Skip to main content

Showing 1–12 of 12 results for author: Barrett, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00238  [pdf, other

    cs.SI cs.DM cs.LG math.CO

    Self-similarity of Communities of the ABCD Model

    Authors: Jordan Barrett, Bogumil Kaminski, Pawel Pralat, Francois Theberge

    Abstract: The Artificial Benchmark for Community Detection (ABCD) graph is a random graph model with community structure and power-law distribution for both degrees and community sizes. The model generates graphs similar to the well-known LFR model but it is faster and can be investigated analytically. In this paper, we show that the ABCD model exhibits some interesting self-similar behaviour, namely, the… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  2. arXiv:2305.06703  [pdf, other

    cs.LG cs.AI stat.ML

    Neural Fine-Gray: Monotonic neural networks for competing risks

    Authors: Vincent Jeanselme, Chang Ho Yoon, Brian Tom, Jessica Barrett

    Abstract: Time-to-event modelling, known as survival analysis, differs from standard regression as it addresses censoring in patients who do not experience the event of interest. Despite competitive performances in tackling this problem, machine learning methods often ignore other competing risks that preclude the event of interest. This practice biases the survival estimation. Extensions to address this ch… ▽ More

    Submitted 11 May, 2023; originally announced May 2023.

    Comments: Presented at the Conference on Health, Inference, and Learning (CHIL) 2023

  3. arXiv:2303.01411  [pdf, ps, other

    physics.hist-ph cs.CC math.PR quant-ph

    Algorithmic Randomness and Probabilistic Laws

    Authors: Jeffrey A. Barrett, Eddy Keming Chen

    Abstract: We consider two ways one might use algorithmic randomness to characterize a probabilistic law. The first is a generative chance* law. Such laws involve a nonstandard notion of chance. The second is a probabilistic* constraining law. Such laws impose relative frequency and randomness constraints that every physically possible world must satisfy. While each notion has virtues, we argue that the latt… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: 14 pages

  4. arXiv:2208.06648  [pdf, other

    cs.AI cs.LG

    Imputation Strategies Under Clinical Presence: Impact on Algorithmic Fairness

    Authors: Vincent Jeanselme, Maria De-Arteaga, Zhe Zhang, Jessica Barrett, Brian Tom

    Abstract: Machine learning risks reinforcing biases present in data, and, as we argue in this work, in what is absent from data. In healthcare, biases have marked medical history, leading to unequal care affecting marginalised groups. Patterns in missing data often reflect these group discrepancies, but the algorithmic fairness implications of group-specific missingness are not well understood. Despite its… ▽ More

    Submitted 30 June, 2023; v1 submitted 13 August, 2022; originally announced August 2022.

    Comments: Full Journal Version under review; Presented at the conference Machine Learning for Health (ML4H) 2022 Published in the Proceedings of Machine Learning Research (193)

  5. arXiv:2205.13481  [pdf, other

    cs.LG

    DeepJoint: Robust Survival Modelling Under Clinical Presence Shift

    Authors: Vincent Jeanselme, Glen Martin, Niels Peek, Matthew Sperrin, Brian Tom, Jessica Barrett

    Abstract: Observational data in medicine arise as a result of the complex interaction between patients and the healthcare system. The sampling process is often highly irregular and itself constitutes an informative process. When using such data to develop prediction models, this phenomenon is often ignored, leading to sub-optimal performance and generalisability of models when practices evolve. We propose a… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

  6. arXiv:1812.02143  [pdf, ps, other

    cs.DM

    The Spread of Voting Attitudes in Social Networks

    Authors: Jordan Barrett, Christopher Duffy, Richard Nowakowski

    Abstract: The Shapley-Shubik power index is a measure of each voters power in the passage or failure of a vote. We extend this measure to graphs and consider a discrete-time process in which voters may change their vote based on the outcome of the previous vote. We use this model to study how voter influence can spread through a network. We find conditions under which a vanishingly small portion of consenti… ▽ More

    Submitted 9 July, 2020; v1 submitted 5 December, 2018; originally announced December 2018.

    MSC Class: 05C90

  7. The computational landscape of general physical theories

    Authors: Jonathan Barrett, Niel de Beaudrap, Matty J. Hoban, Ciarán M. Lee

    Abstract: There is good evidence that quantum computers are more powerful than classical computers, and that various simple modifications of quantum theory yield computational power that is dramatically greater still. However, these modifications also violate fundamental physical principles. This raises the question of whether there exists a physical theory, allowing computation more powerful than quantum,… ▽ More

    Submitted 25 June, 2019; v1 submitted 27 February, 2017; originally announced February 2017.

    Comments: 15 pages, 5 figures. Close to published version. Comments welcome

    Journal ref: npj Quantum Information, 5, 41 (2019)

  8. Computation in generalised probabilistic theories

    Authors: Ciarán M. Lee, Jonathan Barrett

    Abstract: From the existence of an efficient quantum algorithm for factoring, it is likely that quantum computation is intrinsically more powerful than classical computation. At present, the best upper bound known for the power of quantum computation is that BQP is in AWPP. This work investigates limits on computational power that are imposed by physical principles. To this end, we define a circuit-based mo… ▽ More

    Submitted 11 September, 2015; v1 submitted 30 December, 2014; originally announced December 2014.

    Comments: 14+9 pages. Comments welcome

    Journal ref: New J. Phys. 17 (2015) 083001

  9. Unconditionally secure device-independent quantum key distribution with only two devices

    Authors: Jonathan Barrett, Roger Colbeck, Adrian Kent

    Abstract: Device-independent quantum key distribution is the task of using uncharacterized quantum devices to establish a shared key between two users. If a protocol is secure regardless of the device behaviour, it can be used to generate a shared key even if the supplier of the devices is malicious. To date, all device-independent quantum key distribution protocols that are known to be secure require separ… ▽ More

    Submitted 11 October, 2012; v1 submitted 3 September, 2012; originally announced September 2012.

    Comments: 11 pages, minor changes

    Journal ref: Physical Review A 86, 062326 (2012)

  10. Full security of quantum key distribution from no-signaling constraints

    Authors: Ll. Masanes, R. Renner, M. Christandl, A. Winter, J. Barrett

    Abstract: We analyze a cryptographic protocol for generating a distributed secret key from correlations that violate a Bell inequality by a sufficient amount, and prove its security against eavesdroppers, constrained only by the assumption that any information accessible to them must be compatible with the non-signaling principle. The claim holds with respect to the state-of-the-art security definition used… ▽ More

    Submitted 24 September, 2014; v1 submitted 6 June, 2006; originally announced June 2006.

    Comments: 15 pages, 2 figure

    Journal ref: IEEE Transactions on Information Theory, Volume 60, Issue 8, pages 4973-4986, year 2014

  11. Maximally Non-Local and Monogamous Quantum Correlations

    Authors: Jonathan Barrett, Adrian Kent, Stefano Pironio

    Abstract: We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes, and use it to give a simple proof that the maximally entangled state of two d dimensional quantum systems has no local component. That is, if we write its quantum correlations as a mixture of local correlations and general (not necessarily quantum) correlations, the coefficient of the local cor… ▽ More

    Submitted 21 May, 2006; originally announced May 2006.

    Comments: 5 pages, no figures

    Journal ref: Phys. Rev. Lett. 97, 170409 (2006).

  12. No Signalling and Quantum Key Distribution

    Authors: Jonathan Barrett, Lucien Hardy, Adrian Kent

    Abstract: Standard quantum key distribution protocols are provably secure against eavesdrop** attacks, if quantum theory is correct. It is theoretically interesting to know if we need to assume the validity of quantum theory to prove the security of quantum key distribution, or whether its security can be based on other physical principles. The question would also be of practical interest if quantum mec… ▽ More

    Submitted 29 April, 2005; v1 submitted 18 May, 2004; originally announced May 2004.

    Comments: Clarifications and minor revisions in response to comments. Final version; to appear in Phys. Rev. Lett

    Journal ref: Phys. Rev. Lett. 95, 010503 (2005)