Skip to main content

Showing 1–12 of 12 results for author: Szanto, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2004.07641  [pdf, other

    cs.LG cs.SI physics.soc-ph q-bio.PE stat.ML

    Quantifying the Effects of Contact Tracing, Testing, and Containment Measures in the Presence of Infection Hotspots

    Authors: Lars Lorch, Heiner Kremer, William Trouleau, Stratis Tsirtsis, Aron Szanto, Bernhard Schölkopf, Manuel Gomez-Rodriguez

    Abstract: Multiple lines of evidence strongly suggest that infection hotspots, where a single individual infects many others, play a key role in the transmission dynamics of COVID-19. However, most of the existing epidemiological models fail to capture this aspect by neither representing the sites visited by individuals explicitly nor characterizing disease transmission as a function of individual mobility… ▽ More

    Submitted 10 November, 2022; v1 submitted 15 April, 2020; originally announced April 2020.

    Comments: ACM Transactions on Spatial Algorithms and Systems

  2. arXiv:2002.04707  [pdf, other

    cs.SC math.AG math.NA

    Smooth Points on Semi-algebraic Sets

    Authors: Katherine Harris, Jonathan D. Hauenstein, Agnes Szanto

    Abstract: Many algorithms for determining properties of real algebraic or semi-algebraic sets rely upon the ability to compute smooth points. Existing methods to compute smooth points on semi-algebraic sets use symbolic quantifier elimination tools. In this paper, we present a simple algorithm based on computing the critical points of some well-chosen function that guarantees the computation of smooth point… ▽ More

    Submitted 19 May, 2023; v1 submitted 11 February, 2020; originally announced February 2020.

    Journal ref: Journal of Symbolic Computation 116 (2023) 183-212

  3. arXiv:2002.00850  [pdf, other

    cs.SI cs.LG stat.ML

    A Kernel of Truth: Determining Rumor Veracity on Twitter by Diffusion Pattern Alone

    Authors: Nir Rosenfeld, Aron Szanto, David C. Parkes

    Abstract: Recent work in the domain of misinformation detection has leveraged rich signals in the text and user identities associated with content on social media. But text can be strategically manipulated and accounts reopened under different aliases, suggesting that these approaches are inherently brittle. In this work, we investigate an alternative modality that is naturally robust: the pattern in which… ▽ More

    Submitted 6 February, 2020; v1 submitted 28 January, 2020; originally announced February 2020.

    Comments: Published at The Web Conference (WWW) 2020

  4. arXiv:1812.11789  [pdf, ps, other

    cs.SC math.CA

    Subresultants of $(x-α)^m$ and $(x-β)^n$, Jacobi polynomials and complexity

    Authors: A. Bostan, T. Krick, A. Szanto, M. Valdettaro

    Abstract: In an earlier article together with Carlos D'Andrea [BDKSV2017], we described explicit expressions for the coefficients of the order-$d$ polynomial subresultant of $(x-α)^m$ and $(x-β)^n $ with respect to Bernstein's set of polynomials $\{(x-α)^j(x-β)^{d-j}, \, 0\le j\le d\}$, for $0\le d<\min\{m, n\}$. The current paper further develops the study of these structured polynomials and shows that the… ▽ More

    Submitted 5 October, 2019; v1 submitted 31 December, 2018; originally announced December 2018.

    Comments: 34 pages, accepted for publication in Journal of Symbolic Computation

    MSC Class: 13P15; 15B05; 33C05; 33C45; 33F10; 68W30

  5. arXiv:1809.03261  [pdf, other

    cs.DB

    The Skiplist-Based LSM Tree

    Authors: Aron Szanto

    Abstract: Log-Structured Merge (LSM) Trees provide a tiered data storage and retrieval paradigm that is attractive for write-optimized data systems. Maintaining an efficient buffer in memory and deferring updates past their initial write-time, the structure provides quick operations over hot data. Because each layer of the structure is logically separate from the others, the structure is also conducive to o… ▽ More

    Submitted 10 September, 2018; originally announced September 2018.

  6. arXiv:1807.08349  [pdf, other

    cs.CR

    Taint Tracking for WebAssembly

    Authors: Aron Szanto, Timothy Tamm, Artidoro Pagnoni

    Abstract: WebAssembly seeks to provide an alternative to running large and untrusted binaries within web browsers by implementing a portable, performant, and secure bytecode format for native web computation. However, WebAssembly is largely unstudied from a security perspective. In this work, we build the first WebAssembly virtual machine that runs in native JavaScript, and implement a novel taint tracking… ▽ More

    Submitted 22 July, 2018; originally announced July 2018.

  7. arXiv:1806.00857  [pdf, other

    cs.CV

    On the Flip Side: Identifying Counterexamples in Visual Question Answering

    Authors: Gabriel Grand, Aron Szanto, Yoon Kim, Alexander Rush

    Abstract: Visual question answering (VQA) models respond to open-ended natural language questions about images. While VQA is an increasingly popular area of research, it is unclear to what extent current VQA architectures learn key semantic distinctions between visually-similar images. To investigate this question, we explore a reformulation of the VQA task that challenges models to identify counterexamples… ▽ More

    Submitted 24 July, 2018; v1 submitted 3 June, 2018; originally announced June 2018.

    Comments: KDD 2018 conference version

  8. arXiv:1408.2721  [pdf, ps, other

    cs.SC math.AG math.NA

    Certifying solutions to overdetermined and singular polynomial systems over Q

    Authors: Tulay Ayyildiz Akoglu, Jonathan D. Hauenstein, Agnes Szanto

    Abstract: This paper is concerned with certifying that a given point is near an exact root of an overdetermined or singular polynomial system with rational coefficients. The difficulty lies in the fact that consistency of overdetermined systems is not a continuous property. Our certification is based on hybrid symbolic-numeric methods to compute the exact "rational univariate representation" (RUR) of a comp… ▽ More

    Submitted 12 August, 2014; originally announced August 2014.

  9. arXiv:1404.5525  [pdf, ps, other

    math.NA cs.SC

    Global Newton Iteration over Archimedean and non-Archimedean Fields

    Authors: Jonathan D. Hauenstein, Victor Pan, Agnes Szanto

    Abstract: In this paper, we study iterative methods on the coefficients of the rational univariate representation (RUR) of a given algebraic set, called global Newton iteration. We compare two natural approaches to define locally quadratically convergent iterations: the first one involves Newton iteration applied to the approximate roots individually and then interpolation to find the RUR of these approxima… ▽ More

    Submitted 17 April, 2014; originally announced April 2014.

  10. arXiv:1401.5086  [pdf, ps, other

    cs.SC math.OC

    Over-constrained Weierstrass iteration and the nearest consistent system

    Authors: Olivier Ruatta, Mark Sciabica, Agnes Szanto

    Abstract: We propose a generalization of the Weierstrass iteration for over-constrained systems of equations and we prove that the proposed method is the Gauss-Newton iteration to find the nearest system which has at least $k$ common roots and which is obtained via a perturbation of prescribed structure. In the univariate case we show the connection of our method to the optimization problem formulated by Ka… ▽ More

    Submitted 20 January, 2014; originally announced January 2014.

  11. On the Computation of Matrices of Traces and Radicals of Ideals

    Authors: Itnuit Janovitz-Freireich, Bernard Mourrain, Lajos Ronayi, Agnes Szanto

    Abstract: Let $f_1,...,f_s \in \mathbb{K}[x_1,...,x_m]$ be a system of polynomials generating a zero-dimensional ideal $\I$, where $\mathbb{K}$ is an arbitrary algebraically closed field. We study the computation of "matrices of traces" for the factor algebra $\A := \CC[x_1, ..., x_m]/ \I$, i.e. matrices with entries which are trace functions of the roots of $\I$. Such matrices of traces in turn allow us… ▽ More

    Submitted 19 January, 2009; originally announced January 2009.

    Journal ref: Journal of Symbolic Computation 47, 1 (2012) 102-122

  12. arXiv:0812.0088  [pdf, ps, other

    cs.SC

    Moment matrices, trace matrices and the radical of ideals

    Authors: Itnuit Janovitz-Freireich, Agnes Szanto, Bernard Mourrain, Lajos Ronyai

    Abstract: Let $f_1,...,f_s \in \mathbb{K}[x_1,...,x_m]$ be a system of polynomials generating a zero-dimensional ideal $\I$, where $\mathbb{K}$ is an arbitrary algebraically closed field. Assume that the factor algebra $\A=\mathbb{K}[x_1,...,x_m]/\I$ is Gorenstein and that we have a bound $δ>0$ such that a basis for $\A$ can be computed from multiples of $f_1,...,f_s$ of degrees at most $δ$. We propose a… ▽ More

    Submitted 29 November, 2008; originally announced December 2008.

    Journal ref: nternational Conference on Symbolic and Algebraic Computation (2008) 125-132