-
Merlin: A Vision Language Foundation Model for 3D Computed Tomography
Authors:
Louis Blankemeier,
Joseph Paul Cohen,
Ashwin Kumar,
Dave Van Veen,
Syed Jamal Safdar Gardezi,
Magdalini Paschali,
Zhihong Chen,
Jean-Benoit Delbrouck,
Eduardo Reis,
Cesar Truyts,
Christian Bluethgen,
Malte Engmann Kjeldskov Jensen,
Sophie Ostmeier,
Maya Varma,
Jeya Maria Jose Valanarasu,
Zhongnan Fang,
Zepeng Huo,
Zaid Nabulsi,
Diego Ardila,
Wei-Hung Weng,
Edson Amaro Junior,
Neera Ahuja,
Jason Fries,
Nigam H. Shah,
Andrew Johnston
, et al. (6 additional authors not shown)
Abstract:
Over 85 million computed tomography (CT) scans are performed annually in the US, of which approximately one quarter focus on the abdomen. Given the current radiologist shortage, there is a large impetus to use artificial intelligence to alleviate the burden of interpreting these complex imaging studies. Prior state-of-the-art approaches for automated medical image interpretation leverage vision la…
▽ More
Over 85 million computed tomography (CT) scans are performed annually in the US, of which approximately one quarter focus on the abdomen. Given the current radiologist shortage, there is a large impetus to use artificial intelligence to alleviate the burden of interpreting these complex imaging studies. Prior state-of-the-art approaches for automated medical image interpretation leverage vision language models (VLMs). However, current medical VLMs are generally limited to 2D images and short reports, and do not leverage electronic health record (EHR) data for supervision. We introduce Merlin - a 3D VLM that we train using paired CT scans (6+ million images from 15,331 CTs), EHR diagnosis codes (1.8+ million codes), and radiology reports (6+ million tokens). We evaluate Merlin on 6 task types and 752 individual tasks. The non-adapted (off-the-shelf) tasks include zero-shot findings classification (31 findings), phenotype classification (692 phenotypes), and zero-shot cross-modal retrieval (image to findings and image to impressions), while model adapted tasks include 5-year disease prediction (6 diseases), radiology report generation, and 3D semantic segmentation (20 organs). We perform internal validation on a test set of 5,137 CTs, and external validation on 7,000 clinical CTs and on two public CT datasets (VerSe, TotalSegmentator). Beyond these clinically-relevant evaluations, we assess the efficacy of various network architectures and training strategies to depict that Merlin has favorable performance to existing task-specific baselines. We derive data scaling laws to empirically assess training data needs for requisite downstream task performance. Furthermore, unlike conventional VLMs that require hundreds of GPUs for training, we perform all training on a single GPU.
△ Less
Submitted 10 June, 2024;
originally announced June 2024.
-
Large Language Models Enable Automated Formative Feedback in Human-Robot Interaction Tasks
Authors:
Emily Jensen,
Sriram Sankaranarayanan,
Bradley Hayes
Abstract:
We claim that LLMs can be paired with formal analysis methods to provide accessible, relevant feedback for HRI tasks. While logic specifications are useful for defining and assessing a task, these representations are not easily interpreted by non-experts. Luckily, LLMs are adept at generating easy-to-understand text that explains difficult concepts. By integrating task assessment outcomes and othe…
▽ More
We claim that LLMs can be paired with formal analysis methods to provide accessible, relevant feedback for HRI tasks. While logic specifications are useful for defining and assessing a task, these representations are not easily interpreted by non-experts. Luckily, LLMs are adept at generating easy-to-understand text that explains difficult concepts. By integrating task assessment outcomes and other contextual information into an LLM prompt, we can effectively synthesize a useful set of recommendations for the learner to improve their performance.
△ Less
Submitted 25 May, 2024;
originally announced May 2024.
-
Automated Assessment and Adaptive Multimodal Formative Feedback Improves Psychomotor Skills Training Outcomes in Quadrotor Teleoperation
Authors:
Emily Jensen,
Sriram Sankaranarayanan,
Bradley Hayes
Abstract:
The workforce will need to continually upskill in order to meet the evolving demands of industry, especially working with robotic and autonomous systems. Current training methods are not scalable and do not adapt to the skills that learners already possess. In this work, we develop a system that automatically assesses learner skill in a quadrotor teleoperation task using temporal logic task specif…
▽ More
The workforce will need to continually upskill in order to meet the evolving demands of industry, especially working with robotic and autonomous systems. Current training methods are not scalable and do not adapt to the skills that learners already possess. In this work, we develop a system that automatically assesses learner skill in a quadrotor teleoperation task using temporal logic task specifications. This assessment is used to generate multimodal feedback based on the principles of effective formative feedback. Participants perceived the feedback positively. Those receiving formative feedback viewed the feedback as more actionable compared to receiving summary statistics. Participants in the multimodal feedback condition were more likely to achieve a safe landing and increased their safe landings more over the experiment compared to other feedback conditions. Finally, we identify themes to improve adaptive feedback and discuss and how training for complex psychomotor tasks can be integrated with learning theories.
△ Less
Submitted 24 May, 2024;
originally announced May 2024.
-
HRI Curriculum for a Liberal Arts Education
Authors:
Jason R. Wilson,
Emily Jensen
Abstract:
In this paper, we discuss the opportunities and challenges of teaching a human-robot interaction course at an undergraduate liberal arts college. We provide a sample syllabus adapted from a previous version of a course.
In this paper, we discuss the opportunities and challenges of teaching a human-robot interaction course at an undergraduate liberal arts college. We provide a sample syllabus adapted from a previous version of a course.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
GPT-4 Generated Narratives of Life Events using a Structured Narrative Prompt: A Validation Study
Authors:
Christopher J. Lynch,
Erik Jensen,
Madison H. Munro,
Virginia Zamponi,
Joseph Martinez,
Kevin O'Brien,
Brandon Feldhaus,
Katherine Smith,
Ann Marie Reinhold,
Ross Gore
Abstract:
Large Language Models (LLMs) play a pivotal role in generating vast arrays of narratives, facilitating a systematic exploration of their effectiveness for communicating life events in narrative form. In this study, we employ a zero-shot structured narrative prompt to generate 24,000 narratives using OpenAI's GPT-4. From this dataset, we manually classify 2,880 narratives and evaluate their validit…
▽ More
Large Language Models (LLMs) play a pivotal role in generating vast arrays of narratives, facilitating a systematic exploration of their effectiveness for communicating life events in narrative form. In this study, we employ a zero-shot structured narrative prompt to generate 24,000 narratives using OpenAI's GPT-4. From this dataset, we manually classify 2,880 narratives and evaluate their validity in conveying birth, death, hiring, and firing events. Remarkably, 87.43% of the narratives sufficiently convey the intention of the structured prompt. To automate the identification of valid and invalid narratives, we train and validate nine Machine Learning models on the classified datasets. Leveraging these models, we extend our analysis to predict the classifications of the remaining 21,120 narratives. All the ML models excelled at classifying valid narratives as valid, but experienced challenges at simultaneously classifying invalid narratives as invalid. Our findings not only advance the study of LLM capabilities, limitations, and validity but also offer practical insights for narrative generation and natural language processing applications.
△ Less
Submitted 8 February, 2024;
originally announced February 2024.
-
Adaptive Activation Functions for Predictive Modeling with Sparse Experimental Data
Authors:
Farhad Pourkamali-Anaraki,
Tahamina Nasrin,
Robert E. Jensen,
Amy M. Peterson,
Christopher J. Hansen
Abstract:
A pivotal aspect in the design of neural networks lies in selecting activation functions, crucial for introducing nonlinear structures that capture intricate input-output patterns. While the effectiveness of adaptive or trainable activation functions has been studied in domains with ample data, like image classification problems, significant gaps persist in understanding their influence on classif…
▽ More
A pivotal aspect in the design of neural networks lies in selecting activation functions, crucial for introducing nonlinear structures that capture intricate input-output patterns. While the effectiveness of adaptive or trainable activation functions has been studied in domains with ample data, like image classification problems, significant gaps persist in understanding their influence on classification accuracy and predictive uncertainty in settings characterized by limited data availability. This research aims to address these gaps by investigating the use of two types of adaptive activation functions. These functions incorporate shared and individual trainable parameters per hidden layer and are examined in three testbeds derived from additive manufacturing problems containing fewer than one hundred training instances. Our investigation reveals that adaptive activation functions, such as Exponential Linear Unit (ELU) and Softplus, with individual trainable parameters, result in accurate and confident prediction models that outperform fixed-shape activation functions and the less flexible method of using identical trainable activation functions in a hidden layer. Therefore, this work presents an elegant way of facilitating the design of adaptive neural networks in scientific and engineering problems.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
ULT-model: Towards a one-legged unified locomotion template model for forward hop** with an upright trunk
Authors:
Dennis Ossadnik,
Elisabeth Jensen,
Sami Haddadin
Abstract:
While many advancements have been made in the development of template models for describing upright-trunk locomotion, the majority of the effort has been focused on the stance phase. In this paper, we develop a new compact dynamic model as a first step toward a fully unified locomotion template model (ULT-model) of an upright-trunk forward hop** system, which will also require a unified control…
▽ More
While many advancements have been made in the development of template models for describing upright-trunk locomotion, the majority of the effort has been focused on the stance phase. In this paper, we develop a new compact dynamic model as a first step toward a fully unified locomotion template model (ULT-model) of an upright-trunk forward hop** system, which will also require a unified control law in the next step. We demonstrate that all locomotion subfunctions are enabled by adding just a point foot mass and a parallel leg actuator to the well-known trunk SLIP model and that a stable limit cycle can be achieved. This brings us closer toward the ultimate goal of enabling closed-loop dynamics for anchor matching and thus achieving simple, efficient, robust and stable upright-trunk gait control, as observed in biological systems.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Nonlinear stiffness allows passive dynamic hop** for one-legged robots with an upright trunk
Authors:
Dennis Ossadnik,
Elisabeth Jensen,
Sami Haddadin
Abstract:
Template models are frequently used to simplify the control dynamics for robot hop** or running. Passive limit cycles can emerge for such systems and be exploited for energy-efficient control. A grand challenge in locomotion is trunk stabilization when the hip is offset from the center of mass (CoM). The swing phase plays a major role in this process due to the moment of inertia of the leg; howe…
▽ More
Template models are frequently used to simplify the control dynamics for robot hop** or running. Passive limit cycles can emerge for such systems and be exploited for energy-efficient control. A grand challenge in locomotion is trunk stabilization when the hip is offset from the center of mass (CoM). The swing phase plays a major role in this process due to the moment of inertia of the leg; however, many template models ignore the leg mass. In this work, the authors consider a robot hopper model (RHM) with a rigid trunk and leg plus a hip that is displaced from the CoM. It has been previously shown that no passive limit cycle exists for such a model given a linear hip spring. In this work, we show that passive limit cycles can be found when a nonlinear hip spring is used instead. To the authors' knowledge, this is the first time that a passive limit cycle has been found for this type of system.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Mathematical Models of Human Drivers Using Artificial Risk Fields
Authors:
Emily Jensen,
Maya Luster,
Hansol Yoon,
Brandon Pitts,
Sriram Sankaranarayanan
Abstract:
In this paper, we use the concept of artificial risk fields to predict how human operators control a vehicle in response to upcoming road situations. A risk field assigns a non-negative risk measure to the state of the system in order to model how close that state is to violating a safety property, such as hitting an obstacle or exiting the road. Using risk fields, we construct a stochastic model…
▽ More
In this paper, we use the concept of artificial risk fields to predict how human operators control a vehicle in response to upcoming road situations. A risk field assigns a non-negative risk measure to the state of the system in order to model how close that state is to violating a safety property, such as hitting an obstacle or exiting the road. Using risk fields, we construct a stochastic model of the operator that maps from states to likely actions. We demonstrate our approach on a driving task wherein human subjects are asked to drive a car inside a realistic driving simulator while avoiding obstacles placed on the road. We show that the most likely risk field given the driving data is obtained by solving a convex optimization problem. Next, we apply the inferred risk fields to generate distinct driving behaviors while comparing predicted trajectories against ground truth measurements. We observe that the risk fields are excellent at predicting future trajectory distributions with high prediction accuracy for up to twenty seconds prediction horizons. At the same time, we observe some challenges such as the inability to account for how drivers choose to accelerate/decelerate based on the road conditions.
△ Less
Submitted 31 August, 2022; v1 submitted 24 May, 2022;
originally announced May 2022.
-
Autonomous Multirobot Technologies for Mars Mining Base Construction and Operation
Authors:
Jekan Thangavelautham,
Aman Chandra,
Erik Jensen
Abstract:
Beyond space exploration, the next critical step towards living and working in space requires develo** a space economy. One important challenge with this space-economy is ensuring the low-cost transport of raw materials from one gravity-well to another. The escape delta-v of 11.2 km/s from Earth makes this proposition very expensive. Transporting materials from the Moon takes 2.4 km/s and from M…
▽ More
Beyond space exploration, the next critical step towards living and working in space requires develo** a space economy. One important challenge with this space-economy is ensuring the low-cost transport of raw materials from one gravity-well to another. The escape delta-v of 11.2 km/s from Earth makes this proposition very expensive. Transporting materials from the Moon takes 2.4 km/s and from Mars 5.0 km/s. Based on these factors, the Moon and Mars can become colonies to export material into this space economy. One critical question is what are the resources required to sustain a space economy? Water has been identified as a critical resource both to sustain human-life but also for use in propulsion, attitude-control, power, thermal storage and radiation protection systems. Water may be obtained off-world through In-Situ Resource Utilization (ISRU) in the course of human or robotic space exploration. Based upon these important findings, we developed an energy model to determine the feasibility of develo** a mining base on Mars that mines and exports water (transports water on a Mars escape trajectory). Our designs for a mining base utilize renewable energy sources namely photovoltaics and solar-thermal concentrators to provide power to construct the base, keep it operational and export the water using a mass driver (electrodynamic railgun). Our studies found the key to kee** the mining base simple and effective is to make it robotic. Teams of robots (consisting of 100 infrastructure robots) would be used to construct the entire base using locally available resources and fully operate the base. This would decrease energy needs by 5-folds. Furthermore, the base can be built 5-times faster using robotics and 3D printing. This shows that automation and robotics is the key to making such a base technologically feasible.
△ Less
Submitted 9 October, 2019;
originally announced October 2019.
-
Network Traffic Driven Storage Repair
Authors:
Danilo Gligoroski,
Katina Kralevska,
Rune E. Jensen,
Per Simonsen
Abstract:
Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with bot…
▽ More
Recently we constructed an explicit family of locally repairable and locally regenerating codes. Their existence was proven by Kamath et al. but no explicit construction was given. Our design is based on HashTag codes that can have different sub-packetization levels. In this work we emphasize the importance of having two ways to repair a node: repair only with local parity nodes or repair with both local and global parity nodes. We say that the repair strategy is network traffic driven since it is in connection with the concrete system and code parameters: the repair bandwidth of the code, the number of I/O operations, the access time for the contacted parts and the size of the stored file. We show the benefits of having repair duality in one practical example implemented in Hadoop. We also give algorithms for efficient repair of the global parity nodes.
△ Less
Submitted 25 June, 2018; v1 submitted 9 March, 2018;
originally announced March 2018.
-
A Viscoelastic Catastrophe
Authors:
Kristian Ejlebjerg Jensen,
Peter Szabo,
Fridolin Okkels
Abstract:
We use a differential constitutive equation to model the flow of a viscoelastic flow in a cross-slot geometry, which is known to exhibit bistability above a critical flow rate. The novelty lies in two asymmetric modifications to the geometry, which causes a change in the bifurcation diagram such that one of the stable solutions becomes disconnected from the solution at low flow speeds. First we sh…
▽ More
We use a differential constitutive equation to model the flow of a viscoelastic flow in a cross-slot geometry, which is known to exhibit bistability above a critical flow rate. The novelty lies in two asymmetric modifications to the geometry, which causes a change in the bifurcation diagram such that one of the stable solutions becomes disconnected from the solution at low flow speeds. First we show that it is possible to mirror one of the modifications such that the system can be forced to the disconnected solution. Then we show that a slow decrease of the flow rate, can cause the system to go through a drastic change on a short time scale, also known as a catastrophe. The short time scale could lead to a precise and simple experimental measurement of the flow conditions at which the viscoelastic catastrophe occurs. Since the phenomena is intrinsically related to the extensional rheology of the fluid, we propose to exploit the phenomena for in-line extensional rheometry.
△ Less
Submitted 9 February, 2018;
originally announced February 2018.
-
Repair Duality with Locally Repairable and Locally Regenerating Codes
Authors:
Danilo Gligoroski,
Katina Kralevska,
Rune E. Jensen,
Per Simonsen
Abstract:
We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level)…
▽ More
We construct an explicit family of locally repairable and locally regenerating codes whose existence was proven in a recent work by Kamath et al. about codes with local regeneration but no explicit construction was given. This explicit family of codes is based on HashTag codes. HashTag codes are recently defined vector codes with different vector length $α$ (also called a sub-packetization level) that achieve the optimal repair bandwidth of MSR codes or near-optimal repair bandwidth depending on the sub-packetization level. We applied the technique of parity-splitting code construction. We show that the lower bound on the size of the finite field for the presented explicit code constructions can be lower than the one given in the work of Kamath et al. Finally, we discuss the importance of having two ways for node repair with locally regenerating HashTag codes: repair only with local parity nodes or repair with both local and global parity nodes. To the best of the authors' knowledge, this is the first work where this duality in repair process is discussed. We give a practical example and experimental results in Hadoop where we show the benefits of having this repair duality.
△ Less
Submitted 30 August, 2017; v1 submitted 23 January, 2017;
originally announced January 2017.
-
HashTag Erasure Codes: From Theory to Practice
Authors:
Katina Kralevska,
Danilo Gligoroski,
Rune E. Jensen,
Harald Øverby
Abstract:
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS co…
▽ More
Minimum-Storage Regenerating (MSR) codes have emerged as a viable alternative to Reed-Solomon (RS) codes as they minimize the repair bandwidth while they are still optimal in terms of reliability and storage overhead. Although several MSR constructions exist, so far they have not been practically implemented mainly due to the big number of I/O operations. In this paper, we analyze high-rate MDS codes that are simultaneously optimized in terms of storage, reliability, I/O operations, and repair-bandwidth for single and multiple failures of the systematic nodes. The codes were recently introduced in \cite{7463553} without any specific name. Due to the resemblance between the hashtag sign \# and the procedure of the code construction, we call them in this paper \emph{HashTag Erasure Codes (HTECs)}. HTECs provide the lowest data-read and data-transfer, and thus the lowest repair time for an arbitrary sub-packetization level $α$, where $α\leq r^{\lceil \sfrac{k}{r} \rceil}$, among all existing MDS codes for distributed storage including MSR codes. The repair process is linear and highly parallel. Additionally, we show that HTECs are the first high-rate MDS codes that reduce the repair bandwidth for more than one failure. Practical implementations of HTECs in Hadoop release 3.0.0-alpha2 demonstrate their great potentials.
△ Less
Submitted 3 July, 2017; v1 submitted 8 September, 2016;
originally announced September 2016.
-
Simulating Viscous Fingering with a Timespace Method and Anisotropic Mesh Adaptation
Authors:
Kristian E. Jensen
Abstract:
We report findings related to a two dimensional viscous fingering problem solved with a timespace method and anisotropic elements. Timespace methods have attracted interest for solution of time dependent partial differential equations due to the implications of parallelism in the temporal dimension, but there are also attractive features in the context of anisotropic mesh adaptation; not only are…
▽ More
We report findings related to a two dimensional viscous fingering problem solved with a timespace method and anisotropic elements. Timespace methods have attracted interest for solution of time dependent partial differential equations due to the implications of parallelism in the temporal dimension, but there are also attractive features in the context of anisotropic mesh adaptation; not only are heuristics and interpolation errors avoided, but slanted elements in timespace also correspond to long and accurate timesteps, i.e. the anisotropy in timespace can be exploited. We show that our timespace method is restricted by a minimum timestep size, which is due to the growth of numerical perturbations. The lower bound on the timestep is, however, quite high, which is indicative that the number of timesteps can be reduced with several orders of magnitude for practical applications.
△ Less
Submitted 17 August, 2015;
originally announced August 2015.
-
Implementation of the Log-Conformation Formulation for Two-Dimensional Viscoelastic Flow
Authors:
K. E. Jensen,
P. Szabo,
F. Okkels
Abstract:
We have implemented the log-conformation method for two-dimensional viscoelastic flow in COMSOL, a commercial high-level finite element package. The code is verified for an Oldroyd-B fluid flowing past a confined cylinder. We are also able to describe the well-known bistability of the viscoelastic flow in a cross-slot geometry for a FENE-CR fluid, and we describe the changes required for performin…
▽ More
We have implemented the log-conformation method for two-dimensional viscoelastic flow in COMSOL, a commercial high-level finite element package. The code is verified for an Oldroyd-B fluid flowing past a confined cylinder. We are also able to describe the well-known bistability of the viscoelastic flow in a cross-slot geometry for a FENE-CR fluid, and we describe the changes required for performing simulations with the Phan-Thien-Tanner (PTT), Giesekus and FENE-P models. Finally, we calculate the flow of a FENE-CR fluid in a geometry with three in- and outlets. The implementation is included in the supplementary material, and we hope that it can inspire new as well as experienced researchers in the field of differential constitutive equations for viscoelastic flow.
△ Less
Submitted 20 April, 2016; v1 submitted 5 August, 2015;
originally announced August 2015.
-
Thread Parallelism for Highly Irregular Computation in Anisotropic Mesh Adaptation
Authors:
Georgios Rokos,
Gerard J. Gorman,
Kristian Ejlebjerg Jensen,
Paul H. J. Kelly
Abstract:
Thread-level parallelism in irregular applications with mutable data dependencies presents challenges because the underlying data is extensively modified during execution of the algorithm and a high degree of parallelism must be realized while kee** the code race-free. In this article we describe a methodology for exploiting thread parallelism for a class of graph-mutating worklist algorithms, w…
▽ More
Thread-level parallelism in irregular applications with mutable data dependencies presents challenges because the underlying data is extensively modified during execution of the algorithm and a high degree of parallelism must be realized while kee** the code race-free. In this article we describe a methodology for exploiting thread parallelism for a class of graph-mutating worklist algorithms, which guarantees safe parallel execution via processing in rounds of independent sets and using a deferred update strategy to commit changes in the underlying data structures. Scalability is assisted by atomic fetch-and-add operations to create worklists and work-stealing to balance the shared-memory workload. This work is motivated by mesh adaptation algorithms, for which we show a parallel efficiency of 60% and 50% on Intel(R) Xeon(R) Sandy Bridge and AMD Opteron(tm) Magny-Cours systems, respectively, using these techniques.
△ Less
Submitted 18 May, 2015;
originally announced May 2015.
-
Model Selection for Degree-corrected Block Models
Authors:
Xiaoran Yan,
Cosma Rohilla Shalizi,
Jacob E. Jensen,
Florent Krzakala,
Cristopher Moore,
Lenka Zdeborova,
Pan Zhang,
Yaojia Zhu
Abstract:
The proliferation of models for networks raises challenging problems of model selection: the data are sparse and globally dependent, and models are typically high-dimensional and have large numbers of latent variables. Together, these issues mean that the usual model-selection criteria do not work properly for networks. We illustrate these challenges, and show one way to resolve them, by consideri…
▽ More
The proliferation of models for networks raises challenging problems of model selection: the data are sparse and globally dependent, and models are typically high-dimensional and have large numbers of latent variables. Together, these issues mean that the usual model-selection criteria do not work properly for networks. We illustrate these challenges, and show one way to resolve them, by considering the key network-analysis problem of dividing a graph into communities or blocks of nodes with homogeneous patterns of links to the rest of the network. The standard tool for doing this is the stochastic block model, under which the probability of a link between two nodes is a function solely of the blocks to which they belong. This imposes a homogeneous degree distribution within each block; this can be unrealistic, so degree-corrected block models add a parameter for each node, modulating its over-all degree. The choice between ordinary and degree-corrected block models matters because they make very different inferences about communities. We present the first principled and tractable approach to model selection between standard and degree-corrected block models, based on new large-graph asymptotics for the distribution of log-likelihood ratios under the stochastic block model, finding substantial departures from classical results for sparse graphs. We also develop linear-time approximations for log-likelihoods under both the stochastic block model and the degree-corrected model, using belief propagation. Applications to simulated and real networks show excellent agreement with our approximations. Our results thus both solve the practical problem of deciding on degree correction, and point to a general approach to model selection in network analysis.
△ Less
Submitted 30 May, 2013; v1 submitted 17 July, 2012;
originally announced July 2012.
-
The Digital Signature Scheme MQQ-SIG
Authors:
Danilo Gligoroski,
Svein Johan Knapskog,
Smile Markovski,
Rune Steinsmo Ødegård,
Rune Erlend Jensen,
Ludovic Perret,
Jean-Charles Faugère
Abstract:
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of $n - \frac{n}{4}$ quadratic polynomials with $n$ Boolean variables where n=160, 196, 224 or 256.
This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of $n - \frac{n}{4}$ quadratic polynomials with $n$ Boolean variables where n=160, 196, 224 or 256.
△ Less
Submitted 15 October, 2010;
originally announced October 2010.