-
Compositional imprecise probability
Authors:
Jack Liell-Cock,
Sam Staton
Abstract:
Imprecise probability is concerned with uncertainty about which probability distributions to use. It has applications in robust statistics and elsewhere. Imprecise probability can be modelled in various ways, including by convex sets of probability distributions.
We look at programming language models for imprecise probability. Our desiderata are that we would like our model to support all kinds…
▽ More
Imprecise probability is concerned with uncertainty about which probability distributions to use. It has applications in robust statistics and elsewhere. Imprecise probability can be modelled in various ways, including by convex sets of probability distributions.
We look at programming language models for imprecise probability. Our desiderata are that we would like our model to support all kinds of composition, categorical and monoidal, in other words, guided by dataflow diagrams. Another equivalent perspective is that we would like a model of synthetic probability in the sense of Markov categories.
There is already a fairly popular monad-based approach to imprecise probability, but it is not fully compositional because the monad involved is not commutative, which means that we do not have a proper monoidal structure. In this work, we provide a new fully compositional account. The key idea is to name the non-deterministic choices. To manage the renamings and disjointness of names, we use graded monads. We show that the resulting compositional model is maximal. We relate with the earlier monad approach, showing that we obtain tighter bounds on the uncertainty.
△ Less
Submitted 15 May, 2024;
originally announced May 2024.
-
Let a Thousand Flowers Bloom: An Algebraic Representation for Edge Graphs
Authors:
Jack Liell-Cock,
Tom Schrijvers
Abstract:
Context: Edge graphs are graphs whose edges are labelled with identifiers, and nodes can have multiple edges between them. They are used to model a wide range of systems, including networks with distances or degrees of connection and complex relational data.
Inquiry: Unfortunately, the homogeneity of this graph structure prevents an effective representation in (functional) programs. Either their…
▽ More
Context: Edge graphs are graphs whose edges are labelled with identifiers, and nodes can have multiple edges between them. They are used to model a wide range of systems, including networks with distances or degrees of connection and complex relational data.
Inquiry: Unfortunately, the homogeneity of this graph structure prevents an effective representation in (functional) programs. Either their interface is riddled with partial functions, or the representations are computationally inefficient to process.
Approach: We present a novel data type for edge graphs, based on total and recursive definitions, that prevents usage errors from partial APIs and promotes structurally recursive computations. We follow an algebraic approach and provide a set of primitive constructors and combinators, along with equational laws that identify semantically equivalent constructions.
Knowledge: This algebra translates directly into an implementation using algebraic data types, and its homomorphisms give rise to functions for manipulating and transforming these edge graphs.
Grounding: We exploit the fact that many common graph algorithms are such homomorphisms to implement them in our framework.
Importance: In giving a theoretical grounding for the edge graph data type, we can formalise properties such as soundness and completeness of the representation while also minimising usage errors and maximising re-usability.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Preserving Privacy of the Influence Structure in Friedkin-Johnsen Systems
Authors:
Jack Liell-Cock,
Ian R. Manchester,
Guodong Shi
Abstract:
The nature of information sharing in common distributed consensus algorithms permits network eavesdroppers to expose sensitive system information. An important parameter within distributed systems, often neglected under the scope of privacy preservation, is the influence structure - the weighting each agent places on the sources of their opinion pool. This paper proposes a local (i.e. computed ind…
▽ More
The nature of information sharing in common distributed consensus algorithms permits network eavesdroppers to expose sensitive system information. An important parameter within distributed systems, often neglected under the scope of privacy preservation, is the influence structure - the weighting each agent places on the sources of their opinion pool. This paper proposes a local (i.e. computed individually by each agent), time varying mask to prevent the discovery of the influence structure by an external observer with access to the entire information flow, network knowledge and mask formulation. This result is produced through the auxiliary demonstration of the preserved stability of a Friedkin-Johnsen system under a set of generalised conditions. The mask is developed under these constraints and involves perturbing the influence structure by decaying pseudonoise. This paper provides the information matrix of the best influence structure estimate by an eavesdropper lacking a priori knowledge and uses stochastic simulations to analyse the performance of the mask against ranging system hyperparameters.
△ Less
Submitted 5 September, 2020;
originally announced September 2020.