-
Revisiting Constant Negative Rewards for Goal-Reaching Tasks in Robot Learning
Abstract: Many real-world robot learning problems, such as pick-and-place or arriving at a destination, can be seen as a problem of reaching a goal state as soon as possible. These problems, when formulated as episodic reinforcement learning tasks, can easily be specified to align well with our intended goal: -1 reward every time step with termination upon reaching the goal state, called minimum-time tasks.… ▽ More
Submitted 29 June, 2024; originally announced July 2024.
Comments: In Proceedings of Reinforcement Learning Conference 2024. For video demo, see https://drive.google.com/file/d/1O8D3oCWq5xf2hi1JOlMBbs6W1ClrvUFb/view?usp=sharing
-
arXiv:2405.01733 [pdf, ps, other]
Rings with common division, common meadows and their conditional equational theories
Abstract: We examine the consequences of having a total division operation $\frac{x}{y}$ on commutative rings. We consider two forms of binary division, one derived from a unary inverse, the other defined directly as a general operation; each are made total by setting $1/0$ equal to an error value $\bot$, which is added to the ring. Such totalised divisions we call common divisions. In a field the two forms… ▽ More
Submitted 26 May, 2024; v1 submitted 2 May, 2024; originally announced May 2024.
-
A Statistical Guarantee for Representation Transfer in Multitask Imitation Learning
Abstract: Transferring representation for multitask imitation learning has the potential to provide improved sample efficiency on learning new tasks, when compared to learning from scratch. In this work, we provide a statistical guarantee indicating that we can indeed achieve improved sample efficiency on the target task when a representation is trained using sufficiently diverse source tasks. Our theoretic… ▽ More
Submitted 2 November, 2023; originally announced November 2023.
Comments: Accepted by NeurIPS 2023 Workshop on Robot Learning
-
arXiv:2307.04270 [pdf, ps, other]
A Complete Finite Axiomatisation of the Equational Theory of Common Meadows
Abstract: We analyse abstract data types that model numerical structures with a concept of error. Specifically, we focus on arithmetic data types that contain an error value $\bot$ whose main purpose is to always return a value for division. To rings and fields, we add a division operator $x/y$ and study a class of algebras called common meadows wherein $x/0 = \bot$. The set of equations true in all common… ▽ More
Submitted 26 May, 2024; v1 submitted 9 July, 2023; originally announced July 2023.
-
arXiv:2304.14821 [pdf, ps, other]
Conditional logic as a short-circuit logic
Abstract: Both two-valued and three-valued conditional logic (CL), defined by Guzmán and Squier (1990) and based on McCarthy's non-commutative connectives, axiomatise a short-circuit logic (SCL) that defines more identities than MSCL (Memorising SCL), which also has a two- and a three-valued variant. This follows from the fact that the definable connective that prescribes full left-sequential conjunction is… ▽ More
Submitted 28 September, 2023; v1 submitted 28 April, 2023; originally announced April 2023.
Comments: 20 pages, 4 tables. Differences with v1: 1) Definitions 3.7 and 3.8 - the normal forms are more elegantly defined, based on a set of strings A^s which now includes the empty string: nicer proofs of La.3.10 and Thm.3.11; the same goes for the related definitions and proofs in the setting with U. 2) Thm.5.1 - best Prover9 results tightened
MSC Class: 03C90 ACM Class: F.3.1; F.3.2
-
Active Perception and Representation for Robotic Manipulation
Abstract: The vast majority of visual animals actively control their eyes, heads, and/or bodies to direct their gaze toward different parts of their environment. In contrast, recent applications of reinforcement learning in robotic manipulation employ cameras as passive sensors. These are carefully placed to view a scene from a fixed pose. Active perception allows animals to gather the most relevant informa… ▽ More
Submitted 14 March, 2020; originally announced March 2020.
-
Candidate Software Process Flaws for the Boeing 737 Max MCAS Algorithm and Risks for a Proposed Upgrade
Abstract: By reasoning about the claims and speculations promised as part of the public discourse, we analyze the hypothesis that flaws in software engineering played a critical role in the Boeing 737 MCAS incidents. We use promise-based reasoning to discuss how, from an outsider's perspective, one may assemble clues about what went wrong. Rather than looking for a Rational Alternative Design (RAD), as sugg… ▽ More
Submitted 16 January, 2020; originally announced January 2020.
Comments: Sequel to arXiv:2001.01543 [cs.OH]
ACM Class: D.2.m; K.4.0; A.1
-
A Promise Theoretic Account of the Boeing 737 Max MCAS Algorithm Affair
Abstract: Many public controversies involve the assessment of statements about which we have imperfect information. Without a structured approach, it is quite difficult to develop an approach to reasoning which is not based on ad hoc choices. Forms of logic have been used in the past to try to bring such clarity, but these fail for a variety of reasons. We demonstrate a simple approach to bringing a standar… ▽ More
Submitted 24 December, 2019; originally announced January 2020.
ACM Class: D.2.m; K.4.0; A.1
-
arXiv:1906.04491 [pdf, ps, other]
Using Hoare logic in a process algebra setting
Abstract: This paper concerns the relation between process algebra and Hoare logic. We investigate the question whether and how a Hoare logic can be used for reasoning about how data change in the course of a process when reasoning equationally about that process. We introduce an extension of ACP (Algebra of Communicating Processes) with features that are relevant to processes in which data are involved, pr… ▽ More
Submitted 13 October, 2020; v1 submitted 11 June, 2019; originally announced June 2019.
Comments: 24 pages; presentation improved, examples added
ACM Class: D.1.3; D.1.4; D.2.4; F.1.2; F.3.1
Journal ref: Fundamenta Informaticae 179(4):321--344, 2021
-
arXiv:1904.08722 [pdf, ps, other]
Quantitative Expressiveness of Instruction Sequence Classes for Computation on Single Bit Registers
Abstract: The number of instructions of an instruction sequence is taken for its logical SLOC, and is abbreviated with LLOC. A notion of quantitative expressiveness is based on LLOC and in the special case of operation over a family of single bit registers a collection of elementary properties are established. A dedicated notion of interface is developed and is used for stating relevant properties of classe… ▽ More
Submitted 18 April, 2019; originally announced April 2019.
ACM Class: F.1.1; F.2.1
-
Autoregressive Policies for Continuous Control Deep Reinforcement Learning
Abstract: Reinforcement learning algorithms rely on exploration to discover new behaviors, which is typically achieved by following a stochastic policy. In continuous control tasks, policies with a Gaussian distribution have been widely adopted. Gaussian exploration however does not result in smooth trajectories that generally correspond to safe and rewarding behaviors in practical tasks. In addition, Gauss… ▽ More
Submitted 27 March, 2019; originally announced March 2019.
Comments: Submitted to 28th International Joint Conference on Artificial Intelligence (IJCAI 2019). Video: https://youtu.be/NCpyXBNqNmw Code: https://github.com/dkorenkevych/arp
-
arXiv:1901.08840 [pdf, ps, other]
Program algebra for Turing-machine programs
Abstract: This paper presents an algebraic theory of instruction sequences with instructions for Turing tapes as basic instructions, the behaviours produced by the instruction sequences concerned under execution, and the interaction between such behaviours and Turing tapes provided by an execution environment. This theory provides a setting for the development of theory in areas such as computability and co… ▽ More
Submitted 7 December, 2019; v1 submitted 25 January, 2019; originally announced January 2019.
Comments: 19 pages, Sect. 2--4 are largely shortened versions of Sect. 2--4 of arXiv:1808.04264, which, in turn, draw from preliminary sections of several earlier papers; 21 pages, some remarks in Sect.1 and Sect.10 added
ACM Class: F.1.1; F.1.3; F.4.1
Journal ref: Scientific Annals of Computer Science 29(2):113--139 (2019)
-
arXiv:1810.02142 [pdf, ps, other]
Propositional logic with short-circuit evaluation: a non-commutative and a commutative variant
Abstract: Short-circuit evaluation denotes the semantics of propositional connectives in which the second argument is evaluated only if the first argument does not suffice to determine the value of the expression. Short-circuit evaluation is widely used in programming, with sequential conjunction and disjunction as primitive connectives. We study the question which logical laws axiomatize short-circuit ev… ▽ More
Submitted 4 October, 2018; originally announced October 2018.
Comments: 34 pages, 6 tables. Considerable parts of the text below stem from arXiv:1206.1936, arXiv:1010.3674, and arXiv:1707.05718. Together with arXiv:1707.05718, this paper subsumes most of arXiv:1010.3674
MSC Class: 03C90 ACM Class: F.3.1; F.3.2
-
Benchmarking Reinforcement Learning Algorithms on Real-World Robots
Abstract: Through many recent successes in simulation, model-free reinforcement learning has emerged as a promising approach to solving continuous control robotic tasks. The research community is now able to reproduce, analyze and build quickly on these results due to open source implementations of learning algorithms and simulated benchmark tasks. To carry forward these successes to real-world applications… ▽ More
Submitted 20 September, 2018; originally announced September 2018.
Comments: Appears in Proceedings of the Second Conference on Robot Learning (CoRL 2018). Companion video at https://youtu.be/ovDfhvjpQd8 and source code at https://github.com/kindredresearch/SenseAct
-
arXiv:1808.04264 [pdf, ps, other]
A short introduction to program algebra with instructions for Boolean registers
Abstract: A parameterized algebraic theory of instruction sequences, objects that represent the behaviours produced by instruction sequences under execution, and objects that represent the behaviours exhibited by the components of the execution environment of instruction sequences is the basis of a line of research in which issues relating to a wide variety of subjects from computer science have been rigoro… ▽ More
Submitted 2 September, 2018; v1 submitted 13 August, 2018; originally announced August 2018.
Comments: 21 pages, this paper is to a large extent a compilation of material from several earlier publications; 23 pages, presentation improved and section on uses for the theory added. arXiv admin note: text overlap with arXiv:1702.03511
ACM Class: F.1.1; F.3.2; F.4.1
Journal ref: Computer Science Journal of Moldova, 26(3):199--232, 2018
-
arXiv:1805.05845 [pdf, ps, other]
On the complexity of the correctness problem for non-zeroness test instruction sequences
Abstract: This paper concerns the question to what extent it can be efficiently determined whether an arbitrary program correctly solves a given problem. This question is investigated with programs of a very simple form, namely instruction sequences, and a very simple problem, namely the non-zeroness test on natural numbers. The instruction sequences concerned are of a kind by which, for each $n > 0$, each… ▽ More
Submitted 26 February, 2019; v1 submitted 15 May, 2018; originally announced May 2018.
Comments: 32 pages, minor revision with several obscurities made clear
ACM Class: D.2.4; F.1.1; F.1.3
Journal ref: Theoretical Computer Science, 802:1--18, 2020
-
Setting up a Reinforcement Learning Task with a Real-World Robot
Abstract: Reinforcement learning is a promising approach to develo** hard-to-engineer adaptive solutions for complex and diverse robotic tasks. However, learning with real-world robots is often unreliable and difficult, which resulted in their low adoption in reinforcement learning research. This difficulty is worsened by the lack of guidelines for setting up learning tasks with robots. In this work, we d… ▽ More
Submitted 19 March, 2018; originally announced March 2018.
Comments: Submitted to 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)
-
arXiv:1707.00499 [pdf, ps, other]
Universality of Univariate Mixed Fractions in Divisive Meadows
Abstract: Univariate fractions can be transformed to mixed fractions in the equational theory of meadows of characteristic zero.
Submitted 3 July, 2017; originally announced July 2017.
Comments: 12 pages
-
arXiv:1703.06822 [pdf, ps, other]
Process algebra with strategic interleaving
Abstract: In process algebras such as ACP (Algebra of Communicating Processes), parallel processes are considered to be interleaved in an arbitrary way. In the case of multi-threading as found in contemporary programming languages, parallel processes are actually interleaved according to some interleaving strategy. An interleaving strategy is what is called a process-scheduling policy in the field of operat… ▽ More
Submitted 21 April, 2020; v1 submitted 20 March, 2017; originally announced March 2017.
Comments: 19 pages, this version is a revision of the published version
ACM Class: D.1.3; D.4.1; F.1.2
Journal ref: Theory of Computing Systems, 63(3):488--505, 2019
-
arXiv:1702.03511 [pdf, ps, other]
Axioms for behavioural congruence of single-pass instruction sequences
Abstract: In program algebra, an algebraic theory of single-pass instruction sequences, three congruences on instruction sequences are paid attention to: instruction sequence congruence, structural congruence, and behavioural congruence. Sound and complete axiom systems for the first two congruences were already given in early papers on program algebra. The current paper is the first one that is concerned w… ▽ More
Submitted 22 November, 2017; v1 submitted 12 February, 2017; originally announced February 2017.
Comments: 19 pages, this paper draws somewhat from the preliminaries of arXiv:1502.00238 [cs.PL] and some earlier papers; some remarks added and some remarks reformulated
ACM Class: D.3.1; F.3.1; F.3.2
Journal ref: Scientific Annals of Computer Science 27(2):111--135 (2017)
-
arXiv:1611.09351 [pdf, ps, other]
Adams Conditioning and Likelihood Ratio Transfer Mediated Inference
Abstract: Bayesian inference as applied in a legal setting is about belief transfer and involves a plurality of agents and communication protocols. A forensic expert (FE) may communicate to a trier of fact (TOF) first its value of a certain likelihood ratio with respect to FE's belief state as represented by a probability function on FE's proposition space. Subsequently FE communicates its recently acquir… ▽ More
Submitted 16 August, 2019; v1 submitted 26 November, 2016; originally announced November 2016.
Comments: Based on reviewer's comments many minor improvements have been made
-
Datatype defining rewrite systems for naturals and integers
Abstract: A datatype defining rewrite system (DDRS) is an algebraic (equational) specification intended to specify a datatype. When interpreting the equations from left-to-right, a DDRS defines a term rewriting system that must be ground-complete. First we define two DDRSs for the ring of integers, each comprising twelve rewrite rules, and prove their ground-completeness. Then we introduce natural number an… ▽ More
Submitted 17 February, 2021; v1 submitted 22 August, 2016; originally announced August 2016.
Comments: arXiv admin note: text overlap with arXiv:1406.3280
ACM Class: D.3.1
Journal ref: Logical Methods in Computer Science, Volume 17, Issue 1 (February 18, 2021) lmcs:6031
-
Theano: A Python framework for fast computation of mathematical expressions
Abstract: Theano is a Python library that allows to define, optimize, and evaluate mathematical expressions involving multi-dimensional arrays efficiently. Since its introduction, it has been one of the most used CPU and GPU mathematical compilers - especially in the machine learning community - and has shown steady performance improvements. Theano is being actively and continuously developed since 2008, mu… ▽ More
Submitted 9 May, 2016; originally announced May 2016.
Comments: 19 pages, 5 figures
-
arXiv:1510.06233 [pdf, ps, other]
Transformation of fractions into simple fractions in divisive meadows
Abstract: Meadows are alternatives for fields with a purely equational axiomatization. At the basis of meadows lies the decision to make the multiplicative inverse operation total by imposing that the multiplicative inverse of zero is zero. Divisive meadows are meadows with the multiplicative inverse operation replaced by a division operation. Viewing a fraction as a term over the signature of divisive mead… ▽ More
Submitted 25 February, 2016; v1 submitted 21 October, 2015; originally announced October 2015.
Comments: 23 pages; one theorem and two corollaries of it added at end of Sect. 5; some minor errors corrected
MSC Class: 12E12; 12L12; 68Q65
Journal ref: Journal of Applied Logic, 16:92--110, 2016
-
arXiv:1510.04021 [pdf, ps, other]
Subvarieties of the variety of meadows
Abstract: Meadows - commutative rings equipped with a total inversion operation - can be axiomatized by purely equational means. We study subvarieties of the variety of meadows obtained by extending the equational theory and expanding the signature.
Submitted 19 April, 2016; v1 submitted 14 October, 2015; originally announced October 2015.
Comments: 11 pages
-
arXiv:1508.06899 [pdf, ps, other]
Contradiction-tolerant process algebra with propositional signals
Abstract: In a previous paper, an ACP-style process algebra was proposed in which propositions are used as the visible part of the state of processes and as state conditions under which processes may proceed. This process algebra, called ACPps, is built on classical propositional logic. In this paper, we present a version of ACPps built on a paraconsistent propositional logic which is essentially the same a… ▽ More
Submitted 19 March, 2017; v1 submitted 27 August, 2015; originally announced August 2015.
Comments: 25 pages; 26 pages, occurrences of wrong symbol for bisimulation equivalence replaced; 26 pages, Proposition 1 added; 27 pages, explanation of the phrase 'in contradiction' added to section 2 and presentation of the completeness result in section 2 improved; 27 pages, uniqueness result in section 2 revised; 27 pages, last paragraph of section 8 revised
ACM Class: D.2.1; D.2.4; F.3.1; F.4.1
Journal ref: Fundamenta Informaticae, 153(1-2): 29-55 (2017)
-
arXiv:1507.00548 [pdf, ps, other]
A negative result on algebraic specifications of the meadow of rational numbers
Abstract: $\mathbb{Q}_0$ - the involutive meadow of the rational numbers - is the field of the rational numbers where the multiplicative inverse operation is made total by imposing $0^{-1}=0$. In this note, we prove that $\mathbb{Q}_0$ cannot be specified by the usual axioms for meadows augmented by a finite set of axioms of the form $(1+ \cdots +1+x^2)\cdot (1+ \cdots +1 +x^2)^{-1}=1$.
Submitted 22 January, 2016; v1 submitted 2 July, 2015; originally announced July 2015.
Comments: 5 pages, 2 tables
MSC Class: 12D15
-
arXiv:1504.08321 [pdf, ps, other]
Evaluation trees for proposition algebra
Abstract: Proposition algebra is based on Hoare's conditional connective, which is a ternary connective comparable to if-then-else and used in the setting of propositional logic. Conditional statements are provided with a simple semantics that is based on evaluation trees and that characterizes so-called free valuation congruence: two conditional statements are free valuation congruent if, and only if, they… ▽ More
Submitted 28 August, 2017; v1 submitted 30 April, 2015; originally announced April 2015.
Comments: 34 pages, 1 table; main differences with v2: some proofs are corrected and/or simplified in S.3-6
MSC Class: 03B05; 03B70 ACM Class: F.3.2
-
arXiv:1504.07184 [pdf, ps, other]
Architectural Adequacy and Evolutionary Adequacy as Characteristics of a Candidate Informational Money
Abstract: For money-like informational commodities the notions of architectural adequacy and evolutionary adequacy are proposed as the first two stages of a moneyness maturity hierarchy. Then three classes of informational commodities are distinguished: exclusively informational commodities, strictly informational commodities, and ownable informational commodities. For each class money-like instances of tha… ▽ More
Submitted 27 April, 2015; originally announced April 2015.
Comments: 25 pages
-
arXiv:1502.00238 [pdf, ps, other]
On instruction sets for Boolean registers in program algebra
Abstract: In previous work carried out in the setting of program algebra, including work in the area of instruction sequence size complexity, we chose instruction sets for Boolean registers that contain only instructions of a few of the possible kinds. In the current paper, we study instruction sequence size bounded functional completeness of all possible instruction sets for Boolean registers. We expect th… ▽ More
Submitted 6 June, 2016; v1 submitted 1 February, 2015; originally announced February 2015.
Comments: 18 pages, the preliminaries are largely the same as the preliminaries in arXiv:1402.4950 [cs.PL] and some earlier papers; 21 pages, presentation improved
ACM Class: F.1.1; F.1.3
Journal ref: Scientific Annals of Computer Science 26(1):1--26, 2016
-
arXiv:1412.6787 [pdf, ps, other]
Instruction sequence size complexity of parity
Abstract: Each Boolean function can be computed by a single-pass instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. Auxiliary Boolean registers are not necessary for this. In the current paper, we show that, in the case of the parity functions, shorter instruction sequences are possible with the use… ▽ More
Submitted 15 July, 2016; v1 submitted 21 December, 2014; originally announced December 2014.
Comments: 12 pages, the preliminaries are largely the same as the preliminaries in arXiv:1312.1812 [cs.PL] and some earlier papers; 13 pages, minor errors corrected; 13 pages, presentation improved; 14 pages, remarks about related work added; 14 pages, presentation improved
ACM Class: F.1.1; F.1.3
Journal ref: Fundamenta Informaticae, 149(3):297--309, 2016
-
arXiv:1412.3579 [pdf, ps, other]
Personal Multi-threading
Abstract: Multi-threading allows agents to pursue a heterogeneous collection of tasks in an orderly manner. The view of multi-threading that emerges from thread algebra is applied to the case where a single agent, who may be human, maintains a hierarchical multithread as an architecture of its own activities.
Submitted 11 December, 2014; originally announced December 2014.
-
arXiv:1410.8692 [pdf, ps, other]
Note on paraconsistency and reasoning about fractions
Abstract: We apply a paraconsistent logic to reason about fractions.
Submitted 6 March, 2015; v1 submitted 31 October, 2014; originally announced October 2014.
Comments: 6 pages
Report number: report TCS1413, October 2014 ACM Class: F.4.1
-
arXiv:1409.6873 [pdf, ps, other]
Probabilistic thread algebra
Abstract: We add probabilistic features to basic thread algebra and its extensions with thread-service interaction and strategic interleaving. Here, threads represent the behaviours produced by instruction sequences under execution and services represent the behaviours exhibited by the components of execution environments of instruction sequences. In a paper concerned with probabilistic instruction sequence… ▽ More
Submitted 22 July, 2015; v1 submitted 24 September, 2014; originally announced September 2014.
Comments: 25 pages (arXiv admin note: text overlap with arXiv:1408.2955, arXiv:1402.4950); some simplifications made; substantially revised
ACM Class: D.3.3; D.4.1; F.1.1; F.1.2
Journal ref: Scientific Annals of Computer Science 25(2):211--243, 2015
-
arXiv:1408.2955 [pdf, ps, other]
A Hoare-like logic of asserted single-pass instruction sequences
Abstract: We present a formal system for proving the partial correctness of a single-pass instruction sequence as considered in program algebra by decomposition into proofs of the partial correctness of segments of the single-pass instruction sequence concerned. The system is similar to Hoare logics, but takes into account that, by the presence of jump instructions, segments of single-pass instruction seque… ▽ More
Submitted 3 May, 2017; v1 submitted 13 August, 2014; originally announced August 2014.
Comments: 22 pages, the preliminaries have textual overlaps with the preliminaries in arXiv:1402.4950 [cs.LO] and earlier papers; introduction and conclusions rewritten, explanatory remarks added; introduction partly rewritten; 24 pages, clarifying examples added
ACM Class: D.2.4; F.3.1
Journal ref: Scientific Annals of Computer Science, 26(2):125--156 (2016)
-
arXiv:1406.3280 [pdf, ps, other]
Three Datatype Defining Rewrite Systems for Datatypes of Integers each extending a Datatype of Naturals
Abstract: Integer arithmetic is specified according to three views: unary, binary, and decimal notation. The binary and decimal view have as their characteristic that each normal form resembles common number notation, that is, either a digit, or a string of digits without leading zero, or the negated versions of the latter. The unary view comprises a specification of integer arithmetic based on 0, successor… ▽ More
Submitted 18 July, 2016; v1 submitted 12 June, 2014; originally announced June 2014.
Comments: 33 pages; 19 tables. All DDRSes in S.2 are proven ground-complete (gc). In S.3, the DDRS for Z_{ut} contains 16 equations and is proven gc; the DDRS for Z_{bt} has one more equation ([bt22]) and is proven gc; the DDRSes for N_{dt} (Table 14) and Z_{dt} (Table 16) are proven gc in [13]. In Appendix C, corrected versions of the DDRSes for N_{u'} and Z_{u'} are proven gc
ACM Class: D.3.1
-
arXiv:1406.2092 [pdf, ps, other]
Division by zero in non-involutive meadows
Abstract: Meadows have been proposed as alternatives for fields with a purely equational axiomatization. At the basis of meadows lies the decision to make the multiplicative inverse operation total by imposing that the multiplicative inverse of zero is zero. Thus, the multiplicative inverse operation of a meadow is an involution. In this paper, we study `non-involutive meadows', i.e.\ variants of meadows in… ▽ More
Submitted 9 June, 2014; originally announced June 2014.
Comments: 14 pages
MSC Class: 12E12; 12L12; 68Q65
Journal ref: Journal of Applied Logic, 13(1):1--12, 2015
-
arXiv:1402.4950 [pdf, ps, other]
On algorithmic equivalence of instruction sequences for computing bit string functions
Abstract: Every partial function from bit strings of a given length to bit strings of a possibly different given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We look for an equivalence relation on instruction sequences of this kind that captures to a reasonabl… ▽ More
Submitted 5 February, 2015; v1 submitted 20 February, 2014; originally announced February 2014.
Comments: 27 pages, the preliminaries have textual overlaps with the preliminaries in arXiv:1308.0219 [cs.PL], arXiv:1312.1529 [cs.PL], and arXiv:1312.1812 [cs.PL]; 27 pages, three paragraphs about Milner's algorithmic equivalence hypothesis added to concluding remarks; 26 pages, several minor improvements of the presentation made
ACM Class: F.1.1; F.2.0
Journal ref: Fundamenta Informaticae, 138(4):411--434, 2015
-
arXiv:1402.4778 [pdf, ps, other]
Bitcoin: a Money-like Informational Commodity
Abstract: The question "what is Bitcoin" allows for many answers depending on the objectives aimed at when providing such answers. The question addressed in this paper is to determine a top-level classification, or type, for Bitcoin. We will classify Bitcoin as a system of type money-like informational commodity (MLIC).
Submitted 19 February, 2014; originally announced February 2014.
Report number: Report TCS 1402
-
arXiv:1401.3381 [pdf, ps, other]
Promises, Impositions, and other Directionals
Abstract: Promises, impositions, proposals, predictions, and suggestions are categorized as voluntary co-operational methods. The class of voluntary co-operational methods is included in the class of so-called directionals. Directionals are mechanisms supporting the mutual coordination of autonomous agents. Notations are provided capable of expressing residual fragments of directionals. An extensive examp… ▽ More
Submitted 14 January, 2014; originally announced January 2014.
Comments: 55 pages
-
arXiv:1312.1812 [pdf, ps, other]
Long multiplication by instruction sequences with backward jump instructions
Abstract: For each function on bit strings, its restriction to bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. Backward jump instructions are not necessary for this, but instruction sequences can be significantly shorter with them. We tak… ▽ More
Submitted 6 April, 2014; v1 submitted 6 December, 2013; originally announced December 2013.
Comments: 17 pages, the preliminaries are about the same as the preliminaries in arXiv:1308.0219 [cs.PL] and arXiv:1312.1529 [cs.PL]; minor errors corrected, references added; section on indirect addressing added
ACM Class: F.1.1; F.2.1
-
arXiv:1312.1529 [pdf, ps, other]
Instruction sequences expressing multiplication algorithms
Abstract: For each function on bit strings, its restriction to bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We describe instruction sequences of this kind that compute the function on bit strings that models multiplication on natural n… ▽ More
Submitted 1 July, 2018; v1 submitted 5 December, 2013; originally announced December 2013.
Comments: 14 pages, the preliminaries of this paper and arXiv:1308.0219 are the same; 16 pages, results sharpened and presentation improved; 22 pages, combined with arXiv:1312.1812; 22 pages, typos corrected and explanation added
ACM Class: F.1.1; F.2.1
Journal ref: Scientific Annals of Computer Science 28(1):39--66, 2018
-
arXiv:1310.5011 [pdf, ps, other]
Equations for formally real meadows
Abstract: We consider the signatures $Σ_m=(0,1,-,+, \cdot, \ ^{-1})$ of meadows and $(Σ_m, {\mathbf s})$ of signed meadows. We give two complete axiomatizations of the equational theories of the real numbers with respect to these signatures. In the first case, we extend the axiomatization of zero-totalized fields by a single axiom scheme expressing formal realness; the second axiomatization presupposes an o… ▽ More
Submitted 13 January, 2015; v1 submitted 18 October, 2013; originally announced October 2013.
Comments: 24 pages, 14 tables, revised, new Theorem 3.7
MSC Class: 12D15
-
arXiv:1308.4214 [pdf, ps, other]
Pylearn2: a machine learning research library
Abstract: Pylearn2 is a machine learning research library. This does not just mean that it is a collection of machine learning algorithms that share a common API; it means that it has been designed for flexibility and extensibility in order to facilitate research projects that involve new or unusual use cases. In this paper we give a brief history of the library, an overview of its basic philosophy, a summa… ▽ More
Submitted 19 August, 2013; originally announced August 2013.
Comments: 9 pages
-
arXiv:1308.0219 [pdf, ps, other]
Instruction sequence expressions for the secure hash algorithm SHA-256
Abstract: The secure hash function SHA-256 is a function on bit strings. This means that its restriction to the bit strings of any given length can be computed by a finite instruction sequence that contains only instructions to set and get the content of Boolean registers, forward jump instructions, and a termination instruction. We describe such instruction sequences for the restrictions to bit strings of… ▽ More
Submitted 18 November, 2017; v1 submitted 1 August, 2013; originally announced August 2013.
Comments: 14 pages; several minor errors corrected; counting error corrected; instruction sequence fault repaired; misunderstanding cleared up; a minor error corrected; 15 pages, presentation improved, a minor error corrected. preliminaries have text overlap with arXiv:1301.3297
ACM Class: E.3; F.1.1
-
Challenges in Representation Learning: A report on three machine learning contests
Abstract: The ICML 2013 Workshop on Challenges in Representation Learning focused on three challenges: the black box learning challenge, the facial expression recognition challenge, and the multimodal learning challenge. We describe the datasets created for these challenges and summarize the results of the competitions. We provide suggestions for organizers of future challenges and some comments on what kin… ▽ More
Submitted 1 July, 2013; originally announced July 2013.
Comments: 8 pages, 2 figures
-
arXiv:1306.6412 [pdf, ps, other]
Decision Taking versus Promise Issuing
Abstract: An alignment is developed between the terminology of outcome oriented decision taking and a terminology for promise issuing. Differences and correspondences are investigated between the concepts of decision and promise. For decision taking, two forms are distinguished: the external outcome delivering form and internalized decision taking. Internalized decision taking is brought in connection wit… ▽ More
Submitted 27 June, 2013; originally announced June 2013.
Comments: 29 pages
-
Hyperparameter Optimization and Boosting for Classifying Facial Expressions: How good can a "Null" Model be?
Abstract: One of the goals of the ICML workshop on representation and learning is to establish benchmark scores for a new data set of labeled facial expressions. This paper presents the performance of a "Null" model consisting of convolutions with random weights, PCA, pooling, normalization, and a linear readout. Our approach focused on hyperparameter optimization rather than novel model components. On the… ▽ More
Submitted 14 June, 2013; originally announced June 2013.
Comments: Presented at the Workshop on Representation and Learning, ICML 2013
-
arXiv:1305.5956 [pdf, ps, other]
Questions related to Bitcoin and other Informational Money
Abstract: A collection of questions about Bitcoin and its hypothetical relatives Bitguilder and Bitpenny is formulated. These questions concern technical issues about protocols, security issues, issues about the formalizations of informational monies in various contexts, and issues about forms of use and misuse. Some questions are formulated in the more general setting of informational monies and near-monie… ▽ More
Submitted 26 December, 2013; v1 submitted 25 May, 2013; originally announced May 2013.
Comments: 31 pages. In v2 the section on patterns for use and misuse has been improved and expanded with so-called contaminations. Other small improvements were made and 13 additional references have been included
-
arXiv:1304.4758 [pdf, ps, other]
Bitcoin and Beyond: Exclusively Informational Monies
Abstract: The famous new money Bitcoin is classified as a technical informational money (TIM). Besides introducing the idea of a TIM, a more extreme notion of informational money will be developed: exclusively informational money (EXIM). The informational coins (INCOs) of an EXIM can be in control of an agent but are not owned by any agent. INCOs of an EXIM cannot be stolen, but they can be lost, or throw… ▽ More
Submitted 30 December, 2013; v1 submitted 17 April, 2013; originally announced April 2013.
Comments: 82 pages. Revision of v2: the Paragraph on monopresence and pseudomonopresence has been improved and extended; the paragraph on units for monies of account has been extended; several minor clarifications have been included; 8 additional references were added; improvements were made of small errors throughout the paper