    Abstract: We prove Bitcoin is secure under temporary dishonest majority. We assume the adversary can corrupt a specific fraction of parties and also introduce crash failures, i.e., some honest participants are offline during the execution of the protocol. We demand a majority of honest online participants on expectation. We explore three different models and present the requirements for proving Bitcoin's se… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.

    Comments: In Proceedings of Financial Cryptography and Data Security 2019

  26. arXiv:1907.10518  [pdf, other

    eess.SP cs.LG

    Synthetic Epileptic Brain Activities Using Generative Adversarial Networks

    Authors: Damian Pascual, Amir Aminifar, David Atienza, Philippe Ryvlin, Roger Wattenhofer

    Abstract: Epilepsy is a chronic neurological disorder affecting more than 65 million people worldwide and manifested by recurrent unprovoked seizures. The unpredictability of seizures not only degrades the quality of life of the patients, but it can also be life-threatening. Modern systems monitoring electroencephalography (EEG) signals are being currently developed with the view to detect epileptic seizure… ▽ More

    Submitted 12 November, 2019; v1 submitted 22 July, 2019; originally announced July 2019.

    Comments: Machine Learning for Health (ML4H) at NeurIPS 2019 - Extended Abstract

  27. arXiv:1907.02874  [pdf, other

    cs.LG cs.AI stat.ML

    Attentive Multi-Task Deep Reinforcement Learning

    Authors: Timo Bram, Gino Brunner, Oliver Richter, Roger Wattenhofer

    Abstract: Sharing knowledge between tasks is vital for efficient learning in a multi-task setting. However, most research so far has focused on the easier case where knowledge transfer is not harmful, i.e., where knowledge from one task cannot negatively impact the performance on another task. In contrast, we present an approach to multi-task deep reinforcement learning based on attention that does not requ… ▽ More

    Submitted 5 July, 2019; originally announced July 2019.

    Comments: Accepted as conference paper at ECML PKDD 2019

    MSC Class: 93E35 ACM Class: I.2.6; I.2.8

  28. arXiv:1907.02131  [pdf, ps, other

    cs.DM

    Stabilization Time in Minority Processes

    Authors: Pál András Papp, Roger Wattenhofer

    Abstract: We analyze the stabilization time of minority processes in graphs. A minority process is a dynamically changing coloring, where each node repeatedly changes its color to the color which is least frequent in its neighborhood. First, we present a simple $Ω(n^2)$ stabilization time lower bound in the sequential adversarial model. Our main contribution is a graph construction which proves a… ▽ More

    Submitted 3 July, 2019; originally announced July 2019.

  29. arXiv:1906.11941  [pdf, other

    cs.LG cs.AI stat.ML

    Learning Policies through Quantile Regression

    Authors: Oliver Richter, Roger Wattenhofer

    Abstract: Policy gradient based reinforcement learning algorithms coupled with neural networks have shown success in learning complex policies in the model free continuous action space control setting. However, explicitly parameterized policies are limited by the scope of the chosen parametric probability distribution. We show that alternatively to the likelihood based policy gradient, a related objective c… ▽ More

    Submitted 27 September, 2019; v1 submitted 27 June, 2019; originally announced June 2019.

    Comments: Preprint

    MSC Class: 60 ACM Class: I.2.6; I.2.8; G.3

  30. arXiv:1906.10368  [pdf, other

    cs.DC

    PermitBFT: Exploring the Byzantine Fast-Path

    Authors: Roland Schmid, Roger Wattenhofer

    Abstract: PermitBFT establishes a permissioned byzantine ledger in the partially synchronous networking model. For n replicas, PermitBFT tolerates up to f < n/3 byzantine replicas. It is the first BFT protocol to achieve a latency of just 2 message delays despite tolerating byzantine replicas throughout the "fast track", as long as they are not the leader. The design of PermitBFT relies on two fundamental c… ▽ More

    Submitted 30 October, 2020; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: 20 pages, 1 table, 1 figure

  31. arXiv:1905.11360  [pdf, other

    cs.DC cs.CR

    Brick: Asynchronous Payment Channels

    Authors: Georgia Avarikioti, Eleftherios Kokoris Kogias, Roger Wattenhofer, Dionysis Zindros

    Abstract: Off-chain protocols (channels) are a promising solution to the scalability and privacy challenges of blockchain payments. Current proposals, however, require synchrony assumptions to preserve the safety of a channel, leaking to an adversary the exact amount of time needed to control the network for a successful attack. In this paper, we introduce Brick, the first payment channel that remains secur… ▽ More

    Submitted 19 June, 2020; v1 submitted 27 May, 2019; originally announced May 2019.

  32. arXiv:1903.00581  [pdf, ps, other

    cs.DS cs.DC

    Online Graph Exploration on a Restricted Graph Class: Optimal Solutions for Tadpole Graphs

    Authors: Sebastian Brandt, Klaus-Tycho Foerster, Jonathan Maurer, Roger Wattenhofer

    Abstract: We study the problem of online graph exploration on undirected graphs, where a searcher has to visit every vertex and return to the origin. Once a new vertex is visited, the searcher learns of all neighboring vertices and the connecting edge weights. The goal such an exploration is to minimize its total cost, where each edge traversal incurs a cost of the corresponding edge weight. We investigate… ▽ More

    Submitted 18 April, 2020; v1 submitted 1 March, 2019; originally announced March 2019.

  33. arXiv:1902.01228  [pdf, ps, other

    cs.DM

    Stabilization Time in Weighted Minority Processes

    Authors: Pál András Papp, Roger Wattenhofer

    Abstract: A minority process in a weighted graph is a dynamically changing coloring. Each node repeatedly changes its color in order to minimize the sum of weighted conflicts with its neighbors. We study the number of steps until such a process stabilizes. Our main contribution is an exponential lower bound on stabilization time. We first present a construction showing this bound in the adversarial sequenti… ▽ More

    Submitted 4 February, 2019; originally announced February 2019.

    MSC Class: 68R10 ACM Class: G.2.2; C.2.4

  34. arXiv:1811.12740  [pdf, other

    cs.CR cs.GT

    Towards Secure and Efficient Payment Channels

    Authors: Georgia Avarikioti, Felix Laufenberg, Jakub Sliwinski, Yuyi Wang, Roger Wattenhofer

    Abstract: Micropayment channels are the most prominent solution to the limitation on transaction throughput in current blockchain systems. However, in practice channels are risky because participants have to be online constantly to avoid fraud, and inefficient because participants have to open multiple channels and lock funds in them. To address the security issue, we propose a novel mechanism that involves… ▽ More

    Submitted 30 November, 2018; originally announced November 2018.

  35. arXiv:1811.02288  [pdf, ps, other

    cs.CG

    High Dimensional Clustering with $r$-nets

    Authors: Georgia Avarikioti, Alain Ryser, Yuyi Wang, Roger Wattenhofer

    Abstract: Clustering, a fundamental task in data science and machine learning, groups a set of objects in such a way that objects in the same cluster are closer to each other than to those in other clusters. In this paper, we consider a well-known structure, so-called $r$-nets, which rigorously captures the properties of clustering. We devise algorithms that improve the run-time of approximating $r$-nets in… ▽ More

    Submitted 6 November, 2018; originally announced November 2018.

    Comments: Accepted by AAAI2019

  36. arXiv:1811.01348  [pdf, other

    cs.CY cs.CR cs.SI

    Structure and Content of the Visible Darknet

    Authors: Georgia Avarikioti, Roman Brunner, Aggelos Kiayias, Roger Wattenhofer, Dionysis Zindros

    Abstract: In this paper, we analyze the topology and the content found on the "darknet", the set of websites accessible via Tor. We created a darknet spider and crawled the darknet starting from a bootstrap list by recursively following links. We explored the whole connected component of more than 34,000 hidden services, of which we found 10,000 to be online. Contrary to folklore belief, the visible part of… ▽ More

    Submitted 7 November, 2018; v1 submitted 4 November, 2018; originally announced November 2018.

  37. arXiv:1810.07603  [pdf, other

    cs.DS

    Algorithmic Blockchain Channel Design

    Authors: Georgia Avarikioti, Yuyi Wang, Roger Wattenhofer

    Abstract: Payment networks, also known as channels, are a most promising solution to the throughput problem of cryptocurrencies. In this paper we study the design of capital-efficient payment networks, offline as well as online variants. We want to know how to compute an efficient payment network topology, how capital should be assigned to the individual edges, and how to decide which transactions to accept… ▽ More

    Submitted 17 October, 2018; originally announced October 2018.

    Comments: This paper is accepted in ISAAC 2018

  38. arXiv:1810.07585  [pdf, ps, other

    cs.DS

    Payment Network Design with Fees

    Authors: Georgia Avarikioti, Gerrit Janssen, Yuyi Wang, Roger Wattenhofer

    Abstract: Payment channels are the most prominent solution to the blockchain scalability problem. We introduce the problem of network design with fees for payment channels from the perspective of a Payment Service Provider (PSP). Given a set of transactions, we examine the optimal graph structure and fee assignment to maximize the PSP's profit. A customer prefers to route transactions through the PSP's netw… ▽ More

    Submitted 17 October, 2018; originally announced October 2018.

    Comments: This paper was accepted at CBT 2018

  39. arXiv:1810.00361  [pdf, other

    cs.LG cs.AI stat.ML

    Using State Predictions for Value Regularization in Curiosity Driven Deep Reinforcement Learning

    Authors: Gino Brunner, Manuel Fritsche, Oliver Richter, Roger Wattenhofer

    Abstract: Learning in sparse reward settings remains a challenge in Reinforcement Learning, which is often addressed by using intrinsic rewards. One promising strategy is inspired by human curiosity, requiring the agent to learn to predict the future. In this paper a curiosity-driven agent is extended to use these predictions directly for training. To achieve this, the agent predicts the value function of t… ▽ More

    Submitted 30 September, 2018; originally announced October 2018.

  40. arXiv:1809.08022  [pdf, other

    cs.RO eess.SY

    The Urban Last Mile Problem: Autonomous Drone Delivery to Your Balcony

    Authors: Gino Brunner, Bence Szebedy, Simon Tanner, Roger Wattenhofer

    Abstract: Drone delivery has been a hot topic in the industry in the past few years. However, existing approaches either focus on rural areas or rely on centralized drop-off locations from where the last mile delivery is performed. In this paper we tackle the problem of autonomous last mile delivery in urban environments using an off-the-shelf drone. We build a prototype system that is able to fly to the ap… ▽ More

    Submitted 21 September, 2018; originally announced September 2018.

  41. arXiv:1809.07600  [pdf, other

    cs.SD cs.LG eess.AS stat.ML

    MIDI-VAE: Modeling Dynamics and Instrumentation of Music with Applications to Style Transfer

    Authors: Gino Brunner, Andres Konrad, Yuyi Wang, Roger Wattenhofer

    Abstract: We introduce MIDI-VAE, a neural network model based on Variational Autoencoders that is capable of handling polyphonic music with multiple instrument tracks, as well as modeling the dynamics of music by incorporating note durations and velocities. We show that MIDI-VAE can perform style transfer on symbolic music by automatically changing pitches, dynamics and instruments of a music piece from, e.… ▽ More

    Submitted 20 September, 2018; originally announced September 2018.

    Comments: Paper accepted at the 19th International Society for Music Information Retrieval Conference, ISMIR 2018, Paris, France

    ACM Class: I.2.1; I.2.4; I.2.6; H.5.5

  42. arXiv:1809.07575  [pdf, other

    cs.SD cs.LG eess.AS stat.ML

    Symbolic Music Genre Transfer with CycleGAN

    Authors: Gino Brunner, Yuyi Wang, Roger Wattenhofer, Sumu Zhao

    Abstract: Deep generative models such as Variational Autoencoders (VAEs) and Generative Adversarial Networks (GANs) have recently been applied to style and domain transfer for images, and in the case of VAEs, music. GAN-based models employing several generators and some form of cycle consistency loss have been among the most successful for image domain transfer. In this paper we apply such a model to symbol… ▽ More

    Submitted 20 September, 2018; originally announced September 2018.

    Comments: Paper accepted at the 30th International Conference on Tools with Artificial Intelligence, ICTAI 2018, Volos, Greece

    ACM Class: I.2.1; I.2.4; I.2.6; H.5.5

  43. arXiv:1803.02720  [pdf, ps, other

    cs.DC

    Byzantine Preferential Voting

    Authors: Darya Melnyk, Yuyi Wang, Roger Wattenhofer

    Abstract: In the Byzantine agreement problem, n nodes with possibly different input values aim to reach agreement on a common value in the presence of t < n/3 Byzantine nodes which represent arbitrary failures in the system. This paper introduces a generalization of Byzantine agreement, where the input values of the nodes are preference rankings of three or more candidates. We show that consensus on prefere… ▽ More

    Submitted 7 March, 2018; originally announced March 2018.

  44. arXiv:1802.03844  [pdf, other

    cs.DS cs.DC

    Reducing Compare-and-Swap to Consensus Number One Primitives

    Authors: Pankaj Khanchandani, Roger Wattenhofer

    Abstract: The consensus number of an object is the maximum number of processes among which binary consensus can be solved using any number of instances of the object and read-write registers. Herlihy [6] showed in his seminal work that if an object has a consensus number of n, then there is a universal construction for a wait-free and linearizable implementation of any non-trivial concurrent object or data… ▽ More

    Submitted 20 August, 2018; v1 submitted 11 February, 2018; originally announced February 2018.

  45. arXiv:1801.06024  [pdf, other

    cs.CL cs.AI cs.LG stat.ML

    Natural Language Multitasking: Analyzing and Improving Syntactic Saliency of Hidden Representations

    Authors: Gino Brunner, Yuyi Wang, Roger Wattenhofer, Michael Weigelt

    Abstract: We train multi-task autoencoders on linguistic tasks and analyze the learned hidden sentence representations. The representations change significantly when translation and part-of-speech decoders are added. The more decoders a model employs, the better it clusters sentences according to their syntactic similarity, as the representation space becomes less entangled. We explore the structure of the… ▽ More

    Submitted 18 January, 2018; originally announced January 2018.

    Comments: The 31st Annual Conference on Neural Information Processing (NIPS) - Workshop on Learning Disentangled Features: from Perception to Control, Long Beach, CA, December 2017

  46. arXiv:1711.07682  [pdf, ps, other

    cs.SD cs.AI cs.IT cs.LG eess.AS stat.ML

    JamBot: Music Theory Aware Chord Based Generation of Polyphonic Music with LSTMs

    Authors: Gino Brunner, Yuyi Wang, Roger Wattenhofer, Jonas Wiesendanger

    Abstract: We propose a novel approach for the generation of polyphonic music based on LSTMs. We generate music in two steps. First, a chord LSTM predicts a chord progression based on a chord embedding. A second LSTM then generates polyphonic music from the predicted chord progression. The generated music sounds pleasing and harmonic, with only few dissonant notes. It has clear long-term structure that is si… ▽ More

    Submitted 21 November, 2017; originally announced November 2017.

    Comments: Paper presented at the 29th International Conference on Tools with Artificial Intelligence, ICTAI 2017, Boston, MA, USA

    ACM Class: I.2.1; I.2.4; I.2.6; H.5.5

  47. arXiv:1711.07479  [pdf, other

    cs.RO cs.AI cs.LG stat.ML

    Teaching a Machine to Read Maps with Deep Reinforcement Learning

    Authors: Gino Brunner, Oliver Richter, Yuyi Wang, Roger Wattenhofer

    Abstract: The ability to use a 2D map to navigate a complex 3D environment is quite remarkable, and even difficult for many humans. Localization and navigation is also an important problem in domains such as robotics, and has recently become a focus of the deep reinforcement learning community. In this paper we teach a reinforcement learning agent to read a map in order to find the shortest way out of a ran… ▽ More

    Submitted 20 November, 2017; originally announced November 2017.

    Comments: Paper accepted at 32nd AAAI Conference on Artificial Intelligence, AAAI 2018, New Orleans, Louisiana, USA

    ACM Class: I.2.0; I.2.6; I.2.9; I.2.10

  48. arXiv:1705.03834  [pdf, other

    cs.DC

    Tight Bounds for Asynchronous Collaborative Grid Exploration

    Authors: Sebastian Brandt, Jara Uitto, Roger Wattenhofer

    Abstract: Consider a small group of mobile agents whose goal is to locate a certain cell in a two-dimensional infinite grid. The agents operate in an asynchronous environment, where in each discrete time step, an arbitrary subset of the agents execute one atomic look-compute-move cycle. The protocol controlling each agent is determined by a (possibly distinct) finite automaton. The only means of communicati… ▽ More

    Submitted 7 May, 2018; v1 submitted 10 May, 2017; originally announced May 2017.

    ACM Class: F.2.2

  49. arXiv:1705.02808  [pdf, other

    cs.DC

    Towards Reduced Instruction Sets for Synchronization

    Authors: Rati Gelashvili, Idit Keidar, Alexander Spiegelman, Roger Wattenhofer

    Abstract: Contrary to common belief, a recent work by Ellen, Gelashvili, Shavit, and Zhu has shown that computability does not require multicore architectures to support "strong" synchronization instructions like compare-and-swap, as opposed to combinations of "weaker" instructions like decrement and multiply. However, this is the status quo, and in turn, most efficient concurrent data-structures heavily re… ▽ More

    Submitted 8 May, 2017; originally announced May 2017.

  50. arXiv:1607.00298  [pdf, other

    cs.DC cs.NI

    CLEX: Yet Another Supercomputer Architecture?

    Authors: Christoph Lenzen, Roger Wattenhofer

    Abstract: We propose the CLEX supercomputer topology and routing scheme. We prove that CLEX can utilize a constant fraction of the total bandwidth for point-to-point communication, at delays proportional to the sum of the number of intermediate hops and the maximum physical distance between any two nodes. Moreover, % applying an asymmetric bandwidth assignment to the links, all-to-all communication can be r… ▽ More

    Submitted 1 July, 2016; originally announced July 2016.