-
On the consistency of hyper-parameter selection in value-based deep reinforcement learning
Authors:
Johan Obando-Ceron,
João G. M. Araújo,
Aaron Courville,
Pablo Samuel Castro
Abstract:
Deep reinforcement learning (deep RL) has achieved tremendous success on various domains through a combination of algorithmic design and careful selection of hyper-parameters. Algorithmic improvements are often the result of iterative enhancements built upon prior approaches, while hyper-parameter choices are typically inherited from previous methods or fine-tuned specifically for the proposed tec…
▽ More
Deep reinforcement learning (deep RL) has achieved tremendous success on various domains through a combination of algorithmic design and careful selection of hyper-parameters. Algorithmic improvements are often the result of iterative enhancements built upon prior approaches, while hyper-parameter choices are typically inherited from previous methods or fine-tuned specifically for the proposed technique. Despite their crucial impact on performance, hyper-parameter choices are frequently overshadowed by algorithmic advancements. This paper conducts an extensive empirical study focusing on the reliability of hyper-parameter selection for value-based deep reinforcement learning agents, including the introduction of a new score to quantify the consistency and reliability of various hyper-parameters. Our findings not only help establish which hyper-parameters are most critical to tune, but also help clarify which tunings remain consistent across different training regimes.
△ Less
Submitted 2 July, 2024; v1 submitted 25 June, 2024;
originally announced June 2024.
-
Transformers need glasses! Information over-squashing in language tasks
Authors:
Federico Barbero,
Andrea Banino,
Steven Kapturowski,
Dharshan Kumaran,
João G. M. Araújo,
Alex Vitvitskyi,
Razvan Pascanu,
Petar Veličković
Abstract:
We study how information propagates in decoder-only Transformers, which are the architectural backbone of most existing frontier large language models (LLMs). We rely on a theoretical signal propagation analysis -- specifically, we analyse the representations of the last token in the final layer of the Transformer, as this is the representation used for next-token prediction. Our analysis reveals…
▽ More
We study how information propagates in decoder-only Transformers, which are the architectural backbone of most existing frontier large language models (LLMs). We rely on a theoretical signal propagation analysis -- specifically, we analyse the representations of the last token in the final layer of the Transformer, as this is the representation used for next-token prediction. Our analysis reveals a representational collapse phenomenon: we prove that certain distinct sequences of inputs to the Transformer can yield arbitrarily close representations in the final token. This effect is exacerbated by the low-precision floating-point formats frequently used in modern LLMs. As a result, the model is provably unable to respond to these sequences in different ways -- leading to errors in, e.g., tasks involving counting or copying. Further, we show that decoder-only Transformer language models can lose sensitivity to specific tokens in the input, which relates to the well-known phenomenon of over-squashing in graph neural networks. We provide empirical evidence supporting our claims on contemporary LLMs. Our theory also points to simple solutions towards ameliorating these issues.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Key Patches Are All You Need: A Multiple Instance Learning Framework For Robust Medical Diagnosis
Authors:
Diogo J. Araújo,
M. Rita Verdelho,
Alceu Bissoto,
Jacinto C. Nascimento,
Carlos Santiago,
Catarina Barata
Abstract:
Deep learning models have revolutionized the field of medical image analysis, due to their outstanding performances. However, they are sensitive to spurious correlations, often taking advantage of dataset bias to improve results for in-domain data, but jeopardizing their generalization capabilities. In this paper, we propose to limit the amount of information these models use to reach the final cl…
▽ More
Deep learning models have revolutionized the field of medical image analysis, due to their outstanding performances. However, they are sensitive to spurious correlations, often taking advantage of dataset bias to improve results for in-domain data, but jeopardizing their generalization capabilities. In this paper, we propose to limit the amount of information these models use to reach the final classification, by using a multiple instance learning (MIL) framework. MIL forces the model to use only a (small) subset of patches in the image, identifying discriminative regions. This mimics the clinical procedures, where medical decisions are based on localized findings. We evaluate our framework on two medical applications: skin cancer diagnosis using dermoscopy and breast cancer diagnosis using mammography. Our results show that using only a subset of the patches does not compromise diagnostic performance for in-domain data, compared to the baseline approaches. However, our approach is more robust to shifts in patient demographics, while also providing more detailed explanations about which regions contributed to the decision. Code is available at: https://github.com/diogojpa99/MedicalMultiple-Instance-Learning.
△ Less
Submitted 2 May, 2024;
originally announced May 2024.
-
Position: Categorical Deep Learning is an Algebraic Theory of All Architectures
Authors:
Bruno Gavranović,
Paul Lessard,
Andrew Dudzik,
Tamara von Glehn,
João G. M. Araújo,
Petar Veličković
Abstract:
We present our position on the elusive quest for a general-purpose framework for specifying and studying deep learning architectures. Our opinion is that the key attempts made so far lack a coherent bridge between specifying constraints which models must satisfy and specifying their implementations. Focusing on building a such a bridge, we propose to apply category theory -- precisely, the univers…
▽ More
We present our position on the elusive quest for a general-purpose framework for specifying and studying deep learning architectures. Our opinion is that the key attempts made so far lack a coherent bridge between specifying constraints which models must satisfy and specifying their implementations. Focusing on building a such a bridge, we propose to apply category theory -- precisely, the universal algebra of monads valued in a 2-category of parametric maps -- as a single theory elegantly subsuming both of these flavours of neural network design. To defend our position, we show how this theory recovers constraints induced by geometric deep learning, as well as implementations of many architectures drawn from the diverse landscape of neural networks, such as RNNs. We also illustrate how the theory naturally encodes many standard constructs in computer science and automata theory.
△ Less
Submitted 5 June, 2024; v1 submitted 23 February, 2024;
originally announced February 2024.
-
Open RL Benchmark: Comprehensive Tracked Experiments for Reinforcement Learning
Authors:
Shengyi Huang,
Quentin Gallouédec,
Florian Felten,
Antonin Raffin,
Rousslan Fernand Julien Dossa,
Yanxiao Zhao,
Ryan Sullivan,
Viktor Makoviychuk,
Denys Makoviichuk,
Mohamad H. Danesh,
Cyril Roumégous,
Jiayi Weng,
Chufan Chen,
Md Masudur Rahman,
João G. M. Araújo,
Guorui Quan,
Daniel Tan,
Timo Klein,
Rujikorn Charakorn,
Mark Towers,
Yann Berthelot,
Kinal Mehta,
Dipam Chakraborty,
Arjun KG,
Valentin Charraut
, et al. (8 additional authors not shown)
Abstract:
In many Reinforcement Learning (RL) papers, learning curves are useful indicators to measure the effectiveness of RL algorithms. However, the complete raw data of the learning curves are rarely available. As a result, it is usually necessary to reproduce the experiments from scratch, which can be time-consuming and error-prone. We present Open RL Benchmark, a set of fully tracked RL experiments, i…
▽ More
In many Reinforcement Learning (RL) papers, learning curves are useful indicators to measure the effectiveness of RL algorithms. However, the complete raw data of the learning curves are rarely available. As a result, it is usually necessary to reproduce the experiments from scratch, which can be time-consuming and error-prone. We present Open RL Benchmark, a set of fully tracked RL experiments, including not only the usual data such as episodic return, but also all algorithm-specific and system metrics. Open RL Benchmark is community-driven: anyone can download, use, and contribute to the data. At the time of writing, more than 25,000 runs have been tracked, for a cumulative duration of more than 8 years. Open RL Benchmark covers a wide range of RL libraries and reference implementations. Special care is taken to ensure that each experiment is precisely reproducible by providing not only the full parameters, but also the versions of the dependencies used to generate it. In addition, Open RL Benchmark comes with a command-line interface (CLI) for easy fetching and generating figures to present the results. In this document, we include two case studies to demonstrate the usefulness of Open RL Benchmark in practice. To the best of our knowledge, Open RL Benchmark is the first RL benchmark of its kind, and the authors hope that it will improve and facilitate the work of researchers in the field.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
The iteration time and the general position number in graph convexities
Authors:
Julio Araujo,
Mitre C. Dourado,
Fábio Protti,
Rudini Sampaio
Abstract:
In this paper, we study two graph convexity parameters: iteration time and general position number. The iteration time was defined in 1981 in the geodesic convexity, but its computational complexity was so far open. The general position number was defined in the geodesic convexity and proved NP-hard in 2018. We extend these parameters to any graph convexity and prove that the iteration number is N…
▽ More
In this paper, we study two graph convexity parameters: iteration time and general position number. The iteration time was defined in 1981 in the geodesic convexity, but its computational complexity was so far open. The general position number was defined in the geodesic convexity and proved NP-hard in 2018. We extend these parameters to any graph convexity and prove that the iteration number is NP-hard in the P3 convexity. We use this result to prove that the iteration time is also NP-hard in the geodesic convexity even in graphs with diameter two, a long standing open question. These results are also important since they are the last two missing NP-hardness results regarding the ten most studied graph convexity parameters in the geodesic and P3 convexities. We also prove that the general position number of the monophonic convexity is W[1]-hard (parameterized by the size of the solution) and $n^{1-\varepsilon}$-inapproximable in polynomial time for any $\varepsilon>0$ unless P=NP, even in graphs with diameter two. Finally, we also obtain FPT results on the general position number in the P3 convexity and we prove that it is W[1]-hard (parameterized by the size of the solution).
△ Less
Submitted 24 October, 2023; v1 submitted 30 April, 2023;
originally announced May 2023.
-
CIRCLE: Capture In Rich Contextual Environments
Authors:
Joao Pedro Araujo,
Jiaman Li,
Karthik Vetrivel,
Rishi Agarwal,
Deepak Gopinath,
Jiajun Wu,
Alexander Clegg,
C. Karen Liu
Abstract:
Synthesizing 3D human motion in a contextual, ecological environment is important for simulating realistic activities people perform in the real world. However, conventional optics-based motion capture systems are not suited for simultaneously capturing human movements and complex scenes. The lack of rich contextual 3D human motion datasets presents a roadblock to creating high-quality generative…
▽ More
Synthesizing 3D human motion in a contextual, ecological environment is important for simulating realistic activities people perform in the real world. However, conventional optics-based motion capture systems are not suited for simultaneously capturing human movements and complex scenes. The lack of rich contextual 3D human motion datasets presents a roadblock to creating high-quality generative human motion models. We propose a novel motion acquisition system in which the actor perceives and operates in a highly contextual virtual world while being motion captured in the real world. Our system enables rapid collection of high-quality human motion in highly diverse scenes, without the concern of occlusion or the need for physical scene construction in the real world. We present CIRCLE, a dataset containing 10 hours of full-body reaching motion from 5 subjects across nine scenes, paired with ego-centric information of the environment represented in various forms, such as RGBD videos. We use this dataset to train a model that generates human motion conditioned on scene information. Leveraging our dataset, the model learns to use ego-centric scene information to achieve nontrivial reaching tasks in the context of complex 3D scenes. To download the data please visit https://stanford-tml.github.io/circle_dataset/.
△ Less
Submitted 31 March, 2023;
originally announced March 2023.
-
NeMo: 3D Neural Motion Fields from Multiple Video Instances of the Same Action
Authors:
Kuan-Chieh Wang,
Zhenzhen Weng,
Maria Xenochristou,
Joao Pedro Araujo,
Jeffrey Gu,
C. Karen Liu,
Serena Yeung
Abstract:
The task of reconstructing 3D human motion has wideranging applications. The gold standard Motion capture (MoCap) systems are accurate but inaccessible to the general public due to their cost, hardware and space constraints. In contrast, monocular human mesh recovery (HMR) methods are much more accessible than MoCap as they take single-view videos as inputs. Replacing the multi-view Mo- Cap system…
▽ More
The task of reconstructing 3D human motion has wideranging applications. The gold standard Motion capture (MoCap) systems are accurate but inaccessible to the general public due to their cost, hardware and space constraints. In contrast, monocular human mesh recovery (HMR) methods are much more accessible than MoCap as they take single-view videos as inputs. Replacing the multi-view Mo- Cap systems with a monocular HMR method would break the current barriers to collecting accurate 3D motion thus making exciting applications like motion analysis and motiondriven animation accessible to the general public. However, performance of existing HMR methods degrade when the video contains challenging and dynamic motion that is not in existing MoCap datasets used for training. This reduces its appeal as dynamic motion is frequently the target in 3D motion recovery in the aforementioned applications. Our study aims to bridge the gap between monocular HMR and multi-view MoCap systems by leveraging information shared across multiple video instances of the same action. We introduce the Neural Motion (NeMo) field. It is optimized to represent the underlying 3D motions across a set of videos of the same action. Empirically, we show that NeMo can recover 3D motion in sports using videos from the Penn Action dataset, where NeMo outperforms existing HMR methods in terms of 2D keypoint detection. To further validate NeMo using 3D metrics, we collected a small MoCap dataset mimicking actions in Penn Action,and show that NeMo achieves better 3D reconstruction compared to various baselines.
△ Less
Submitted 27 December, 2022;
originally announced December 2022.
-
On Extensions of Quasi-Overlap and Quasi-Grou** Functions Defined on Bounded Lattices
Authors:
Ana Shirley Monteiro,
Regivan Santiago,
Benjamín Bedregal,
Juscelino Araújo,
Eduardo Palmeira
Abstract:
In this paper, we propose a method of extending quasi-overlap and grou** functions defined on a sublattice $ M $ of a bounded lattice $ L $ to this lattice considering a more general version of sublattice definition, introduced by Palmeira and Bedregral.
In this paper, we propose a method of extending quasi-overlap and grou** functions defined on a sublattice $ M $ of a bounded lattice $ L $ to this lattice considering a more general version of sublattice definition, introduced by Palmeira and Bedregral.
△ Less
Submitted 27 March, 2023; v1 submitted 21 November, 2022;
originally announced November 2022.
-
On the hull and interval numbers of oriented graphs
Authors:
J. Araujo,
A. K. Maia,
P. P. Medeiros,
L. Penso
Abstract:
In this work, for a given oriented graph $D$, we study its interval and hull numbers, respectively, in the oriented geodetic, P3 and P3* convexities. This last one, we believe to be formally defined and first studied in this paper, although its undirected version is well-known in the literature.
Concerning bounds, for a strongly oriented graph D, and the oriented geodetic convexity, we prove tha…
▽ More
In this work, for a given oriented graph $D$, we study its interval and hull numbers, respectively, in the oriented geodetic, P3 and P3* convexities. This last one, we believe to be formally defined and first studied in this paper, although its undirected version is well-known in the literature.
Concerning bounds, for a strongly oriented graph D, and the oriented geodetic convexity, we prove that $ohng(D)\leq m(D)-n(D)+2$ and that there is at least one such that $ohng(D) = m(D)-n(D)$. We also determine exact values for the hull numbers in these three convexities for tournaments, which imply polynomial-time algorithms to compute them. These results allow us to deduce polynomial-time algorithms to compute $ohnp(D)$ when the underlying graph of $D$ is split or cobipartite.
Moreover, we provide a meta-theorem by proving that if deciding whether $oing(D)\leq k$ or $ohng(D)\leq k$ is NP-hard or W[i]-hard parameterized by $k$, for some $i\in\mathbb{Z_+^*}$, then the same holds even if the underlying graph of $D$ is bipartite. Next, we prove that deciding whether $ohnp(D)\leq k$ or $ohnps(D)\leq k$ is W[2]-hard parameterized by $k$, even if $D$ is acyclic and its underlying graph is bipartite; that deciding whether $ohng(D)\leq k$ is W[2]-hard parameterized by $k$, even if $D$ is acyclic; that deciding whether $oinp(D)\leq k$ or $oinps(D)\leq k$ is NP-complete, even if $D$ has no directed cycles and the underlying graph of $D$ is a chordal bipartite graph; and that deciding whether $oinp(D)\leq k$ or $oinps(D)\leq k$ is W[2]-hard parameterized by $k$, even if the underlying graph of $D$ is split.
Finally, also argue that the interval and hull numbers in the oriented P3 and P3* convexities can be computed in cubic time for graphs of bounded clique-width by using Courcelle's theorem.
△ Less
Submitted 1 March, 2024; v1 submitted 4 October, 2022;
originally announced October 2022.
-
Scalable Training of Language Models using JAX pjit and TPUv4
Authors:
Joanna Yoo,
Kuba Perlin,
Siddhartha Rao Kamalakara,
João G. M. Araújo
Abstract:
Modern large language models require distributed training strategies due to their size. The challenges of efficiently and robustly training them are met with rapid developments on both software and hardware frontiers. In this technical report, we explore challenges and design decisions associated with develo** a scalable training framework, and present a quantitative analysis of efficiency impro…
▽ More
Modern large language models require distributed training strategies due to their size. The challenges of efficiently and robustly training them are met with rapid developments on both software and hardware frontiers. In this technical report, we explore challenges and design decisions associated with develo** a scalable training framework, and present a quantitative analysis of efficiency improvements coming from adopting new software and hardware solutions.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
Boosting Isomorphic Model Filtering with Invariants
Authors:
João Araújo,
Choiwah Chow,
Mikoláš Janota
Abstract:
The enumeration of finite models is very important to the working discrete mathematician (algebra, graph theory, etc) and hence the search for effective methods to do this task is a critical goal in discrete computational mathematics. However, it is hindered by the possible existence of many isomorphic models, which usually only add noise. Typically, they are filtered out {\em a posteriori}, a ste…
▽ More
The enumeration of finite models is very important to the working discrete mathematician (algebra, graph theory, etc) and hence the search for effective methods to do this task is a critical goal in discrete computational mathematics. However, it is hindered by the possible existence of many isomorphic models, which usually only add noise. Typically, they are filtered out {\em a posteriori}, a step that might take a long time just to discard redundant models. This paper proposes a novel approach to split the generated models into mutually non-isomorphic blocks. To do that we use well-designed hand-crafted invariants as well as randomly generated invariants. The blocks are then tackled separately and possibly in parallel. This approach is integrated into Mace4 (the most popular tool among mathematicians) where it shows tremendous speed-ups for a large variety of algebraic structures.
△ Less
Submitted 21 January, 2022;
originally announced January 2022.
-
No News is Good News: A Critique of the One Billion Word Benchmark
Authors:
Helen Ngo,
João G. M. Araújo,
Jeffrey Hui,
Nicholas Frosst
Abstract:
The One Billion Word Benchmark is a dataset derived from the WMT 2011 News Crawl, commonly used to measure language modeling ability in natural language processing. We train models solely on Common Crawl web scrapes partitioned by year, and demonstrate that they perform worse on this task over time due to distributional shift. Analysis of this corpus reveals that it contains several examples of ha…
▽ More
The One Billion Word Benchmark is a dataset derived from the WMT 2011 News Crawl, commonly used to measure language modeling ability in natural language processing. We train models solely on Common Crawl web scrapes partitioned by year, and demonstrate that they perform worse on this task over time due to distributional shift. Analysis of this corpus reveals that it contains several examples of harmful text, as well as outdated references to current events. We suggest that the temporal nature of news and its distribution shift over time makes it poorly suited for measuring language modeling ability, and discuss potential impact and considerations for researchers building language models and evaluation datasets.
△ Less
Submitted 24 October, 2021;
originally announced October 2021.
-
Mitigating harm in language models with conditional-likelihood filtration
Authors:
Helen Ngo,
Cooper Raterink,
João G. M. Araújo,
Ivan Zhang,
Carol Chen,
Adrien Morisot,
Nicholas Frosst
Abstract:
Language models trained on large-scale unfiltered datasets curated from the open web acquire systemic biases, prejudices, and harmful views from their training data. We present a methodology for programmatically identifying and removing harmful text from web-scale datasets. A pretrained language model is used to calculate the log-likelihood of researcher-written trigger phrases conditioned on a sp…
▽ More
Language models trained on large-scale unfiltered datasets curated from the open web acquire systemic biases, prejudices, and harmful views from their training data. We present a methodology for programmatically identifying and removing harmful text from web-scale datasets. A pretrained language model is used to calculate the log-likelihood of researcher-written trigger phrases conditioned on a specific document, which is used to identify and filter documents from the dataset. We demonstrate that models trained on this filtered dataset exhibit lower propensity to generate harmful text, with a marginal decrease in performance on standard language modeling benchmarks compared to unfiltered baselines. We provide a partial explanation for this performance gap by surfacing examples of hate speech and other undesirable content from standard language modeling benchmarks. Finally, we discuss the generalization of this method and how trigger phrases which reflect specific values can be used by researchers to build language models which are more closely aligned with their values.
△ Less
Submitted 27 November, 2021; v1 submitted 4 August, 2021;
originally announced August 2021.
-
Snakes AI Competition 2020 and 2021 Report
Authors:
Joseph Alexander Brown,
Luiz Jonata Pires de Araujo,
Alexandr Grichshenko
Abstract:
The Snakes AI Competition was held by the Innopolis University and was part of the IEEE Conference on Games2020 and 2021 editions. It aimed to create a sandbox for learning and implementing artificial intelligence algorithms in agents in a ludic manner. Competitors of several countries participated in both editions of the competition, which was streamed to create asynergy between organizers and th…
▽ More
The Snakes AI Competition was held by the Innopolis University and was part of the IEEE Conference on Games2020 and 2021 editions. It aimed to create a sandbox for learning and implementing artificial intelligence algorithms in agents in a ludic manner. Competitors of several countries participated in both editions of the competition, which was streamed to create asynergy between organizers and the community. The high-quality submissions and the enthusiasm around the developed framework create an exciting scenario for future extensions.
△ Less
Submitted 11 August, 2021;
originally announced August 2021.
-
Topological Similarity Index and Loss Function for Blood Vessel Segmentation
Authors:
R. J. Araújo,
J. S. Cardoso,
H. P. Oliveira
Abstract:
Blood vessel segmentation is one of the most studied topics in computer vision, due to its relevance in daily clinical practice. Despite the evolution the field has been facing, especially after the dawn of deep learning, important challenges are still not solved. One of them concerns the consistency of the topological properties of the vascular trees, given that the best performing methodologies…
▽ More
Blood vessel segmentation is one of the most studied topics in computer vision, due to its relevance in daily clinical practice. Despite the evolution the field has been facing, especially after the dawn of deep learning, important challenges are still not solved. One of them concerns the consistency of the topological properties of the vascular trees, given that the best performing methodologies do not directly penalize mistakes such as broken segments and end up producing predictions with disconnected trees. This is particularly relevant in graph-like structures, such as blood vessel trees, given that it puts at risk the characterization steps that follow the segmentation task. In this paper, we propose a similarity index which captures the topological consistency of the predicted segmentations having as reference the ground truth. We also design a novel loss function based on the morphological closing operator and show how it allows to learn deep neural network models which produce more topologically coherent masks. Our experiments target well known retinal benchmarks and a coronary angiogram database.
△ Less
Submitted 30 July, 2021;
originally announced July 2021.
-
Parameterized complexity of computing maximum minimal blocking and hitting sets
Authors:
Júlio Araújo,
Marin Bougeret,
Victor A. Campos,
Ignasi Sau
Abstract:
A blocking set in a graph $G$ is a subset of vertices that intersects every maximum independent set of $G$. Let ${\sf mmbs}(G)$ be the size of a maximum (inclusion-wise) minimal blocking set of $G$. This parameter has recently played an important role in the kernelization of Vertex Cover parameterized by the distance to a graph class ${\cal F}$. Indeed, it turns out that the existence of a polynom…
▽ More
A blocking set in a graph $G$ is a subset of vertices that intersects every maximum independent set of $G$. Let ${\sf mmbs}(G)$ be the size of a maximum (inclusion-wise) minimal blocking set of $G$. This parameter has recently played an important role in the kernelization of Vertex Cover parameterized by the distance to a graph class ${\cal F}$. Indeed, it turns out that the existence of a polynomial kernel for this problem is closely related to the property that ${\sf mmbs}({\cal F})=\sup_{G \in {\cal F}}{\sf mmbs}(G)$ is bounded by a constant, and thus several recent results focused on determining ${\sf mmbs}({\cal F})$ for different classes ${\cal F}$. We consider the parameterized complexity of computing ${\sf mmbs}$ under various parameterizations, such as the size of a maximum independent set of the input graph and the natural parameter. We provide a panorama of the complexity of computing both ${\sf mmbs}$ and ${\sf mmhs}$, which is the size of a maximum minimal hitting set of a hypergraph, a closely related parameter. Finally, we consider the problem of computing ${\sf mmbs}$ parameterized by treewidth, especially relevant in the context of kernelization. Given the "counting" nature of ${\sf mmbs}$, it does not seem to be expressible in monadic second-order logic, hence its tractability does not follow from Courcelle's theorem. Our main technical contribution is a fixed-parameter tractable algorithm for this problem.
△ Less
Submitted 5 February, 2021;
originally announced February 2021.
-
Introducing lop-kernels: a framework for kernelization lower bounds
Authors:
Júlio Araújo,
Marin Bougeret,
Victor A. Campos,
Ignasi Sau
Abstract:
In the Maximum Minimal Vertex Cover (MMVC) problem, we are given a graph $G$ and a positive integer $k$, and the objective is to decide whether $G$ contains a minimal vertex cover of size at least $k$. Motivated by the kernelization of MMVC with parameter $k$, our main contribution is to introduce a simple general framework to obtain kernelization lower bounds for a certain type of kernels for opt…
▽ More
In the Maximum Minimal Vertex Cover (MMVC) problem, we are given a graph $G$ and a positive integer $k$, and the objective is to decide whether $G$ contains a minimal vertex cover of size at least $k$. Motivated by the kernelization of MMVC with parameter $k$, our main contribution is to introduce a simple general framework to obtain kernelization lower bounds for a certain type of kernels for optimization problems, which we call lop-kernels. Informally, this type of kernels is required to preserve large optimal solutions in the reduced instance, and captures the vast majority of existing kernels in the literature.
As a consequence of this framework, we show that the trivial quadratic kernel for MMVC is essentially optimal, answering a question of Boria et al. [Discret. Appl. Math. 2015], and that the known cubic kernel for Maximum Minimal Feedback Vertex Set is also essentially optimal. We present further applications for Tree Deletion Set and for Maximum Independent Set on $K_t$-free graphs.
Back to the MMVC problem, given the (plausible) non-existence of subquadratic kernels for MMVC on general graphs, we provide subquadratic kernels on $H$-free graphs for several graphs $H$, such as the bull, the paw, or the complete graphs, by making use of the Erdös-Hajnal property. Finally, we prove that MMVC does not admit polynomial kernels parameterized by the size of a minimum vertex cover of the input graph, even on bipartite graphs, unless ${\sf NP} \subseteq {\sf coNP} / {\sf poly}$.
△ Less
Submitted 17 December, 2021; v1 submitted 4 February, 2021;
originally announced February 2021.
-
Cycle convexity and the tunnel number of links
Authors:
Júlio Araújo,
Victor Campos,
Darlan Girão,
João Nogueira,
António Salgueiro,
Ana Silva
Abstract:
In this work, we introduce a new graph convexity, that we call Cycle Convexity, motivated by related notions in Knot Theory.
For a graph $G=(V,E)$, define the interval function in the Cycle Convexity as $I_{cc}(S) = S\cup \{v\in V(G)\mid \text{there is a cycle }C\text{ in }G\text{ such that } V(C)\setminus S=\{v\}\}$, for every $S\subseteq V(G)$. We say that $S\subseteq V(G)$ is convex if…
▽ More
In this work, we introduce a new graph convexity, that we call Cycle Convexity, motivated by related notions in Knot Theory.
For a graph $G=(V,E)$, define the interval function in the Cycle Convexity as $I_{cc}(S) = S\cup \{v\in V(G)\mid \text{there is a cycle }C\text{ in }G\text{ such that } V(C)\setminus S=\{v\}\}$, for every $S\subseteq V(G)$. We say that $S\subseteq V(G)$ is convex if $I_{cc}(S)=S$. The convex hull of $S\subseteq V(G)$, denoted by $Hull(S)$, is the inclusion-wise minimal convex set $S'$ such that $S\subseteq S'$. A set $S\subseteq V(G)$ is called a hull set if $Hull(S)=V(G)$. The hull number of $G$ in the cycle convexity, denoted by $hn_{cc}(G)$, is the cardinality of a smallest hull set of $G$.
We first present the motivation for introducing such convexity and the study of its related hull number. Then, we prove that: the hull number of a 4-regular planar graph is at most half of its vertices; computing the hull number of a planar graph is an $NP$-complete problem; computing the hull humber of chordal graphs, $P_4$-sparse graphs and grids can be done in polynomial time.
△ Less
Submitted 10 December, 2020;
originally announced December 2020.
-
On the proper orientation number of chordal graphs
Authors:
Julio Araujo,
Alexandre Cezar,
Carlos V. G. C. Lima,
Vinicius F. dos Santos,
Ana Silva
Abstract:
An orientation $D$ of a graph $G=(V,E)$ is a digraph obtained from $G$ by replacing each edge by exactly one of the two possible arcs with the same end vertices. For each $v \in V(G)$, the indegree of $v$ in $D$, denoted by $d^-_D(v)$, is the number of arcs with head $v$ in $D$. An orientation $D$ of $G$ is proper if $d^-_D(u)\neq d^-_D(v)$, for all $uv\in E(G)$. An orientation with maximum indegr…
▽ More
An orientation $D$ of a graph $G=(V,E)$ is a digraph obtained from $G$ by replacing each edge by exactly one of the two possible arcs with the same end vertices. For each $v \in V(G)$, the indegree of $v$ in $D$, denoted by $d^-_D(v)$, is the number of arcs with head $v$ in $D$. An orientation $D$ of $G$ is proper if $d^-_D(u)\neq d^-_D(v)$, for all $uv\in E(G)$. An orientation with maximum indegree at most $k$ is called a $k$-orientation. The proper orientation number of $G$, denoted by $\overrightarrowχ(G)$, is the minimum integer $k$ such that $G$ admits a proper $k$-orientation. We prove that determining whether $\overrightarrowχ(G) \leq k$ is NP-complete for chordal graphs of bounded diameter, but can be solved in linear-time in the subclass of quasi-threshold graphs. When parameterizing by $k$, we argue that this problem is FPT for chordal graphs and argue that no polynomial kernel exists, unless $NP\subseteq coNP/\ poly$. We present a better kernel to the subclass of split graphs and a linear kernel to the class of cobipartite graphs.
Concerning bounds, we prove tight upper bounds for subclasses of block graphs. We also present new families of trees having proper orientation number at most 2 and at most 3. Actually, we prove a general bound stating that any graph $G$ having no adjacent vertices of degree at least $c+1$ have proper orientation number at most $c$. This implies new classes of (outer)planar graphs with bounded proper orientation number. We also prove that maximal outerplanar graphs $G$ whose weak-dual is a path satisfy $\overrightarrowχ(G)\leq 13$. Finally, we present simple bounds to the classes of chordal claw-free graphs and cographs.
△ Less
Submitted 30 November, 2020;
originally announced November 2020.
-
Control with adaptive Q-learning
Authors:
João Pedro Araújo,
Mário A. T. Figueiredo,
Miguel Ayala Botto
Abstract:
This paper evaluates adaptive Q-learning (AQL) and single-partition adaptive Q-learning (SPAQL), two algorithms for efficient model-free episodic reinforcement learning (RL), in two classical control problems (Pendulum and Cartpole). AQL adaptively partitions the state-action space of a Markov decision process (MDP), while learning the control policy, i. e., the map** from states to actions. The…
▽ More
This paper evaluates adaptive Q-learning (AQL) and single-partition adaptive Q-learning (SPAQL), two algorithms for efficient model-free episodic reinforcement learning (RL), in two classical control problems (Pendulum and Cartpole). AQL adaptively partitions the state-action space of a Markov decision process (MDP), while learning the control policy, i. e., the map** from states to actions. The main difference between AQL and SPAQL is that the latter learns time-invariant policies, where the map** from states to actions does not depend explicitly on the time step. This paper also proposes the SPAQL with terminal state (SPAQL-TS), an improved version of SPAQL tailored for the design of regulators for control problems. The time-invariant policies are shown to result in a better performance than the time-variant ones in both problems studied. These algorithms are particularly fitted to RL problems where the action space is finite, as is the case with the Cartpole problem. SPAQL-TS solves the OpenAI Gym Cartpole problem, while also displaying a higher sample efficiency than trust region policy optimization (TRPO), a standard RL algorithm for solving control tasks. Moreover, the policies learned by SPAQL are interpretable, while TRPO policies are typically encoded as neural networks, and therefore hard to interpret. Yielding interpretable policies while being sample-efficient are the major advantages of SPAQL.
△ Less
Submitted 3 November, 2020;
originally announced November 2020.
-
Single-partition adaptive Q-learning
Authors:
João Pedro Araújo,
Mário Figueiredo,
Miguel Ayala Botto
Abstract:
This paper introduces single-partition adaptive Q-learning (SPAQL), an algorithm for model-free episodic reinforcement learning (RL), which adaptively partitions the state-action space of a Markov decision process (MDP), while simultaneously learning a time-invariant policy (i. e., the map** from states to actions does not depend explicitly on the episode time step) for maximizing the cumulative…
▽ More
This paper introduces single-partition adaptive Q-learning (SPAQL), an algorithm for model-free episodic reinforcement learning (RL), which adaptively partitions the state-action space of a Markov decision process (MDP), while simultaneously learning a time-invariant policy (i. e., the map** from states to actions does not depend explicitly on the episode time step) for maximizing the cumulative reward. The trade-off between exploration and exploitation is handled by using a mixture of upper confidence bounds (UCB) and Boltzmann exploration during training, with a temperature parameter that is automatically tuned as training progresses. The algorithm is an improvement over adaptive Q-learning (AQL). It converges faster to the optimal solution, while also using fewer arms. Tests on episodes with a large number of time steps show that SPAQL has no problems scaling, unlike AQL. Based on this empirical evidence, we claim that SPAQL may have a higher sample efficiency than AQL, thus being a relevant contribution to the field of efficient model-free RL methods.
△ Less
Submitted 13 July, 2020;
originally announced July 2020.
-
Using Tabu Search Algorithm for Map Generation in the Terra Mystica Tabletop Game
Authors:
Alexandr Grichshenko,
Luiz Jonata Pires de Araujo,
Susanna Gimaeva,
Joseph Alexander Brown
Abstract:
Tabu Search (TS) metaheuristic improves simple local search algorithms (e.g. steepest ascend hill-climbing) by enabling the algorithm to escape local optima points. It has shown to be useful for addressing several combinatorial optimization problems. This paper investigates the performance of TS and considers the effects of the size of the Tabu list and the size of the neighbourhood for a procedur…
▽ More
Tabu Search (TS) metaheuristic improves simple local search algorithms (e.g. steepest ascend hill-climbing) by enabling the algorithm to escape local optima points. It has shown to be useful for addressing several combinatorial optimization problems. This paper investigates the performance of TS and considers the effects of the size of the Tabu list and the size of the neighbourhood for a procedural content generation, specifically the generation of maps for a popular tabletop game called Terra Mystica. The results validate the feasibility of the proposed method and how it can be used to generate maps that improve existing maps for the game.
△ Less
Submitted 4 June, 2020;
originally announced June 2020.
-
Machine Learning and value generation in Software Development: a survey
Authors:
Barakat. J. Akinsanya,
Luiz J. P. Araújo,
Mariia Charikova,
Susanna Gimaeva,
Alexandr Grichshenko,
Adil Khan,
Manuel Mazzara,
Ozioma Okonicha N,
Daniil Shilintsev
Abstract:
Machine Learning (ML) has become a ubiquitous tool for predicting and classifying data and has found application in several problem domains, including Software Development (SD). This paper reviews the literature between 2000 and 2019 on the use the learning models that have been employed for programming effort estimation, predicting risks and identifying and detecting defects. This work is meant t…
▽ More
Machine Learning (ML) has become a ubiquitous tool for predicting and classifying data and has found application in several problem domains, including Software Development (SD). This paper reviews the literature between 2000 and 2019 on the use the learning models that have been employed for programming effort estimation, predicting risks and identifying and detecting defects. This work is meant to serve as a starting point for practitioners willing to add ML to their software development toolbox. It categorises recent literature and identifies trends and limitations. The survey shows as some authors have agreed that industrial applications of ML for SD have not been as popular as the reported results would suggest. The conducted investigation shows that, despite having promising findings for a variety of SD tasks, most of the studies yield vague results, in part due to the lack of comprehensive datasets in this problem domain. The paper ends with concluding remarks and suggestions for future research.
△ Less
Submitted 23 January, 2020;
originally announced January 2020.
-
802.11g Signal Strength Evaluation in an Industrial Environment
Authors:
Dalton Cézane Gomes Valadares,
Joseana Macêdo Fechine Régis de Araújo,
Marco Aurélio Spohn,
Angelo Perkusich,
Kyller Costa Gorgônio,
Elmar Uwe Kurt Melcher
Abstract:
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols are emerging or being updated, changes in existing…
▽ More
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols are emerging or being updated, changes in existing industries generally can lead to large expenditures. As the well known and accepted IEEE 802.11g standard, mostly used in residential and commercial applications, has a low deployment and maintenance cost, many industries also decide to adopt it. In this scenario, there is a need to evaluate the signal quality to better design the network infrastructure in order to obtain good communication coverage. In this work, we present a practical study about the 802.11g signal strength in a thermoelectric power plant. We collected signal strength values in different points along the engine room and compared our measured values with the estimated ones through the Log-Distance Path Loss model. We concluded that it is possible to use this model in an industrial environment to estimate signal strength with a low error by choosing the right propagation (path loss) exponent.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
A Machine to Machine framework for the charging of Electric Autonomous Vehicles
Authors:
Ziyad Elbanna,
Ilya Afanasyev,
Luiz J. P. Araujo,
Rasheed Hussain,
Mansur Khazeev,
Joseph Lamptey,
Manuel Mazzara,
Swati Megha,
Diksha Moolchandani,
Dragos Strugar
Abstract:
Electric Autonomous Vehicles (EAVs) have gained increasing attention of industry, governments and scientific communities concerned about issues related to classic transportation including accidents and casualties, gas emissions and air pollution, intensive traffic and city viability. One of the aspects, however, that prevent a broader adoption of this technology is the need for human interference…
▽ More
Electric Autonomous Vehicles (EAVs) have gained increasing attention of industry, governments and scientific communities concerned about issues related to classic transportation including accidents and casualties, gas emissions and air pollution, intensive traffic and city viability. One of the aspects, however, that prevent a broader adoption of this technology is the need for human interference to charge EAVs, which is still mostly manual and time-consuming. This study approaches such a problem by introducing the Inno-EAV, an open-source charging framework for EAVs that employs machine-to-machine (M2M) distributed communication. The idea behind M2M is to have networked devices that can interact, exchange information and perform actions without any manual assistance of humans. The advantages of the Inno-EAV include the automation of charging processes and the collection of relevant data that can support better decision making in the spheres of energy distribution. In this paper, we present the software design of the framework, the development process, the emphasis on the distributed architecture and the networked communication, and we discuss the back-end database that is used to store information about car owners, cars, and charging stations.
△ Less
Submitted 9 November, 2019;
originally announced November 2019.
-
Anomaly Detection in DevOps Toolchain
Authors:
Antonio Capizzi,
Salvatore Distefano,
Manuel Mazzara,
Luiz J. P. Araùjo,
Muhammad Ahmad,
Evgeny Bobrov
Abstract:
The tools employed in the DevOps Toolchain generates a large quantity of data that is typically ignored or inspected only in particular occasions, at most. However, the analysis of such data could enable the extraction of useful information about the status and evolution of the project. For example, metrics like the "lines of code added since the last release" or "failures detected in the staging…
▽ More
The tools employed in the DevOps Toolchain generates a large quantity of data that is typically ignored or inspected only in particular occasions, at most. However, the analysis of such data could enable the extraction of useful information about the status and evolution of the project. For example, metrics like the "lines of code added since the last release" or "failures detected in the staging environment" are good indicators for predicting potential risks in the incoming release. In order to prevent problems appearing in later stages of production, an anomaly detection system can operate in the staging environment to compare the current incoming release with previous ones according to predefined metrics. The analysis is conducted before going into production to identify anomalies which should be addressed by human operators that address false-positive and negatives that can appear. In this paper, we describe a prototypical implementation of the aforementioned idea in the form of a "proof of concept". The current study effectively demonstrates the feasibility of the approach for a set of implemented functionalities.
△ Less
Submitted 27 September, 2019;
originally announced September 2019.
-
Strong Bounds for Resource Constrained Project Scheduling: Preprocessing and Cutting Planes
Authors:
Janniele A. S. Araujo,
Haroldo Gambini Santos,
Bernard Gendron,
Sanjay Dominik Jena,
Samuel S. Brito,
Danilo S. Souzaa
Abstract:
Resource Constrained Project Scheduling Problems (RCPSPs) without preemption are well-known NP-hard combinatorial optimization problems. A feasible RCPSP solution consists of a time-ordered schedule of jobs with corresponding execution modes, respecting precedence and resources constraints. In this paper, we propose a cutting plane algorithm to separate five different cut families, as well as a ne…
▽ More
Resource Constrained Project Scheduling Problems (RCPSPs) without preemption are well-known NP-hard combinatorial optimization problems. A feasible RCPSP solution consists of a time-ordered schedule of jobs with corresponding execution modes, respecting precedence and resources constraints. In this paper, we propose a cutting plane algorithm to separate five different cut families, as well as a new preprocessing routine to strengthen resource-related constraints. New lifted versions of the well-known precedence and cover inequalities are employed. At each iteration, a dense conflict graph is built considering feasibility and optimality conditions to separate cliques, odd-holes and strengthened Chvátal-Gomory cuts. The proposed strategies considerably improve the linear relaxation bounds, allowing a state-of-the-art mixed-integer linear programming solver to find provably optimal solutions for 754 previously open instances of different variants of the RCPSPs, which was not possible using the original linear programming formulations.
△ Less
Submitted 6 September, 2019;
originally announced September 2019.
-
Computer Aided Detection of Deep Inferior Epigastric Perforators in Computed Tomography Angiography scans
Authors:
Ricardo J. Araújo,
Vera Garrido,
Catarina A. Baraças,
Maria A. Vasconcelos,
Carlos Mavioso,
João C. Anacleto,
Maria J. Cardoso,
Hélder P. Oliveira
Abstract:
The deep inferior epigastric artery perforator (DIEAP) flap is the most common free flap used for breast reconstruction after a mastectomy. It makes use of the skin and fat of the lower abdomen to build a new breast mound either at the same time of the mastectomy or in a second surgery. This operation requires preoperative imaging studies to evaluate the branches - the perforators - that irrigate…
▽ More
The deep inferior epigastric artery perforator (DIEAP) flap is the most common free flap used for breast reconstruction after a mastectomy. It makes use of the skin and fat of the lower abdomen to build a new breast mound either at the same time of the mastectomy or in a second surgery. This operation requires preoperative imaging studies to evaluate the branches - the perforators - that irrigate the tissue that will be used to reconstruct the breast mound. These branches will support tissue viability after the microsurgical ligation of the inferior epigastric vessels to the receptor vessels in the thorax. Usually through a Computed Tomography Angiography (CTA), each perforator, diameter and direction is manually identified by the imaging team, who will subsequently draw a map for the identification of the best vascular support for the reconstruction. In the current work we propose a semi-automatic methodology that aims at reducing the time and subjectivity inherent to the manual annotation. In 21 CTAs from patients proposed for breast reconstruction with DIEAP flaps, the subcutaneous region of each perforator was extracted, by means of a tracking procedure, whereas the intramuscular portion was detected through a minimum cost approach. Both were subsequently compared with the radiologist manual annotation. Results showed that the semi-automatic procedure was able to correctly detect the course of the DIEAPs with a minimum error (average error of 0.64 mm and 0.50 mm regarding the extraction of subcutaneous and intramuscular paths, respectively). The objective methodology is a promising tool in the automatic detection of perforators in CTA and can contribute to spare human resources and reduce subjectivity in the aforementioned task.
△ Less
Submitted 24 July, 2019;
originally announced July 2019.
-
Fuzzy neural networks to create an expert system for detecting attacks by SQL Injection
Authors:
Lucas Oliveira Batista,
Gabriel Adriano de Silva,
Vanessa Souza Araújo,
Vinícius Jonathan Silva Araújo,
Thiago Silva Rezende,
Augusto Junio Guimarães,
Paulo Vitor de Campos Souza
Abstract:
Its constant technological evolution characterizes the contemporary world, and every day the processes, once manual, become computerized. Data are stored in the cyberspace, and as a consequence, one must increase the concern with the security of this environment. Cyber-attacks are represented by a growing worldwide scale and are characterized as one of the significant challenges of the century. Th…
▽ More
Its constant technological evolution characterizes the contemporary world, and every day the processes, once manual, become computerized. Data are stored in the cyberspace, and as a consequence, one must increase the concern with the security of this environment. Cyber-attacks are represented by a growing worldwide scale and are characterized as one of the significant challenges of the century. This article aims to propose a computational system based on intelligent hybrid models, which through fuzzy rules allows the construction of expert systems in cybernetic data attacks, focusing on the SQL Injection attack. The tests were performed with real bases of SQL Injection attacks on government computers, using fuzzy neural networks. According to the results obtained, the feasibility of constructing a system based on fuzzy rules, with the classification accuracy of cybernetic invasions within the margin of the standard deviation (compared to the state-of-the-art model in solving this type of problem) is real. The model helps countries prepare to protect their data networks and information systems, as well as create opportunities for expert systems to automate the identification of attacks in cyberspace.
△ Less
Submitted 9 January, 2019;
originally announced January 2019.
-
Regularized Fuzzy Neural Networks to Aid Effort Forecasting in the Construction and Software Development
Authors:
Paulo Vitor de Campos Souza,
Augusto Junio Guimaraes,
Vanessa Souza Araujo,
Thiago Silva Rezende,
Vinicius Jonathan Silva Araujo
Abstract:
Predicting the time to build software is a very complex task for software engineering managers. There are complex factors that can directly interfere with the productivity of the development team. Factors directly related to the complexity of the system to be developed drastically change the time necessary for the completion of the works with the software factories. This work proposes the use of a…
▽ More
Predicting the time to build software is a very complex task for software engineering managers. There are complex factors that can directly interfere with the productivity of the development team. Factors directly related to the complexity of the system to be developed drastically change the time necessary for the completion of the works with the software factories. This work proposes the use of a hybrid system based on artificial neural networks and fuzzy systems to assist in the construction of an expert system based on rules to support in the prediction of hours destined to the development of software according to the complexity of the elements present in the same. The set of fuzzy rules obtained by the system helps the management and control of software development by providing a base of interpretable estimates based on fuzzy rules. The model was submitted to tests on a real database, and its results were promissory in the construction of an aid mechanism in the predictability of the software construction.
△ Less
Submitted 4 December, 2018;
originally announced December 2018.
-
Dual parameterization of Weighted Coloring
Authors:
Júlio Araújo,
Victor A. Campos,
Carlos Vinícius G. C. Lima,
Vinícius Fernandes dos Santos,
Ignasi Sau,
Ana Silva
Abstract:
Given a graph $G$, a proper $k$-coloring of $G$ is a partition $c = (S_i)_{i\in [1,k]}$ of $V(G)$ into $k$ stable sets $S_1,\ldots, S_{k}$. Given a weight function $w: V(G) \to \mathbb{R}^+$, the weight of a color $S_i$ is defined as $w(i) = \max_{v \in S_i} w(v)$ and the weight of a coloring $c$ as $w(c) = \sum_{i=1}^{k}w(i)$. Guan and Zhu [Inf. Process. Lett., 1997] defined the weighted chromati…
▽ More
Given a graph $G$, a proper $k$-coloring of $G$ is a partition $c = (S_i)_{i\in [1,k]}$ of $V(G)$ into $k$ stable sets $S_1,\ldots, S_{k}$. Given a weight function $w: V(G) \to \mathbb{R}^+$, the weight of a color $S_i$ is defined as $w(i) = \max_{v \in S_i} w(v)$ and the weight of a coloring $c$ as $w(c) = \sum_{i=1}^{k}w(i)$. Guan and Zhu [Inf. Process. Lett., 1997] defined the weighted chromatic number of a pair $(G,w)$, denoted by $σ(G,w)$, as the minimum weight of a proper coloring of $G$. The problem of determining $σ(G,w)$ has received considerable attention during the last years, and has been proved to be notoriously hard: for instance, it is NP-hard on split graphs, unsolvable on $n$-vertex trees in time $n^{o(\log n)}$ unless the ETH fails, and W[1]-hard on forests parameterized by the size of a largest tree. In this article we provide some positive results for the problem, by considering its so-called dual parameterization: given a vertex-weighted graph $(G,w)$ and an integer $k$, the question is whether $σ(G,w) \leq \sum_{v \in V(G)} w(v) - k$. We prove that this problem is FPT by providing an algorithm running in time $9^k \cdot n^{O(1)}$, and it is easy to see that no algorithm in time $2^{o(k)} \cdot n^{O(1)}$ exists under the ETH. On the other hand, we present a kernel with at most $(2^{k-1}+1) (k-1)$ vertices, and we rule out the existence of polynomial kernels unless ${\sf NP} \subseteq {\sf coNP} / {\sf poly}$, even on split graphs with only two different weights. Finally, we identify some classes of graphs on which the problem admits a polynomial kernel, in particular interval graphs and subclasses of split graphs, and in the latter case we present lower bounds on the degrees of the polynomials.
△ Less
Submitted 17 May, 2018;
originally announced May 2018.
-
Weighted proper orientations of trees and graphs of bounded treewidth
Authors:
Júlio Araújo,
Cláudia Linhares Sales,
Ignasi Sau,
Ana Silva
Abstract:
Given a simple graph $G$, a weight function $w:E(G)\rightarrow \mathbb{N} \setminus \{0\}$, and an orientation $D$ of $G$, we define $μ^-(D) = \max_{v \in V(G)} w_D^-(v)$, where $w^-_D(v) = \sum_{u\in N_D^{-}(v)}w(uv)$. We say that $D$ is a weighted proper orientation of $G$ if $w^-_D(u) \neq w^-_D(v)$ whenever $u$ and $v$ are adjacent. We introduce the parameter weighted proper orientation number…
▽ More
Given a simple graph $G$, a weight function $w:E(G)\rightarrow \mathbb{N} \setminus \{0\}$, and an orientation $D$ of $G$, we define $μ^-(D) = \max_{v \in V(G)} w_D^-(v)$, where $w^-_D(v) = \sum_{u\in N_D^{-}(v)}w(uv)$. We say that $D$ is a weighted proper orientation of $G$ if $w^-_D(u) \neq w^-_D(v)$ whenever $u$ and $v$ are adjacent. We introduce the parameter weighted proper orientation number of $G$, denoted by $\overrightarrowχ(G,w)$, which is the minimum, over all weighted proper orientations $D$ of $G$, of $μ^-(D)$. When all the weights are equal to 1, this parameter is equal to the proper orientation number of $G$, which has been object of recent studies and whose determination is NP-hard in general, but polynomial-time solvable on trees. Here, we prove that the equivalent decision problem of the weighted proper orientation number (i.e., $\overrightarrowχ(G,w) \leq k$?) is (weakly) NP-complete on trees but can be solved by a pseudo-polynomial time algorithm whose running time depends on $k$. Furthermore, we present a dynamic programming algorithm to determine whether a general graph $G$ on $n$ vertices and treewidth at most ${\sf tw}$ satisfies $\overrightarrowχ(G,w) \leq k$, running in time $O(2^{{\sf tw}^2}\cdot k^{3{\sf tw}}\cdot {\sf tw} \cdot n)$, and we complement this result by showing that the problem is W[1]-hard on general graphs parameterized by the treewidth of $G$, even if the weights are polynomial in $n$.
△ Less
Submitted 11 April, 2018;
originally announced April 2018.
-
On the complexity of finding internally vertex-disjoint long directed paths
Authors:
Júlio Araújo,
Victor A. Campos,
Ana Karolinna Maia,
Ignasi Sau,
Ana Silva
Abstract:
For two positive integers $k$ and $\ell$, a $(k \times \ell)$-spindle is the union of $k$ pairwise internally vertex-disjoint directed paths with $\ell$ arcs between two vertices $u$ and $v$. We are interested in the (parameterized) complexity of several problems consisting in deciding whether a given digraph contains a subdivision of a spindle, which generalize both the Maximum Flow and Longest P…
▽ More
For two positive integers $k$ and $\ell$, a $(k \times \ell)$-spindle is the union of $k$ pairwise internally vertex-disjoint directed paths with $\ell$ arcs between two vertices $u$ and $v$. We are interested in the (parameterized) complexity of several problems consisting in deciding whether a given digraph contains a subdivision of a spindle, which generalize both the Maximum Flow and Longest Path problems. We obtain the following complexity dichotomy: for a fixed $\ell \geq 1$, finding the largest $k$ such that an input digraph $G$ contains a subdivision of a $(k \times \ell)$-spindle is polynomial-time solvable if $\ell \leq 3$, and NP-hard otherwise. We place special emphasis on finding spindles with exactly two paths and present FPT algorithms that are asymptotically optimal under the ETH. These algorithms are based on the technique of representative families in matroids, and use also color-coding as a subroutine. Finally, we study the case where the input graph is acyclic, and present several algorithmic and hardness results.
△ Less
Submitted 27 June, 2017;
originally announced June 2017.
-
VCube-PS: A Causal Broadcast Topic-based Publish/Subscribe System
Authors:
João Paulo de Araujo,
Luciana Arantes,
Elias P. Duarte Jr.,
Luiz A. Rodrigues,
Pierre Sens
Abstract:
In this work we present VCube-PS, a topic-based Publish/Subscribe system built on the top of a virtual hypercube-like topology. Membership information and published messages are broadcast to subscribers (members) of a topic group over dynamically built spanning trees rooted at the publisher. For a given topic, the delivery of published messages respects the causal order. VCube-PS was implemented o…
▽ More
In this work we present VCube-PS, a topic-based Publish/Subscribe system built on the top of a virtual hypercube-like topology. Membership information and published messages are broadcast to subscribers (members) of a topic group over dynamically built spanning trees rooted at the publisher. For a given topic, the delivery of published messages respects the causal order. VCube-PS was implemented on the PeerSim simulator, and experiments are reported including a comparison with the traditional Publish/Subscribe approach that employs a single rooted static spanning-tree for message distribution. Results confirm the efficiency of VCube-PS in terms of scalability, latency, number and size of messages.
△ Less
Submitted 4 July, 2018; v1 submitted 26 June, 2017;
originally announced June 2017.
-
Ruling out FPT algorithms for Weighted Coloring on forests
Authors:
Júlio Araújo,
Julien Baste,
Ignasi Sau
Abstract:
Given a graph $G$, a proper $k$-coloring of $G$ is a partition $c = (S_i)_{i\in [1,k]}$ of $V(G)$ into $k$ stable sets $S_1,\ldots, S_{k}$. Given a weight function $w: V(G) \to \mathbb{R}^+$, the weight of a color $S_i$ is defined as $w(i) = \max_{v \in S_i} w(v)$ and the weight of a coloring $c$ as $w(c) = \sum_{i=1}^{k}w(i)$. Guan and Zhu [Inf. Process. Lett., 1997] defined the weighted chromati…
▽ More
Given a graph $G$, a proper $k$-coloring of $G$ is a partition $c = (S_i)_{i\in [1,k]}$ of $V(G)$ into $k$ stable sets $S_1,\ldots, S_{k}$. Given a weight function $w: V(G) \to \mathbb{R}^+$, the weight of a color $S_i$ is defined as $w(i) = \max_{v \in S_i} w(v)$ and the weight of a coloring $c$ as $w(c) = \sum_{i=1}^{k}w(i)$. Guan and Zhu [Inf. Process. Lett., 1997] defined the weighted chromatic number of a pair $(G,w)$, denoted by $σ(G,w)$, as the minimum weight of a proper coloring of $G$. For a positive integer $r$, they also defined $σ(G,w;r)$ as the minimum of $w(c)$ among all proper $r$-colorings $c$ of $G$.
The complexity of determining $σ(G,w)$ when $G$ is a tree was open for almost 20 years, until Araújo et al. [SIAM J. Discrete Math., 2014] recently proved that the problem cannot be solved in time $n^{o(\log n)}$ on $n$-vertex trees unless the Exponential Time Hypothesis (ETH) fails.
The objective of this article is to provide hardness results for computing $σ(G,w)$ and $σ(G,w;r)$ when $G$ is a tree or a forest, relying on complexity assumptions weaker than the ETH. Namely, we study the problem from the viewpoint of parameterized complexity, and we assume the weaker hypothesis $FPT \neq W[1]$. Building on the techniques of Araújo et al., we prove that when $G$ is a forest, computing $σ(G,w)$ is $W[1]$-hard parameterized by the size of a largest connected component of $G$, and that computing $σ(G,w;r)$ is $W[2]$-hard parameterized by $r$. Our results rule out the existence of $FPT$ algorithms for computing these invariants on trees or forests for many natural choices of the parameter.
△ Less
Submitted 28 March, 2017;
originally announced March 2017.
-
Circular Backbone Colorings: on matching and tree backbones of planar graphs
Authors:
Julio Araujo,
Fabricio Benevides,
Alexandre Cezar,
Ana Silva
Abstract:
Given a graph $G$, and a spanning subgraph $H$ of $G$, a circular $q$-backbone $k$-coloring of $(G,H)$ is a proper $k$-coloring $c$ of $G$ such that $q\le \lvert c(u)-c(v)\rvert \le k-q$, for every edge $uv\in E(H)$. The circular $q$-backbone chromatic number of $(G,H)$, denoted by $CBC_q(G,H)$, is the minimum integer $k$ for which there exists a circular $q$-backbone $k$-coloring of $(G,H)$.
Th…
▽ More
Given a graph $G$, and a spanning subgraph $H$ of $G$, a circular $q$-backbone $k$-coloring of $(G,H)$ is a proper $k$-coloring $c$ of $G$ such that $q\le \lvert c(u)-c(v)\rvert \le k-q$, for every edge $uv\in E(H)$. The circular $q$-backbone chromatic number of $(G,H)$, denoted by $CBC_q(G,H)$, is the minimum integer $k$ for which there exists a circular $q$-backbone $k$-coloring of $(G,H)$.
The Four Color Theorem implies that whenever $G$ is planar, we have $CBC_2(G,H)\le 8$. It is conjectured that this upper bound can be improved to 7 when $H$ is a tree, and to 6 when $H$ is a matching. In this work, we show that: 1) if $G$ is planar and has no $C_4$ as subgraph, and $H$ is a linear spanning forest of $G$, then $CBC_2(G,H)\leq 7$; 2) if $G$ is a plane graph having no two 3-faces sharing an edge, and $H$ is a matching of $G$, then $CBC_2(G,H)\leq 6$; and 3) if $G$ is planar and has no $C_4$ nor $C_5$ as subgraph, and $H$ is a mathing of $G$, then $CBC_2(G,H)\leq 5$. These results partially answer questions posed by Broersma, Fujisawa and Yoshimoto (2003), and by Broersma, Fomin and Golovach (2007). It also points towards a positive answer for the Steinberg's Conjecture.
△ Less
Submitted 20 April, 2016;
originally announced April 2016.
-
JADE, TraSMAPI and SUMO: A tool-chain for simulating traffic light control
Authors:
Tiago Azevedo,
Paulo J. M. de Araújo,
Rosaldo J. F. Rossetti,
Ana Paula C. Rocha
Abstract:
Increased stress, fuel consumption, air pollution, accidents and delays are some of the consequences of traffic congestion usually incurring in tremendous economic impacts, which society aims to remedy in order to leverage a sustainable development. Recently, unconventional means for modeling and controlling such complex traffic systems relying on multi-agent systems have arisen. This paper contri…
▽ More
Increased stress, fuel consumption, air pollution, accidents and delays are some of the consequences of traffic congestion usually incurring in tremendous economic impacts, which society aims to remedy in order to leverage a sustainable development. Recently, unconventional means for modeling and controlling such complex traffic systems relying on multi-agent systems have arisen. This paper contributes to the understanding of such complex and highly dynamic systems by proposing an open-source tool-chain to implement multi-agent-based solutions in traffic and transportation. The proposed approach relies on two very popular tools in both domains, with focus on traffic light control. This tool-chain consists in combining JADE (Java Agent DEvelopment Framework), for the implementation of multi-agent systems, with SUMO (Simulation of Urban MObility), for the microscopic simulation of traffic interactions. TraSMAPI (Traffic Simulation Manager Application Programming Interface) is used to combine JADE and SUMO allowing communication between them. A demonstration of the concept is presented to illustrate the main features of this tool-chain, using Q-Learning as the reinforcement learning method for each traffic light agent in a simulated network. Results demonstrate the feasibility of the proposed framework as a practical means to experiment with different agent-based designs of intelligent transportation solutions.
△ Less
Submitted 29 January, 2016;
originally announced January 2016.
-
On the Existence of Tree Backbones that Realize the Chromatic Number on a Backbone Coloring
Authors:
Julio Araujo,
Alexandre A. Cezar,
Ana Silva
Abstract:
A proper $k$-coloring of a graph $G=(V,E)$ is a function $c: V(G)\to \{1,\ldots,k\}$ such that $c(u)\neq c(v)$, for every $uv\in E(G)$. The chromatic number $χ(G)$ is the minimum $k$ such that there exists a proper $k$-coloring of $G$. Given a spanning subgraph $H$ of $G$, a $q$-backbone $k$-coloring of $(G,H)$ is a proper $k$-coloring $c$ of $V(G)$ such that $\lvert c(u)-c(v)\rvert \ge q$, for ev…
▽ More
A proper $k$-coloring of a graph $G=(V,E)$ is a function $c: V(G)\to \{1,\ldots,k\}$ such that $c(u)\neq c(v)$, for every $uv\in E(G)$. The chromatic number $χ(G)$ is the minimum $k$ such that there exists a proper $k$-coloring of $G$. Given a spanning subgraph $H$ of $G$, a $q$-backbone $k$-coloring of $(G,H)$ is a proper $k$-coloring $c$ of $V(G)$ such that $\lvert c(u)-c(v)\rvert \ge q$, for every edge $uv\in E(H)$. The $q$-backbone chromatic number $BBC_q(G,H)$ is the smallest $k$ for which there exists a $q$-backbone $k$-coloring of $(G,H)$. In this work, we show that every connected graph $G$ has a generating tree $T$ such that $BBC_q(G,T) = \max\{χ(G),\left\lceil\frac{χ(G)}{2}\right\rceil+q\}$, and that this value is the best possible.
As a direct consequence, we get that every connected graph $G$ has a spanning tree $T$ for which $BBC_2(G,T)=χ(G)$, if $χ(G)\ge 4$, or $BBC_2(G,T)=χ(G)+1$, otherwise. Thus, by applying the Four Color Theorem, we have that every connected nonbipartite planar graph $G$ has a spanning tree $T$ such that $BBC_2(G,T)=4$. This settles a question by Wang, Bu, Montassier and Raspaud (2012), and generalizes a number of previous partial results to their question.
△ Less
Submitted 17 November, 2015;
originally announced November 2015.
-
TARDIS: Stably shifting traffic in space and time (extended version)
Authors:
Richard G. Clegg,
Raul Landa,
João Taveira Araújo,
Eleni Mykoniati,
David Griffin,
Miguel Rio
Abstract:
This paper describes TARDIS (Traffic Assignment and Retiming Dynamics with Inherent Stability) which is an algorithmic procedure designed to reallocate traffic within Internet Service Provider (ISP) networks. Recent work has investigated the idea of shifting traffic in time (from peak to off-peak) or in space (by using different links). This work gives a unified scheme for both time and space shif…
▽ More
This paper describes TARDIS (Traffic Assignment and Retiming Dynamics with Inherent Stability) which is an algorithmic procedure designed to reallocate traffic within Internet Service Provider (ISP) networks. Recent work has investigated the idea of shifting traffic in time (from peak to off-peak) or in space (by using different links). This work gives a unified scheme for both time and space shifting to reduce costs. Particular attention is given to the commonly used 95th percentile pricing scheme.
The work has three main innovations: firstly, introducing the Shapley Gradient, a way of comparing traffic pricing between different links at different times of day; secondly, a unified way of reallocating traffic in time and/or in space; thirdly, a continuous approximation to this system is proved to be stable. A trace-driven investigation using data from two service providers shows that the algorithm can create large savings in transit costs even when only small proportions of the traffic can be shifted.
△ Less
Submitted 8 April, 2014;
originally announced April 2014.
-
Extracting Geospatial Preferences Using Relational Neighbors
Authors:
Leandro Balby Marinho,
Cláudio de Souza Baptista,
Thomas Sandholm,
Iury Nunes,
Caio Nóbrega,
Jordão Araújo
Abstract:
With the increasing popularity of location-based social media applications and devices that automatically tag generated content with locations, large repositories of collaborative geo-referenced data are appearing on-line. Efficiently extracting user preferences from these data to determine what information to recommend is challenging because of the sheer volume of data as well as the frequency of…
▽ More
With the increasing popularity of location-based social media applications and devices that automatically tag generated content with locations, large repositories of collaborative geo-referenced data are appearing on-line. Efficiently extracting user preferences from these data to determine what information to recommend is challenging because of the sheer volume of data as well as the frequency of updates. Traditional recommender systems focus on the interplay between users and items, but ignore contextual parameters such as location. In this paper we take a geospatial approach to determine locational preferences and similarities between users. We propose to capture the geographic context of user preferences for items using a relational graph, through which we are able to derive many new and state-of-the-art recommendation algorithms, including combinations of them, requiring changes only in the definition of the edge weights. Furthermore, we discuss several solutions for cold-start scenarios. Finally, we conduct experiments using two real-world datasets and provide empirical evidence that many of the proposed algorithms outperform existing location-aware recommender algorithms.
△ Less
Submitted 6 April, 2012;
originally announced April 2012.