-
Decision theory via model-free generalized fiducial inference
Authors:
Jonathan P Williams,
Yang Liu
Abstract:
Building on the recent development of the model-free generalized fiducial (MFGF) paradigm (Williams, 2023) for predictive inference with finite-sample frequentist validity guarantees, in this paper, we develop an MFGF-based approach to decision theory. Beyond the utility of the new tools we contribute to the field of decision theory, our work establishes a formal connection between decision theori…
▽ More
Building on the recent development of the model-free generalized fiducial (MFGF) paradigm (Williams, 2023) for predictive inference with finite-sample frequentist validity guarantees, in this paper, we develop an MFGF-based approach to decision theory. Beyond the utility of the new tools we contribute to the field of decision theory, our work establishes a formal connection between decision theories from the perspectives of fiducial inference, conformal prediction, and imprecise probability theory. In our paper, we establish pointwise and uniform consistency of an {\em MFGF upper risk function} as an approximation to the true risk function via the derivation of nonasymptotic concentration bounds, and our work serves as the foundation for future investigations of the properties of the MFGF upper risk from the perspective of new decision-theoretic, finite-sample validity criterion, as in Martin (2021).
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Analysis of singularly perturbed stochastic chemical reaction networks motivated by applications to epigenetic cell memory
Authors:
Simone Bruno,
Felipe A. Campos,
Yi Fu,
Domitilla Del Vecchio,
Ruth J. Williams
Abstract:
Epigenetic cell memory, the inheritance of gene expression patterns across subsequent cell divisions, is a critical property of multi-cellular organisms. In recent work [10], a subset of the authors observed in a simulation study how the stochastic dynamics and time-scale differences between establishment and erasure processes in chromatin modifications (such as histone modifications and DNA methy…
▽ More
Epigenetic cell memory, the inheritance of gene expression patterns across subsequent cell divisions, is a critical property of multi-cellular organisms. In recent work [10], a subset of the authors observed in a simulation study how the stochastic dynamics and time-scale differences between establishment and erasure processes in chromatin modifications (such as histone modifications and DNA methylation) can have a critical effect on epigenetic cell memory. In this paper, we provide a mathematical framework to rigorously validate and extend beyond these computational findings. Viewing our stochastic model of a chromatin modification circuit as a singularly perturbed, finite state, continuous time Markov chain, we extend beyond existing theory in order to characterize the leading coefficients in the series expansions of stationary distributions and mean first passage times. In particular, we characterize the limiting stationary distribution in terms of a reduced Markov chain, provide an algorithm to determine the orders of the poles of mean first passage times, and determine how changing erasure rates affects system behavior. The theoretical tools developed in this paper not only allow us to set a rigorous mathematical basis for the computational findings of our prior work, highlighting the effect of chromatin modification dynamics on epigenetic cell memory, but they can also be applied to other singularly perturbed Markov chains beyond the applications in this paper, especially those associated with chemical reaction networks.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Large-sample theory for inferential models: a possibilistic Bernstein--von Mises theorem
Authors:
Ryan Martin,
Jonathan P. Williams
Abstract:
The inferential model (IM) framework offers alternatives to the familiar probabilistic (e.g., Bayesian and fiducial) uncertainty quantification in statistical inference. Allowing this uncertainty quantification to be imprecise makes it possible to achieve exact validity and reliability. But is imprecision and exact validity compatible with attainment of the classical notions of statistical efficie…
▽ More
The inferential model (IM) framework offers alternatives to the familiar probabilistic (e.g., Bayesian and fiducial) uncertainty quantification in statistical inference. Allowing this uncertainty quantification to be imprecise makes it possible to achieve exact validity and reliability. But is imprecision and exact validity compatible with attainment of the classical notions of statistical efficiency? The present paper offers an affirmative answer to this question via a new possibilistic Bernstein--von Mises theorem that parallels a fundamental result in Bayesian inference. Among other things, our result demonstrates that the IM solution is asymptotically efficient in the sense that its asymptotic credal set is the smallest that contains the Gaussian distribution whose variance agrees with the Cramer--Rao lower bound.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Numerical Simulations for Fractional Differential Equations of Higher Order and a Wright-Type Transformation
Authors:
M. Nacianceno,
T. Oraby,
H. Rodrigo,
Y. Sepulveda,
J. Sifuentes,
E. Suazo,
T. Stuck,
J. Williams
Abstract:
In this work, a new relationship is established between the solutions of higher fractional differential equations and a Wright-type transformation. Solutions could be interpreted as expected values of functions in a random time process. As applications, we solve the fractional beam equation, fractional electric circuits with special functions as external sources, and derive dAlemberts formula for…
▽ More
In this work, a new relationship is established between the solutions of higher fractional differential equations and a Wright-type transformation. Solutions could be interpreted as expected values of functions in a random time process. As applications, we solve the fractional beam equation, fractional electric circuits with special functions as external sources, and derive dAlemberts formula for the fractional wave equation. Due to this relationship, we present two methods for simulating solutions of fractional differential equations. The two approaches use the interpretation of the Caputo derivative of a function as a Wright-type transformation of the higher derivative of the function. In the first approach, we use the Runge-Kutta method of hybrid orders 4 and 5 to solve ordinary differential equations combined with the Monte Carlo integration to conduct the Wrighttype transformation. The second method uses a feedforward neural network to simulate the fractional differential equation.
△ Less
Submitted 30 March, 2024;
originally announced April 2024.
-
Persistence of steady-states for dynamical systems on large networks
Authors:
Jason J. Bramburger,
Matt Holzer,
Jackson Williams
Abstract:
The goal of this work is to identify steady-state solutions to dynamical systems defined on large, random families of networks. We do so by passing to a continuum limit where the adjacency matrix is replaced by a non-local operator with kernel called a graphon. This graphon equation is often more amenable to analysis and provides a single equation to study instead of the infinitely many variations…
▽ More
The goal of this work is to identify steady-state solutions to dynamical systems defined on large, random families of networks. We do so by passing to a continuum limit where the adjacency matrix is replaced by a non-local operator with kernel called a graphon. This graphon equation is often more amenable to analysis and provides a single equation to study instead of the infinitely many variations of networks that lead to the limit. Our work establishes a rigorous connection between steady-states of the continuum and network systems. Precisely, we show that if the graphon equation has a steady-state solution whose linearization is invertible, there exists related steady-state solutions to the finite-dimensional networked dynamical system over all sufficiently large graphs converging to the graphon. The proof involves setting up a Newton--Kantorovich type iteration scheme which is shown to be a contraction on a suitable metric space. Interestingly, we show that the first iterate of our defined operator in general fails to be a contraction map**, but the second iterate is proven to contract on the space. We extend our results to show that linear stability properties further carry over from the graphon system to the graph dynamical system. Our results are applied to twisted states in a Kuramoto model of coupled oscillators, steady-states in a model of neuronal network activity, and a Lotka--Volterra model of ecological interaction.
△ Less
Submitted 14 February, 2024;
originally announced February 2024.
-
Donaldson-Thomas invariants for the Bridgeland-Smith correspondence
Authors:
Omar Kidwai,
Nicholas J. Williams
Abstract:
Famous work of Bridgeland and Smith shows that certain moduli spaces of quadratic differentials are isomorphic to spaces of stability conditions on particular 3-Calabi-Yau triangulated categories. This result has subsequently been generalised and extended by several authors. One facet of this correspondence is that finite-length trajectories of the quadratic differential are related to categories…
▽ More
Famous work of Bridgeland and Smith shows that certain moduli spaces of quadratic differentials are isomorphic to spaces of stability conditions on particular 3-Calabi-Yau triangulated categories. This result has subsequently been generalised and extended by several authors. One facet of this correspondence is that finite-length trajectories of the quadratic differential are related to categories of semistable objects of the corresponding stability condition, which have associated Donaldson-Thomas invariants. On the other hand, computations in the physics literature suggest certain values of these invariants according to the type of trajectory. In this paper, we show that the category recently constructed by Christ, Haiden, and Qiu gives Donaldson-Thomas invariants which agree with the predictions from physics; in particular, degenerate ring domains of the quadratic differential give rise to non-zero Donaldson-Thomas invariants. In calculating all of the invariants, we obtain a novel application of string and band techniques from representation theory.
△ Less
Submitted 25 June, 2024; v1 submitted 18 January, 2024;
originally announced January 2024.
-
Explicit Foundation Model Optimization with Self-Attentive Feed-Forward Neural Units
Authors:
Jake Ryland Williams,
Haoran Zhao
Abstract:
Iterative approximation methods using backpropagation enable the optimization of neural networks, but they remain computationally expensive, especially when used at scale. This paper presents an efficient alternative for optimizing neural networks that reduces the costs of scaling neural networks and provides high-efficiency optimizations for low-resource applications. We will discuss a general re…
▽ More
Iterative approximation methods using backpropagation enable the optimization of neural networks, but they remain computationally expensive, especially when used at scale. This paper presents an efficient alternative for optimizing neural networks that reduces the costs of scaling neural networks and provides high-efficiency optimizations for low-resource applications. We will discuss a general result about feed-forward neural networks and then extend this solution to compositional (mult-layer) networks, which are applied to a simplified transformer block containing feed-forward and self-attention layers. These models are used to train highly-specified and complex multi-layer neural architectures that we refer to as self-attentive feed-forward unit (SAFFU) layers, which we use to develop a transformer that appears to generalize well over small, cognitively-feasible, volumes of data. Testing demonstrates explicit solutions outperform models optimized by backpropagation alone. Moreover, further application of backpropagation after explicit solutions leads to better optima from smaller scales of data, training effective models from much less data is enabled by explicit solution warm starts. We then carry out ablation experiments training a roadmap of about 250 transformer models over 1-million tokens to determine ideal settings. We find that multiple different architectural variants produce highly-performant models, and discover from this ablation that some of the best are not the most parameterized. This appears to indicate well-generalized models could be reached using less data by using explicit solutions, and that architectural exploration using explicit solutions pays dividends in guiding the search for efficient variants with fewer parameters, and which could be incorporated into low-resource hardware where AI might be embodied.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Reducing the Need for Backpropagation and Discovering Better Optima With Explicit Optimizations of Neural Networks
Authors:
Jake Ryland Williams,
Haoran Zhao
Abstract:
Iterative differential approximation methods that rely upon backpropagation have enabled the optimization of neural networks; however, at present, they remain computationally expensive, especially when training models at scale. In this paper, we propose a computationally efficient alternative for optimizing neural networks that can both reduce the costs of scaling neural networks and provide high-…
▽ More
Iterative differential approximation methods that rely upon backpropagation have enabled the optimization of neural networks; however, at present, they remain computationally expensive, especially when training models at scale. In this paper, we propose a computationally efficient alternative for optimizing neural networks that can both reduce the costs of scaling neural networks and provide high-efficiency optimizations for low-resource applications. We derive an explicit solution to a simple feed-forward language model (LM) by mathematically analyzing its gradients. This solution generalizes from single-layer LMs to the class of all single-layer feed-forward softmax-activated neural models trained on positive-valued features, as is demonstrated by our extension of this solution application to MNIST digit classification. For both LM and digit classifiers, we find computationally that explicit solutions perform near-optimality in experiments showing that 1) iterative optimization only marginally improves the explicit solution parameters and 2) randomly initialized parameters iteratively optimize towards the explicit solution. We also preliminarily apply the explicit solution locally by layer in multi-layer networks and discuss how the solution's computational savings increase with model complexity -- for both single- and mult-layer applications of the explicit solution, we emphasize that the optima achieved cannot be reached by backpropagation alone, i.e., better optima appear discoverable only after explicit solutions are applied. Finally, we discuss the solution's computational savings alongside its impact on model interpretability and suggest future directions for the derivation of explicit solutions to complex- and multi-layer architectures.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Steenrod operations via higher Bruhat orders
Authors:
Guillaume Laplante-Anfossi,
Nicholas J. Williams
Abstract:
The purpose of this paper is to establish a correspondence between the higher Bruhat orders of Yu. I. Manin and V. Schechtman, and the cup-$i$ coproducts defining Steenrod squares in cohomology. To any element of the higher Bruhat orders we associate a coproduct, recovering Steenrod's original ones from extremal elements in these orders. This correspondence allows us to interpret the coproducts ge…
▽ More
The purpose of this paper is to establish a correspondence between the higher Bruhat orders of Yu. I. Manin and V. Schechtman, and the cup-$i$ coproducts defining Steenrod squares in cohomology. To any element of the higher Bruhat orders we associate a coproduct, recovering Steenrod's original ones from extremal elements in these orders. This correspondence allows us to interpret the coproducts geometrically in terms of zonotopal tilings, understand all possible choices of coproducts, and give conceptual proofs of their properties.
△ Less
Submitted 29 September, 2023; v1 submitted 28 September, 2023;
originally announced September 2023.
-
Leveraging arbitrary mobile sensor trajectories with shallow recurrent decoder networks for full-state reconstruction
Authors:
Megan R. Ebers,
Jan P. Williams,
Katherine M. Steele,
J. Nathan Kutz
Abstract:
Sensing is one of the most fundamental tasks for the monitoring, forecasting and control of complex, spatio-temporal systems. In many applications, a limited number of sensors are mobile and move with the dynamics, with examples including wearable technology, ocean monitoring buoys, and weather balloons. In these dynamic systems (without regions of statistical-independence), the measurement time h…
▽ More
Sensing is one of the most fundamental tasks for the monitoring, forecasting and control of complex, spatio-temporal systems. In many applications, a limited number of sensors are mobile and move with the dynamics, with examples including wearable technology, ocean monitoring buoys, and weather balloons. In these dynamic systems (without regions of statistical-independence), the measurement time history encodes a significant amount of information that can be extracted for critical tasks. Most model-free sensing paradigms aim to map current sparse sensor measurements to the high-dimensional state space, ignoring the time-history all together. Using modern deep learning architectures, we show that a sequence-to-vector model, such as an LSTM (long, short-term memory) network, with a decoder network, dynamic trajectory information can be mapped to full state-space estimates. Indeed, we demonstrate that by leveraging mobile sensor trajectories with shallow recurrent decoder networks, we can train the network (i) to accurately reconstruct the full state space using arbitrary dynamical trajectories of the sensors, (ii) the architecture reduces the variance of the mean-square error of the reconstruction error in comparison with immobile sensors, and (iii) the architecture also allows for rapid generalization (parameterization of dynamics) for data outside the training set. Moreover, the path of the sensor can be chosen arbitrarily, provided training data for the spatial trajectory of the sensor is available. The exceptional performance of the network architecture is demonstrated on three applications: turbulent flows, global sea-surface temperature data, and human movement biomechanics.
△ Less
Submitted 20 July, 2023;
originally announced July 2023.
-
A survey of congruences and quotients of partially ordered sets
Authors:
Nicholas J. Williams
Abstract:
A quotient of a poset $P$ is a partial order obtained on the equivalence classes of an equivalence relation $θ$ on $P$; $θ$ is then called a congruence if it satisfies certain conditions, which vary according to different theories. The literature on congruences and quotients of partially ordered sets contains a large and profilerating array of approaches, but little in the way of systematic exposi…
▽ More
A quotient of a poset $P$ is a partial order obtained on the equivalence classes of an equivalence relation $θ$ on $P$; $θ$ is then called a congruence if it satisfies certain conditions, which vary according to different theories. The literature on congruences and quotients of partially ordered sets contains a large and profilerating array of approaches, but little in the way of systematic exposition and examination of the subject. We seek to rectify this by surveying the different theories in the literature and providing philosophical discussion on requirements for notions of congruences of posets. We advocate a pluralist approach which recognises that different types of congruence arise naturally in different mathematical situations. There are some notions of congruence which are very general, whilst others capture specific structure which often appears in examples. Indeed, we finish by giving several examples where quotients of posets appear naturally in mathematics.
△ Less
Submitted 2 May, 2024; v1 submitted 7 March, 2023;
originally announced March 2023.
-
Introduction to Generalized Fiducial Inference
Authors:
Alexander C. Murph,
Jan Hannig,
Jonathan P. Williams
Abstract:
Fiducial inference was introduced in the first half of the 20th century by Fisher (1935) as a means to get a posterior-like distribution for a parameter without having to arbitrarily define a prior. While the method originally fell out of favor due to non-exactness issues in multivariate cases, the method has garnered renewed interest in the last decade. This is partly due to the development of ge…
▽ More
Fiducial inference was introduced in the first half of the 20th century by Fisher (1935) as a means to get a posterior-like distribution for a parameter without having to arbitrarily define a prior. While the method originally fell out of favor due to non-exactness issues in multivariate cases, the method has garnered renewed interest in the last decade. This is partly due to the development of generalized fiducial inference, which is a fiducial perspective on generalized confidence intervals: a method used to find approximate confidence distributions. In this chapter, we illuminate the usefulness of the fiducial philosophy, introduce the definition of a generalized fiducial distribution, and apply it to interesting, non-trivial inferential examples.
△ Less
Submitted 28 February, 2023;
originally announced February 2023.
-
A geometric perspective on the $τ$-cluster morphism category
Authors:
Sibylle Schroll,
Aran Tattar,
Hipolito Treffinger,
Nicholas J. Williams
Abstract:
We show how the $τ$-cluster morphism category may be defined in terms of the wall-and-chamber structure of an algebra. This geometric perspective leads to a simplified proof that the category is well-defined.
We show how the $τ$-cluster morphism category may be defined in terms of the wall-and-chamber structure of an algebra. This geometric perspective leads to a simplified proof that the category is well-defined.
△ Less
Submitted 19 April, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Valid Inference for Machine Learning Model Parameters
Authors:
Neil Dey,
Jonathan P. Williams
Abstract:
The parameters of a machine learning model are typically learned by minimizing a loss function on a set of training data. However, this can come with the risk of overtraining; in order for the model to generalize well, it is of great importance that we are able to find the optimal parameter for the model on the entire population -- not only on the given training sample. In this paper, we construct…
▽ More
The parameters of a machine learning model are typically learned by minimizing a loss function on a set of training data. However, this can come with the risk of overtraining; in order for the model to generalize well, it is of great importance that we are able to find the optimal parameter for the model on the entire population -- not only on the given training sample. In this paper, we construct valid confidence sets for this optimal parameter of a machine learning model, which can be generated using only the training data without any knowledge of the population. We then show that studying the distribution of this confidence set allows us to assign a notion of confidence to arbitrary regions of the parameter space, and we demonstrate that this distribution can be well-approximated using bootstrap** techniques.
△ Less
Submitted 9 May, 2024; v1 submitted 21 February, 2023;
originally announced February 2023.
-
Comparison Theorems for Stochastic Chemical Reaction Networks
Authors:
Felipe A. Campos,
Simone Bruno,
Yi Fu,
Domitilla Del Vecchio,
Ruth J. Williams
Abstract:
Continuous-time Markov chains are frequently used as stochastic models for chemical reaction networks, especially in the growing field of systems biology. A fundamental problem for these Stochastic Chemical Reaction Networks (SCRNs) is to understand the dependence of the stochastic behavior of these systems on the chemical reaction rate parameters. Towards solving this problem, in this paper we de…
▽ More
Continuous-time Markov chains are frequently used as stochastic models for chemical reaction networks, especially in the growing field of systems biology. A fundamental problem for these Stochastic Chemical Reaction Networks (SCRNs) is to understand the dependence of the stochastic behavior of these systems on the chemical reaction rate parameters. Towards solving this problem, in this paper we develop theoretical tools called comparison theorems that provide stochastic ordering results for SCRNs. These theorems give sufficient conditions for monotonic dependence on parameters in these network models, which allow us to obtain, under suitable conditions, information about transient and steady state behavior. These theorems exploit structural properties of SCRNs, beyond those of general continuous-time Markov chains. Furthermore, we derive two theorems to compare stationary distributions and mean first passage times for SCRNs with different parameter values, or with the same parameters and different initial conditions. These tools are developed for SCRNs taking values in a generic (finite or countably infinite) state space and can also be applied for non-mass-action kinetics models. When propensity functions are bounded, our method of proof gives an explicit method for coupling two comparable SCRNs, which can be used to simultaneously simulate their sample paths in a comparable manner. We illustrate our results with applications to models of enzymatic kinetics and epigenetic regulation by chromatin modifications.
△ Less
Submitted 6 March, 2023; v1 submitted 6 February, 2023;
originally announced February 2023.
-
Sensing with shallow recurrent decoder networks
Authors:
Jan P. Williams,
Olivia Zahn,
J. Nathan Kutz
Abstract:
Sensing is a universal task in science and engineering. Downstream tasks from sensing include inferring full state estimates of a system (system identification), control decisions, and forecasting. These tasks are exceptionally challenging to achieve with limited sensors, noisy measurements, and corrupt or missing data. We propose a SHallow REcurrent Decoder (SHRED) neural network structure for se…
▽ More
Sensing is a universal task in science and engineering. Downstream tasks from sensing include inferring full state estimates of a system (system identification), control decisions, and forecasting. These tasks are exceptionally challenging to achieve with limited sensors, noisy measurements, and corrupt or missing data. We propose a SHallow REcurrent Decoder (SHRED) neural network structure for sensing which incorporates (i) a recurrent neural network (LSTM) to learn a latent representation of the temporal dynamics of the sensors, and (ii) a shallow decoder that learns a map** between this latent representation and the high-dimensional state space. By explicitly accounting for the time-history, or trajectory, of the sensor measurements, SHRED enables accurate reconstructions with far fewer sensors, outperforms existing techniques when more measurements are available, and is agnostic towards sensor placement. In addition, a compressed representation of the high-dimensional state is directly obtained from sensor measurements, which provides an on-the-fly compression for modeling physical and engineering systems. Forecasting is also achieved from the sensor time-series data alone, producing an efficient paradigm for predicting temporal evolution with an exceptionally limited number of sensors. In the example cases explored, including turbulent flows, complex spatio-temporal dynamics can be characterized with exceedingly limited sensors that can be randomly placed with minimal loss of performance.
△ Less
Submitted 5 June, 2024; v1 submitted 27 January, 2023;
originally announced January 2023.
-
A structural view of maximal green sequences
Authors:
Mikhail Gorsky,
Nicholas J. Williams
Abstract:
We study the structure of the set of all maximal green sequences of a finite-dimensional algebra. There is a natural equivalence relation on this set, which we show can be interpreted in several different ways, underscoring its significance. There are three partial orders on the equivalence classes, analogous to the partial orders on silting complexes and generalising the higher Stasheff--Tamari o…
▽ More
We study the structure of the set of all maximal green sequences of a finite-dimensional algebra. There is a natural equivalence relation on this set, which we show can be interpreted in several different ways, underscoring its significance. There are three partial orders on the equivalence classes, analogous to the partial orders on silting complexes and generalising the higher Stasheff--Tamari orders on triangulations of three-dimensional cyclic polytopes. We conjecture that these partial orders are in fact equal, just as the orders in the silting case have the same Hasse diagram. This can be seen as a refined and more widely applicable version of the No-Gap Conjecture of Brüstle, Dupont, and Perotin. We prove our conjecture in the case of Nakayama algebras.
△ Less
Submitted 25 April, 2023; v1 submitted 20 January, 2023;
originally announced January 2023.
-
The higher Stasheff--Tamari orders in representation theory
Authors:
Nicholas J. Williams
Abstract:
We show that the relationship discovered by Oppermann and Thomas between triangulations of cyclic polytopes and the higher Auslander algebras of type $A$, denoted $A_{n}^{d}$, is an incredibly rich one. The \emph{higher Stasheff--Tamari orders} are two orders on triangulations of cyclic polytopes, conjectured to be equivalent, defined in the 1990s by Kapranov and Voevodsky, and Edelman and Reiner.…
▽ More
We show that the relationship discovered by Oppermann and Thomas between triangulations of cyclic polytopes and the higher Auslander algebras of type $A$, denoted $A_{n}^{d}$, is an incredibly rich one. The \emph{higher Stasheff--Tamari orders} are two orders on triangulations of cyclic polytopes, conjectured to be equivalent, defined in the 1990s by Kapranov and Voevodsky, and Edelman and Reiner. We first show that these orders correspond in even dimensions to natural orders on tilting modules defined by Riedtmann and Schofield and studied by Happel and Unger. This result allows us to show that triangulations of odd-dimensional cyclic polytopes are in bijection with equivalence classes of $d$-maximal green sequences of $A_{n}^{d}$, which we introduce as a higher-dimensional generalisation of the original maximal green sequences of Keller. We further interpret the higher Stasheff--Tamari orders in odd dimensions, where they correspond to natural orders on equivalences classes of $d$-maximal green sequences. The conjecture that these two partial orders on equivalence classes of $d$-maximal green sequences are equal amounts to an oriented version of the ``no-gap'' conjecture of Brüstle, Dupont, and Perotin. A corollary of our results is that this conjecture holds for $A_{n}$, and that here the set of equivalence classes of (1-)maximal green sequences is a lattice.
△ Less
Submitted 16 December, 2022;
originally announced December 2022.
-
The architectural application of shells whose boundaries subtend a constant solid angle
Authors:
Emil Adiels,
Mats Ander,
Chris J. K. Williams
Abstract:
Surface geometry plays a central role in the design of bridges, vaults and shells, using various techniques for generating a geometry which aims to balance structural, spatial, aesthetic and construction requirements.
In this paper we propose the use of surfaces defined such that given closed curves subtend a constant solid angle at all points on the surface and form its boundary. Constant solid…
▽ More
Surface geometry plays a central role in the design of bridges, vaults and shells, using various techniques for generating a geometry which aims to balance structural, spatial, aesthetic and construction requirements.
In this paper we propose the use of surfaces defined such that given closed curves subtend a constant solid angle at all points on the surface and form its boundary. Constant solid angle surfaces enable one to control the boundary slope and hence achieve an approximately constant span-to-height ratio as the span varies, making them structurally viable for shell structures. In addition, when the entire surface boundary is in the same plane, the slope of the surface around the boundary is constant and thus follows a principal curvature direction. Such surfaces are suitable for surface grids where planar quadrilaterals meet the surface boundaries. They can also be used as the Airy stress function in the form finding of shells having forces concentrated at the corners.
Our technique employs the Gauss-Bonnet theorem to calculate the solid angle of a point in space and Newton's method to move the point onto the constant solid angle surface. We use the Biot-Savart law to find the gradient of the solid angle. The technique can be applied in parallel to each surface point without an initial mesh, opening up for future studies and other applications when boundary curves are known but the initial topology is unknown.
We show the geometrical properties, possibilities and limitations of surfaces of constant solid angle using examples in three dimensions.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
Non-tightness in class theory and second-order arithmetic
Authors:
Alfredo Roque Freire,
Kameryn J. Williams
Abstract:
A theory T is tight if different deductively closed extensions of T (in the same language) cannot be bi-interpretable. Many well-studied foundational theories are tight, including PA [Visser2006], ZF, Z2, and KM [enayat2017]. In this article we extend Enayat's investigations to subsystems of these latter two theories. We prove that restricting the Comprehension schema of Z2 and KM gives non-tight…
▽ More
A theory T is tight if different deductively closed extensions of T (in the same language) cannot be bi-interpretable. Many well-studied foundational theories are tight, including PA [Visser2006], ZF, Z2, and KM [enayat2017]. In this article we extend Enayat's investigations to subsystems of these latter two theories. We prove that restricting the Comprehension schema of Z2 and KM gives non-tight theories. Specifically, we show that GB and ACA0 each admit different bi-interpretable extensions, and the same holds for their extensions by adding Sigma^1_k-Comprehension, for k <= 1. These results provide evidence that tightness characterizes Z2 and KM in a minimal way.
△ Less
Submitted 14 May, 2023; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Generalized Fiducial Inference on Differentiable Manifolds
Authors:
Alexander C Murph,
Jan Hannig,
Jonathan P Williams
Abstract:
We introduce a novel approach to inference on parameters that take values in a Riemannian manifold embedded in a Euclidean space. Parameter spaces of this form are ubiquitous across many fields, including chemistry, physics, computer graphics, and geology. This new approach uses generalized fiducial inference to obtain a posterior-like distribution on the manifold, without needing to know a parame…
▽ More
We introduce a novel approach to inference on parameters that take values in a Riemannian manifold embedded in a Euclidean space. Parameter spaces of this form are ubiquitous across many fields, including chemistry, physics, computer graphics, and geology. This new approach uses generalized fiducial inference to obtain a posterior-like distribution on the manifold, without needing to know a parameterization that maps the constrained space to an unconstrained Euclidean space. The proposed methodology, called the constrained generalized fiducial distribution (CGFD), is obtained by using mathematical tools from Riemannian geometry. A Bernstein-von Mises-type result for the CGFD, which provides intuition for how the desirable asymptotic qualities of the unconstrained generalized fiducial distribution are inherited by the CGFD, is provided. To demonstrate the practical use of the CGFD, we provide three proof-of-concept examples: inference for data from a multivariate normal density with the mean parameters on a sphere, a linear logspline density estimation problem, and a reimagined approach to the AR(1) model, all of which exhibit desirable coverages via simulation. We discuss two Markov chain Monte Carlo algorithms for the exploration of these constrained parameter spaces and adapt them for the CGFD.
△ Less
Submitted 8 December, 2022; v1 submitted 30 September, 2022;
originally announced September 2022.
-
Stability spaces of string and band modules
Authors:
Sibylle Schroll,
Aran Tattar,
Hipolito Treffinger,
Yadira Valdivieso,
Nicholas J. Williams
Abstract:
The stability space of a module is the cone of vectors which make the module semistable. These cones are defined in terms of inequalities; in this paper we draw insights from considering the dual description in terms of non-negative linear spans. We show how stability spaces of thin modules are related to order polytopes. In the case of non-thin modules, we show how the stability spaces of string…
▽ More
The stability space of a module is the cone of vectors which make the module semistable. These cones are defined in terms of inequalities; in this paper we draw insights from considering the dual description in terms of non-negative linear spans. We show how stability spaces of thin modules are related to order polytopes. In the case of non-thin modules, we show how the stability spaces of string and band modules are related to the stability spaces of the thin modules corresponding to the abstract string and band. We use this to analyse the way in which the stability space of a band module is the limit of stability spaces of string modules. Namely, the stability space of the band module is a union of cones, each of which is the limit of the stability spaces of a family of string modules.
△ Less
Submitted 31 August, 2022;
originally announced August 2022.
-
Triangulations of prisms and preprojective algebras of type $A$
Authors:
Osamu Iyama,
Nicholas J. Williams
Abstract:
We show that indecomposable two-term presilting complexes over $Π_{n}$, the preprojective algebra of $A_{n}$, are in bijection with internal $n$-simplices in the prism $Δ_{n} \times Δ_{1}$, the product of an $n$-simplex with a 1-simplex. We show further that this induces a bijection between triangulations of $Δ_{n} \times Δ_{1}$ and two-term silting complexes over $Π_{n}$ such that bistellar flips…
▽ More
We show that indecomposable two-term presilting complexes over $Π_{n}$, the preprojective algebra of $A_{n}$, are in bijection with internal $n$-simplices in the prism $Δ_{n} \times Δ_{1}$, the product of an $n$-simplex with a 1-simplex. We show further that this induces a bijection between triangulations of $Δ_{n} \times Δ_{1}$ and two-term silting complexes over $Π_{n}$ such that bistellar flips of triangulations correspond to mutations of two-term silting complexes. These bijections are shown to compatible with the known bijections involving the symmetric group.
△ Less
Submitted 14 November, 2022; v1 submitted 27 August, 2022;
originally announced August 2022.
-
The salient crossings of a crown diagram
Authors:
J Williams
Abstract:
A crown diagram of a smooth, closed oriented 4-manifold can be thought of as the projection of a link in the product of a closed surface and the circle, with chords in the circle direction connecting the strands of each crossing. This paper uses a straightforward assignment of integers to these chords to show that the smooth structures on the topological 4-manifold underlying a pair of Fintushel-S…
▽ More
A crown diagram of a smooth, closed oriented 4-manifold can be thought of as the projection of a link in the product of a closed surface and the circle, with chords in the circle direction connecting the strands of each crossing. This paper uses a straightforward assignment of integers to these chords to show that the smooth structures on the topological 4-manifold underlying a pair of Fintushel-Stern knot surgery 4-manifolds which are known to have the same Seiberg-Witten invariant are not isotopic. A natural question is to determine if the argument may be strengthened to show these manifolds are not diffeomorphic.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Data-driven sensor placement with shallow decoder networks
Authors:
Jan Williams,
Olivia Zahn,
J. Nathan Kutz
Abstract:
Sensor placement is an important and ubiquitous problem across the engineering and physical sciences for tasks such as reconstruction, forecasting and control. Surprisingly, there are few principled mathematical techniques developed to date for optimizing sensor locations, with the leading sensor placement algorithms often based upon the discovery of linear, low-rank sub-spaces and the QR algorith…
▽ More
Sensor placement is an important and ubiquitous problem across the engineering and physical sciences for tasks such as reconstruction, forecasting and control. Surprisingly, there are few principled mathematical techniques developed to date for optimizing sensor locations, with the leading sensor placement algorithms often based upon the discovery of linear, low-rank sub-spaces and the QR algorithm. QR is a computationally efficient greedy search algorithm which selects sensor locations from candidate positions with maximal variance exhibited in a training data set. More recently, neural networks, specifically shallow decoder networks (SDNs), have been shown to be very successful in map** sensor measurements to the original high-dimensional state space. SDNs outperform linear subspace representations in reconstruction accuracy, noise tolerance, and robustness to sensor locations. However, SDNs lack principled mathematical techniques for determining sensor placement. In this work, we develop two algorithms for optimizing sensor locations for use with SDNs: one which is a linear selection algorithm based upon QR (Q-SDN), and one which is a nonlinear selection algorithm based upon neural network pruning (P-SDN). Such sensor placement algorithms promise to enhance the already impressive reconstruction capabilities of SDNs. We demonstrate our sensor selection algorithms on two example data sets from fluid dynamics. Moreover, we provide a detailed comparison between our linear (Q-SDN) and nonlinear (P-SDN) algorithms with traditional linear embedding techniques (proper orthogonal decomposition) and QR greedy selection. We show that QR selection with SDNs enhances performance. QR even out-performs our nonlinear selection method that uses magnitude-based pruning. Thus, the combination of a greedy linear selection (QR) with nonlinear encoding (SDN) provides a synergistic combination.
△ Less
Submitted 10 February, 2022;
originally announced February 2022.
-
Depicting a generalized shift move in crown diagrams
Authors:
J Williams
Abstract:
This paper gives a diagrammatic way to perform a generalized shift move on a crown diagram of a smooth 4-manifold. Applications include a simplified proof that if two crown diagrams are related by a generalized shift move, then they are slide-equivalent; a method for converting a genus g > 1 Lefschetz fibration into a crown diagram; and the fact that the vanishing cycles of such a crown diagram ar…
▽ More
This paper gives a diagrammatic way to perform a generalized shift move on a crown diagram of a smooth 4-manifold. Applications include a simplified proof that if two crown diagrams are related by a generalized shift move, then they are slide-equivalent; a method for converting a genus g > 1 Lefschetz fibration into a crown diagram; and the fact that the vanishing cycles of such a crown diagram are slide-equivalent to a standard inclusion of the Lefschetz vanishing cycles into a genus g + 1 surface.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Quiver combinatorics for higher-dimensional triangulations
Authors:
Nicholas J. Williams
Abstract:
We investigate the combinatorics of quivers that arise from triangulations of even-dimensional cyclic polytopes. Work of Oppermann and Thomas pinpoints such quivers as the prototypes for higher-dimensional cluster theory. We first show that a $2d$-dimensional triangulation has no interior $(d + 1)$-simplices if and only if its quiver is a cut quiver of type $A$, in the sense of Iyama and Oppermann…
▽ More
We investigate the combinatorics of quivers that arise from triangulations of even-dimensional cyclic polytopes. Work of Oppermann and Thomas pinpoints such quivers as the prototypes for higher-dimensional cluster theory. We first show that a $2d$-dimensional triangulation has no interior $(d + 1)$-simplices if and only if its quiver is a cut quiver of type $A$, in the sense of Iyama and Oppermann. This is a higher-dimensional generalisation of the fact that triangulations of polygons with no interior triangles correspond to orientations of an $A_{n}$ Dynkin diagram. An application of this first result is that the set of triangulations of a $2d$-dimensional cyclic polytope with no interior $(d + 1)$-simplices is connected via bistellar flips -- the higher-dimensional analogue of flip** a diagonal inside a quadrilateral. In dimensions higher than 2, bistellar flips cannot be performed at all locations in a triangulation. Our second result gives a quiver-theoretic criterion for performing bistellar flips on a triangulation of a $2d$-dimensional cyclic polytope. This provides a visual tool for studying mutability of higher-dimensional triangulations and points towards what a theory of higher-dimensional quiver mutation could look like. Indeed, we apply this result to give a rule for mutating cut quivers at vertices which are not necessarily sinks or sources.
△ Less
Submitted 16 December, 2021;
originally announced December 2021.
-
Varieties of class-theoretic potentialism
Authors:
Neil Barton,
Kameryn J. Williams
Abstract:
We explain and explore class-theoretic potentialism -- the view that one can always individuate more classes over a set-theoretic universe. We examine some motivations for class-theoretic potentialism, before proving some results concerning the relevant potentialist systems (in particular exhibiting failures of the .2 and .3 axioms). We then discuss the significance of these results for the differ…
▽ More
We explain and explore class-theoretic potentialism -- the view that one can always individuate more classes over a set-theoretic universe. We examine some motivations for class-theoretic potentialism, before proving some results concerning the relevant potentialist systems (in particular exhibiting failures of the .2 and .3 axioms). We then discuss the significance of these results for the different kinds of class-theoretic potentialist.
△ Less
Submitted 14 March, 2023; v1 submitted 3 August, 2021;
originally announced August 2021.
-
The EAS approach to variable selection for multivariate response data in high-dimensional settings
Authors:
Salil Koner,
Jonathan P Williams
Abstract:
In this paper, we develop an {\em epsilon admissible subsets} (EAS) model selection approach for performing group variable selection in the high-dimensional multivariate regression setting. This EAS strategy is designed to estimate a posterior-like, generalized fiducial distribution over a parsimonious class of models in the setting of correlated predictors and/or in the absence of a sparsity assu…
▽ More
In this paper, we develop an {\em epsilon admissible subsets} (EAS) model selection approach for performing group variable selection in the high-dimensional multivariate regression setting. This EAS strategy is designed to estimate a posterior-like, generalized fiducial distribution over a parsimonious class of models in the setting of correlated predictors and/or in the absence of a sparsity assumption. The effectiveness of our approach, to this end, is demonstrated empirically in simulation studies, and is compared to other state-of-the-art model/variable selection procedures. Furthermore, assuming a matrix-Normal linear model we show that the EAS strategy achieves {\em strong model selection consistency} in the high-dimensional setting if there does exist a sparse, true data generating set of predictors. In contrast to Bayesian approaches for model selection, our generalized fiducial approach completely avoids the problem of simultaneously having to specify arbitrary prior distributions for model parameters and penalize model complexity; our approach allows for inference directly on the model complexity. \textcolor{black}{Implementation of the method is illustrated through yeast data to identify significant cell-cycle regulating transcription factors.
△ Less
Submitted 12 June, 2023; v1 submitted 10 July, 2021;
originally announced July 2021.
-
The $ω$-th inner mantle
Authors:
Kameryn J. Williams
Abstract:
This article investigates pathological behavior at the first limit stage in the sequence of inner mantles, obtained by iterating the definition of the mantle to get smaller and smaller inner models. I show: (A) it is possible that the $ω$-th inner mantle is not a definable class; and (B) it is possible that the $ω$-th inner mantle is a definable class but does not satisfy $\mathsf{AC}$. This answe…
▽ More
This article investigates pathological behavior at the first limit stage in the sequence of inner mantles, obtained by iterating the definition of the mantle to get smaller and smaller inner models. I show: (A) it is possible that the $ω$-th inner mantle is not a definable class; and (B) it is possible that the $ω$-th inner mantle is a definable class but does not satisfy $\mathsf{AC}$. This answers a pair of questions of Fuchs, Hamkins, and Reitz [FHR15].
△ Less
Submitted 14 June, 2021;
originally announced June 2021.
-
The two higher Stasheff-Tamari orders are equal
Authors:
Nicholas J. Williams
Abstract:
The set of triangulations of a cyclic polytope possesses two a priori different partial orders, known as the higher Stasheff-Tamari orders. The first of these orders was introduced by Kapranov and Voevodsky, while the second order was introduced by Edelman and Reiner, who also conjectured the two to coincide in 1996. In this paper we prove their conjecture, thereby substantially increasing our und…
▽ More
The set of triangulations of a cyclic polytope possesses two a priori different partial orders, known as the higher Stasheff-Tamari orders. The first of these orders was introduced by Kapranov and Voevodsky, while the second order was introduced by Edelman and Reiner, who also conjectured the two to coincide in 1996. In this paper we prove their conjecture, thereby substantially increasing our understanding of these orders. This result also has ramifications in the representation theory of algebras, as established in previous work of the author. Indeed, it means that the two corresponding orders on tilting modules, cluster-tilting objects and their maximal chains are equal for the higher Auslander algebras of type $A$.
△ Less
Submitted 13 June, 2022; v1 submitted 2 June, 2021;
originally announced June 2021.
-
The Inscribed Angle Theorem for the Hyperbola
Authors:
Jack Williams
Abstract:
The inscribed angle theorem, a famous result about the angle subtended by a chord within a circle, is well known and commonly taught in school curricula. In this paper, we present a generalisation of this result (and other related circle theorems) to the rectangular hyperbola. The notion of angle is replaced by pseudo-angle, defined via the Minkowski inner product. Indeed, in Minkowski space, the…
▽ More
The inscribed angle theorem, a famous result about the angle subtended by a chord within a circle, is well known and commonly taught in school curricula. In this paper, we present a generalisation of this result (and other related circle theorems) to the rectangular hyperbola. The notion of angle is replaced by pseudo-angle, defined via the Minkowski inner product. Indeed, in Minkowski space, the unit hyperbola is the set of points a unit metric distance from the origin, analogous to the Euclidean unit circle. While this is a result of pure geometrical interest, the connection to Minkowski space allows an interpretation in terms of special relativity where, in the limit $c\to\infty$, it leads to a familiar result from non-relativistic dynamics. This non-relativistic result can be interpreted as an inscribed angle theorem for the parabola, which we show can also be obtained from the Euclidean inscribed angle theorem by taking the limit of a family of ellipses ananlogous to the non-relativistic limit $c\to\infty$. This simple result could be used as a pedagogical example to consolidate understanding of pseudo-angles in non-Euclidean spaces or to demonstrate the power of analytic continuation.
△ Less
Submitted 19 April, 2021;
originally announced April 2021.
-
On finite $p$-groups with powerful subgroups
Authors:
James Williams
Abstract:
In this paper we investigate the structure of finite $p$-groups with the property that every subgroup of index $p^i$ is powerful for some $i$. For odd primes $p$, we show that under certain conditions these groups must be potent. Then, motivated by a question of Mann, we investigate in detail the case when all maximal subgroups are powerful. We show that for odd $p$ any finite $p$-group $G$ with a…
▽ More
In this paper we investigate the structure of finite $p$-groups with the property that every subgroup of index $p^i$ is powerful for some $i$. For odd primes $p$, we show that under certain conditions these groups must be potent. Then, motivated by a question of Mann, we investigate in detail the case when all maximal subgroups are powerful. We show that for odd $p$ any finite $p$-group $G$ with all maximal subgroups powerful has a regular power structure - with precisely one exceptional case which is a $3$-group of maximal class and order $81$. To show this counterexample is unique we use a computational approach. We briefly discuss the case $p=2$ and some generalisations.
△ Less
Submitted 14 January, 2021;
originally announced January 2021.
-
The first higher Stasheff-Tamari orders are quotients of the higher Bruhat orders
Authors:
Nicholas J. Williams
Abstract:
We prove the conjecture that the higher Tamari orders of Dimakis and Müller-Hoissen coincide with the first higher Stasheff--Tamari orders. To this end, we show that the higher Tamari orders may be conceived as the image of an order-preserving map from the higher Bruhat orders to the first higher Stasheff--Tamari orders. This map is defined by taking the first cross-section of a cubillage of a cyc…
▽ More
We prove the conjecture that the higher Tamari orders of Dimakis and Müller-Hoissen coincide with the first higher Stasheff--Tamari orders. To this end, we show that the higher Tamari orders may be conceived as the image of an order-preserving map from the higher Bruhat orders to the first higher Stasheff--Tamari orders. This map is defined by taking the first cross-section of a cubillage of a cyclic zonotope. We provide a new proof that this map is surjective and show further that the map is full, which entails the aforementioned conjecture. We explain how order-preserving maps which are surjective and full correspond to quotients of posets. Our results connect the first higher Stasheff--Tamari orders with the literature on the role of the higher Tamari orders in integrable systems.
△ Less
Submitted 18 May, 2021; v1 submitted 18 December, 2020;
originally announced December 2020.
-
Limit theorems and ergodicity for general bootstrap random walks
Authors:
A. Collevecchio,
K. Hamza,
M. Shi,
R. J. Williams
Abstract:
Given the increments of a simple symmetric random walk $(X_n)_{n\ge0}$, we characterize all possible ways of recycling these increments into a simple symmetric random walk $(Y_n)_{n\ge0}$ adapted to the filtration of $(X_n)_{n\ge0}$. We study the long term behavior of a suitably normalized two-dimensional process $((X_n,Y_n))_{n\ge0}$. In particular, we provide necessary and sufficient conditions…
▽ More
Given the increments of a simple symmetric random walk $(X_n)_{n\ge0}$, we characterize all possible ways of recycling these increments into a simple symmetric random walk $(Y_n)_{n\ge0}$ adapted to the filtration of $(X_n)_{n\ge0}$. We study the long term behavior of a suitably normalized two-dimensional process $((X_n,Y_n))_{n\ge0}$. In particular, we provide necessary and sufficient conditions for the process to converge to a two-dimensional Brownian motion (possibly degenerate). We also discuss cases in which the limit is not Gaussian. Finally, we provide a simple necessary and sufficient condition for the ergodicity of the recycling transformation, thus generalizing results from Dubins and Smorodinsky (1992) and Fujita (2008), and solving the discrete version of the open problem of the ergodicity of the general Lévy transformation (see Mansuy and Yor, 2006).
△ Less
Submitted 30 June, 2021; v1 submitted 29 October, 2020;
originally announced October 2020.
-
New interpretations of the higher Stasheff--Tamari orders
Authors:
Nicholas J. Williams
Abstract:
In 1996, Edelman and Reiner defined the two higher Stasheff--Tamari orders on triangulations of cyclic polytopes and conjectured them to coincide. We open up an algebraic angle for approaching this conjecture by showing how these orders arise naturally in the representation theory of the higher Auslander algebras of type $A$, denoted $A_{n}^{d}$. For this we give new combinatorial interpretations…
▽ More
In 1996, Edelman and Reiner defined the two higher Stasheff--Tamari orders on triangulations of cyclic polytopes and conjectured them to coincide. We open up an algebraic angle for approaching this conjecture by showing how these orders arise naturally in the representation theory of the higher Auslander algebras of type $A$, denoted $A_{n}^{d}$. For this we give new combinatorial interpretations of the orders, making them comparable. We then translate these combinatorial interpretations into the algebraic framework. We also show how triangulations of odd-dimensional cyclic polytopes arise in the representation theory of $A_{n}^{d}$, namely as equivalence classes of maximal green sequences. We furthermore give the odd-dimensional counterpart to the known description of $2d$-dimensional triangulations as sets of non-intersecting $d$-simplices of a maximal size. This consists in a definition of two new properties which imply that a set of $d$-simplices produces a $(2d+1)$-dimensional triangulation.
△ Less
Submitted 19 February, 2021; v1 submitted 24 July, 2020;
originally announced July 2020.
-
Forcing as a computational process
Authors:
Joel David Hamkins,
Russell Miller,
Kameryn J. Williams
Abstract:
We investigate how set-theoretic forcing can be seen as a computational process on the models of set theory. Given an oracle for information about a model of set theory $\langle M,\in^M\rangle$, we explain senses in which one may compute $M$-generic filters $G\subseteq\mathbb{P}\in M$ and the corresponding forcing extensions $M[G]$. Specifically, from the atomic diagram one may compute $G$, from t…
▽ More
We investigate how set-theoretic forcing can be seen as a computational process on the models of set theory. Given an oracle for information about a model of set theory $\langle M,\in^M\rangle$, we explain senses in which one may compute $M$-generic filters $G\subseteq\mathbb{P}\in M$ and the corresponding forcing extensions $M[G]$. Specifically, from the atomic diagram one may compute $G$, from the $Δ_0$-diagram one may compute $M[G]$ and its $Δ_0$-diagram, and from the elementary diagram one may compute the elementary diagram of $M[G]$. We also examine the information necessary to make the process functorial, and conclude that in the general case, no such computational process will be functorial. For any such process, it will always be possible to have different isomorphic presentations of a model of set theory $M$ that lead to different non-isomorphic forcing extensions $M[G]$. Indeed, there is no Borel function providing generic filters that is functorial in this sense.
△ Less
Submitted 23 November, 2023; v1 submitted 1 July, 2020;
originally announced July 2020.
-
On the regular power structure of $p$-groups and applications
Authors:
James Williams
Abstract:
In this paper, we give elementary proofs of the Restricted Burnside Problem and the Hughes Conjecture for finite $p$-groups with Hall's regular power structure property. Moreover, in this setting we determine an explicit bound on the order of a finite $d$-generator $p$-group of fixed exponent. Further applications of $p$-groups with regular power structure are presented. For example, we give a sho…
▽ More
In this paper, we give elementary proofs of the Restricted Burnside Problem and the Hughes Conjecture for finite $p$-groups with Hall's regular power structure property. Moreover, in this setting we determine an explicit bound on the order of a finite $d$-generator $p$-group of fixed exponent. Further applications of $p$-groups with regular power structure are presented. For example, we give a short new proof of an important property of powerful $p$-groups; namely, that the minimal number of generators of a subgroup of such a group $G$ is at most the number needed to generate $G$.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Powerfully nilpotent groups of rank 2 or small order
Authors:
Gunnar Traustason,
James Williams
Abstract:
In this paper we continue the study of powerfully nilpotent groups. These are powerful $p$-groups possessing a central series of a special kind. To each such group one can attach a powerful nilpotency class that leads naturally to the notion of a powerful coclass and classification in terms of an ancestry tree. In this paper we will give a full classification of powerfully nilpotent groups of rank…
▽ More
In this paper we continue the study of powerfully nilpotent groups. These are powerful $p$-groups possessing a central series of a special kind. To each such group one can attach a powerful nilpotency class that leads naturally to the notion of a powerful coclass and classification in terms of an ancestry tree. In this paper we will give a full classification of powerfully nilpotent groups of rank $2$. The classification will then be used to arrive at a precise formula for the number of powerfully nilpotent groups of rank $2$ and order $p^{n}$. We will also give a detailed analysis of the ancestry tree for these groups. The second part of the paper is then devoted to a full classification of powerfully nilpotent groups of order up to $p^{6}$.
△ Less
Submitted 7 February, 2020;
originally announced February 2020.
-
The combinatorics of tensor products of higher Auslander algebras of type $A$
Authors:
Jordan McMahon,
Nicholas J. Williams
Abstract:
We consider maximal non-$l$-intertwining collections, which are a higher-dimensional version of the maximal non-crossing collections which give clusters of Plücker coordinates in the Grassmannian coordinate ring, as described by Scott. We extend a method of Scott for producing such collections, which are related to tensor products of higher Auslander algebras of type $A$. We show that a higher pre…
▽ More
We consider maximal non-$l$-intertwining collections, which are a higher-dimensional version of the maximal non-crossing collections which give clusters of Plücker coordinates in the Grassmannian coordinate ring, as described by Scott. We extend a method of Scott for producing such collections, which are related to tensor products of higher Auslander algebras of type $A$. We show that a higher preprojective algebra of the tensor product of two $d$-representation-finite algebras has a $d$-precluster-tilting subcategory. Finally we relate mutations of these collections to a form of tilting for these algebras.
△ Less
Submitted 18 January, 2020;
originally announced January 2020.
-
Quasi-powerful $p$-groups
Authors:
James Williams
Abstract:
In this paper we introduce the notion of a quasi-powerful $p$-group for odd primes $p$. These are the finite $p$-groups $G$ such that $G/Z(G)$ is powerful in the sense of Lubotzky and Mann. We show that this large family of groups shares many of the same properties as powerful $p$-groups. For example, we show that they have a regular power structure, and we generalise a result of Fernández-Alcober…
▽ More
In this paper we introduce the notion of a quasi-powerful $p$-group for odd primes $p$. These are the finite $p$-groups $G$ such that $G/Z(G)$ is powerful in the sense of Lubotzky and Mann. We show that this large family of groups shares many of the same properties as powerful $p$-groups. For example, we show that they have a regular power structure, and we generalise a result of Fernández-Alcober on the order of commutators in powerful $p$-groups to this larger family of groups. We also obtain a bound on the number of generators of a subgroup of a quasi-powerful $p$-group, expressed in terms of the number of generators of the group. We give an infinite family of examples which demonstrates this bound is close to best possible.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
-
Optimal periodic structures with general space group symmetries in the Ohta-Kawasaki problem
Authors:
Jan Bouwe van den Berg,
JF Williams
Abstract:
We consider the problem of rigorously computing periodic minimizers to the Ohta-Kawasaki energy. We develop a method to prove existence of solutions and determine rigorous bounds on the distance between our numerical approximations and the true infinite dimensional solution and also on the energy. We use a method with prescribed symmetries to explore the phase space, computing candidate minimizers…
▽ More
We consider the problem of rigorously computing periodic minimizers to the Ohta-Kawasaki energy. We develop a method to prove existence of solutions and determine rigorous bounds on the distance between our numerical approximations and the true infinite dimensional solution and also on the energy. We use a method with prescribed symmetries to explore the phase space, computing candidate minimizers both with and without experimentally observed symmetries. We find qualitative differences between the phase diagram of the Ohta-Kawasaki energy and self consistent field theory when well away form the weak segregation limit.
△ Less
Submitted 29 November, 2019;
originally announced December 2019.
-
Estimating Density Models with Truncation Boundaries using Score Matching
Authors:
Song Liu,
Takafumi Kanamori,
Daniel J. Williams
Abstract:
Truncated densities are probability density functions defined on truncated domains. They share the same parametric form with their non-truncated counterparts up to a normalizing constant. Since the computation of their normalizing constants is usually infeasible, Maximum Likelihood Estimation cannot be easily applied to estimate truncated density models. Score Matching (SM) is a powerful tool for…
▽ More
Truncated densities are probability density functions defined on truncated domains. They share the same parametric form with their non-truncated counterparts up to a normalizing constant. Since the computation of their normalizing constants is usually infeasible, Maximum Likelihood Estimation cannot be easily applied to estimate truncated density models. Score Matching (SM) is a powerful tool for fitting parameters using only unnormalized models. However, it cannot be directly applied here as boundary conditions used to derive a tractable SM objective are not satisfied by truncated densities. In this paper, we study parameter estimation for truncated probability densities using SM. The estimator minimizes a weighted Fisher divergence. The weight function is simply the shortest distance from a data point to the boundary of the domain. We show this choice of weight function naturally arises from minimizing the Stein discrepancy as well as upperbounding the finite-sample estimation error. The usefulness of our method is demonstrated by numerical experiments and a study on the Chicago crime data set. We also show that the proposed density estimation can correct the outlier-trimming bias caused by aggressive outlier detection methods.
△ Less
Submitted 20 April, 2022; v1 submitted 9 October, 2019;
originally announced October 2019.
-
The Sigma_1-definable universal finite sequence
Authors:
Joel David Hamkins,
Kameryn J. Williams
Abstract:
We introduce the $Σ_1$-definable universal finite sequence and prove that it exhibits the universal extension property amongst the countable models of set theory under end-extension. That is, (i) the sequence is $Σ_1$-definable and provably finite; (ii) the sequence is empty in transitive models; and (iii) if $M$ is a countable model of set theory in which the sequence is $s$ and $t$ is any finite…
▽ More
We introduce the $Σ_1$-definable universal finite sequence and prove that it exhibits the universal extension property amongst the countable models of set theory under end-extension. That is, (i) the sequence is $Σ_1$-definable and provably finite; (ii) the sequence is empty in transitive models; and (iii) if $M$ is a countable model of set theory in which the sequence is $s$ and $t$ is any finite extension of $s$ in this model, then there is an end-extension of $M$ to a model in which the sequence is $t$. Our proof method grows out of a new infinitary-logic-free proof of the Barwise extension theorem, by which any countable model of set theory is end-extended to a model of $V=L$ or indeed any theory true in a suitable submodel of the original model. The main theorem settles the modal logic of end-extensional potentialism, showing that the potentialist validities of the models of set theory under end-extensions are exactly the assertions of S4. Finally, we introduce the end-extensional maximality principle, which asserts that every possibly necessary sentence is already true, and show that every countable model extends to a model satisfying it.
△ Less
Submitted 9 November, 2020; v1 submitted 19 September, 2019;
originally announced September 2019.
-
Normal Subgroups of Powerful $p$ -groups
Authors:
James Williams
Abstract:
In this note we show that if $p$ is an odd prime and $G$ is a powerful $p$-group with $N\leq G^{p}$ and $N$ normal in $G$, then $N$ is powerfully nilpotent. An analogous result is proved for $p=2$ when $N\leq G^{4}$.
In this note we show that if $p$ is an odd prime and $G$ is a powerful $p$-group with $N\leq G^{p}$ and $N$ normal in $G$, then $N$ is powerfully nilpotent. An analogous result is proved for $p=2$ when $N\leq G^{4}$.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
Omegas of Agemos in Powerful Groups
Authors:
James Williams
Abstract:
In this note we show that for any powerful $p$-group $G$, the subgroup $Ω_{i}(G^{p^{j}})$ is powerfully nilpotent for all $i,j\geq1$ when $p$ is an odd prime, and $i\geq1$, $j\geq2$ when $p=2$. We provide an example to show why this modification is needed in the case $p=2$. Furthermore we obtain a bound on the powerful nilpotency class of $Ω_{i}(G^{p^{j}})$. We give an example to show that powerfu…
▽ More
In this note we show that for any powerful $p$-group $G$, the subgroup $Ω_{i}(G^{p^{j}})$ is powerfully nilpotent for all $i,j\geq1$ when $p$ is an odd prime, and $i\geq1$, $j\geq2$ when $p=2$. We provide an example to show why this modification is needed in the case $p=2$. Furthermore we obtain a bound on the powerful nilpotency class of $Ω_{i}(G^{p^{j}})$. We give an example to show that powerfully nilpotent characteristic subgroups of powerful $p$-groups need not be strongly powerful.
△ Less
Submitted 23 July, 2019; v1 submitted 2 November, 2018;
originally announced November 2018.
-
Powerfully nilpotent groups
Authors:
Gunnar Traustason,
James Williams
Abstract:
We introduce a special class of powerful $p$-groups that we call powerfully nilpotent groups that are finite $p$-groups that possess a central series of a special kind. To these we can attach the notion of a powerful nilpotence class that leads naturally to a classification in terms of an `ancestry tree' and powerful coclass. We show that there are finitely many powerfully nilpotent $p$-groups of…
▽ More
We introduce a special class of powerful $p$-groups that we call powerfully nilpotent groups that are finite $p$-groups that possess a central series of a special kind. To these we can attach the notion of a powerful nilpotence class that leads naturally to a classification in terms of an `ancestry tree' and powerful coclass. We show that there are finitely many powerfully nilpotent $p$-groups of each given powerful coclass and develop some general theory for this class of groups. We also determine the growth of powerfully nilpotent groups of exponent $p^{2}$ and order $p^{n}$ where $p$ is odd. The number of these is $f(n)=p^{αn^{3}+o(n^{3})}$ where $α=\frac{9+4\sqrt{2}}{394}$. For the larger class of all powerful groups of exponent $p^{2}$ and order $p^{n}$, where $p$ is odd, the number is $p^{\frac{2}{27}n^{3}+o(n^{3})}$. Thus here the class of powerfully nilpotent $p$-groups is large while sparse within the larger class of powerful $p$-groups.
△ Less
Submitted 2 November, 2018;
originally announced November 2018.
-
Inner mantles and iterated HOD
Authors:
Jonas Reitz,
Kameryn J Williams
Abstract:
We present a class forcing notion $\mathbb M(η)$, uniformly definable for ordinals $η$, which forces the ground model to be the $η$-th inner mantle of the extension, in which the sequence of inner mantles has length at least $η$. This answers a conjecture of Fuchs, Hamkins, and Reitz [FHR15] in the positive. We also show that $\mathbb M(η)$ forces the ground model to be the $η$-th iterated HOD of…
▽ More
We present a class forcing notion $\mathbb M(η)$, uniformly definable for ordinals $η$, which forces the ground model to be the $η$-th inner mantle of the extension, in which the sequence of inner mantles has length at least $η$. This answers a conjecture of Fuchs, Hamkins, and Reitz [FHR15] in the positive. We also show that $\mathbb M(η)$ forces the ground model to be the $η$-th iterated HOD of the extension, where the sequence of iterated HODs has length at least $η$. We conclude by showing that the lengths of the sequences of inner mantles and of iterated HODs can be separated to be any two ordinals you please.
△ Less
Submitted 4 September, 2019; v1 submitted 19 October, 2018;
originally announced October 2018.
-
Set-Theoretic Blockchains
Authors:
Miha E. Habič,
Joel David Hamkins,
Lukas Daniel Klausner,
Jonathan Verner,
Kameryn J. Williams
Abstract:
Given a countable model of set theory, we study the structure of its generic multiverse, the collection of its forcing extensions and ground models, ordered by inclusion. Mostowski showed that any finite poset embeds into the generic multiverse while preserving the nonexistence of upper bounds. We obtain several improvements of his result, using what we call the blockchain construction to build ge…
▽ More
Given a countable model of set theory, we study the structure of its generic multiverse, the collection of its forcing extensions and ground models, ordered by inclusion. Mostowski showed that any finite poset embeds into the generic multiverse while preserving the nonexistence of upper bounds. We obtain several improvements of his result, using what we call the blockchain construction to build generic objects with varying degrees of mutual genericity. The method accommodates certain infinite posets, and we can realize these embeddings via a wide variety of forcing notions, while providing control over lower bounds as well. We also give a generalization to class forcing in the context of second-order set theory, and exhibit some further structure in the generic multiverse, such as the existence of exact pairs.
△ Less
Submitted 27 March, 2019; v1 submitted 4 August, 2018;
originally announced August 2018.
-
The Structure of Models of Second-order Set Theories
Authors:
Kameryn J Williams
Abstract:
This dissertation is a contribution to the project of second-order set theory, which has seen a revival in recent years. The approach is to understand second-order set theory by studying the structure of models of second-order set theories. The main results are the following, organized by chapter. First, I investigate the poset of $T$-realizations of a fixed countable model of $\mathsf{ZFC}$, wher…
▽ More
This dissertation is a contribution to the project of second-order set theory, which has seen a revival in recent years. The approach is to understand second-order set theory by studying the structure of models of second-order set theories. The main results are the following, organized by chapter. First, I investigate the poset of $T$-realizations of a fixed countable model of $\mathsf{ZFC}$, where $T$ is a reasonable second-order set theory such as $\mathsf{GBC}$ or $\mathsf{KM}$, showing that it has a rich structure. In particular, every countable partial order embeds into this structure. Moreover, we can arrange so that these embedding preserve the existence/nonexistence of upper bounds, at least for finite partial orders. Second I generalize some constructions of Marek and Mostowski from $\mathsf{KM}$ to weaker theories. They showed that every model of $\mathsf{KM}$ plus the Class Collection schema "unrolls" to a model of $\mathsf{ZFC}^-$ with a largest cardinal. I calculate the theories of the unrolling for a variety of second-order set theories, going as weak as $\mathsf{GBC} + \mathsf{ETR}$. I also show that being $T$-realizable goes down to submodels for a broad selection of second-order set theories $T$. Third, I show that there is a hierarchy of transfinite recursion principles ranging in strength from $\mathsf{GBC}$ to $\mathsf{KM}$. This hierarchy is ordered first by the complexity of the properties allowed in the recursions and second by the allowed heights of the recursions. Fourth, I investigate the question of which second-order set theories have least models. I show that strong theories---such as $\mathsf{KM}$ or $Π^1_1\text{-}\mathsf{CA}$---do not have least transitive models while weaker theories---from $\mathsf{GBC}$ to $\mathsf{GBC} + \mathsf{ETR}_\mathrm{Ord}$---do have least transitive models.
△ Less
Submitted 25 April, 2018;
originally announced April 2018.