Mathematics

Date: Thu, 9 May 2024 | Total: 152

#1 Causality Pursuit from Heterogeneous Environments via Neural Adversarial Invariance Learning [PDF] [Copy] [Kimi2]

Authors: Yihong Gu ; Cong Fang ; Peter Bühlmann ; Jianqing Fan

Statistics suffers from a fundamental problem, "the curse of endogeneity" -- the regression function, or more broadly the prediction risk minimizer with infinite data, may not be the target we wish to pursue. This is because when complex data are collected from multiple sources, the biases deviated from the interested (causal) association inherited in individuals or sub-populations are not expected to be canceled. Traditional remedies are of hindsight and restrictive in being tailored to prior knowledge like untestable cause-effect structures, resulting in methods that risk model misspecification and lack scalable applicability. This paper seeks to offer a purely data-driven and universally applicable method that only uses the heterogeneity of the biases in the data rather than following pre-offered commandments. Such an idea is formulated as a nonparametric invariance pursuit problem, whose goal is to unveil the invariant conditional expectation $m^\star(x)\equiv \mathbb{E}[Y^{(e)}|X_{S^\star}^{(e)}=x_{S^\star}]$ with unknown important variable set $S^\star$ across heterogeneous environments $e\in \mathcal{E}$. Under the structural causal model framework, $m^\star$ can be interpreted as certain data-driven causality in general. The paper contributes to proposing a novel framework, called Focused Adversarial Invariance Regularization (FAIR), formulated as a single minimax optimization program that can solve the general invariance pursuit problem. As illustrated by the unified non-asymptotic analysis, our adversarial estimation framework can attain provable sample-efficient estimation akin to standard regression under a minimal identification condition for various tasks and models. As an application, the FAIR-NN estimator realized by two Neural Network classes is highlighted as the first approach to attain statistically efficient estimation in general nonparametric invariance learning.

#2 Communication-Efficient Collaborative Perception via Information Filling with Codebook [PDF2] [Copy] [Kimi]

Authors: Yue Hu ; Juntong Peng ; Sifei Liu ; Junhao Ge ; Si Liu ; Siheng Chen

Collaborative perception empowers each agent to improve its perceptual ability through the exchange of perceptual messages with other agents. It inherently results in a fundamental trade-off between perception ability and communication cost. To address this bottleneck issue, our core idea is to optimize the collaborative messages from two key aspects: representation and selection. The proposed codebook-based message representation enables the transmission of integer codes, rather than high-dimensional feature maps. The proposed information-filling-driven message selection optimizes local messages to collectively fill each agent's information demand, preventing information overflow among multiple agents. By integrating these two designs, we propose CodeFilling, a novel communication-efficient collaborative perception system, which significantly advances the perception-communication trade-off and is inclusive to both homogeneous and heterogeneous collaboration settings. We evaluate CodeFilling in both a real-world dataset, DAIR-V2X, and a new simulation dataset, OPV2VH+. Results show that CodeFilling outperforms previous SOTA Where2comm on DAIR-V2X/OPV2VH+ with 1,333/1,206 times lower communication volume. Our code is available at https://github.com/PhyllisH/CodeFilling.

#3 Robust deep learning from weakly dependent data [PDF1] [Copy] [Kimi]

Authors: William Kengne ; Modou Wade

Recent developments on deep learning established some theoretical properties of deep neural networks estimators. However, most of the existing works on this topic are restricted to bounded loss functions or (sub)-Gaussian or bounded input. This paper considers robust deep learning from weakly dependent observations, with unbounded loss function and unbounded input/output. It is only assumed that the output variable has a finite $r$ order moment, with $r >1$. Non asymptotic bounds for the expected excess risk of the deep neural network estimator are established under strong mixing, and $\psi$-weak dependence assumptions on the observations. We derive a relationship between these bounds and $r$, and when the data have moments of any order (that is $r=\infty$), the convergence rate is close to some well-known results. When the target predictor belongs to the class of H\"older smooth functions with sufficiently large smoothness index, the rate of the expected excess risk for exponentially strongly mixing data is close to or as same as those for obtained with i.i.d. samples. Application to robust nonparametric regression and robust nonparametric autoregression are considered. The simulation study for models with heavy-tailed errors shows that, robust estimators with absolute loss and Huber loss function outperform the least squares method.

#4 Towards field theory of multiple D0-branes. Hamiltonian mechanics and quantization of simplest 3D prototype of multiple D0-brane system [PDF] [Copy] [Kimi]

Authors: Igor Bandos ; Unai D. M. Sarraga

Recently we have constructed a completely supersymmetric nonlinear action possessing the properties expected from multiple D0-brane system. Its quantization should result in an interesting supersymmetric field theory in the (super)space with additional matrix coordinates which can provide an important insights in the study of String Theory. As a first stage toward this aim, in this paper we construct the Hamiltonian mechanics and perform covariant quantization of the simplest three dimensional counterpart of the ten dimensional multiple D0-brane model. We obtain a supersymmetric system of equations in super-spacetime enlarged by bosonic and fermionic matrix coordinates which appears as a result of such quantization and discuss some of its properties.

#5 Differentially Private Synthetic Data with Private Density Estimation [PDF] [Copy] [Kimi]

Authors: Nikolija Bojkovic ; Po-Ling Loh

The need to analyze sensitive data, such as medical records or financial data, has created a critical research challenge in recent years. In this paper, we adopt the framework of differential privacy, and explore mechanisms for generating an entire dataset which accurately captures characteristics of the original data. We build upon the work of Boedihardjo et al, which laid the foundations for a new optimization-based algorithm for generating private synthetic data. Importantly, we adapt their algorithm by replacing a uniform sampling step with a private distribution estimator; this allows us to obtain better computational guarantees for discrete distributions, and develop a novel algorithm suitable for continuous distributions. We also explore applications of our work to several statistical tasks.

#6 Understanding High-Order Network Structure using Permissible Walks on Attributed Hypergraphs [PDF] [Copy] [Kimi]

Authors: Enzo Battistella ; Sean English ; Robert Green ; Cliff Joslyn ; Evgeniya Lagoda ; Van Magnan ; Audun Myers ; Evan D. Nash ; Michael Robinson

Hypergraphs have been a recent focus of study in mathematical data science as a tool to understand complex networks with high-order connections. One question of particular relevance is how to leverage information carried in hypergraph attributions when doing walk-based techniques. In this work, we focus on a new generalization of a walk in a network that recovers previous approaches and allows for a description of permissible walks in hypergraphs. Permissible walk graphs are constructed by intersecting the attributed $s$-line graph of a hypergraph with a relation respecting graph. The attribution of the hypergraph's line graph commonly carries over information from categorical and temporal attributions of the original hypergraph. To demonstrate this approach on a temporally attributed example, we apply our framework to a Reddit data set composed of hyperedges as threads and authors as nodes where post times are tracked.

#7 Complex Scaling Method applied to the study of the Swanson Hamiltonian in the broken PT-symmetry phase [PDF] [Copy] [Kimi]

Authors: Viviano Fernández ; Romina Ramírez ; Marta Reboiro

In this work, we study the non-PT symmetry phase of the Swanson Hamiltonian in the framework of the Complex Scaling Method. By constructing a bi-orthogonality relation, we apply the formalism of the response function to analyse the time evolution of different initial wave packages. The Wigner Functions and mean value of operators are evaluated as a function of time. We analyse in detail the time evolution in the neighbourhood of Exceptional Points. We derive a continuity equation for the system. We compare the results obtained using the Complex Scaling Method to the ones obtained by working in a Rigged Hilbert Space.

#8 Numerical Fuzz: A Type System for Rounding Error Analysis [PDF] [Copy] [Kimi]

Authors: Ariel E. Kellison ; Justin Hsu

Algorithms operating on real numbers are implemented as floating-point computations in practice, but floating-point operations introduce roundoff errors that can degrade the accuracy of the result. We propose $\Lambda_{num}$, a functional programming language with a type system that can express quantitative bounds on roundoff error. Our type system combines a sensitivity analysis, enforced through a linear typing discipline, with a novel graded monad to track the accumulation of roundoff errors. We prove that our type system is sound by relating the denotational semantics of our language to the exact and floating-point operational semantics. To demonstrate our system, we instantiate $\Lambda_{num}$ with error metrics proposed in the numerical analysis literature and we show how to incorporate rounding operations that faithfully model aspects of the IEEE 754 floating-point standard. To show that $\Lambda_{num}$ can be a useful tool for automated error analysis, we develop a prototype implementation for $\Lambda_{num}$ that infers error bounds that are competitive with existing tools, while often running significantly faster. Finally, we consider semantic extensions of our graded monad to bound error under more complex rounding behaviors, such as non-deterministic and randomized rounding.

#9 Non-anomalous non-invertible symmetries in 1+1D from gapped boundaries of SymTFTs [PDF] [Copy] [Kimi]

Authors: Pavel Putrov ; Rajath Radhakrishnan

We study the anomalies of non-invertible symmetries in 1+1D QFTs using gapped boundaries of its SymTFT. We establish the explicit relation between Lagrangian algebras which determine gapped boundaries of the SymTFT, and algebras which determine non-anomalous/gaugeable topological line operators in the 1+1D QFT. If the Lagrangian algebras in the SymTFT are known, this provides a method to compute algebras in all fusion categories that share the same SymTFT. We find necessary conditions that a line operator in the SymTFT must satisfy for the corresponding line operator in the 1+1D QFT to be non-anomalous. We use this constraint to show that a non-invertible symmetry admits a 1+1D trivially gapped phase if and only if the SymTFT admits a magnetic Lagrangian algebra. We define a process of transporting non-anomalous line operators between fusion categories which share the same SymTFT and apply this method to the three Haagerup fusion categories.

#10 Untangling Lariats: Subgradient Following of Variationally Penalized Objectives [PDF] [Copy] [Kimi]

Authors: Kai-Chia Mo ; Shai Shalev-Shwartz ; Nisæl Shártov

We describe a novel subgradient following apparatus for calculating the optimum of convex problems with variational penalties. In this setting, we receive a sequence $y_i,\ldots,y_n$ and seek a smooth sequence $x_1,\ldots,x_n$. The smooth sequence attains the minimum Bregman divergence to an input sequence with additive variational penalties in the general form of $\sum_i g_i(x_{i+1}-x_i)$. We derive, as special cases of our apparatus, known algorithms for the fused lasso and isotonic regression. Our approach also facilitates new variational penalties such as non-smooth barrier functions. We next derive and analyze multivariate problems in which $\mathbf{x}_i,\mathbf{y}_i\in\mathbb{R}^d$ and variational penalties that depend on $\|\mathbf{x}_{i+1}-\mathbf{x}_i\|$. The norms we consider are $\ell_2$ and $\ell_\infty$ which promote group sparsity. Last but not least, we derive a lattice-based subgradient following for variational penalties characterized through the output of arbitrary convolutional filters. This paradigm yields efficient solvers for problems in which sparse high-order discrete derivatives such as acceleration and jerk are desirable.

#11 Cluster Alphabets from Generalized Worldsheets: A Geometric Approach to Finite Types [PDF] [Copy] [Kimi]

Authors: Peng Zhao ; Yihong Wang

We provide a systematic derivation of cluster alphabets of finite types. The construction is based on a geometric realization of the generalized worldsheets by gluing and folding a pair of polygons. The cross ratios of the worldsheet z variables are evolved using the Y-system equations. By a new gauge choice, we obtain a simpler set of cluster alphabets than the known ones.

#12 Effective alpha theory certification using interval arithmetic: alpha theory over regions [PDF] [Copy] [Kimi]

Author: Kisun Lee

We reexamine Smale's alpha theory as a way to certify a numerical solution to an analytic system. For a given point and a system, Smale's alpha theory determines whether Newton's method applied to this point shows the quadratic convergence to an exact solution. We introduce the alpha theory computation using interval arithmetic to avoid costly exact arithmetic. As a straightforward variation of the alpha theory, our work improves computational efficiency compared to software employing the traditional alpha theory.

#13 Modified version of open TASEP with dynamic defects [PDF] [Copy] [Kimi]

Authors: Nikhil Bhatia ; Arvind Kumar Gupta

We propose a modification to the study of site-wise dynamically disordered totally asymmetric simple exclusion process (TASEP). Motivated by the process of gene transcription, a study in ref. [39] introduced an extension of TASEP, where the defects (or obstacles) bind/un-bind dynamically to the sites of the lattice and the hopping of the particles on lattice faces a hindrance if the arrival site is occupied by an obstacle. In addition, the particle is only allowed to enter the lattice provided the first site is defect-free. In our study, we propose that the particle movement at the entry of the lattice must face an equal hindrance that is provided by the obstacles to the rest of the particles on the lattice. For open boundaries, the continuum mean-field equations are derived and solved numerically to obtain steady-state phase diagrams and density profiles. The presence of obstacles produces a shift in the phase boundaries obtained but the same three phases as obtained for the standard TASEP. Contrary to the model introduced in ref. \cite{waclaw2019totally}, the idea to introduce the modification at the entrance shows that the limiting case $p_d \rightarrow 1$ converges to the standard TASEP, where $p_d$ refers to the affected hopping rate due to presence of obstacle. The mean-field solutions are validated using extensive Monte Carlo simulations.

#14 A unified theory of the self-similar supersonic Marshak wave problem [PDF] [Copy] [Kimi]

Authors: Menahem Krief ; Ryan G. McClarren

We present a systematic study of the similarity solutions for the Marshak wave problem, in the local thermodynamic equilibrium (LTE) diffusion approximation and in the supersonic regime. Self-similar solutions exist for a temporal power law surface temperature drive and a material model with power law temperature dependent opacity and energy density. The properties of the solutions in both linear and nonlinear conduction regimes are studied as a function of the temporal drive, opacity and energy density exponents. We show that there exists a range of the temporal exponent for which the total energy in the system decreases, and the solution has a local maxima. For nonlinear conduction, we specify the conditions on the opacity and energy density exponents under which the heat front is linear or even flat, and does posses its common sharp character; this character is independent of the drive exponent. We specify the values of the temporal exponents for which analytical solutions exist and employ the Hammer-Rosen perturbation theory to obtain highly accurate approximate solutions, which are parameterized using only two numerically fitted quantities. The solutions are used to construct a set of benchmarks for supersonic LTE radiative heat transfer, including some with unusual and interesting properties such as local maxima and non sharp fronts. The solutions are compared in detail to implicit Monte-Carlo and discrete-ordinate transport simulations as well gray diffusion simulations, showing a good agreement, which highlights their usefulness as a verification test problem for radiative transfer simulations.

#15 Axiomatization of approximate exclusion [PDF] [Copy] [Kimi]

Author: Matilda Häggblom

We define and axiomatize approximate exclusion atoms in the team semantic setting. A team is a set of assignments, which can be seen as a mathematical model of a uni-relational database, and we say that an approximate exclusion atom is satisfied in a team if the corresponding usual exclusion atom is satisfied in a large enough subteam. We consider the implication problem for approximate exclusion atoms and show that it is axiomatizable for consequences with a degree of approximation that is not too large. We prove the completeness theorem for usual exclusion atoms, which is currently missing from the literature, and generalize it to approximate exclusion atoms. We also provide a polynomial time algorithm for the implication problems. The results also apply to exclusion dependencies in database theory.

#16 Tunable Localisation in Parity-Time-Symmetric Resonator Arrays with Imaginary Gauge Potentials [PDF] [Copy] [Kimi]

Authors: Habib Ammari ; Silvio Barandun ; Ping Liu ; Alexander Uhlmann

The aim of this paper is to illustrate both analytically and numerically the interplay of two fundamentally distinct non-Hermitian mechanisms in a deep subwavelength regime. Considering a parity-time symmetric system of one-dimensional subwavelength resonators equipped with two kinds of non-Hermiticity - an imaginary gauge potential and on-site gain and loss - we prove that all but two eigenmodes of the system decouple when going through an exceptional point. By tuning the gain-to-loss ratio, the system changes from a phase with unbroken parity-time symmetry to a phase with broken parity-time symmetry. At the macroscopic level, this is observed as a transition from symmetrical eigenmodes to condensated eigenmodes at one edge of the structure. Mathematically, it arises from a topological state change. The results of this paper open the door to the justification of a variety of phenomena arising from the interplay between non-Hermitian reciprocal and non-reciprocal mechanisms not only in subwavelength wave physics but also in quantum mechanics where the tight binding model coupled with the nearest neighbour approximation can be analysed with the same tools as those developed here.

#17 Fast Fourier transforms and fast Wigner and Weyl functions in large quantum systems [PDF] [Copy] [Kimi]

Authors: C. Lei ; A. Vourdas

Two methods for fast Fourier transforms are used in a quantum context. The first method is for systems with dimension of the Hilbert space $D=d^n$ with $d$ an odd integer, and is inspired by the Cooley-Tukey formalism. The `large Fourier transform' is expressed as a sequence of $n$ `small Fourier transforms' (together with some other transforms) in quantum systems with $d$-dimensional Hilbert space. Limitations of the method are discussed. In some special cases, the $n$ Fourier transforms can be performed in parallel. The second method is for systems with dimension of the Hilbert space $D=d_0...d_{n-1}$ with $d_0,...,d_{n-1}$ odd integers coprime to each other. It is inspired by the Good formalism, which in turn is based on the Chinese reminder theorem. In this case also the `large Fourier transform' is expressed as a sequence of $n$ `small Fourier transforms' (that involve some constants related to the number theory that describes the formalism). The `small Fourier transforms' can be performed in a classical computer or in a quantum computer (in which case we have the additional well known advantages of quantum Fourier transform circuits). In the case that the small Fourier transforms are performed with a classical computer, complexity arguments for both methods show the reduction in computational time from ${\cal O}(D^2)$ to ${\cal O}(D\log D)$. The second method is also used for the fast calculation of Wigner and Weyl functions, in quantum systems with large finite dimension of the Hilbert space.

#18 Fusion rule in conformal field theories and topological orders: A unified view of correspondence and (fractional) supersymmetry and their relation to topological holography [PDF] [Copy] [Kimi]

Author: Yoshiki Fukusumi

Generalized symmetry, including non-invertible and categorical symmetry, plays a central role in contemporary studies on topological orders (TOs) and the corresponding conformal field theories (CFTs). The generators of such symmetries have a close connection to non-abelian anyonic objects in a bulk CFT or chiral CFT (CCFT), but it has been known that the construction of a CCFT contains theoretical difficulties in general. In this work, we revisit the structure of the fusion rule in $Z_{N}$ symmetric chiral and bulk conformal field theories and the corresponding TOs. We propose a nontrivial expression of subalgebra structure in the fusion rule of a bulk CFT. We name this subalgebra "bulk semionization" which corresponds to the fusion rule of the CCFTs and categorical symmetry of the TOs. This is a bulk-edge correspondence based on the symmetry analysis and can be interpreted as a version of topological holography in the recent literature. The topological holography has been expected to be applicable to the systems in general space-time dimensions. Moreover, we give a concise way of unifying duality (or fractional supersymmetry), generalized or categorical symmetry, and Lagrangian subalgebra. Our method is potentially useful to formulate and study general TOs, fundamentally only from the data of bulk CFTs.

#19 Is Transductive Learning Equivalent to PAC Learning? [PDF] [Copy] [Kimi]

Authors: Shaddin Dughmi ; Yusuf Kalayci ; Grayson York

Most work in the area of learning theory has focused on designing effective Probably Approximately Correct (PAC) learners. Recently, other models of learning such as transductive error have seen more scrutiny. We move toward showing that these problems are equivalent by reducing agnostic learning with a PAC guarantee to agnostic learning with a transductive guarantee by adding a small number of samples to the dataset. We first rederive the result of Aden-Ali et al. arXiv:2304.09167 reducing PAC learning to transductive learning in the realizable setting using simpler techniques and at more generality as background for our main positive result. Our agnostic transductive to PAC conversion technique extends the aforementioned argument to the agnostic case, showing that an agnostic transductive learner can be efficiently converted to an agnostic PAC learner. Finally, we characterize the performance of the agnostic one inclusion graph algorithm of Asilis et al. arXiv:2309.13692 for binary classification, and show that plugging it into our reduction leads to an agnostic PAC learner that is essentially optimal. Our results imply that transductive and PAC learning are essentially equivalent for supervised learning with pseudometric losses in the realizable setting, and for binary classification in the agnostic setting. We conjecture this is true more generally for the agnostic setting.

#20 Stability and Performance Analysis of Discrete-Time ReLU Recurrent Neural Networks [PDF] [Copy] [Kimi]

Authors: Sahel Vahedi Noori ; Bin Hu ; Geir Dullerud ; Peter Seiler

This paper presents sufficient conditions for the stability and $\ell_2$-gain performance of recurrent neural networks (RNNs) with ReLU activation functions. These conditions are derived by combining Lyapunov/dissipativity theory with Quadratic Constraints (QCs) satisfied by repeated ReLUs. We write a general class of QCs for repeated RELUs using known properties for the scalar ReLU. Our stability and performance condition uses these QCs along with a "lifted" representation for the ReLU RNN. We show that the positive homogeneity property satisfied by a scalar ReLU does not expand the class of QCs for the repeated ReLU. We present examples to demonstrate the stability / performance condition and study the effect of the lifting horizon.

#21 Nonstandard arguments for results about infinite systems of equations in infinitely many variables [PDF] [Copy] [Kimi]

Author: David A. Ross

Short nonstandard proofs are given for some results about infinite systems of equations in infinitely many variables.

#22 Bivariate $P$- and $Q$-polynomial structures of the association schemes based on attenuated spaces [PDF] [Copy] [Kimi]

Authors: Pierre-Antoine Bernard ; Nicolas Crampe ; Luc Vinet ; Meri Zaimi ; Xiaohong Zhang

The bivariate $P$- and $Q$-polynomial structures of association schemes based on attenuated spaces are examined using recurrence and difference relations of the bivariate polynomials which form the eigenvalues of the scheme. These bispectral properties are obtained from contiguity relations of univariate dual $q$-Hahn and affine $q$-Krawtchouk polynomials. The bispectral algebra associated to the bivariate polynomials is investigated, as well as the subconstituent algebra of the schemes. The properties of the schemes are compared to those of the non-binary Johnson schemes through a limit.

#23 The Wedderburn-Artin Theorem [PDF] [Copy] [Kimi]

Author: Matej Brešar

The celebrated Wedderburn-Artin theorem states that a simple left artinian ring is isomorphic to the ring of matrices over a division ring. We give a short and self-contained proof which avoids the use of modules.

#24 Unique continuation for the wave equation based on a discontinuous Galerkin time discretization [PDF] [Copy] [Kimi]

Authors: Erik Burman ; Janosch Preuss

We consider a stable unique continuation problem for the wave equation where the initial data is lacking and the solution is reconstructed using measurements in some subset of the bulk domain. Typically fairly sophisticated space-time methods have been used in previous work to obtain stable and accurate solutions to this reconstruction problem. Here we propose to solve the problem using a standard discontinuous Galerkin method for the temporal discretization and continuous finite elements for the space discretization. Error estimates are established under a geometric control condition. We also investigate two preconditioning strategies which can be used to solve the arising globally coupled space-time system by means of simple time-stepping procedures. Our numerical experiments test the performance of these strategies and highlight the importance of the geometric control condition for reconstructing the solution beyond the data domain.

#25 Symmetrically pseudo-amenable Banach algebras [PDF] [Copy] [Kimi]

Authors: Hoger Ghahramani ; Parvin Zamani

We introduce and study a new notion of amenability called symmetric pseudo-amenability. We obtain some properties of symmetrically pseudo-amenable Banach algebras and with examples, we compare this type of amenability with some other types of amenability. We also provide some special classes of symmetrically pseudo-amenable Banach algebras. Finally, Jordan and Lie derivations from a class of Banach algebras into appropriate Banach bimodules are investigated using the notion of symmetric pseudo-amenability.