-
A Guide to Feature Importance Methods for Scientific Inference
Authors:
Fiona Katharina Ewald,
Ludwig Bothmann,
Marvin N. Wright,
Bernd Bischl,
Giuseppe Casalicchio,
Gunnar König
Abstract:
While machine learning (ML) models are increasingly used due to their high predictive power, their use in understanding the data-generating process (DGP) is limited. Understanding the DGP requires insights into feature-target associations, which many ML models cannot directly provide, due to their opaque internal mechanisms. Feature importance (FI) methods provide useful insights into the DGP unde…
▽ More
While machine learning (ML) models are increasingly used due to their high predictive power, their use in understanding the data-generating process (DGP) is limited. Understanding the DGP requires insights into feature-target associations, which many ML models cannot directly provide, due to their opaque internal mechanisms. Feature importance (FI) methods provide useful insights into the DGP under certain conditions. Since the results of different FI methods have different interpretations, selecting the correct FI method for a concrete use case is crucial and still requires expert knowledge. This paper serves as a comprehensive guide to help understand the different interpretations of FI methods. Through an extensive review of FI methods and providing new proofs regarding their interpretation, we facilitate a thorough understanding of these methods and formulate concrete recommendations for scientific inference. We conclude by discussing options for FI uncertainty estimation and point to directions for future research aiming at full statistical inference from black-box ML models.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
Bergman kernels of Monomial Polyhedra
Authors:
Debraj Chakrabarti,
Isaac Cinzori,
Ishani Gaidhane,
Jonathan Gregory,
Mary Wright
Abstract:
The Bergman kernels of monomial polyhedra are explicitly computed. Monomial polyhedra are a class of bounded pseudoconvex Reinhardt domains defined as sublevel sets of Laurent monomials. Their kernels are rational functions and are obtained by an application of Bell's transformation formula.
The Bergman kernels of monomial polyhedra are explicitly computed. Monomial polyhedra are a class of bounded pseudoconvex Reinhardt domains defined as sublevel sets of Laurent monomials. Their kernels are rational functions and are obtained by an application of Bell's transformation formula.
△ Less
Submitted 10 August, 2023;
originally announced August 2023.
-
Enhancing Neural Network Differential Equation Solvers
Authors:
Matthew J. H. Wright
Abstract:
We motivate the use of neural networks for the construction of numerical solutions to differential equations. We prove that there exists a feed-forward neural network that can arbitrarily minimise an objective function that is zero at the solution of Poisson's equation, allowing us to guarantee that neural network solution estimates can get arbitrarily close to the exact solutions. We also show ho…
▽ More
We motivate the use of neural networks for the construction of numerical solutions to differential equations. We prove that there exists a feed-forward neural network that can arbitrarily minimise an objective function that is zero at the solution of Poisson's equation, allowing us to guarantee that neural network solution estimates can get arbitrarily close to the exact solutions. We also show how these estimates can be appreciably enhanced through various strategies, in particular through the construction of error correction networks, for which we propose a general method. We conclude by providing numerical experiments that attest to the validity of all such strategies for variants of Poisson's equation.
△ Less
Submitted 28 December, 2022;
originally announced January 2023.
-
Magic Triangles
Authors:
Gabriel Hale,
Bjorn Vogen,
Matthew Wright
Abstract:
Magic squares are well-known arrangements of integers with common row, column, and diagonal sums. Various other magic shapes have been proposed, but triangles have been somewhat overlooked. We introduce certain triangular arrangements of integers with common sums in three directions, which we call magic triangles. For small sizes of these triangles, we count the number of unique magic triangles an…
▽ More
Magic squares are well-known arrangements of integers with common row, column, and diagonal sums. Various other magic shapes have been proposed, but triangles have been somewhat overlooked. We introduce certain triangular arrangements of integers with common sums in three directions, which we call magic triangles. For small sizes of these triangles, we count the number of unique magic triangles and examine distributions of integers at different positions within them. While we cannot enumerate the number of magic triangles at larger sizes, we offer a simulated annealing method for finding magic triangles.
△ Less
Submitted 6 July, 2022;
originally announced August 2022.
-
Unifying local and global model explanations by functional decomposition of low dimensional structures
Authors:
Munir Hiabu,
Joseph T. Meyer,
Marvin N. Wright
Abstract:
We consider a global representation of a regression or classification function by decomposing it into the sum of main and interaction components of arbitrary order. We propose a new identification constraint that allows for the extraction of interventional SHAP values and partial dependence plots, thereby unifying local and global explanations. With our proposed identification, a feature's partial…
▽ More
We consider a global representation of a regression or classification function by decomposing it into the sum of main and interaction components of arbitrary order. We propose a new identification constraint that allows for the extraction of interventional SHAP values and partial dependence plots, thereby unifying local and global explanations. With our proposed identification, a feature's partial dependence plot corresponds to the main effect term plus the intercept. The interventional SHAP value of feature $k$ is a weighted sum of the main component and all interaction components that include $k$, with the weights given by the reciprocal of the component's dimension. This brings a new perspective to local explanations such as SHAP values which were previously motivated by game theory only. We show that the decomposition can be used to reduce direct and indirect bias by removing all components that include a protected feature. Lastly, we motivate a new measure of feature importance. In principle, our proposed functional decomposition can be applied to any machine learning model, but exact calculation is only feasible for low-dimensional structures or ensembles of those. We provide an algorithm and efficient implementation for gradient-boosted trees (xgboost) and random planted forest. Conducted experiments suggest that our method provides meaningful explanations and reveals interactions of higher orders. The proposed methods are implemented in an R package, available at \url{https://github.com/PlantedML/glex}.
△ Less
Submitted 23 February, 2023; v1 submitted 12 August, 2022;
originally announced August 2022.
-
Generalization of the Change of Variables Formula with Applications to Residual Flows
Authors:
Niklas Koenen,
Marvin N. Wright,
Peter Maaß,
Jens Behrmann
Abstract:
Normalizing flows leverage the Change of Variables Formula (CVF) to define flexible density models. Yet, the requirement of smooth transformations (diffeomorphisms) in the CVF poses a significant challenge in the construction of these models. To enlarge the design space of flows, we introduce $\mathcal{L}$-diffeomorphisms as generalized transformations which may violate these requirements on zero…
▽ More
Normalizing flows leverage the Change of Variables Formula (CVF) to define flexible density models. Yet, the requirement of smooth transformations (diffeomorphisms) in the CVF poses a significant challenge in the construction of these models. To enlarge the design space of flows, we introduce $\mathcal{L}$-diffeomorphisms as generalized transformations which may violate these requirements on zero Lebesgue-measure sets. This relaxation allows e.g. the use of non-smooth activation functions such as ReLU. Finally, we apply the obtained results to planar, radial, and contractive residual flows.
△ Less
Submitted 9 July, 2021;
originally announced July 2021.
-
Piercing Numbers in Circular Societies
Authors:
Kristen Mazur,
Mutiara Sondjaja,
Matthew Wright,
Carolyn Yarnall
Abstract:
In the system of approval voting, individuals vote for all candidates they find acceptable. Many approval voting situations can be modeled geometrically, and thus geometric concepts such as the piercing number have a natural interpretation. In this paper, we explore piercing numbers in the setting where voter preferences can be modeled by congruent arcs on a circle -- i.e., in fixed-length circula…
▽ More
In the system of approval voting, individuals vote for all candidates they find acceptable. Many approval voting situations can be modeled geometrically, and thus geometric concepts such as the piercing number have a natural interpretation. In this paper, we explore piercing numbers in the setting where voter preferences can be modeled by congruent arcs on a circle -- i.e., in fixed-length circular societies. Given a number of voters and the length of the voter preference arcs, we give bounds on the possible piercing number of the society. Further, we explore which piercing numbers are more likely. Specifically, under the assumption of uniformly distributed voter preference arcs, we determine the probability distribution of the piercing number of societies in which the length of the arcs is sufficiently small. We end with simulations that give estimated probabilities of piercing number for societies with larger voter preference arcs.
△ Less
Submitted 8 April, 2022; v1 submitted 4 August, 2020;
originally announced August 2020.
-
Topological Data Analysis on Simple English Wikipedia Articles
Authors:
Matthew Wright,
Xiaojun Zheng
Abstract:
Single-parameter persistent homology, a key tool in topological data analysis, has been widely applied to data problems along with statistical techniques that quantify the significance of the results. In contrast, statistical techniques for two-parameter persistence, while highly desirable for real-world applications, have scarcely been considered. We present three statistical approaches for compa…
▽ More
Single-parameter persistent homology, a key tool in topological data analysis, has been widely applied to data problems along with statistical techniques that quantify the significance of the results. In contrast, statistical techniques for two-parameter persistence, while highly desirable for real-world applications, have scarcely been considered. We present three statistical approaches for comparing geometric data using two-parameter persistent homology; these approaches rely on the Hilbert function, matching distance, and barcodes obtained from two-parameter persistence modules computed from the point-cloud data. Our statistical methods are broadly applicable for analysis of geometric data indexed by a real-valued parameter. We apply these approaches to analyze high-dimensional point-cloud data obtained from Simple English Wikipedia articles. In particular, we show how our methods can be utilized to distinguish certain subsets of the Wikipedia data and to compare with random data. These results yield insights into the construction of null distributions and stability of our methods with respect to noisy data.
△ Less
Submitted 11 December, 2020; v1 submitted 30 June, 2020;
originally announced July 2020.
-
Macroscopic Modeling, Calibration, and Simulation of Managed Lane-Freeway Networks, Part II: Network-scale Calibration and Case Studies
Authors:
Matthew A. Wright,
Roberto Horowitz,
Alex A. Kurzhanskiy
Abstract:
In Part I of this paper series, several macroscopic traffic model elements for mathematically describing freeway networks equipped with managed lane facilities were proposed. These modeling techniques seek to capture at the macroscopic the complex phenomena that occur on managed lane-freeway networks, where two parallel traffic flows interact with each other both in the physical sense (how and whe…
▽ More
In Part I of this paper series, several macroscopic traffic model elements for mathematically describing freeway networks equipped with managed lane facilities were proposed. These modeling techniques seek to capture at the macroscopic the complex phenomena that occur on managed lane-freeway networks, where two parallel traffic flows interact with each other both in the physical sense (how and where cars flow between the two lane groups) and the physiological sense (how driving behaviors are changed by being adjacent to a quantitatively and qualitatively different traffic flow).
The local descriptions we developed in Part I are not the only modeling complexity introduced in managed lane-freeway networks. The complex topologies mean that network-scale modeling of a freeway corridor is increased in complexity as well. The already-difficult model calibration problem for a dynamic model of a freeway becomes more complex when the freeway becomes, in effect, two interrelating flow streams. In the present paper, we present an iterative-learning-based approach to calibrating our model's physical and driver-behavioral parameters. We consider the common situation where a complex traffic model needs to be calibrated to recreate real-world baseline traffic behavior, such that counterfactuals can be generated by training purposes. Our method is used to identify traditional freeway parameters as well as the proposed parameters that describe managed lane-freeway-network-specific behaviors. We validate our model and calibration methodology with case studies of simulations of two managed lane-equipped California freeways.
△ Less
Submitted 26 August, 2019;
originally announced August 2019.
-
Computing Minimal Presentations and Bigraded Betti Numbers of 2-Parameter Persistent Homology
Authors:
Michael Lesnick,
Matthew Wright
Abstract:
Motivated by applications to topological data analysis, we give an efficient algorithm for computing a (minimal) presentation of a bigraded $K[x,y]$-module $M$, where $K$ is a field. The algorithm takes as input a short chain complex of free modules $X\xrightarrow{f} Y \xrightarrow{g} Z$ such that $M\cong \ker{g}/\mathrm{im}{f}$. It runs in time $O(|X|^3+|Y|^3+|Z|^3)$ and requires…
▽ More
Motivated by applications to topological data analysis, we give an efficient algorithm for computing a (minimal) presentation of a bigraded $K[x,y]$-module $M$, where $K$ is a field. The algorithm takes as input a short chain complex of free modules $X\xrightarrow{f} Y \xrightarrow{g} Z$ such that $M\cong \ker{g}/\mathrm{im}{f}$. It runs in time $O(|X|^3+|Y|^3+|Z|^3)$ and requires $O(|X|^2+|Y|^2+|Z|^2)$ memory, where $|\cdot |$ denotes the rank. Given the presentation computed by our algorithm, the bigraded Betti numbers of $M$ are readily computed. Our approach is based on a simple matrix reduction algorithm, slight variants of which compute kernels of morphisms between free modules, minimal generating sets, and Gröbner bases. Our algorithm for computing minimal presentations has been implemented in RIVET, a software tool for the visualization and analysis of two-parameter persistent homology. In experiments on topological data analysis problems, our implementation outperforms the standard computational commutative algebra packages Singular and Macaulay2 by a wide margin.
△ Less
Submitted 19 May, 2022; v1 submitted 15 February, 2019;
originally announced February 2019.
-
A Largest Empty Hypersphere Metaheuristic for Robust Optimisation with Implementation Uncertainty
Authors:
Martin Hughes,
Marc Goerigk,
Michael Wright
Abstract:
We consider box-constrained robust optimisation problems with implementation uncertainty. In this setting, the solution that a decision maker wants to implement may become perturbed. The aim is to find a solution that optimises the worst possible performance over all possible perturbances.
Previously, only few generic search methods have been developed for this setting. We introduce a new approa…
▽ More
We consider box-constrained robust optimisation problems with implementation uncertainty. In this setting, the solution that a decision maker wants to implement may become perturbed. The aim is to find a solution that optimises the worst possible performance over all possible perturbances.
Previously, only few generic search methods have been developed for this setting. We introduce a new approach for a global search, based on placing a largest empty hypersphere. We do not assume any knowledge on the structure of the original objective function, making this approach also viable for simulation-optimisation settings. In computational experiments we demonstrate a strong performance of our approach in comparison with state-of-the-art methods, which makes it possible to solve even high-dimensional problems.
△ Less
Submitted 7 September, 2018;
originally announced September 2018.
-
A Framework for Robust Assimilation of Potentially Malign Third-Party Data, and its Statistical Meaning
Authors:
Matthew A. Wright,
Roberto Horowitz
Abstract:
This paper presents a model-based method for fusing data from multiple sensors with a hypothesis-test-based component for rejecting potentially faulty or otherwise malign data. Our framework is based on an extension of the classic particle filter algorithm for real-time state estimation of uncertain systems with nonlinear dynamics with partial and noisy observations. This extension, based on class…
▽ More
This paper presents a model-based method for fusing data from multiple sensors with a hypothesis-test-based component for rejecting potentially faulty or otherwise malign data. Our framework is based on an extension of the classic particle filter algorithm for real-time state estimation of uncertain systems with nonlinear dynamics with partial and noisy observations. This extension, based on classical statistical theories, utilizes statistical tests against the system's observation model. We discuss the application of the two major statistical testing frameworks, Fisherian significance testing and Neyman-Pearsonian hypothesis testing, to the Monte Carlo and sensor fusion settings. The Monte Carlo Neyman-Pearson test we develop is useful when one has a reliable model of faulty data, while the Fisher one is applicable when one may not have a model of faults, which may occur when dealing with third-party data, like GNSS data of transportation system users. These statistical tests can be combined with a particle filter to obtain a Monte Carlo state estimation scheme that is robust to faulty or outlier data. We present a synthetic freeway traffic state estimation problem where the filters are able to reject simulated faulty GNSS measurements. The fault-model-free Fisher filter, while underperforming the Neyman-Pearson one when the latter has an accurate fault model, outperforms it when the assumed fault model is incorrect.
△ Less
Submitted 4 March, 2019; v1 submitted 4 September, 2018;
originally announced September 2018.
-
A Dynamic-System-Based Approach to Modeling Driver Movements Across General-Purpose/Managed Lane Interfaces
Authors:
Matthew A. Wright,
Roberto Horowitz,
Alex A. Kurzhanskiy
Abstract:
To help mitigate road congestion caused by the unrelenting growth of traffic demand, many transportation authorities have implemented managed lane policies, which restrict certain freeway lanes to certain types of vehicles. It was originally thought that managed lanes would improve the use of existing infrastructure through demand-management behaviors like carpooling, but implementations have ofte…
▽ More
To help mitigate road congestion caused by the unrelenting growth of traffic demand, many transportation authorities have implemented managed lane policies, which restrict certain freeway lanes to certain types of vehicles. It was originally thought that managed lanes would improve the use of existing infrastructure through demand-management behaviors like carpooling, but implementations have often been characterized by unpredicted phenomena that are sometimes detrimental to system performance. The development of traffic models that can capture these sorts of behaviors is a key step for hel** managed lanes deliver on their promised gains. Towards this goal, this paper presents an approach for solving for driver behavior of entering and exiting managed lanes at the macroscopic (i.e., fluid approximation of traffic) scale. Our method is inspired by recent work in extending a dynamic-system-based modeling framework from traffic behaviors on individual roads, to models at junctions, and can be considered a further extension of this dynamic-system paradigm to the route/lane choice problem. Unlike traditional route choice models that are often based on discrete-choice methods and often rely on computing and comparing drivers' estimated travel times from taking different routes, our method is agnostic to the particular choice of physical traffic model and is suited specifically towards making decisions at these interfaces using only local information. These features make it a natural drop-in component to extend existing dynamic traffic modeling methods.
△ Less
Submitted 3 July, 2018; v1 submitted 13 April, 2018;
originally announced April 2018.
-
Generic second-order macroscopic traffic node model for general multi-input multi-output road junctions via a dynamic system approach
Authors:
Matthew A. Wright,
Roberto Horowitz
Abstract:
This paper addresses an open problem in traffic modeling: the second-order macroscopic node problem. A second-order macroscopic traffic model, in contrast to a first-order model, allows for variation of driving behavior across subpopulations of vehicles in the flow. The second-order models are thus more descriptive (e.g., they have been used to model variable mixtures of behaviorally-different tra…
▽ More
This paper addresses an open problem in traffic modeling: the second-order macroscopic node problem. A second-order macroscopic traffic model, in contrast to a first-order model, allows for variation of driving behavior across subpopulations of vehicles in the flow. The second-order models are thus more descriptive (e.g., they have been used to model variable mixtures of behaviorally-different traffic, like car/truck traffic, autonomous/human-driven traffic, etc.), but are much more complex. The second-order node problem is a particularly complex problem, as it requires the resolution of discontinuities in traffic density and mixture characteristics, and solving of throughflows for arbitrary numbers of input and output roads to a node (in other words, this is an arbitrary-dimensional Riemann problem with two conserved quantities). In this paper, we extend the well-known "Generic Class of Node Model" constraints to the second order and present a simple solution algorithm to the second-order node problem. Our solution makes use of a recently-introduced dynamic system characterization of the first-order node model problem, which gives insight and intuition as to the continuous-time dynamics implicit in node models. We further argue that the common "supply and demand" construction of node models that decouples them from link models is not suitable to the second-order node problem. Our second-order node model and solution method have immediate applications in allowing modeling of behaviorally-complex traffic flows of contemporary interest (like partially-autonomous-vehicle flows) in arbitrary road networks.
△ Less
Submitted 18 June, 2019; v1 submitted 28 July, 2017;
originally announced July 2017.
-
Finding Minimum Spanning Forests in a Graph
Authors:
Abdel-Rahman Madkour,
Phillip Nadolny,
Matthew Wright
Abstract:
We introduce a graph partitioning problem motivated by computational topology and propose two algorithms that produce approximate solutions. Specifically, given a weighted, undirected graph $G$ and a positive integer $k$, we desire to find $k$ disjoint trees within $G$ such that each vertex of $G$ is contained in one of the trees and the weight of the largest tree is as small as possible. We are u…
▽ More
We introduce a graph partitioning problem motivated by computational topology and propose two algorithms that produce approximate solutions. Specifically, given a weighted, undirected graph $G$ and a positive integer $k$, we desire to find $k$ disjoint trees within $G$ such that each vertex of $G$ is contained in one of the trees and the weight of the largest tree is as small as possible. We are unable to find this problem in the graph partitioning literature, but we show that the problem is NP-complete. We then propose two approximation algorithms, one that uses a spectral clustering approach and another that employs a dynamic programming strategy, which produce near-optimal partitions on a family of test graphs. We describe these algorithms and analyze their empirical performance.
△ Less
Submitted 3 July, 2019; v1 submitted 1 May, 2017;
originally announced May 2017.
-
Approval Voting in Product Societies
Authors:
Kristen Mazur,
Mutiara Sondjaja,
Matthew Wright,
Carolyn Yarnall
Abstract:
In approval voting, individuals vote for all platforms that they find acceptable. In this situation it is natural to ask: When is agreement possible? What conditions guarantee that some fraction of the voters agree on even a single platform? Berg et. al. found such conditions when voters are asked to make a decision on a single issue that can be represented on a linear spectrum. In particular, the…
▽ More
In approval voting, individuals vote for all platforms that they find acceptable. In this situation it is natural to ask: When is agreement possible? What conditions guarantee that some fraction of the voters agree on even a single platform? Berg et. al. found such conditions when voters are asked to make a decision on a single issue that can be represented on a linear spectrum. In particular, they showed that if two out of every three voters agree on a platform, there is a platform that is acceptable to a majority of the voters. Hardin developed an analogous result when the issue can be represented on a circular spectrum. We examine scenarios in which voters must make two decisions simultaneously. For example, if voters must decide on the day of the week to hold a meeting and the length of the meeting, then the space of possible options forms a cylindrical spectrum. Previous results do not apply to these multi-dimensional voting societies because a voter's preference on one issue often impacts their preference on another. We present a general lower bound on agreement in a two-dimensional voting society, and then examine specific results for societies whose spectra are cylinders and tori.
△ Less
Submitted 28 March, 2017;
originally announced March 2017.
-
On the Uniqueness Problem for Notations of Recursive Ordinals
Authors:
Matthew Timothy Wright
Abstract:
In the article 'Ordinal Logics and the Characterizations of the Informal Concept of Proof', Georg Kreisel poses the problem of assigning unique notations to recursive ordinals, and additionally suggests that the methods which are developed for its solution will be non-constructive in character. In this paper we develop methods in which various uniqueness results for notations of recursive ordinals…
▽ More
In the article 'Ordinal Logics and the Characterizations of the Informal Concept of Proof', Georg Kreisel poses the problem of assigning unique notations to recursive ordinals, and additionally suggests that the methods which are developed for its solution will be non-constructive in character. In this paper we develop methods in which various uniqueness results for notations of recursive ordinals can be obtained, and thereafter apply these results to investigate the problems surrounding the hierarchical classification of the computable functions.
△ Less
Submitted 16 March, 2017; v1 submitted 16 February, 2017;
originally announced February 2017.
-
Particle-Filter-Enabled Real-Time Sensor Fault Detection Without a Model of Faults
Authors:
Matthew A. Wright,
Roberto Horowitz
Abstract:
We are experiencing an explosion in the amount of sensors measuring our activities and the world around us. These sensors are spread throughout the built environment and can help us perform state estimation and control of related systems, but they are often built and/or maintained by third parties or system users. As a result, by outsourcing system measurement to third parties, the controller must…
▽ More
We are experiencing an explosion in the amount of sensors measuring our activities and the world around us. These sensors are spread throughout the built environment and can help us perform state estimation and control of related systems, but they are often built and/or maintained by third parties or system users. As a result, by outsourcing system measurement to third parties, the controller must accept their measurements without being able to directly verify the sensors' correct operation. Instead, detection and rejection of measurements from faulty sensors must be done with the raw data only. Towards this goal, we present a method of detecting possibly faulty behavior of sensors. The method does not require that the control designer have any model of faulty sensor behavior. As we discuss, it turns out that the widely-used particle filter state estimation algorithm provides the ingredients necessary for a hypothesis test against all ranges of correct operating behavior, obviating the need for a fault model to compare measurements. We demonstrate the applicability of our method by demonstrating its ability to reject faulty measurements and improve state estimation accuracy in a nonlinear vehicle traffic model without information of generated faulty measurements' characteristics. In our test, we correctly identify nearly 90% of measurements as faulty or non-faulty without having any fault model. This leads to only a 3% increase in state estimation error over a theoretical 100%-accurate fault detector.
△ Less
Submitted 21 September, 2017; v1 submitted 21 September, 2016;
originally announced September 2016.
-
A dynamic system characterization of road network node models
Authors:
Matthew A. Wright,
Roberto Horowitz,
Alex A. Kurzhanskiy
Abstract:
The propagation of traffic congestion along roads is a commonplace nonlinear phenomenon. When many roads are connected in a network, congestion can spill from one road to others as drivers queue to enter a congested road, creating further nonlinearities in the network dynamics. This paper considers the node model problem, which refers to methods for solving for cross-flows when roads meet at a jun…
▽ More
The propagation of traffic congestion along roads is a commonplace nonlinear phenomenon. When many roads are connected in a network, congestion can spill from one road to others as drivers queue to enter a congested road, creating further nonlinearities in the network dynamics. This paper considers the node model problem, which refers to methods for solving for cross-flows when roads meet at a junction. We present a simple hybrid dynamic system that, given a macroscopic snapshot of the roads entering and exiting a node, intuitively models the node's throughflows over time. This dynamic system produces solutions to the node model problem that are equal to those produced by many popular node models without intuitive physical meanings. We also show how the earlier node models can be rederived as executions of our dynamic system. The intuitive physical description supplied by our system provides a base for control of the road junction system dynamics, as well as the emergent network dynamics.
△ Less
Submitted 26 August, 2016;
originally announced August 2016.
-
Interactive Visualization of 2-D Persistence Modules
Authors:
Michael Lesnick,
Matthew Wright
Abstract:
The goal of this work is to extend the standard persistent homology pipeline for exploratory data analysis to the 2-D persistence setting, in a practical, computationally efficient way. To this end, we introduce RIVET, a software tool for the visualization of 2-D persistence modules, and present mathematical foundations for this tool. RIVET provides an interactive visualization of the barcodes of…
▽ More
The goal of this work is to extend the standard persistent homology pipeline for exploratory data analysis to the 2-D persistence setting, in a practical, computationally efficient way. To this end, we introduce RIVET, a software tool for the visualization of 2-D persistence modules, and present mathematical foundations for this tool. RIVET provides an interactive visualization of the barcodes of 1-D affine slices of a 2-D persistence module $M$. It also computes and visualizes the dimension of each vector space in $M$ and the bigraded Betti numbers of $M$. At the heart of our computational approach is a novel data structure based on planar line arrangements, on which we can perform fast queries to find the barcode of any slice of $M$. We present an efficient algorithm for constructing this data structure and establish bounds on its complexity.
△ Less
Submitted 1 December, 2015;
originally announced December 2015.
-
On Defining AW*-algebras and Rickart C*-algebras
Authors:
Kazuyuki Saitô,
J. D. Maitland Wright
Abstract:
Let A be a C*-algebra. It is shown that A is an AW*-algebra if, and only if, each maximal abelian self--adjoint subalgebra of A is monotone complete. An analogous result is proved for Rickart C*-algebras; a C*-algebra is a Rickart C*-algebra if, and only if, it is unital and each maximal abelian self--adjoint subalgebra of A is monotone σ-complete.
Let A be a C*-algebra. It is shown that A is an AW*-algebra if, and only if, each maximal abelian self--adjoint subalgebra of A is monotone complete. An analogous result is proved for Rickart C*-algebras; a C*-algebra is a Rickart C*-algebra if, and only if, it is unital and each maximal abelian self--adjoint subalgebra of A is monotone σ-complete.
△ Less
Submitted 11 January, 2015;
originally announced January 2015.
-
An elementary proof of linear programming optimality conditions without using Farkas' lemma
Authors:
Anders Forsgren,
Margaret H. Wright
Abstract:
Although it is easy to prove the sufficient conditions for optimality of a linear program, the necessary conditions pose a pedagogical challenge. A widespread practice in deriving the necessary conditions is to invoke Farkas' lemma, but proofs of Farkas' lemma typically involve "nonlinear" topics such as separating hyperplanes between disjoint convex sets, or else more advanced LP-related material…
▽ More
Although it is easy to prove the sufficient conditions for optimality of a linear program, the necessary conditions pose a pedagogical challenge. A widespread practice in deriving the necessary conditions is to invoke Farkas' lemma, but proofs of Farkas' lemma typically involve "nonlinear" topics such as separating hyperplanes between disjoint convex sets, or else more advanced LP-related material such as duality and anti-cycling strategies in the simplex method. An alternative approach taken previously by several authors is to avoid Farkas' lemma through a direct proof of the necessary conditions. In that spirit, this paper presents what we believe to be an "elementary" proof of the necessary conditions that does not rely on Farkas' lemma and is independent of the simplex method, relying only on linear algebra and a perturbation technique published in 1952 by Charnes. No claim is made that the results are new, but we hope that the proofs may be useful for those who teach linear programming.
△ Less
Submitted 4 July, 2014;
originally announced July 2014.
-
A Hadwiger Theorem for Simplicial Maps
Authors:
P. Christopher Staecker,
Matthew L. Wright
Abstract:
We define the notion of valuation on simplicial maps between geometric realizations of simplicial complexes in $\mathbb{R}^n$. Valuations on simplicial maps are analogous to valuations on sets. In particular, we define the Lefschetz volumes, which are analogous to the intrinsic volumes of subsets of $\mathbb{R}^n$. Our definition not only provides a generalization of the Lefschetz number, but also…
▽ More
We define the notion of valuation on simplicial maps between geometric realizations of simplicial complexes in $\mathbb{R}^n$. Valuations on simplicial maps are analogous to valuations on sets. In particular, we define the Lefschetz volumes, which are analogous to the intrinsic volumes of subsets of $\mathbb{R}^n$. Our definition not only provides a generalization of the Lefschetz number, but also yields a Hadwiger-style classification theorem for all such valuations.
△ Less
Submitted 25 February, 2014;
originally announced February 2014.
-
Intrinsic Volumes of Random Cubical Complexes
Authors:
Michael Werman,
Matthew L. Wright
Abstract:
Intrinsic volumes, which generalize both Euler characteristic and Lebesgue volume, are important properties of $d$-dimensional sets. A random cubical complex is a union of unit cubes, each with vertices on a regular cubic lattice, constructed according to some probability model. We analyze and give exact polynomial formulae, dependent on a probability, for the expected value and variance of the in…
▽ More
Intrinsic volumes, which generalize both Euler characteristic and Lebesgue volume, are important properties of $d$-dimensional sets. A random cubical complex is a union of unit cubes, each with vertices on a regular cubic lattice, constructed according to some probability model. We analyze and give exact polynomial formulae, dependent on a probability, for the expected value and variance of the intrinsic volumes of several models of random cubical complexes. We then prove a central limit theorem for these intrinsic volumes. For our primary model, we also prove an interleaving theorem for the zeros of the expected-value polynomials. The intrinsic volumes of cubical complexes are useful for understanding the shape of random $d$-dimensional sets and for characterizing noise in applications.
△ Less
Submitted 2 January, 2015; v1 submitted 21 February, 2014;
originally announced February 2014.
-
Hadwiger Integration of Random Fields
Authors:
Matthew L. Wright
Abstract:
Hadwiger integrals employ the intrinsic volumes as measures for integration of real-valued functions. We provide a formula for the expected values of Hadwiger integrals of Gaussian-related random fields. The expected Hadwiger integrals of random fields are both theoretically interesting and potentially useful in applications such as sensor networks, image processing, and cell dynamics. Furthermore…
▽ More
Hadwiger integrals employ the intrinsic volumes as measures for integration of real-valued functions. We provide a formula for the expected values of Hadwiger integrals of Gaussian-related random fields. The expected Hadwiger integrals of random fields are both theoretically interesting and potentially useful in applications such as sensor networks, image processing, and cell dynamics. Furthermore, combining the expected integrals with a functional version of Hadwiger's theorem, we obtain expected values of more general valuations on Gaussian-related random fields.
△ Less
Submitted 23 May, 2014; v1 submitted 13 November, 2013;
originally announced November 2013.
-
Monotone Complete C*-algebras and Generic Dynamics
Authors:
Kazuyuki Saito,
J. D. Maitland Wright
Abstract:
Let S be the Stone space of a complete, non-atomic Boolean algebra. Let G be a countably infinite group of homeomorphisms of S. Let the action of G on S have a free dense orbit. Then we prove that, on a generic subset of S, the orbit equivalence relation coming from this action can also be obtained as an action of the (abelian) Dyadic Group. For the special case where the complete Boolean algebra…
▽ More
Let S be the Stone space of a complete, non-atomic Boolean algebra. Let G be a countably infinite group of homeomorphisms of S. Let the action of G on S have a free dense orbit. Then we prove that, on a generic subset of S, the orbit equivalence relation coming from this action can also be obtained as an action of the (abelian) Dyadic Group. For the special case where the complete Boolean algebra is the algebra of regular open subsets of the real numbers, this reduces to a theorem of Sullivan-Weiss-Wright. By applying our new dynamical results we improve on an earlier paper by constructing a family of monotone complete C*-algebras, {B(t):t in T} with the following properties. First,T is large; it can be identified with the set of all subsets of the reals. Secondly each B(t) is a small C*-algebra,which is a monotone complete factor of Type III, is hyperfinite and is not a von Neumann algebra.Thirdly, when t is not equal to s, then B(s) is not isomorphic to B(t). In fact, B(s) and B(t) take different values in the classification semi-group for small monotone complete C*-algebras.
△ Less
Submitted 28 December, 2012;
originally announced December 2012.
-
Hadwiger's Theorem for Definable Functions
Authors:
Yuliy Baryshnikov,
Robert Ghrist,
Matthew Wright
Abstract:
Hadwiger's Theorem states that Euclidean-invariant convex-continuous valuations of definable sets are linear combinations of intrinsic volumes. We lift this result from sets to data distributions over sets, specifically, to definable real-valued functions on n-dimensional Euclidean space. This generalizes intrinsic volumes to (dual pairs) of non-linear valuations on functions and provides a dual p…
▽ More
Hadwiger's Theorem states that Euclidean-invariant convex-continuous valuations of definable sets are linear combinations of intrinsic volumes. We lift this result from sets to data distributions over sets, specifically, to definable real-valued functions on n-dimensional Euclidean space. This generalizes intrinsic volumes to (dual pairs) of non-linear valuations on functions and provides a dual pair of Hadwiger classification theorems.
△ Less
Submitted 28 June, 2013; v1 submitted 27 March, 2012;
originally announced March 2012.
-
Convergence of the restricted Nelder-Mead algorithm in two dimensions
Authors:
Jeffrey C. Lagarias,
Bjorn Poonen,
Margaret H. Wright
Abstract:
The Nelder-Mead algorithm, a longstanding direct search method for unconstrained optimization published in 1965, is designed to minimize a scalar-valued function f of n real variables using only function values, without any derivative information. Each Nelder-Mead iteration is associated with a nondegenerate simplex defined by n+1 vertices and their function values; a typical iteration produces a…
▽ More
The Nelder-Mead algorithm, a longstanding direct search method for unconstrained optimization published in 1965, is designed to minimize a scalar-valued function f of n real variables using only function values, without any derivative information. Each Nelder-Mead iteration is associated with a nondegenerate simplex defined by n+1 vertices and their function values; a typical iteration produces a new simplex by replacing the worst vertex by a new point. Despite the method's widespread use, theoretical results have been limited: for strictly convex objective functions of one variable with bounded level sets, the algorithm always converges to the minimizer; for such functions of two variables, the diameter of the simplex converges to zero, but examples constructed by McKinnon show that the algorithm may converge to a nonminimizing point.
This paper considers the restricted Nelder-Mead algorithm, a variant that does not allow expansion steps. In two dimensions we show that, for any nondegenerate starting simplex and any twice-continuously differentiable function with positive definite Hessian and bounded level sets, the algorithm always converges to the minimizer. The proof is based on treating the method as a discrete dynamical system, and relies on several techniques that are non-standard in convergence proofs for unconstrained optimization.
△ Less
Submitted 3 April, 2011;
originally announced April 2011.
-
A Krylov subspace algorithm for evaluating the phi-functions appearing in exponential integrators
Authors:
Jitse Niesen,
Will M. Wright
Abstract:
We develop an algorithm for computing the solution of a large system of linear ordinary differential equations (ODEs) with polynomial inhomogeneity. This is equivalent to computing the action of a certain matrix function on the vector representing the initial condition. The matrix function is a linear combination of the matrix exponential and other functions related to the exponential (the so-call…
▽ More
We develop an algorithm for computing the solution of a large system of linear ordinary differential equations (ODEs) with polynomial inhomogeneity. This is equivalent to computing the action of a certain matrix function on the vector representing the initial condition. The matrix function is a linear combination of the matrix exponential and other functions related to the exponential (the so-called phi-functions). Such computations are the major computational burden in the implementation of exponential integrators, which can solve general ODEs. Our approach is to compute the action of the matrix function by constructing a Krylov subspace using Arnoldi or Lanczos iteration and projecting the function on this subspace. This is combined with time-step** to prevent the Krylov subspace from growing too large. The algorithm is fully adaptive: it varies both the size of the time steps and the dimension of the Krylov subspace to reach the required accuracy. We implement this algorithm in the Matlab function phipm and we give instructions on how to obtain and use this function. Various numerical experiments show that the phipm function is often significantly more efficient than the state-of-the-art.
△ Less
Submitted 11 November, 2010; v1 submitted 27 July, 2009;
originally announced July 2009.
-
On the Hopf Algebraic Structure of Lie Group Integrators
Authors:
H. Z. Munthe-Kaas,
W. M. Wright
Abstract:
A commutative but not cocommutative graded Hopf algebra $\Hn$, based on ordered rooted trees, is studied. This Hopf algebra generalizes the Hopf algebraic structure of unordered rooted trees $\Hc$, developed by Butcher in his study of Runge--Kutta methods and later rediscovered by Connes and Moscovici in the context of non-commutative geometry and by Kreimer where it is used to describe renormal…
▽ More
A commutative but not cocommutative graded Hopf algebra $\Hn$, based on ordered rooted trees, is studied. This Hopf algebra generalizes the Hopf algebraic structure of unordered rooted trees $\Hc$, developed by Butcher in his study of Runge--Kutta methods and later rediscovered by Connes and Moscovici in the context of non-commutative geometry and by Kreimer where it is used to describe renormalization in quantum field theory. It is shown that $\Hn$ is naturally obtained from a universal object in a category of non-commutative derivations, and in particular, it forms a foundation for the study of numerical integrators based on non-commutative Lie group actions on a manifold. Recursive and non-recursive definitions of the coproduct and the antipode are derived. It is also shown that the dual of $\Hn$ is a Hopf algebra of Grossman and Larson. $\Hn$ contains two well-known Hopf algebras as special cases: The Hopf algebra $\Hc$ of Butcher--Connes--Kreimer is identified as a proper subalgebra of $\Hn$ using the image of a tree symmetrization operator. The Hopf algebra $\Hf$ of the Free Associative Algebra is obtained from $\Hn$ by a quotient construction.
△ Less
Submitted 1 March, 2006;
originally announced March 2006.
-
On Tracial Operator Representations of Quantum Decoherence Functionals
Authors:
Oliver Rudolph,
J. D. Maitland Wright
Abstract:
A general `quantum history theory' can be characterised by the space of histories and by the space of decoherence functionals. In this note we consider the situation where the space of histories is given by the lattice of projection operators on an infinite dimensional Hilbert space $H$. We study operator representations for decoherence functionals on this space of histories. We first give neces…
▽ More
A general `quantum history theory' can be characterised by the space of histories and by the space of decoherence functionals. In this note we consider the situation where the space of histories is given by the lattice of projection operators on an infinite dimensional Hilbert space $H$. We study operator representations for decoherence functionals on this space of histories. We first give necessary and sufficient conditions for a decoherence functional being representable by a trace class operator on $H \otimes H$, an infinite dimensional analogue of the Isham-Linden-Schreckenberg representation for finite dimensions. Since this excludes many decoherence functionals of physical interest, we then identify the large and physically important class of decoherence functionals which can be represented, canonically, by bounded operators on $H \otimes H$.
△ Less
Submitted 31 May, 1997;
originally announced June 1997.
-
The Mackey-Gleason Problem
Authors:
L. J. Bunce,
J. D. Maitland Wright
Abstract:
Let $A$ be a von Neumann algebra with no direct summand of Type $\roman I_2$, and let $\scr P(A)$ be its lattice of projections. Let $X$ be a Banach space. Let $m\:\scr P(A)\to X$ be a bounded function such that $m(p+q)=m(p)+m(q)$ whenever $p$ and $q$ are orthogonal projections. The main theorem states that $m$ has a unique extension to a bounded linear operator from $A$ to $X$. In particular, e…
▽ More
Let $A$ be a von Neumann algebra with no direct summand of Type $\roman I_2$, and let $\scr P(A)$ be its lattice of projections. Let $X$ be a Banach space. Let $m\:\scr P(A)\to X$ be a bounded function such that $m(p+q)=m(p)+m(q)$ whenever $p$ and $q$ are orthogonal projections. The main theorem states that $m$ has a unique extension to a bounded linear operator from $A$ to $X$. In particular, each bounded complex-valued finitely additive quantum measure on $\scr P(A)$ has a unique extension to a bounded linear functional on $A$.
△ Less
Submitted 31 March, 1992;
originally announced April 1992.