Skip to main content

Showing 1–33 of 33 results for author: Davies, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.18568  [pdf, other

    cs.DS cs.LG

    Warm-starting Push-Relabel

    Authors: Sami Davies, Sergei Vassilvitskii, Yuyan Wang

    Abstract: Push-Relabel is one of the most celebrated network flow algorithms. Maintaining a pre-flow that saturates a cut, it enjoys better theoretical and empirical running time than other flow algorithms, such as Ford-Fulkerson. In practice, Push-Relabel is even faster than what theoretical guarantees can promise, in part because of the use of good heuristics for seeding and updating the iterative algorit… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  2. arXiv:2402.11109  [pdf, other

    cs.DS

    Online Flexible Busy Time Scheduling on Heterogeneous Machines

    Authors: Gruia Calinescu, Sami Davies, Samir Khuller, Shirley Zhang

    Abstract: We study the online busy time scheduling model on heterogeneous machines. In our setting, unit-length jobs arrive online with a deadline that is known to the algorithm at the job's arrival time. An algorithm has access to machines, each with different associated capacities and costs. The goal is to schedule jobs on machines before their deadline, so that the total cost incurred by the scheduling a… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

  3. arXiv:2312.02659  [pdf, other

    cs.NE cs.AI

    Supervised learning of spatial features with STDP and homeostasis using Spiking Neural Networks on SpiNNaker

    Authors: Sergio Davies, Andrew Gait, Andrew Rowley, Alessandro Di Nuovo

    Abstract: Artificial Neural Networks (ANN) have gained significant popularity thanks to their ability to learn using the well-known backpropagation algorithm. Conversely, Spiking Neural Networks (SNNs), despite having broader capabilities than ANNs, have always posed challenges in the training phase. This paper shows a new method to perform supervised learning on SNNs, using Spike Timing Dependent Plasticit… ▽ More

    Submitted 24 June, 2024; v1 submitted 5 December, 2023; originally announced December 2023.

    Comments: 14 pages, 6 figures (figure 6 has 9 sub-figures) for a total of 14 images, 10 tables, submitted to the Journal of Neural Networks

  4. arXiv:2310.18011  [pdf

    cs.DL cs.HC physics.pop-ph

    Data journeys in popular science: Producing climate change and COVID-19 data visualizations at Scientific American

    Authors: Kathleen Gregory, Laura Koesten, Regina Schuster, Torsten Möller, Sarah Davies

    Abstract: Vast amounts of (open) data are increasingly used to make arguments about crisis topics such as climate change and global pandemics. Data visualizations are central to bringing these viewpoints to broader publics. However, visualizations often conceal the many contexts involved in their production, ranging from decisions made in research labs about collecting and sharing data to choices made in ed… ▽ More

    Submitted 27 March, 2024; v1 submitted 27 October, 2023; originally announced October 2023.

    Comments: 44 pages, 4 figures, 3 boxes

  5. arXiv:2308.01534  [pdf, other

    cs.DS cs.DM

    Simultaneously Approximating All $\ell_p$-norms in Correlation Clustering

    Authors: Sami Davies, Benjamin Moseley, Heather Newman

    Abstract: This paper considers correlation clustering on unweighted complete graphs. We give a combinatorial algorithm that returns a single clustering solution that is simultaneously $O(1)$-approximate for all $\ell_p$-norms of the disagreement vector; in other words, a combinatorial $O(1)$-approximation of the all-norms objective for correlation clustering. This is the first proof that minimal sacrifice i… ▽ More

    Submitted 9 March, 2024; v1 submitted 3 August, 2023; originally announced August 2023.

    Comments: 27 pages, 2 figures

  6. arXiv:2305.18852  [pdf, other

    cs.CR

    Majority Voting Approach to Ransomware Detection

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: Crypto-ransomware remains a significant threat to governments and companies alike, with high-profile cyber security incidents regularly making headlines. Many different detection systems have been proposed as solutions to the ever-changing dynamic landscape of ransomware detection. In the majority of cases, these described systems propose a method based on the result of a single test performed on… ▽ More

    Submitted 30 May, 2023; originally announced May 2023.

    Comments: 17 pages

  7. arXiv:2304.10544  [pdf, other

    cs.HC

    What is the message? Perspectives on Visual Data Communication

    Authors: Laura Koesten, Kathleen Gregory, Regina Schuster, Christian Knoll, Sarah Davies, Torsten Möller

    Abstract: Data visualizations are used to communicate messages to diverse audiences. It is unclear whether interpretations of these visualizations match the messages their creators aim to convey. In a mixed-methods study, we investigate how data in the popular science magazine Scientific American are visually communicated and understood. We first analyze visualizations about climate change and pandemics pub… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

  8. arXiv:2303.00837  [pdf, other

    cs.DS

    Predictive Flows for Faster Ford-Fulkerson

    Authors: Sami Davies, Benjamin Moseley, Sergei Vassilvitskii, Yuyan Wang

    Abstract: Recent work has shown that leveraging learned predictions can improve the running time of algorithms for bipartite matching and similar combinatorial problems. In this work, we build on this idea to improve the performance of the widely used Ford-Fulkerson algorithm for computing maximum flows by seeding Ford-Fulkerson with predicted flows. Our proposed method offers strong theoretical performance… ▽ More

    Submitted 1 March, 2023; originally announced March 2023.

  9. arXiv:2301.13079  [pdf, other

    cs.DS cs.DM

    Fast Combinatorial Algorithms for Min Max Correlation Clustering

    Authors: Sami Davies, Benjamin Moseley, Heather Newman

    Abstract: We introduce fast algorithms for correlation clustering with respect to the Min Max objective that provide constant factor approximations on complete graphs. Our algorithms are the first purely combinatorial approximation algorithms for this problem. We construct a novel semi-metric on the set of vertices, which we call the correlation metric, that indicates to our clustering algorithms whether pa… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

  10. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

    Authors: Simon R Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Ransomware is a malicious class of software that utilises encryption to implement an attack on system availability. The target's data remains encrypted and is held captive by the attacker until a ransom demand is met. A common approach used by many crypto-ransomware detection techniques is to monitor file system activity and attempt to identify encrypted files being written to disk, often using a… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Journal ref: Entropy. 2022; 24(10):1503

  11. arXiv:2207.08913  [pdf, other

    cs.DM cs.DS math.CO

    Robust Factorizations and Colorings of Tensor Graphs

    Authors: Joshua Brakensiek, Sami Davies

    Abstract: Since the seminal result of Karger, Motwani, and Sudan, algorithms for approximate 3-coloring have primarily centered around SDP-based rounding. However, it is likely that important combinatorial or algebraic insights are needed in order to break the $n^{o(1)}$ threshold. One way to develop new understanding in graph coloring is to study special subclasses of graphs. For instance, Blum studied the… ▽ More

    Submitted 27 November, 2023; v1 submitted 18 July, 2022; originally announced July 2022.

    Comments: 27 pages, 3 figures; accepted to SIAM Journal on Discrete Mathematics

  12. arXiv:2206.01360  [pdf, other

    cs.DS

    Balancing Flow Time and Energy Consumption

    Authors: Sami Davies, Samir Khuller, Shirley Zhang

    Abstract: In this paper, we study the following batch scheduling model: find a schedule that minimizes total flow time for $n$ uniform length jobs, with release times and deadlines, where the machine is only actively processing jobs in at most $k$ synchronized batches of size at most $B$. Prior work on such batch scheduling models has considered only feasibility with no regard to the flow time of the schedu… ▽ More

    Submitted 2 June, 2022; originally announced June 2022.

  13. NapierOne: A modern mixed file data set alternative to Govdocs1

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: It was found when reviewing the ransomware detection research literature that almost no proposal provided enough detail on how the test data set was created, or sufficient description of its actual content, to allow it to be recreated by other researchers interested in reconstructing their environment and validating the research results. A modern cybersecurity mixed file data set called NapierOne… ▽ More

    Submitted 20 January, 2022; originally announced January 2022.

    Journal ref: Forensic Science International: Digital Investigation, Volume 40, 2022, 301330, ISSN 2666-2817

  14. arXiv:2109.01064  [pdf, other

    math.PR cs.IT cs.LG math.ST

    Lower Bounds on the Total Variation Distance Between Mixtures of Two Gaussians

    Authors: Sami Davies, Arya Mazumdar, Soumyabrata Pal, Cyrus Rashtchian

    Abstract: Mixtures of high dimensional Gaussian distributions have been studied extensively in statistics and learning theory. While the total variation distance appears naturally in the sample complexity of distribution learning, it is analytically difficult to obtain tight lower bounds for mixtures. Exploiting a connection between total variation distance and the characteristic function of the mixture, we… ▽ More

    Submitted 9 March, 2022; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: 22 pages, 1 figure; Accepted to ALT 2022

  15. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

    Authors: Simon R Davies, Richard Macfarlane, William J Buchanan

    Abstract: The threat from ransomware continues to grow both in the number of affected victims as well as the cost incurred by the people and organisations impacted in a successful attack. In the majority of cases, once a victim has been attacked there remain only two courses of action open to them; either pay the ransom or lose their data. One common behaviour shared between all crypto ransomware strains is… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

    Journal ref: Computers & Security, 102377, 2021

  16. arXiv:2105.00111  [pdf, ps, other

    cs.DS

    On the Hardness of Scheduling With Non-Uniform Communication Delays

    Authors: Sami Davies, Janardhan Kulkarni, Thomas Rothvoss, Sai Sandeep, Jakub Tarnawski, Yihao Zhang

    Abstract: In the scheduling with non-uniform communication delay problem, the input is a set of jobs with precedence constraints. Associated with every precedence constraint between a pair of jobs is a communication delay, the time duration the scheduler has to wait between the two jobs if they are scheduled on different machines. The objective is to assign the jobs to machines to minimize the makespan of t… ▽ More

    Submitted 30 April, 2021; originally announced May 2021.

  17. Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

    Authors: Simon R. Davies, Richard Macfarlane, William J. Buchanan

    Abstract: Memory was captured from a system infected by ransomware and its contents was examined using live forensic tools, with the intent of identifying the symmetric encryption keys being used. NotPetya, Bad Rabbit and Phobos hybrid ransomware samples were tested during the investigation. If keys were discovered, the following two steps were also performed. Firstly, a timeline was manually created by com… ▽ More

    Submitted 19 December, 2020; v1 submitted 15 December, 2020; originally announced December 2020.

    Comments: 11 pages, 10 figures

    ACM Class: E.3; K.6.5

    Journal ref: Forensic Science International: Digital Investigation. Volume 33, June 2020, 300979

  18. arXiv:2012.06713  [pdf, ps, other

    cs.DS cs.CC cs.IT cs.LG math.PR

    Approximate Trace Reconstruction

    Authors: Sami Davies, Miklos Z. Racz, Cyrus Rashtchian, Benjamin G. Schiffer

    Abstract: In the usual trace reconstruction problem, the goal is to exactly reconstruct an unknown string of length $n$ after it passes through a deletion channel many times independently, producing a set of traces (i.e., random subsequences of the string). We consider the relaxed problem of approximate reconstruction. Here, the goal is to output a string that is close to the original one in edit distance w… ▽ More

    Submitted 16 December, 2020; v1 submitted 11 December, 2020; originally announced December 2020.

  19. arXiv:2004.09682  [pdf, ps, other

    cs.DS

    Scheduling with Communication Delays via LP Hierarchies and Clustering

    Authors: Sami Davies, Janardhan Kulkarni, Thomas Rothvoss, Jakub Tarnawski, Yihao Zhang

    Abstract: We consider the classic problem of scheduling jobs with precedence constraints on identical machines to minimize makespan, in the presence of communication delays. In this setting, denoted by $\mathsf{P} \mid \mathsf{prec}, c \mid C_{\mathsf{max}}$, if two dependent jobs are scheduled on different machines, then at least $c$ units of time must pass between their executions. Despite its relevance t… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

  20. arXiv:1902.05101  [pdf, other

    cs.CC cs.DS math.PR

    Reconstructing Trees from Traces

    Authors: Sami Davies, Miklos Z. Racz, Cyrus Rashtchian

    Abstract: We study the problem of learning a node-labeled tree given independent traces from an appropriately defined deletion channel. This problem, tree trace reconstruction, generalizes string trace reconstruction, which corresponds to the tree being a path. For many classes of trees, including complete trees and spiders, we provide algorithms that reconstruct the labels using only a polynomial number of… ▽ More

    Submitted 18 September, 2020; v1 submitted 13 February, 2019; originally announced February 2019.

    Comments: Major revisions in the new version including algorithm descriptions, more details in section 3.1, and several new figures

  21. arXiv:1811.01375  [pdf

    cs.ET physics.app-ph

    Supervised learning of an opto-magnetic neural network with ultrashort laser pulses

    Authors: A. Chakravarty, J. H. Mentink, C. S. Davies, K. T. Yamada, A. V. Kimel, Th. Rasing

    Abstract: The explosive growth of data and its related energy consumption is pushing the need to develop energy-efficient brain-inspired schemes and materials for data processing and storage. Here, we demonstrate experimentally that Co/Pt films can be used as artificial synapses by manipulating their magnetization state using circularly-polarized ultrashort optical pulses at room temperature. We also show a… ▽ More

    Submitted 28 May, 2019; v1 submitted 4 November, 2018; originally announced November 2018.

    Comments: 9 pages, 4 figures

    Journal ref: Applied Physics Letters 114, 192407 (2019)

  22. arXiv:1807.07189  [pdf, ps, other

    cs.DS cs.DM

    A Tale of Santa Claus, Hypergraphs and Matroids

    Authors: Sami Davies, Thomas Rothvoss, Yihao Zhang

    Abstract: A well-known problem in scheduling and approximation algorithms is the Santa Claus problem. Suppose that Santa Claus has a set of gifts, and he wants to distribute them among a set of children so that the least happy child is made as happy as possible. Here, the value that a child $i$ has for a present $j$ is of the form $p_{ij} \in \{ 0,p_j\}$. A polynomial time algorithm by Annamalai et al. give… ▽ More

    Submitted 7 May, 2019; v1 submitted 18 July, 2018; originally announced July 2018.

  23. arXiv:1806.08476  [pdf, ps, other

    cs.FL

    A General Approach to State Complexity of Operations: Formalization and Limitations

    Authors: Sylvie Davies

    Abstract: The state complexity of the result of a regular operation is often positively correlated with the number of distinct transformations induced by letters in the minimal deterministic finite automaton of the input languages. That is, more transformations in the inputs means higher state complexity in the output. When this correlation holds, the state complexity of a unary operation can be maximized u… ▽ More

    Submitted 5 September, 2018; v1 submitted 21 June, 2018; originally announced June 2018.

    Comments: 27 pages, 1 figure. Short version (covering just the case of unary operations) accepted to DLT 2018. Introduction has been expanded to give a more complete historical overview of the ideas in the paper

  24. arXiv:1806.04645  [pdf, ps, other

    cs.FL

    State Complexity of Pattern Matching in Regular Languages

    Authors: Janusz A. Brzozowski, Sylvie Davies, Abhishek Madan

    Abstract: In a simple pattern matching problem one has a pattern $w$ and a text $t$, which are words over a finite alphabet $Σ$. One may ask whether $w$ occurs in $t$, and if so, where? More generally, we may have a set $P$ of patterns and a set $T$ of texts, where $P$ and $T$ are regular languages. We are interested whether any word of $T$ begins with a word of $P$, ends with a word of $P$, has a word of… ▽ More

    Submitted 4 November, 2018; v1 submitted 12 June, 2018; originally announced June 2018.

    Comments: 30 pages, 17 figures

  25. arXiv:1711.09149  [pdf, ps, other

    cs.FL

    Most Complex Deterministic Union-Free Regular Languages

    Authors: Janusz A. Brzozowski, Sylvie Davies

    Abstract: A regular language $L$ is union-free if it can be represented by a regular expression without the union operation. A union-free language is deterministic if it can be accepted by a deterministic one-cycle-free-path finite automaton; this is an automaton which has one final state and exactly one cycle-free path from any state to the final state. Jirásková and Masopust proved that the state complexi… ▽ More

    Submitted 2 January, 2018; v1 submitted 24 November, 2017; originally announced November 2017.

    Comments: 12 pages, 3 Figures. This version corrects an error in the proof of Theorem 1 (7c). arXiv admin note: text overlap with arXiv:1701.03944

  26. arXiv:1710.05061  [pdf, ps, other

    cs.FL

    A New Technique for Reachability of States in Concatenation Automata

    Authors: Sylvie Davies

    Abstract: We present a new technique for demonstrating the reachability of states in deterministic finite automata representing the concatenation of two languages. Such demonstrations are a necessary step in establishing the state complexity of the concatenation of two languages, and thus in establishing the state complexity of concatenation as an operation. Typically, ad-hoc induction arguments are used to… ▽ More

    Submitted 17 October, 2017; v1 submitted 13 October, 2017; originally announced October 2017.

    Comments: 23 pages, 1 table. Added missing affiliation/funding information

  27. arXiv:1705.07150  [pdf, ps, other

    cs.FL

    State Complexity of Reversals of Deterministic Finite Automata with Output

    Authors: Sylvie Davies

    Abstract: We investigate the worst-case state complexity of reversals of deterministic finite automata with output (DFAOs). In these automata, each state is assigned some output value, rather than simply being labelled final or non-final. This directly generalizes the well-studied problem of determining the worst-case state complexity of reversals of ordinary deterministic finite automata. If a DFAO has… ▽ More

    Submitted 17 October, 2017; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 18 pages, 3 tables. Added missing affiliation/funding information

  28. Primitivity, Uniform Minimality and State Complexity of Boolean Operations

    Authors: Sylvie Davies

    Abstract: A minimal deterministic finite automaton (DFA) is uniformly minimal if it always remains minimal when the final state set is replaced by a non-empty proper subset of the state set. We prove that a permutation DFA is uniformly minimal if and only if its transition monoid is a primitive group. We use this to study boolean operations on group languages, which are recognized by direct products of perm… ▽ More

    Submitted 26 March, 2018; v1 submitted 2 February, 2017; originally announced February 2017.

    Comments: 46 pages, 5 figures. Expanded version published in Theory of Computing Systems (https://doi.org/10.1007/s00224-018-9859-0); also available at http://rdcu.be/JQDs via Springer Nature SharedIt. The present arXiv version corrects errors in the statements and proofs of Theorem 2 and Corollary 3 (these errors are also fixed in the journal version)

  29. arXiv:1701.03944  [pdf, ps, other

    cs.FL

    Most Complex Non-Returning Regular Languages

    Authors: Janusz A. Brzozowski, Sylvie Davies

    Abstract: A regular language $L$ is non-returning if in the minimal deterministic finite automaton accepting it there are no transitions into the initial state. Eom, Han and Jirásková derived upper bounds on the state complexity of boolean operations and Kleene star, and proved that these bounds are tight using two different binary witnesses. They derived upper bounds for concatenation and reversal using th… ▽ More

    Submitted 14 January, 2017; originally announced January 2017.

    Comments: 22 pages, 6 figures

  30. Most Complex Regular Ideal Languages

    Authors: Janusz Brzozowski, Sylvie Davies, Bo Yang Victor Liu

    Abstract: A right ideal (left ideal, two-sided ideal) is a non-empty language $L$ over an alphabet $Σ$ such that $L=LΣ^*$ ($L=Σ^*L$, $L=Σ^*LΣ^*$). Let $k=3$ for right ideals, 4 for left ideals and 5 for two-sided ideals. We show that there exist sequences ($L_n \mid n \ge k $) of right, left, and two-sided regular ideals, where $L_n$ has quotient complexity (state complexity) $n$, such that $L_n$ is most co… ▽ More

    Submitted 13 October, 2016; v1 submitted 31 October, 2015; originally announced November 2015.

    Comments: 25 pages, 11 figures. To appear in Discrete Mathematics and Theoretical Computer Science. arXiv admin note: text overlap with arXiv:1311.4448

    Journal ref: Discrete Mathematics & Theoretical Computer Science, Vol. 18 no. 3, Automata, Logic and Semantics (October 17, 2016) dmtcs:1343

  31. arXiv:1503.02208  [pdf, ps, other

    cs.FL

    Quotient Complexities of Atoms in Regular Ideal Languages

    Authors: Janusz Brzozowski, Sylvie Davies

    Abstract: A (left) quotient of a language $L$ by a word $w$ is the language $w^{-1}L=\{x\mid wx\in L\}$. The quotient complexity of a regular language $L$ is the number of quotients of $L$; it is equal to the state complexity of $L$, which is the number of states in a minimal deterministic finite automaton accepting $L$. An atom of $L$ is an equivalence class of the relation in which two words are equivalen… ▽ More

    Submitted 23 May, 2015; v1 submitted 7 March, 2015; originally announced March 2015.

    Comments: 17 pages, 4 figures, two tables

  32. arXiv:1301.3852  [pdf

    cs.LG cs.AI stat.ML

    Mix-nets: Factored Mixtures of Gaussians in Bayesian Networks With Mixed Continuous And Discrete Variables

    Authors: Scott Davies, Andrew Moore

    Abstract: Recently developed techniques have made it possible to quickly learn accurate probability density functions from data in low-dimensional continuous space. In particular, mixtures of Gaussians can be fitted to data very quickly using an accelerated EM algorithm that employs multiresolution kd-trees (Moore, 1999). In this paper, we propose a kind of Bayesian networks in which low-dimensional mixture… ▽ More

    Submitted 16 January, 2013; originally announced January 2013.

    Comments: Appears in Proceedings of the Sixteenth Conference on Uncertainty in Artificial Intelligence (UAI2000)

    Report number: UAI-P-2000-PG-168-175

  33. arXiv:1301.0563  [pdf

    cs.LG cs.AI stat.ML

    Interpolating Conditional Density Trees

    Authors: Scott Davies, Andrew Moore

    Abstract: Joint distributions over many variables are frequently modeled by decomposing them into products of simpler, lower-dimensional conditional distributions, such as in sparsely connected Bayesian networks. However, automatically learning such models can be very computationally expensive when there are many datapoints and many continuous variables with complex nonlinear relationships, particularly wh… ▽ More

    Submitted 12 December, 2012; originally announced January 2013.

    Comments: Appears in Proceedings of the Eighteenth Conference on Uncertainty in Artificial Intelligence (UAI2002)

    Report number: UAI-P-2002-PG-119-127