Skip to main content

Showing 1–50 of 123 results for author: Bergstra, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.00324  [pdf, other

    cs.RO cs.LG

    Revisiting Constant Negative Rewards for Goal-Reaching Tasks in Robot Learning

    Authors: Gautham Vasan, Yan Wang, Fahim Shahriar, James Bergstra, Martin Jagersand, A. Rupam Mahmood

    Abstract: Many real-world robot learning problems, such as pick-and-place or arriving at a destination, can be seen as a problem of reaching a goal state as soon as possible. These problems, when formulated as episodic reinforcement learning tasks, can easily be specified to align well with our intended goal: -1 reward every time step with termination upon reaching the goal state, called minimum-time tasks.… ▽ More

    Submitted 29 June, 2024; originally announced July 2024.

    Comments: In Proceedings of Reinforcement Learning Conference 2024. For video demo, see https://drive.google.com/file/d/1O8D3oCWq5xf2hi1JOlMBbs6W1ClrvUFb/view?usp=sharing

  2. arXiv:2405.01733  [pdf, ps, other

    cs.LO cs.SC

    Rings with common division, common meadows and their conditional equational theories

    Authors: Jan A Bergstra, John V Tucker

    Abstract: We examine the consequences of having a total division operation $\frac{x}{y}$ on commutative rings. We consider two forms of binary division, one derived from a unary inverse, the other defined directly as a general operation; each are made total by setting $1/0$ equal to an error value $\bot$, which is added to the ring. Such totalised divisions we call common divisions. In a field the two forms… ▽ More

    Submitted 26 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.

  3. arXiv:2311.01589  [pdf, other

    cs.LG

    A Statistical Guarantee for Representation Transfer in Multitask Imitation Learning

    Authors: Bryan Chan, Karime Pereida, James Bergstra

    Abstract: Transferring representation for multitask imitation learning has the potential to provide improved sample efficiency on learning new tasks, when compared to learning from scratch. In this work, we provide a statistical guarantee indicating that we can indeed achieve improved sample efficiency on the target task when a representation is trained using sufficiently diverse source tasks. Our theoretic… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

    Comments: Accepted by NeurIPS 2023 Workshop on Robot Learning

  4. arXiv:2307.04270  [pdf, ps, other

    cs.LO

    A Complete Finite Axiomatisation of the Equational Theory of Common Meadows

    Authors: Jan A Bergstra, John V Tucker

    Abstract: We analyse abstract data types that model numerical structures with a concept of error. Specifically, we focus on arithmetic data types that contain an error value $\bot$ whose main purpose is to always return a value for division. To rings and fields, we add a division operator $x/y$ and study a class of algebras called common meadows wherein $x/0 = \bot$. The set of equations true in all common… ▽ More

    Submitted 26 May, 2024; v1 submitted 9 July, 2023; originally announced July 2023.

  5. arXiv:2304.14821  [pdf, ps, other

    cs.LO

    Conditional logic as a short-circuit logic

    Authors: Jan A. Bergstra, Alban Ponse

    Abstract: Both two-valued and three-valued conditional logic (CL), defined by Guzmán and Squier (1990) and based on McCarthy's non-commutative connectives, axiomatise a short-circuit logic (SCL) that defines more identities than MSCL (Memorising SCL), which also has a two- and a three-valued variant. This follows from the fact that the definable connective that prescribes full left-sequential conjunction is… ▽ More

    Submitted 28 September, 2023; v1 submitted 28 April, 2023; originally announced April 2023.

    Comments: 20 pages, 4 tables. Differences with v1: 1) Definitions 3.7 and 3.8 - the normal forms are more elegantly defined, based on a set of strings A^s which now includes the empty string: nicer proofs of La.3.10 and Thm.3.11; the same goes for the related definitions and proofs in the setting with U. 2) Thm.5.1 - best Prover9 results tightened

    MSC Class: 03C90 ACM Class: F.3.1; F.3.2

  6. arXiv:2003.06734  [pdf, other

    cs.CV cs.LG cs.RO

    Active Perception and Representation for Robotic Manipulation

    Authors: Youssef Zaky, Gaurav Paruthi, Bryan Tripp, James Bergstra

    Abstract: The vast majority of visual animals actively control their eyes, heads, and/or bodies to direct their gaze toward different parts of their environment. In contrast, recent applications of reinforcement learning in robotic manipulation employ cameras as passive sensors. These are carefully placed to view a scene from a fixed pose. Active perception allows animals to gather the most relevant informa… ▽ More

    Submitted 14 March, 2020; originally announced March 2020.

  7. arXiv:2001.05690  [pdf, other

    cs.CY

    Candidate Software Process Flaws for the Boeing 737 Max MCAS Algorithm and Risks for a Proposed Upgrade

    Authors: Jan A. Bergstra, Mark Burgess

    Abstract: By reasoning about the claims and speculations promised as part of the public discourse, we analyze the hypothesis that flaws in software engineering played a critical role in the Boeing 737 MCAS incidents. We use promise-based reasoning to discuss how, from an outsider's perspective, one may assemble clues about what went wrong. Rather than looking for a Rational Alternative Design (RAD), as sugg… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

    Comments: Sequel to arXiv:2001.01543 [cs.OH]

    ACM Class: D.2.m; K.4.0; A.1

  8. arXiv:2001.01543  [pdf, other

    cs.OH

    A Promise Theoretic Account of the Boeing 737 Max MCAS Algorithm Affair

    Authors: J. A. Bergstra, M. Burgess

    Abstract: Many public controversies involve the assessment of statements about which we have imperfect information. Without a structured approach, it is quite difficult to develop an approach to reasoning which is not based on ad hoc choices. Forms of logic have been used in the past to try to bring such clarity, but these fail for a variety of reasons. We demonstrate a simple approach to bringing a standar… ▽ More

    Submitted 24 December, 2019; originally announced January 2020.

    ACM Class: D.2.m; K.4.0; A.1

  9. Using Hoare logic in a process algebra setting

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: This paper concerns the relation between process algebra and Hoare logic. We investigate the question whether and how a Hoare logic can be used for reasoning about how data change in the course of a process when reasoning equationally about that process. We introduce an extension of ACP (Algebra of Communicating Processes) with features that are relevant to processes in which data are involved, pr… ▽ More

    Submitted 13 October, 2020; v1 submitted 11 June, 2019; originally announced June 2019.

    Comments: 24 pages; presentation improved, examples added

    ACM Class: D.1.3; D.1.4; D.2.4; F.1.2; F.3.1

    Journal ref: Fundamenta Informaticae 179(4):321--344, 2021

  10. arXiv:1904.08722  [pdf, ps, other

    cs.PL

    Quantitative Expressiveness of Instruction Sequence Classes for Computation on Single Bit Registers

    Authors: Jan A. Bergstra

    Abstract: The number of instructions of an instruction sequence is taken for its logical SLOC, and is abbreviated with LLOC. A notion of quantitative expressiveness is based on LLOC and in the special case of operation over a family of single bit registers a collection of elementary properties are established. A dedicated notion of interface is developed and is used for stating relevant properties of classe… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

    ACM Class: F.1.1; F.2.1

  11. arXiv:1903.11524  [pdf, other

    cs.LG cs.AI cs.RO stat.ML

    Autoregressive Policies for Continuous Control Deep Reinforcement Learning

    Authors: Dmytro Korenkevych, A. Rupam Mahmood, Gautham Vasan, James Bergstra

    Abstract: Reinforcement learning algorithms rely on exploration to discover new behaviors, which is typically achieved by following a stochastic policy. In continuous control tasks, policies with a Gaussian distribution have been widely adopted. Gaussian exploration however does not result in smooth trajectories that generally correspond to safe and rewarding behaviors in practical tasks. In addition, Gauss… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

    Comments: Submitted to 28th International Joint Conference on Artificial Intelligence (IJCAI 2019). Video: https://youtu.be/NCpyXBNqNmw Code: https://github.com/dkorenkevych/arp

  12. Program algebra for Turing-machine programs

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: This paper presents an algebraic theory of instruction sequences with instructions for Turing tapes as basic instructions, the behaviours produced by the instruction sequences concerned under execution, and the interaction between such behaviours and Turing tapes provided by an execution environment. This theory provides a setting for the development of theory in areas such as computability and co… ▽ More

    Submitted 7 December, 2019; v1 submitted 25 January, 2019; originally announced January 2019.

    Comments: 19 pages, Sect. 2--4 are largely shortened versions of Sect. 2--4 of arXiv:1808.04264, which, in turn, draw from preliminary sections of several earlier papers; 21 pages, some remarks in Sect.1 and Sect.10 added

    ACM Class: F.1.1; F.1.3; F.4.1

    Journal ref: Scientific Annals of Computer Science 29(2):113--139 (2019)

  13. arXiv:1810.02142  [pdf, ps, other

    cs.LO

    Propositional logic with short-circuit evaluation: a non-commutative and a commutative variant

    Authors: Jan A. Bergstra, Alban Ponse, Daan J. C. Staudt

    Abstract: Short-circuit evaluation denotes the semantics of propositional connectives in which the second argument is evaluated only if the first argument does not suffice to determine the value of the expression. Short-circuit evaluation is widely used in programming, with sequential conjunction and disjunction as primitive connectives. We study the question which logical laws axiomatize short-circuit ev… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

    Comments: 34 pages, 6 tables. Considerable parts of the text below stem from arXiv:1206.1936, arXiv:1010.3674, and arXiv:1707.05718. Together with arXiv:1707.05718, this paper subsumes most of arXiv:1010.3674

    MSC Class: 03C90 ACM Class: F.3.1; F.3.2

  14. arXiv:1809.07731  [pdf, other

    cs.LG cs.AI cs.RO stat.ML

    Benchmarking Reinforcement Learning Algorithms on Real-World Robots

    Authors: A. Rupam Mahmood, Dmytro Korenkevych, Gautham Vasan, William Ma, James Bergstra

    Abstract: Through many recent successes in simulation, model-free reinforcement learning has emerged as a promising approach to solving continuous control robotic tasks. The research community is now able to reproduce, analyze and build quickly on these results due to open source implementations of learning algorithms and simulated benchmark tasks. To carry forward these successes to real-world applications… ▽ More

    Submitted 20 September, 2018; originally announced September 2018.

    Comments: Appears in Proceedings of the Second Conference on Robot Learning (CoRL 2018). Companion video at https://youtu.be/ovDfhvjpQd8 and source code at https://github.com/kindredresearch/SenseAct

  15. arXiv:1808.04264  [pdf, ps, other

    cs.PL cs.LO

    A short introduction to program algebra with instructions for Boolean registers

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: A parameterized algebraic theory of instruction sequences, objects that represent the behaviours produced by instruction sequences under execution, and objects that represent the behaviours exhibited by the components of the execution environment of instruction sequences is the basis of a line of research in which issues relating to a wide variety of subjects from computer science have been rigoro… ▽ More

    Submitted 2 September, 2018; v1 submitted 13 August, 2018; originally announced August 2018.

    Comments: 21 pages, this paper is to a large extent a compilation of material from several earlier publications; 23 pages, presentation improved and section on uses for the theory added. arXiv admin note: text overlap with arXiv:1702.03511

    ACM Class: F.1.1; F.3.2; F.4.1

    Journal ref: Computer Science Journal of Moldova, 26(3):199--232, 2018

  16. On the complexity of the correctness problem for non-zeroness test instruction sequences

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: This paper concerns the question to what extent it can be efficiently determined whether an arbitrary program correctly solves a given problem. This question is investigated with programs of a very simple form, namely instruction sequences, and a very simple problem, namely the non-zeroness test on natural numbers. The instruction sequences concerned are of a kind by which, for each $n > 0$, each… ▽ More

    Submitted 26 February, 2019; v1 submitted 15 May, 2018; originally announced May 2018.

    Comments: 32 pages, minor revision with several obscurities made clear

    ACM Class: D.2.4; F.1.1; F.1.3

    Journal ref: Theoretical Computer Science, 802:1--18, 2020

  17. arXiv:1803.07067  [pdf, other

    cs.LG cs.AI cs.RO stat.ML

    Setting up a Reinforcement Learning Task with a Real-World Robot

    Authors: A. Rupam Mahmood, Dmytro Korenkevych, Brent J. Komer, James Bergstra

    Abstract: Reinforcement learning is a promising approach to develo** hard-to-engineer adaptive solutions for complex and diverse robotic tasks. However, learning with real-world robots is often unreliable and difficult, which resulted in their low adoption in reinforcement learning research. This difficulty is worsened by the lack of guidelines for setting up learning tasks with robots. In this work, we d… ▽ More

    Submitted 19 March, 2018; originally announced March 2018.

    Comments: Submitted to 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  18. arXiv:1707.00499  [pdf, ps, other

    math.RA cs.LO

    Universality of Univariate Mixed Fractions in Divisive Meadows

    Authors: Jan A. Bergstra, Inge Bethke, Dimitri Hendriks

    Abstract: Univariate fractions can be transformed to mixed fractions in the equational theory of meadows of characteristic zero.

    Submitted 3 July, 2017; originally announced July 2017.

    Comments: 12 pages

  19. Process algebra with strategic interleaving

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: In process algebras such as ACP (Algebra of Communicating Processes), parallel processes are considered to be interleaved in an arbitrary way. In the case of multi-threading as found in contemporary programming languages, parallel processes are actually interleaved according to some interleaving strategy. An interleaving strategy is what is called a process-scheduling policy in the field of operat… ▽ More

    Submitted 21 April, 2020; v1 submitted 20 March, 2017; originally announced March 2017.

    Comments: 19 pages, this version is a revision of the published version

    ACM Class: D.1.3; D.4.1; F.1.2

    Journal ref: Theory of Computing Systems, 63(3):488--505, 2019

  20. Axioms for behavioural congruence of single-pass instruction sequences

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: In program algebra, an algebraic theory of single-pass instruction sequences, three congruences on instruction sequences are paid attention to: instruction sequence congruence, structural congruence, and behavioural congruence. Sound and complete axiom systems for the first two congruences were already given in early papers on program algebra. The current paper is the first one that is concerned w… ▽ More

    Submitted 22 November, 2017; v1 submitted 12 February, 2017; originally announced February 2017.

    Comments: 19 pages, this paper draws somewhat from the preliminaries of arXiv:1502.00238 [cs.PL] and some earlier papers; some remarks added and some remarks reformulated

    ACM Class: D.3.1; F.3.1; F.3.2

    Journal ref: Scientific Annals of Computer Science 27(2):111--135 (2017)

  21. arXiv:1611.09351  [pdf, ps, other

    cs.AI

    Adams Conditioning and Likelihood Ratio Transfer Mediated Inference

    Authors: Jan A. Bergstra

    Abstract: Bayesian inference as applied in a legal setting is about belief transfer and involves a plurality of agents and communication protocols. A forensic expert (FE) may communicate to a trier of fact (TOF) first its value of a certain likelihood ratio with respect to FE's belief state as represented by a probability function on FE's proposition space. Subsequently FE communicates its recently acquir… ▽ More

    Submitted 16 August, 2019; v1 submitted 26 November, 2016; originally announced November 2016.

    Comments: Based on reviewer's comments many minor improvements have been made

  22. Datatype defining rewrite systems for naturals and integers

    Authors: Jan A. Bergstra, Alban Ponse

    Abstract: A datatype defining rewrite system (DDRS) is an algebraic (equational) specification intended to specify a datatype. When interpreting the equations from left-to-right, a DDRS defines a term rewriting system that must be ground-complete. First we define two DDRSs for the ring of integers, each comprising twelve rewrite rules, and prove their ground-completeness. Then we introduce natural number an… ▽ More

    Submitted 17 February, 2021; v1 submitted 22 August, 2016; originally announced August 2016.

    Comments: arXiv admin note: text overlap with arXiv:1406.3280

    ACM Class: D.3.1

    Journal ref: Logical Methods in Computer Science, Volume 17, Issue 1 (February 18, 2021) lmcs:6031

  23. arXiv:1605.02688  [pdf, other

    cs.SC cs.LG cs.MS

    Theano: A Python framework for fast computation of mathematical expressions

    Authors: The Theano Development Team, Rami Al-Rfou, Guillaume Alain, Amjad Almahairi, Christof Angermueller, Dzmitry Bahdanau, Nicolas Ballas, Frédéric Bastien, Justin Bayer, Anatoly Belikov, Alexander Belopolsky, Yoshua Bengio, Arnaud Bergeron, James Bergstra, Valentin Bisson, Josh Bleecher Snyder, Nicolas Bouchard, Nicolas Boulanger-Lewandowski, Xavier Bouthillier, Alexandre de Brébisson, Olivier Breuleux, Pierre-Luc Carrier, Kyunghyun Cho, Jan Chorowski, Paul Christiano , et al. (88 additional authors not shown)

    Abstract: Theano is a Python library that allows to define, optimize, and evaluate mathematical expressions involving multi-dimensional arrays efficiently. Since its introduction, it has been one of the most used CPU and GPU mathematical compilers - especially in the machine learning community - and has shown steady performance improvements. Theano is being actively and continuously developed since 2008, mu… ▽ More

    Submitted 9 May, 2016; originally announced May 2016.

    Comments: 19 pages, 5 figures

  24. Transformation of fractions into simple fractions in divisive meadows

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Meadows are alternatives for fields with a purely equational axiomatization. At the basis of meadows lies the decision to make the multiplicative inverse operation total by imposing that the multiplicative inverse of zero is zero. Divisive meadows are meadows with the multiplicative inverse operation replaced by a division operation. Viewing a fraction as a term over the signature of divisive mead… ▽ More

    Submitted 25 February, 2016; v1 submitted 21 October, 2015; originally announced October 2015.

    Comments: 23 pages; one theorem and two corollaries of it added at end of Sect. 5; some minor errors corrected

    MSC Class: 12E12; 12L12; 68Q65

    Journal ref: Journal of Applied Logic, 16:92--110, 2016

  25. arXiv:1510.04021  [pdf, ps, other

    math.RA cs.LO

    Subvarieties of the variety of meadows

    Authors: Jan A. Bergstra, Inge Bethke

    Abstract: Meadows - commutative rings equipped with a total inversion operation - can be axiomatized by purely equational means. We study subvarieties of the variety of meadows obtained by extending the equational theory and expanding the signature.

    Submitted 19 April, 2016; v1 submitted 14 October, 2015; originally announced October 2015.

    Comments: 11 pages

  26. Contradiction-tolerant process algebra with propositional signals

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: In a previous paper, an ACP-style process algebra was proposed in which propositions are used as the visible part of the state of processes and as state conditions under which processes may proceed. This process algebra, called ACPps, is built on classical propositional logic. In this paper, we present a version of ACPps built on a paraconsistent propositional logic which is essentially the same a… ▽ More

    Submitted 19 March, 2017; v1 submitted 27 August, 2015; originally announced August 2015.

    Comments: 25 pages; 26 pages, occurrences of wrong symbol for bisimulation equivalence replaced; 26 pages, Proposition 1 added; 27 pages, explanation of the phrase 'in contradiction' added to section 2 and presentation of the completeness result in section 2 improved; 27 pages, uniqueness result in section 2 revised; 27 pages, last paragraph of section 8 revised

    ACM Class: D.2.1; D.2.4; F.3.1; F.4.1

    Journal ref: Fundamenta Informaticae, 153(1-2): 29-55 (2017)

  27. arXiv:1507.00548  [pdf, ps, other

    math.RA cs.LO

    A negative result on algebraic specifications of the meadow of rational numbers

    Authors: Jan A. Bergstra, Inge Bethke

    Abstract: $\mathbb{Q}_0$ - the involutive meadow of the rational numbers - is the field of the rational numbers where the multiplicative inverse operation is made total by imposing $0^{-1}=0$. In this note, we prove that $\mathbb{Q}_0$ cannot be specified by the usual axioms for meadows augmented by a finite set of axioms of the form $(1+ \cdots +1+x^2)\cdot (1+ \cdots +1 +x^2)^{-1}=1$.

    Submitted 22 January, 2016; v1 submitted 2 July, 2015; originally announced July 2015.

    Comments: 5 pages, 2 tables

    MSC Class: 12D15

  28. arXiv:1504.08321  [pdf, ps, other

    cs.LO

    Evaluation trees for proposition algebra

    Authors: Jan A. Bergstra, Alban Ponse

    Abstract: Proposition algebra is based on Hoare's conditional connective, which is a ternary connective comparable to if-then-else and used in the setting of propositional logic. Conditional statements are provided with a simple semantics that is based on evaluation trees and that characterizes so-called free valuation congruence: two conditional statements are free valuation congruent if, and only if, they… ▽ More

    Submitted 28 August, 2017; v1 submitted 30 April, 2015; originally announced April 2015.

    Comments: 34 pages, 1 table; main differences with v2: some proofs are corrected and/or simplified in S.3-6

    MSC Class: 03B05; 03B70 ACM Class: F.3.2

  29. arXiv:1504.07184  [pdf, ps, other

    cs.CY

    Architectural Adequacy and Evolutionary Adequacy as Characteristics of a Candidate Informational Money

    Authors: Jan A. Bergstra

    Abstract: For money-like informational commodities the notions of architectural adequacy and evolutionary adequacy are proposed as the first two stages of a moneyness maturity hierarchy. Then three classes of informational commodities are distinguished: exclusively informational commodities, strictly informational commodities, and ownable informational commodities. For each class money-like instances of tha… ▽ More

    Submitted 27 April, 2015; originally announced April 2015.

    Comments: 25 pages

  30. On instruction sets for Boolean registers in program algebra

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: In previous work carried out in the setting of program algebra, including work in the area of instruction sequence size complexity, we chose instruction sets for Boolean registers that contain only instructions of a few of the possible kinds. In the current paper, we study instruction sequence size bounded functional completeness of all possible instruction sets for Boolean registers. We expect th… ▽ More

    Submitted 6 June, 2016; v1 submitted 1 February, 2015; originally announced February 2015.

    Comments: 18 pages, the preliminaries are largely the same as the preliminaries in arXiv:1402.4950 [cs.PL] and some earlier papers; 21 pages, presentation improved

    ACM Class: F.1.1; F.1.3

    Journal ref: Scientific Annals of Computer Science 26(1):1--26, 2016

  31. Instruction sequence size complexity of parity

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Each Boolean function can be computed by a single-pass instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. Auxiliary Boolean registers are not necessary for this. In the current paper, we show that, in the case of the parity functions, shorter instruction sequences are possible with the use… ▽ More

    Submitted 15 July, 2016; v1 submitted 21 December, 2014; originally announced December 2014.

    Comments: 12 pages, the preliminaries are largely the same as the preliminaries in arXiv:1312.1812 [cs.PL] and some earlier papers; 13 pages, minor errors corrected; 13 pages, presentation improved; 14 pages, remarks about related work added; 14 pages, presentation improved

    ACM Class: F.1.1; F.1.3

    Journal ref: Fundamenta Informaticae, 149(3):297--309, 2016

  32. arXiv:1412.3579  [pdf, ps, other

    cs.OH

    Personal Multi-threading

    Authors: Jan A. Bergstra

    Abstract: Multi-threading allows agents to pursue a heterogeneous collection of tasks in an orderly manner. The view of multi-threading that emerges from thread algebra is applied to the case where a single agent, who may be human, maintains a hierarchical multithread as an architecture of its own activities.

    Submitted 11 December, 2014; originally announced December 2014.

  33. arXiv:1410.8692  [pdf, ps, other

    cs.LO math.LO

    Note on paraconsistency and reasoning about fractions

    Authors: Jan A. Bergstra, Inge Bethke

    Abstract: We apply a paraconsistent logic to reason about fractions.

    Submitted 6 March, 2015; v1 submitted 31 October, 2014; originally announced October 2014.

    Comments: 6 pages

    Report number: report TCS1413, October 2014 ACM Class: F.4.1

  34. Probabilistic thread algebra

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: We add probabilistic features to basic thread algebra and its extensions with thread-service interaction and strategic interleaving. Here, threads represent the behaviours produced by instruction sequences under execution and services represent the behaviours exhibited by the components of execution environments of instruction sequences. In a paper concerned with probabilistic instruction sequence… ▽ More

    Submitted 22 July, 2015; v1 submitted 24 September, 2014; originally announced September 2014.

    Comments: 25 pages (arXiv admin note: text overlap with arXiv:1408.2955, arXiv:1402.4950); some simplifications made; substantially revised

    ACM Class: D.3.3; D.4.1; F.1.1; F.1.2

    Journal ref: Scientific Annals of Computer Science 25(2):211--243, 2015

  35. A Hoare-like logic of asserted single-pass instruction sequences

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: We present a formal system for proving the partial correctness of a single-pass instruction sequence as considered in program algebra by decomposition into proofs of the partial correctness of segments of the single-pass instruction sequence concerned. The system is similar to Hoare logics, but takes into account that, by the presence of jump instructions, segments of single-pass instruction seque… ▽ More

    Submitted 3 May, 2017; v1 submitted 13 August, 2014; originally announced August 2014.

    Comments: 22 pages, the preliminaries have textual overlaps with the preliminaries in arXiv:1402.4950 [cs.LO] and earlier papers; introduction and conclusions rewritten, explanatory remarks added; introduction partly rewritten; 24 pages, clarifying examples added

    ACM Class: D.2.4; F.3.1

    Journal ref: Scientific Annals of Computer Science, 26(2):125--156 (2016)

  36. arXiv:1406.3280  [pdf, ps, other

    cs.LO cs.DS

    Three Datatype Defining Rewrite Systems for Datatypes of Integers each extending a Datatype of Naturals

    Authors: Jan A. Bergstra, Alban Ponse

    Abstract: Integer arithmetic is specified according to three views: unary, binary, and decimal notation. The binary and decimal view have as their characteristic that each normal form resembles common number notation, that is, either a digit, or a string of digits without leading zero, or the negated versions of the latter. The unary view comprises a specification of integer arithmetic based on 0, successor… ▽ More

    Submitted 18 July, 2016; v1 submitted 12 June, 2014; originally announced June 2014.

    Comments: 33 pages; 19 tables. All DDRSes in S.2 are proven ground-complete (gc). In S.3, the DDRS for Z_{ut} contains 16 equations and is proven gc; the DDRS for Z_{bt} has one more equation ([bt22]) and is proven gc; the DDRSes for N_{dt} (Table 14) and Z_{dt} (Table 16) are proven gc in [13]. In Appendix C, corrected versions of the DDRSes for N_{u'} and Z_{u'} are proven gc

    ACM Class: D.3.1

  37. Division by zero in non-involutive meadows

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Meadows have been proposed as alternatives for fields with a purely equational axiomatization. At the basis of meadows lies the decision to make the multiplicative inverse operation total by imposing that the multiplicative inverse of zero is zero. Thus, the multiplicative inverse operation of a meadow is an involution. In this paper, we study `non-involutive meadows', i.e.\ variants of meadows in… ▽ More

    Submitted 9 June, 2014; originally announced June 2014.

    Comments: 14 pages

    MSC Class: 12E12; 12L12; 68Q65

    Journal ref: Journal of Applied Logic, 13(1):1--12, 2015

  38. On algorithmic equivalence of instruction sequences for computing bit string functions

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: Every partial function from bit strings of a given length to bit strings of a possibly different given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We look for an equivalence relation on instruction sequences of this kind that captures to a reasonabl… ▽ More

    Submitted 5 February, 2015; v1 submitted 20 February, 2014; originally announced February 2014.

    Comments: 27 pages, the preliminaries have textual overlaps with the preliminaries in arXiv:1308.0219 [cs.PL], arXiv:1312.1529 [cs.PL], and arXiv:1312.1812 [cs.PL]; 27 pages, three paragraphs about Milner's algorithmic equivalence hypothesis added to concluding remarks; 26 pages, several minor improvements of the presentation made

    ACM Class: F.1.1; F.2.0

    Journal ref: Fundamenta Informaticae, 138(4):411--434, 2015

  39. arXiv:1402.4778  [pdf, ps, other

    cs.CY

    Bitcoin: a Money-like Informational Commodity

    Authors: Jan A. Bergstra, Peter Weijland

    Abstract: The question "what is Bitcoin" allows for many answers depending on the objectives aimed at when providing such answers. The question addressed in this paper is to determine a top-level classification, or type, for Bitcoin. We will classify Bitcoin as a system of type money-like informational commodity (MLIC).

    Submitted 19 February, 2014; originally announced February 2014.

    Report number: Report TCS 1402

  40. arXiv:1401.3381  [pdf, ps, other

    cs.MA

    Promises, Impositions, and other Directionals

    Authors: Jan A. Bergstra, Mark Burgess

    Abstract: Promises, impositions, proposals, predictions, and suggestions are categorized as voluntary co-operational methods. The class of voluntary co-operational methods is included in the class of so-called directionals. Directionals are mechanisms supporting the mutual coordination of autonomous agents. Notations are provided capable of expressing residual fragments of directionals. An extensive examp… ▽ More

    Submitted 14 January, 2014; originally announced January 2014.

    Comments: 55 pages

  41. arXiv:1312.1812  [pdf, ps, other

    cs.PL

    Long multiplication by instruction sequences with backward jump instructions

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: For each function on bit strings, its restriction to bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. Backward jump instructions are not necessary for this, but instruction sequences can be significantly shorter with them. We tak… ▽ More

    Submitted 6 April, 2014; v1 submitted 6 December, 2013; originally announced December 2013.

    Comments: 17 pages, the preliminaries are about the same as the preliminaries in arXiv:1308.0219 [cs.PL] and arXiv:1312.1529 [cs.PL]; minor errors corrected, references added; section on indirect addressing added

    ACM Class: F.1.1; F.2.1

  42. Instruction sequences expressing multiplication algorithms

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: For each function on bit strings, its restriction to bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We describe instruction sequences of this kind that compute the function on bit strings that models multiplication on natural n… ▽ More

    Submitted 1 July, 2018; v1 submitted 5 December, 2013; originally announced December 2013.

    Comments: 14 pages, the preliminaries of this paper and arXiv:1308.0219 are the same; 16 pages, results sharpened and presentation improved; 22 pages, combined with arXiv:1312.1812; 22 pages, typos corrected and explanation added

    ACM Class: F.1.1; F.2.1

    Journal ref: Scientific Annals of Computer Science 28(1):39--66, 2018

  43. arXiv:1310.5011  [pdf, ps, other

    math.RA cs.LO

    Equations for formally real meadows

    Authors: Jan A. Bergstra, Inge Bethke, Alban Ponse

    Abstract: We consider the signatures $Σ_m=(0,1,-,+, \cdot, \ ^{-1})$ of meadows and $(Σ_m, {\mathbf s})$ of signed meadows. We give two complete axiomatizations of the equational theories of the real numbers with respect to these signatures. In the first case, we extend the axiomatization of zero-totalized fields by a single axiom scheme expressing formal realness; the second axiomatization presupposes an o… ▽ More

    Submitted 13 January, 2015; v1 submitted 18 October, 2013; originally announced October 2013.

    Comments: 24 pages, 14 tables, revised, new Theorem 3.7

    MSC Class: 12D15

  44. arXiv:1308.4214  [pdf, ps, other

    stat.ML cs.LG cs.MS

    Pylearn2: a machine learning research library

    Authors: Ian J. Goodfellow, David Warde-Farley, Pascal Lamblin, Vincent Dumoulin, Mehdi Mirza, Razvan Pascanu, James Bergstra, Frédéric Bastien, Yoshua Bengio

    Abstract: Pylearn2 is a machine learning research library. This does not just mean that it is a collection of machine learning algorithms that share a common API; it means that it has been designed for flexibility and extensibility in order to facilitate research projects that involve new or unusual use cases. In this paper we give a brief history of the library, an overview of its basic philosophy, a summa… ▽ More

    Submitted 19 August, 2013; originally announced August 2013.

    Comments: 9 pages

  45. arXiv:1308.0219  [pdf, ps, other

    cs.PL cs.CR

    Instruction sequence expressions for the secure hash algorithm SHA-256

    Authors: J. A. Bergstra, C. A. Middelburg

    Abstract: The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We describe such instruction sequences for the restrictions to bit strings of… ▽ More

    Submitted 18 November, 2017; v1 submitted 1 August, 2013; originally announced August 2013.

    Comments: 14 pages; several minor errors corrected; counting error corrected; instruction sequence fault repaired; misunderstanding cleared up; a minor error corrected; 15 pages, presentation improved, a minor error corrected. preliminaries have text overlap with arXiv:1301.3297

    ACM Class: E.3; F.1.1

  46. arXiv:1307.0414  [pdf, other

    stat.ML cs.LG

    Challenges in Representation Learning: A report on three machine learning contests

    Authors: Ian J. Goodfellow, Dumitru Erhan, Pierre Luc Carrier, Aaron Courville, Mehdi Mirza, Ben Hamner, Will Cukierski, Yichuan Tang, David Thaler, Dong-Hyun Lee, Yingbo Zhou, Chetan Ramaiah, Fangxiang Feng, Ruifan Li, Xiaojie Wang, Dimitris Athanasakis, John Shawe-Taylor, Maxim Milakov, John Park, Radu Ionescu, Marius Popescu, Cristian Grozea, James Bergstra, **g**g Xie, Lukasz Romaszko , et al. (3 additional authors not shown)

    Abstract: The ICML 2013 Workshop on Challenges in Representation Learning focused on three challenges: the black box learning challenge, the facial expression recognition challenge, and the multimodal learning challenge. We describe the datasets created for these challenges and summarize the results of the competitions. We provide suggestions for organizers of future challenges and some comments on what kin… ▽ More

    Submitted 1 July, 2013; originally announced July 2013.

    Comments: 8 pages, 2 figures

  47. arXiv:1306.6412  [pdf, ps, other

    cs.SE

    Decision Taking versus Promise Issuing

    Authors: Jan A. Bergstra

    Abstract: An alignment is developed between the terminology of outcome oriented decision taking and a terminology for promise issuing. Differences and correspondences are investigated between the concepts of decision and promise. For decision taking, two forms are distinguished: the external outcome delivering form and internalized decision taking. Internalized decision taking is brought in connection wit… ▽ More

    Submitted 27 June, 2013; originally announced June 2013.

    Comments: 29 pages

  48. arXiv:1306.3476  [pdf, other

    cs.CV cs.LG stat.ML

    Hyperparameter Optimization and Boosting for Classifying Facial Expressions: How good can a "Null" Model be?

    Authors: James Bergstra, David D. Cox

    Abstract: One of the goals of the ICML workshop on representation and learning is to establish benchmark scores for a new data set of labeled facial expressions. This paper presents the performance of a "Null" model consisting of convolutions with random weights, PCA, pooling, normalization, and a linear readout. Our approach focused on hyperparameter optimization rather than novel model components. On the… ▽ More

    Submitted 14 June, 2013; originally announced June 2013.

    Comments: Presented at the Workshop on Representation and Learning, ICML 2013

  49. arXiv:1305.5956  [pdf, ps, other

    cs.CY

    Questions related to Bitcoin and other Informational Money

    Authors: Jan A. Bergstra, Karl de Leeuw

    Abstract: A collection of questions about Bitcoin and its hypothetical relatives Bitguilder and Bitpenny is formulated. These questions concern technical issues about protocols, security issues, issues about the formalizations of informational monies in various contexts, and issues about forms of use and misuse. Some questions are formulated in the more general setting of informational monies and near-monie… ▽ More

    Submitted 26 December, 2013; v1 submitted 25 May, 2013; originally announced May 2013.

    Comments: 31 pages. In v2 the section on patterns for use and misuse has been improved and expanded with so-called contaminations. Other small improvements were made and 13 additional references have been included

  50. arXiv:1304.4758  [pdf, ps, other

    cs.CY cs.CR

    Bitcoin and Beyond: Exclusively Informational Monies

    Authors: Jan A. Bergstra, Karl de Leeuw

    Abstract: The famous new money Bitcoin is classified as a technical informational money (TIM). Besides introducing the idea of a TIM, a more extreme notion of informational money will be developed: exclusively informational money (EXIM). The informational coins (INCOs) of an EXIM can be in control of an agent but are not owned by any agent. INCOs of an EXIM cannot be stolen, but they can be lost, or throw… ▽ More

    Submitted 30 December, 2013; v1 submitted 17 April, 2013; originally announced April 2013.

    Comments: 82 pages. Revision of v2: the Paragraph on monopresence and pseudomonopresence has been improved and extended; the paragraph on units for monies of account has been extended; several minor clarifications have been included; 8 additional references were added; improvements were made of small errors throughout the paper