• J. Supercomput. (IF 2.157) Pub Date : 2020-02-18
Anurina Tarafdar, Mukta Debnath, Sunirmal Khatua, Rajib K. Das

Abstract The large-scale virtualized Cloud data centers consume huge amount of electrical energy leading to high operational costs and emission of greenhouse gases. Virtual machine (VM) consolidation has been found to be a promising approach to improve resource utilization and reduce energy consumption of the data center. However, aggressive consolidation of VMs tends to increase the number of VM migrations and leads to over-utilization of hosts. This in turn affects the quality of service (QoS) of the applications running in the VMs. Thus, reduction in energy consumption and at the same time ensuring proper QoS to the Cloud users are one of the major challenges among the researchers. In this paper, we have proposed an energy efficient and QoS-aware VM consolidation technique in order to address this problem. We have used Markov chain-based prediction approach to identify the over-utilized and under-utilized hosts in the data center. We have also proposed an efficient VM selection and placement policy based on linear weighted sum approach to migrate the VMs from over-utilized and under-utilized hosts considering both energy and QoS. Extensive simulations using real-world traces and comparison with state-of-art strategies show that our VM consolidation approach substantially reduces energy consumption within a data center while delivering suitable QoS.

更新日期：2020-02-18
• J. Supercomput. (IF 2.157) Pub Date : 2020-02-18
B. E. Moutafis, G. A. Gravvanis, C. K. Filelis-Papadopoulos

Abstract Solving large sparse linear systems, efficiently, on supercomputing infrastructures is a time-consuming component for a wide variety of simulation processes. An effective parallel solver should meet the required specifications, concerning both convergence behavior and scalability. Herewith, a class of two-stage algebraic domain decomposition preconditioning schemes based on the upper Schur complement method is proposed, in order to exploit appropriately distributed memory systems with multicore processors. The design of the method has been focused on homogeneous hybrid parallel systems, i.e., distributed and shared memory systems. However, the proposed method can also be applied to heterogeneous systems, such as cloud infrastructures, or hybrid parallel systems with accelerators, by modifying the workload distribution algorithm and taking into account the different network latencies and bandwidths. The first stage of the proposed schemes is related to the assignment of the subdomains among the workstations of the distributed system, whereas the second stage concerns the further redistribution of the subdomains to each core of a processor. The proposed method utilizes multiprojection techniques, based on semi-aggregated subdomains, leading to improved convergence behavior as the number of subdomains increases. Moreover, a subspace compression technique is used, in order to improve the performance of the preprocessing phase and reduce the memory requirements of the proposed scheme. The preconditioning schemes were combined with a parallel Krylov subspace method, i.e., the parallel preconditioned GMRES(m) method. The convergence behavior, the performance and the scalability of the proposed preconditioning schemes are examined and compared to existing state-of-the-art methods, by conducting several numerical experiments on supercomputing infrastructures.

更新日期：2020-02-18
• arXiv.cs.OH Pub Date : 2020-02-16
W. W. Koczkodaj; R. Smarzewski; J. Szybowski

In this study, the orthogonalization process for different inner products is applied to pairwise comparisons. Properties of consistent approximations of a given inconsistent pairwise comparisons matrix are examined. A method of a derivation of a priority vector induced by a pairwise comparison matrix for a given inner product has been introduced. The mathematical elegance of orthogonalization and its universal use in most applied sciences has been the motivating factor for this study. However, the finding of this study that approximations depend on the inner product assumed, is of considerable importance.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-15
Anuj Dawar; Gregory Wilsenach

We introduce symmetric arithmetic circuits, i.e. arithmetic circuits with a natural symmetry restriction. In the context of circuits computing polynomials defined on a matrix of variables, such as the determinant or the permanent, the restriction amounts to requiring that the shape of the circuit is invariant under row and column permutations of the matrix. We establish unconditional, nearly exponential, lower bounds on the size of any symmetric circuit for computing the permanent over any field of characteristic other than 2. In contrast, we show that there are polynomial-size symmetric circuits for computing the determinant over fields of characterisitic zero.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-15
Ezio Bartocci; Thomas Ferrère; Thomas A. Henzinger; Dejan Nickovic; Ana Oliveira da Costa

Contract-based design is a promising methodology for taming the complexity of developing sophisticated systems. A formal contract distinguishes between assumptions, which are constraints that the designer of a component puts on the environments in which the component can be used safely, and guarantees, which are promises that the designer asks from the team that implements the component. A theory of formal contracts can be formalized as an interface theory, which supports the composition and refinement of both assumptions and guarantees. Although there is a rich landscape of contract-based design methods that address functional and extra-functional properties, we present the first interface theory that is designed for ensuring system-wide security properties, thus paving the way for a science of safety and security co-engineering. Our framework provides a refinement relation and a composition operation that support both incremental design and independent implementability. We develop our theory for both stateless and stateful interfaces. We illustrate the applicability of our framework with an example inspired from the automotive domain. Finally, we provide three plausible trace semantics to stateful information-flow interfaces and we show that only two correspond to temporal logics for specifying hyperproperties, while the third defines a new class of hyperproperties that lies between the other two classes.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-17
Kristóf Bérczi; Endre Boros; Ondřej Čepek; Khaled Elbassioni; Petr Kučera; Kazuhisa Makino

Given a CNF formula $\Phi$ with clauses $C_1,\ldots,C_m$ and variables $V=\{x_1,\ldots,x_n\}$, a truth assignment $a:V\rightarrow\{0,1\}$ of $\Phi$ leads to a clause sequence $\sigma_\Phi(a)=(C_1(a),\ldots,C_m(a))\in\{0,1\}^m$ where $C_i(a) = 1$ if clause $C_i$ evaluates to $1$ under assignment $a$, otherwise $C_i(a) = 0$. The set of all possible clause sequences carries a lot of information on the formula, e.g. SAT, MAX-SAT and MIN-SAT can be encoded in terms of finding a clause sequence with extremal properties. We consider a problem posed at Dagstuhl Seminar 19211 "Enumeration in Data Management" (2019) about the generation of all possible clause sequences of a given CNF with bounded dimension. We prove that the problem can be solved in incremental polynomial time. We further give an algorithm with polynomial delay for the class of tractable CNF formulas. We also consider the generation of maximal and minimal clause sequences, and show that generating maximal clause sequences is NP-hard, while minimal clause sequences can be generated with polynomial delay.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-17
Zhe Chen; Yunyun Chen; Robert M. Hierons; Yifan Wu

Runtime Verification (RV) is a lightweight formal technique in which program or system execution is monitored and analyzed, to check whether certain properties are satisfied or violated after a finite number of steps. The use of RV has led to interest in deciding whether a property is monitorable: whether it is always possible for the satisfaction or violation of the property to be determined after a finite future continuation. However, classical two-valued monitorability suffers from two inherent limitations. First, a property can only be evaluated as monitorable or non-monitorable; no information is available regarding whether only one verdict (satisfaction or violation) can be detected. Second, monitorability is defined at the language-level and does not tell us whether satisfaction or violation can be detected starting from the current monitor state during system execution. To address these limitations, this paper proposes a new notion of four-valued monitorability for $\omega$-languages and applies it at the state-level. Four-valued monitorability is more informative than two-valued monitorability as a property can be evaluated as a four-valued result, denoting that only satisfaction, only violation, or both are active for a monitorable property. We can also compute state-level weak monitorability, i.e., whether satisfaction or violation can be detected starting from a given state in a monitor, which enables state-level optimizations of monitoring algorithms. Based on a new six-valued semantics, we propose procedures for computing four-valued monitorability of $\omega$-regular languages, both at the language-level and at the state-level. We have developed a new tool that implements the proposed procedure for computing monitorability of LTL formulas.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-17
Satoshi Kura

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-17
Pedro Cabalar; Jorge Fandinno; Torsten Schaub; Philipp Wanko

We elaborate upon the formal foundations of hybrid Answer Set Programming (ASP) and extend its underlying logical framework with aggregate functions over constraint values and variables. This is achieved by introducing the construct of conditional expressions, which allow for considering two alternatives while evaluating constraints. Which alternative is considered is interpretation-dependent and chosen according to an associated condition. We put some emphasis on logic programs with linear constraints and show how common ASP aggregates can be regarded as particular cases of so-called conditional linear constraints. Finally, we introduce a polynomial-size, modular and faithful translation from our framework into regular (condition-free) Constraint ASP, outlining an implementation of conditional aggregates on top of existing hybrid ASP solvers.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2018-10-10
Paweł Parys

We study the model-checking problem for recursion schemes: does the tree generated by a given higher-order recursion scheme satisfy a given logical sentence. The problem is known to be decidable for sentences of the MSO logic. We prove decidability for an extension of MSO in which we additionally have an unbounding quantifier U, saying that a subformula is true for arbitrarily large finite sets. This quantifier can be used only for subformulae in which all free variables represent finite sets (while an unrestricted use of the quantifier leads to undecidability). We also show that the logic has the properties of reflection and effective selection for trees generated by recursion schemes.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-04-30
Ludwig Staiger

Using an iterative tree construction we show that for simple computable subsets of the Cantor space Hausdorff, constructive and computable dimensions amight be incomputable.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-08-29
Tim Lyon; Kees van Berkel

This work provides proof-search algorithms and automated counter-model extraction for a class of STIT logics. With this, we answer an open problem concerning syntactic decision procedures and cut-free calculi for STIT logics. A new class of cut-free complete labelled sequent calculi G3LdmL^m_n, for multi-agent STIT with at most n-many choices, is introduced. We refine the calculi G3LdmL^m_n through the use of propagation rules and demonstrate the admissibility of their structural rules, resulting in auxiliary calculi Ldm^m_nL. In the single-agent case, we show that the refined calculi Ldm^m_nL derive theorems within a restricted class of (forestlike) sequents, allowing us to provide proof-search algorithms that decide single-agent STIT logics. We prove that the proof-search algorithms are correct and terminate.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-10-06
G. Michele Pinna

Event structures where the causality may explicitly change during a computation have recently gained the stage. In this kind of event structures the changes in the set of the causes of an event are triggered by modifiers that may add or remove dependencies, thus making the happening of an event contextual. Still the focus is always on the dependencies of the event. In this paper we promote the idea that the \emph{context} determined by the modifiers plays a major role, and the context itself determines not only the causes but also what causality should be. Modifiers are then used to understand when an event (or a set of events) can be added to a configuration, together with a set of events modeling dependencies, which will play a less important role. We show that most of the notions of Event Structure presented in literature can be translated into this new kind of event structure, preserving the main notion, namely the one of configuration.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-10-21
Jiří Adámek; Stefan Milius; Lawrence S. Moss

This paper studies fundamental questions concerning category-theoretic models of induction and recursion. We are concerned with the relationship between well-founded and recursive coalgebras for an endofunctor. For monomorphism preserving endofunctors on complete and well-powered categories every coalgebra has a well-founded part, and we provide a new, shorter proof that this is the coreflection in the category of all well-founded coalgebras. We present a new more general proof of Taylor's General Recursion Theorem that every well-founded coalgebra is recursive, and we study under which hypothesis the converse holds. In addition, we present a new equivalent characterization of well-foundedness: a coalgebra is well-founded iff it admits a coalgebra-to-algebra morphism to the initial algebra.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-10-24
Florent Delgrange; Joost-Pieter Katoen; Tim Quatmann; Mickael Randour

We consider the verification of multiple expected reward objectives at once on Markov decision processes (MDPs). This enables a trade-off analysis among multiple objectives by obtaining the Pareto front. We focus on strategies that are easy to employ and implement. That is, strategies that are pure (no randomization) and have bounded memory. We show that checking whether a point is achievable by a pure stationary strategy is NP-complete, even for two objectives, and we provide an MILP encoding to solve the corresponding problem. The bounded memory case can be reduced to the stationary one by a product construction. Experimental results using \Storm and Gurobi show the feasibility of our algorithms.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-12-03
Francesco Contaldo; Patrick Trentin; Roberto Sebastiani

Optimization Modulo Theories (OMT) is an extension of SMT that allows for finding models that optimize objective functions. In this paper we aim at bridging the gap between Constraint Programming (CP) and OMT, in both directions. First, we have extended the OMT solver OptiMathSAT with a FlatZinc interface -- which can also be used as a FlatZinc-to-OMT encoder for other OMT solvers. This allows OMT tools to be used in combination with mzn2fzn on the large amount of CP problems coming from the MiniZinc community. Second, we have introduced a tool for translating SMT and OMT problems on the linear arithmetic and bit-vector theories into MiniZinc. This allows MiniZinc solvers to be used on a large amount of SMT/OMT problems. We have discussed the main issues we had to cope with in either directions. We have performed an extensive empirical evaluation comparing three state-of-the-art OMT-based tools with many state-of-the-art CP tools on (i) CP problems coming from the MiniZinc challenge, and (ii) OMT problems coming mostly from formal verification. This analysis also allowed us to identify some criticalities, in terms of efficiency and correctness, one has to cope with when addressing CP problems with OMT tools, and vice versa.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-12-18
Manuel Bodirsky; Simon Knäuer

We study the computational complexity of the general network satisfaction problem for a finite relation algebra $A$ with a normal representation $B$. If $B$ contains a non-trivial equivalence relation with a finite number of equivalence classes, then the network satisfaction problem for $A$ is NP-hard. As a second result, we prove hardness if $B$ has domain size at least three and contains no non-trivial equivalence relations but a symmetric atom $a$ with a forbidden triple $(a,a,a)$, that is, $a \not\leq a \circ a$. We illustrate how to apply our conditions on two small relation algebras.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-15
Meryem Essaidi; Kira Goldner; S. Matthew Weinberg

We study a problem inspired by regulated health insurance markets, such as those created by the government in the Affordable Care Act Exchanges or by employers when they contract with private insurers to provide plans for their employees. The market regulator can choose to do nothing, running a Free Market, or can exercise her regulatory power by limiting the entry of providers (decreasing consumer welfare by limiting options, but also decreasing revenue via enhanced competition). We investigate whether limiting entry increases or decreases the utility (welfare minus revenue) of the consumers who purchase from the providers, specifically in settings where the outside option of "purchasing nothing" is prohibitively undesirable. We focus primarily on the case where providers are symmetric. We propose a sufficient condition on the distribution of consumer values for (a) a unique symmetric equilibrium to exist in both markets and (b) utility to be higher with limited entry. (We also establish that these conclusions do not necessarily hold for all distributions, and therefore some condition is necessary.) Our techniques are primarily based on tools from revenue maximization, and in particular Myerson's virtual value theory. We also consider extensions to settings where providers have identical costs for providing plans, and to two providers with an asymmetric distribution.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-15
Nikhil Devanur; Kira Goldner; Raghuvansh Saxena; Ariel Schvartzman; S. Matthew Weinberg

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-16
Ari Azarafrooz

A novel imitation learning algorithm is introduced by applying a game-theoretic notion of correlated equilibrium to the generative adversarial imitation learning. This imitation learning algorithm is equipped with queues of discriminators and agents, in contrast with the classical approach, where there are single discriminator and single agent. The achievement of a correlated equilibrium is due to a mediating neural architecture, which augments the observations that are being seen by queues of discriminators and agents. At every step of the training, the mediator network computes feedback using the rewards of discriminators and agents, to augment the next observations accordingly. By interacting in the game, it steers the training dynamic towards more suitable regions. The resulting imitation learning provides three important benefits. First, it makes adaptability and transferability of the learned model to new environments straightforward. Second, it is suitable for imitating a mixture of state-action trajectories. Third, it avoids the difficulties of non-convex optimization faced by the discriminator in the generative adversarial type architectures.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-16
Moshe Haviv; Eyal Winter

We derive a revenue-maximizing scheme that charges customers who are homogeneous with respect to their waiting cost parameter for a random fee in order to become premium customers. This scheme incentivizes all customers to purchase priority, each at his/her drawn price. We also design a revenue-maximizing scheme for the case where customers are heterogeneous with respect to their waiting cost parameter. Now lower cost parameter customers are encouraged to join the premium class at a low price: Given that, those with high cost parameter would be willing to pay even more for this privilege.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-16
Eshwar Ram Arunachaleswaran; Sampath Kannan; Aaron Roth; Juba Ziani

We introduce the \emph{pipeline intervention} problem, defined by a layered directed acyclic graph and a set of stochastic matrices governing transitions between successive layers. The graph is a stylized model for how people from different populations are presented opportunities, eventually leading to some reward. In our model, individuals are born into an initial position (i.e. some node in the first layer of the graph) according to a fixed probability distribution, and then stochastically progress through the graph according to the transition matrices, until they reach a node in the final layer of the graph; each node in the final layer has a \emph{reward} associated with it. The pipeline intervention problem asks how to best make costly changes to the transition matrices governing people's stochastic transitions through the graph, subject to a budget constraint. We consider two objectives: social welfare maximization, and a fairness-motivated maximin objective that seeks to maximize the value to the population (starting node) with the \emph{least} expected value. We consider two variants of the maximin objective that turn out to be distinct, depending on whether we demand a deterministic solution or allow randomization. For each objective, we give an efficient approximation algorithm (an additive FPTAS) for constant width networks. We also tightly characterize the "price of fairness" in our setting: the ratio between the highest achievable social welfare and the highest social welfare consistent with a maximin optimal solution. Finally we show that for polynomial width networks, even approximating the maximin objective to any constant factor is NP hard, even for networks with constant depth. This shows that the restriction on the width in our positive results is essential.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-16
Juan C. Perdomo; Tijana Zrnic; Celestine Mendler-Dünner; Moritz Hardt

When predictions support decisions they may influence the outcome they aim to predict. We call such predictions performative; the prediction influences the target. Performativity is a well-studied phenomenon in policy-making that has so far been neglected in supervised learning. When ignored, performativity surfaces as undesirable distribution shift, routinely addressed with retraining. We develop a risk minimization framework for performative prediction bringing together concepts from statistics, game theory, and causality. A conceptual novelty is an equilibrium notion we call performative stability. Performative stability implies that the predictions are calibrated not against past outcomes, but against the future outcomes that manifest from acting on the prediction. Our main results are necessary and sufficient conditions for the convergence of retraining to a performatively stable point of nearly minimal loss. In full generality, performative prediction strictly subsumes the setting known as strategic classification. We thus also give the first sufficient conditions for retraining to overcome strategic feedback effects.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-16
Constantinos Daskalakis; Maxwell Fishelson; Brendan Lucier; Vasilis Syrgkanis; Santhoshini Velusamy

We identify the first static credible mechanism for multi-item additive auctions that achieves a constant factor of the optimal revenue. This is one instance of a more general framework for designing two-part tariff auctions, adapting the duality framework of Cai et al [CDW16]. Given a (not necessarily incentive compatible) auction format $A$ satisfying certain technical conditions, our framework augments the auction with a personalized entry fee for each bidder, which must be paid before the auction can be accessed. These entry fees depend only on the prior distribution of bidder types, and in particular are independent of realized bids. Our framework can be used with many common auction formats, such as simultaneous first-price, simultaneous second-price, and simultaneous all-pay auctions. If all-pay auctions are used, we prove that the resulting mechanism is credible in the sense that the auctioneer cannot benefit by deviating from the stated mechanism after observing agent bids. If second-price auctions are used, we obtain a truthful $O(1)$-approximate mechanism with fixed entry fees that are amenable to tuning via online learning techniques. Our results for first price and all-pay are the first revenue guarantees of non-truthful mechanisms in multi-dimensional environments; an open question in the literature [RST17].

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-17
Haris Aziz; Serge Gaspers; Zhaohong Sun; Toby Walsh

In the past few years, several new matching models have been proposed and studied that take into account complex distributional constraints. Relevant lines of work include (1) school choice with diversity constraints where students have (possibly overlapping) types and (2) hospital-doctor matching where various regional quotas are imposed. In this paper, we present a polynomial-time reduction to transform an instance of (1) to an instance of (2) and we show how the feasibility and stability of corresponding matchings are preserved under the reduction. Our reduction provides a formal connection between two important strands of work on matching with distributional constraints. We then apply the reduction in two ways. Firstly, we show that it is NP-complete to check whether a feasible and stable outcome for (1) exists. Due to our reduction, these NP-completeness results carry over to setting (2). In view of this, we help unify some of the results that have been presented in the literature. Secondly, if we have positive results for (2), then we have corresponding results for (1). One key conclusion of our results is that further developments on axiomatic and algorithmic aspects of hospital-doctor matching with regional quotas will result in corresponding results for school choice with diversity constraints.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-17
Qi Lei; Sai Ganesh Nagarajan; Ioannis Panageas; Xiao Wang

In a recent series of papers it has been established that variants of Gradient Descent/Ascent and Mirror Descent exhibit last iterate convergence in convex-concave zero-sum games. Specifically, \cite{DISZ17, LiangS18} show last iterate convergence of the so called "Optimistic Gradient Descent/Ascent" for the case of \textit{unconstrained} min-max optimization. Moreover, in \cite{Metal} the authors show that Mirror Descent with an extra gradient step displays last iterate convergence for convex-concave problems (both constrained and unconstrained), though their algorithm does not follow the online learning framework; it uses extra information rather than \textit{only} the history to compute the next iteration. In this work, we show that "Optimistic Multiplicative-Weights Update (OMWU)" which follows the no-regret online learning framework, exhibits last iterate convergence locally for convex-concave games, generalizing the results of \cite{DP19} where last iterate convergence of OMWU was shown only for the \textit{bilinear case}. We complement our results with experiments that indicate fast convergence of the method.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-17
Ben Berger; Alon Eden; Michal Feldman

We study the power and limits of optimal dynamic pricing in combinatorial markets; i.e., dynamic pricing that leads to optimal social welfare. Previous work by Cohen-Addad et al. [EC'16] demonstrated the existence of optimal dynamic prices for unit-demand buyers, and showed a market with coverage valuations that admits no such prices. However, finding the frontier of markets (i.e., valuation functions) that admit optimal dynamic prices remains an open problem. In this work we establish positive and negative results that narrow the existing gap. On the positive side, we provide tools for handling markets beyond unit-demand valuations. In particular, we characterize all optimal allocations in multi-demand markets. This characterization allows us to partition the items into equivalence classes according to the role they play in achieving optimality. Using these tools, we provide a poly-time optimal dynamic pricing algorithm for up to $3$ multi-demand buyers. On the negative side, we establish a maximal domain theorem, showing that for every non-gross substitutes valuation, there exist unit-demand valuations such that adding them yields a market that does not admit an optimal dynamic pricing. This result is reminiscent of the seminal maximal domain theorem by Gul and Stacchetti [JET'99] for Walrasian equilibrium. Yang [JET'17] discovered an error in their original proof, and established a different, incomparable version of their maximal domain theorem. En route to our maximal domain theorem for optimal dynamic pricing, we provide the first complete proof of the original theorem by Gul and Stacchetti.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2014-04-23
Thomas Brihaye; Gilles Geeraerts; Shankara Narayanan Krishna; Lakshmi Manasa; Benjamin Monmege; Ashutosh Trivedi

Priced timed games (PTGs) are two-player zero-sum games played on the infinite graph of configurations of priced timed automata where two players take turns to choose transitions in order to optimize cost to reach target states. Bouyer et al. and Alur, Bernadsky, and Madhusudan independently proposed algorithms to solve PTGs with nonnegative prices under certain divergence restriction over prices. Brihaye, Bruyere, and Raskin later provided a justification for such a restriction by showing the undecidability of the optimal strategy synthesis problem in the absence of this divergence restriction. This problem for PTGs with one clock has long been conjectured to be in polynomial time, however the current best known algorithm, by Hansen, Ibsen-Jensen, and Miltersen, is exponential. We extend this picture by studying PTGs with both negative and positive prices. We refine the undecidability results for optimal strategy synthesis problem, and show undecidability for several variants of optimal reachability cost objectives including reachability cost, time-bounded reachability cost, and repeated reachability cost objectives. We also identify a subclass with bi-valued price-rates and give a pseudo-polynomial algorithm to partially answer the conjecture on the complexity of one-clock PTGs.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2018-02-21
Yang Cai; Federico Echenique; Hu Fu; Katrina Ligett; Adam Wierman; Juba Ziani

Motivated by the growing prominence of third-party data providers in online marketplaces, this paper studies the impact of the presence of third-party data providers on mechanism design. When no data provider is present, it has been shown that simple mechanisms are "good enough" -- they can achieve a constant fraction of the revenue of optimal mechanisms. The results in this paper demonstrate that this is no longer true in the presence of a third-party data provider who can provide the bidder with a signal that is correlated with the item type. Specifically, even with a single seller, a single bidder, and a single item of uncertain type for sale, the strategies of pricing each item-type separately (the analog of item pricing for multi-item auctions) and bundling all item-types under a single price (the analog of grand bundling) can both simultaneously be a logarithmic factor worse than the optimal revenue. Further, in the presence of a data provider, item-type partitioning mechanisms---a more general class of mechanisms which divide item-types into disjoint groups and offer prices for each group---still cannot achieve within a $\log \log$ factor of the optimal revenue. Thus, our results highlight that the presence of a data-provider forces the use of more complicated mechanisms in order to achieve a constant fraction of the optimal revenue.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2018-02-26
Yang Liu; Juntao Wang; Yiling Chen

Strictly proper scoring rules (SPSR) are incentive compatible for eliciting information about random variables from strategic agents when the principal can reward agents after the realization of the random variables. They also quantify the quality of elicited information, with more accurate predictions receiving higher score in expectation. In this paper, we extend such scoring rules to settings where a principal elicits private probabilistic beliefs but only has access to agents' reports. We name our solution \emph{Surrogate Scoring Rules} (SSR). SSR build on a bias correction step and an error rate estimation procedure for a reference answer defined using agents' reports. We show that, with one bit of information about the prior distribution of the random variables, SSR in a multi-task setting recover SPSR in expectation, as if having access to the ground truth. Therefore, a salient feature of SSR is that they quantify the quality of information despite the lack of ground truth, just as SPSR do for the {\em with} ground truth setting. As a by-product, SSR induce \emph{dominant truthfulness} in reporting. Our work complements the proper scoring rule literature via extending existing SPSR to operate when there is no clean ground truth verification. Because of the non-existence of verification, our setting falls into the classical information elicitation without verification (IEWV) domain, which has focused on eliciting discrete signals. Therefore our work also contributes to the peer prediction literature via providing a scoring rule that elicits continuous probabilistic beliefs, an approach that rewards accuracy instead of correlation, and a mechanism that achieves truthfulness in \emph{dominant strategy} in a multi-task setting. Our method is verified both theoretically and empirically using data collected from real human forecasters.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2018-08-02
Lorenzo Fiaschi; Marco Cococcioni

Prisoner's Dilemma (PD) is a widely studied game that plays an important role in Game Theory. This paper aims at extending PD Tournaments to the case of infinite, finite or infinitesimal payoffs using Sergeyev's Infinity Computing (IC). By exploiting IC, we are able to show the limits of the classical approach to PD Tournaments analysis of the classical theory, extending both the sets of the feasible and numerically computable tournaments. In particular we provide a numerical computation of the exact outcome of a simple PD Tournament where one player meets every other an infinite number of times, for both its deterministic and stochastic formulations.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2019-02-28
Jugal Garg; Setareh Taki

We study the problem of fair allocation of m indivisible items among n agents with additive valuations using the popular notion of maximin share (MMS) as our measure of fairness. An MMS allocation provides each agent a bundle worth at least her maximin share. While it is known that such an allocation need not exist, a series of work provided 2/3 approximation algorithms in which each agent receives a bundle worth at least 2/3 times her maximin share. More recently, Ghodsi et al. [EC'2018] showed the existence of 3/4 MMS allocations and a PTAS to find a 3/4-\epsilon MMS allocation. Most of the previous works utilize intricate algorithms and require agents' approximate MMS values, which are computationally expensive to obtain. In this paper, we develop a new approach that gives a simple algorithm for showing the existence of a 3/4-MMS allocation. Furthermore, our approach is powerful enough to be easily extended in two directions: First, we get a strongly polynomial-time algorithm to find a 3/4-MMS allocation, where we do not need to approximate the MMS values at all. Second, we show that there always exists a (3/4 + 1/(12n))-MMS allocation, breaking the barrier of 3/4. This considerably improves the approximation guarantee for small n. To the best of our knowledge, 3/4 was the best factor known for n> 4.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2019-07-09
Yiling Chen; Haifeng Xu; Shuran Zheng

We consider a monopoly information holder selling information to a budget-constrained decision maker, who may benefit from the seller's information. The decision maker has a utility function that depends on his action and an uncertain state of the world. The seller and the buyer each observe a private signal regarding the state of the world, which may be correlated with each other. The seller's goal is to sell her private information to the buyer and extract maximum possible revenue, subject to the buyer's budget constraints. We consider three different settings with increasing generality, i.e., the seller's signal and the buyer's signal can be independent, correlated, or follow a general distribution accessed through a black-box sampling oracle. For each setting, we design information selling mechanisms which are both optimal and simple in the sense that they can be naturally interpreted, have succinct representations, and can be efficiently computed. Notably, though the optimal mechanism exhibits slightly increasing complexity as the setting becomes more general, all our mechanisms share the same format of acting as a consultant who recommends the best action to the buyer but uses different and carefully designed payment rules for different settings. Each of our optimal mechanisms can be easily computed by solving a single polynomial-size linear program. This significantly simplifies exponential-size LPs solved by the Ellipsoid method in the previous work, which computes the optimal mechanisms in the same setting but without budget limit. Such simplification is enabled by our new characterizations of the optimal mechanism in the (more realistic) budget-constrained setting.

更新日期：2020-02-18
• arXiv.cs.GL Pub Date : 2020-02-15
Matteo Zallio; John McGrory; Damon Berry

The global introduction of affordable Internet of Things (IoT) devices offers an opportunity to empower a large variety of users with different needs. However, many off-the-shelf digital products are still not widely adopted by people who are hesitant technology users or by older adults, notwithstanding that the design and user-interaction of these devices is recognized to be user-friendly. In view of the potential of IoT-based devices, how can we reduce the obstacles of a cohort with low digital literacy and technology anxiety and enable them to be equal participants in the digitalized world? This article shows the method and results achieved in a community-stakeholder workshop, developed through the participatory design methodology, aiming at brainstorming problems and scenarios through a focus group and a structured survey. The research activity focused on understanding factors to increase the usability of off-the-shelf IoT devices for hesitant users and identifying strategies for improving digital literacy and reducing technology anxiety. A notable result was a series of feedback items pointing to the importance of facilitating educational experiences through learning resources to support individuals with different abilities, age, gender expression, to better adopt off-the-shelf IoT-based solutions.

更新日期：2020-02-18
• arXiv.cs.ET Pub Date : 2020-02-15
Theodoros Panagiotis Chatzinikolaou; Iosif-Angelos Fyrigos; Rafailia-Eleni Karamani; Vasileios Ntinas; Giorgos Dimitrakopoulos; Sorin Cotofana; Georgios Ch. Sirakoulis

Memristor networks are capable of low-power and massive parallel processing and information storage. Moreover, they have presented the ability to apply for a vast number of intelligent data analysis applications targeting mobile edge devices and low power computing. Beyond the memory and conventional computing architectures, memristors are widely studied in circuits aiming for increased intelligence that are suitable to tackle complex problems in a power and area efficient manner, offering viable solutions oftenly arriving also from the biological principles of living organisms. In this paper, a memristive circuit exploiting the dynamics of oscillating networks is utilized for the resolution of very popular and NP-complete logic puzzles, like the well-known "Sudoku". More specifically, the proposed circuit design methodology allows for appropriate usage of interconnections' advantages in a oscillation network and of memristor's switching dynamics resulting to logic-solvable puzzle-instances. The reduced complexity of the proposed circuit and its increased scalability constitute its main advantage against previous approaches and the broadly presented SPICE based simulations provide a clear proof of concept of the aforementioned appealing characteristics.

更新日期：2020-02-18
• arXiv.cs.CE Pub Date : 2020-02-15
Keiji Onishi; Makoto Tsubokura

To design a method to solve the issues of handling 'dirty' and highly complex geometries, the topology-free method combined with the immersed boundary method is presented for viscous and incompressible flows at a high Reynolds number. The method simultaneously employs a ghost-cell technique and distributed forcing technique to impose the boundary conditions. An axis-projected interpolation scheme is used to avoid searching failures during fluid and solid identification. This method yields a topology-free immersed boundary, which particularly suits flow simulations of highly complex geometries. Difficulties generally arise when generating the calculation grid for these scenarios. This method allows dirty data to be handled without any preparatory treatment work to simplify or clean-up the geometry. This method is also applicable to the coherent structural turbulence model employed in this study. The verification cases, used in conjunction with the second-order central-difference scheme, resulted in first-order accuracy at finer resolution, although the coarser resolution retained second-order accuracy. This method is fully parallelized for distributed memory platforms. In this study, the accuracy and fidelity of this method were examined by simulating the flow around the bluff body, past a flat plate, and past dirty spheres. These simulations were compared with experimental data and other established results. Finally, results from the simulation of practical applications demonstrate the ability of the method to model highly complex, non-canonical three-dimensional flows. The countermeasure based on the accurate classification of geometric features has provided a robust and reasonable solution.

更新日期：2020-02-18
• arXiv.cs.CE Pub Date : 2020-02-17
Yongbo Deng; Jan G. Korvink

This paper presents a topology optimization approach for the fluidic flows on two-dimensional manifolds, which can represent the viscous and incompressible material surfaces. The fluidic motion on such a material surface can be described by the surface Navier-Stokes equations, which are derived by using the elementary tangential calculus in terms of exterior differential operators expressed in a Cartesian coordinate system. Based on the topology optimization model for fluidic flows with porous medium filling the design domain, an artificial Darcy friction is added to the area force term of the surface Navier-Stokes equations and the physical area forces are penalized to eliminate their existence in the fluidic regions and to avoid the invalidity of the porous medium model. Topology optimization for unsteady and steady surface flows is implemented by iteratively evolving the impermeability of the porous medium on two-dimensional manifolds, where the impermeability is interpolated by the material density derived from the design variable. The related partial differential equations are solved by using the surface finite element method. Numerical tests have been provided to demonstrated this topology optimization approach for fluidic flows on two-dimensional manifolds.

更新日期：2020-02-18
• arXiv.cs.CC Pub Date : 2020-02-15
Anuj Dawar; Gregory Wilsenach

We introduce symmetric arithmetic circuits, i.e. arithmetic circuits with a natural symmetry restriction. In the context of circuits computing polynomials defined on a matrix of variables, such as the determinant or the permanent, the restriction amounts to requiring that the shape of the circuit is invariant under row and column permutations of the matrix. We establish unconditional, nearly exponential, lower bounds on the size of any symmetric circuit for computing the permanent over any field of characteristic other than 2. In contrast, we show that there are polynomial-size symmetric circuits for computing the determinant over fields of characterisitic zero.

更新日期：2020-02-18
• arXiv.cs.CC Pub Date : 2020-02-16
Bruno Bauwens; Ilya Blinnikov

It is known that the normalized algorithmic information distance $N$ is not computable and not semicomputable. We show that for all $\epsilon < 1/2$, there exist no semicomputable functions that differ from $N$ by at most~$\epsilon$. Moreover, for any computable function $f$ such that $|\lim_t f(x,y,t) - N(x,y)| \le \epsilon$ and for all $n$, there exist strings $x,y$ of length $n$ such that $\sum_t |f(x,y,t+1) - f(x,y,t)| \ge \Omega(\log n)$. This is optimal up to constant factors. We also show that the maximal number of oscillations of a limit approximation of $N$ is $\Omega(n/\log n)$. This strengthens the $\omega(1)$ lower bound from [K. Ambos-Spies, W. Merkle, and S.A. Terwijn, 2019, Normalized information distance and the oscillation hierarchy], see arXiv:1708.03583 .

更新日期：2020-02-18
• arXiv.cs.CC Pub Date : 2019-09-27
Seiichiro Tani

An ordered binary decision diagram (OBDD) is a directed acyclic graph that represents a Boolean function. OBDDs are also known as special cases of oblivious read-once branching programs in the field of complexity theory. Since OBDDs have many nice properties as data structures, they have been extensively studied for decades in both theoretical and practical fields, such as VLSI design, formal verification, machine learning, and combinatorial problems. Arguably, the most crucial problem in using OBDDs is that they may vary exponentially in size depending on their variable ordering (i.e., the order in which the variable are to read) when they represent the same function. Indeed, it is NP hard to find an optimal variable ordering that minimizes an OBDD for a given function. Hence, numerous studies have sought heuristics to find an optimal variable ordering. From practical as well as theoretical points of view, it is also important to seek algorithms that output optimal solutions with lower (exponential) time complexity than trivial brute-force algorithms do. Friedman and Supowit provided a clever deterministic algorithm with time/space complexity $O^\ast(3^n)$, where $n$ is the number of variables of the function, which is much better than the trivial brute-force bound $O^\ast(n!2^n)$. This paper shows that a further speedup is possible with quantum computers by demonstrating the existence of a quantum algorithm that produces a minimum OBDD together with the corresponding variable ordering in $O^\ast(2.77286^n)$ time and space with an exponentially small error. Moreover, this algorithm can be adapted to constructing other minimum decision diagrams such as zero-suppressed BDDs, which provide compact representations of sparse sets and are often used in the field of discrete optimization and enumeration.

更新日期：2020-02-18
• arXiv.cs.CC Pub Date : 2019-10-22
Fabrizio Riguzzi

In Weighted Model Counting (WMC) we assign weights to Boolean literals and we want to compute the sum of the weights of the models of a Boolean function where the weight of a model is the product of the weights of its literals. WMC was shown to be particularly effective for performing inference in graphical models, with a complexity of $O(n2^w)$ where $n$ is the number of variables and $w$ is the treewidth. In this paper, we propose a quantum algorithm for performing WMC, Quantum WMC (QWMC), that modifies the quantum model counting algorithm to take into account the weights. In turn, the model counting algorithm uses the algorithms of quantum search, phase estimation and Fourier transform. In the black box model of computation, where we can only query an oracle for evaluating the Boolean function given an assignment, QWMC solves the problem approximately with a complexity of $\Theta(2^{\frac{n}{2}})$ oracle calls while classically the best complexity is $\Theta(2^n)$, thus achieving a quadratic speedup.

更新日期：2020-02-18
• arXiv.cs.CC Pub Date : 2019-12-18
Manuel Bodirsky; Simon Knäuer

We study the computational complexity of the general network satisfaction problem for a finite relation algebra $A$ with a normal representation $B$. If $B$ contains a non-trivial equivalence relation with a finite number of equivalence classes, then the network satisfaction problem for $A$ is NP-hard. As a second result, we prove hardness if $B$ has domain size at least three and contains no non-trivial equivalence relations but a symmetric atom $a$ with a forbidden triple $(a,a,a)$, that is, $a \not\leq a \circ a$. We illustrate how to apply our conditions on two small relation algebras.

更新日期：2020-02-18
• J. Supercomput. (IF 2.157) Pub Date : 2020-02-17

Abstract The power system operation, stability, and reliability are strongly dependent on the network protection system performance. On the other hand, the penetration of the renewable energy power plants into power grids drastically affects power networks and smart grids’ stability and reliability because of their fast dynamics in comparison to conventional power generators. Hence, power networks are considered as a complex cyber–physical energy system with vast interactions and communications among consumers and generators. In this condition, a reliable monitoring and control system can augment the safety, security, and operation of such an intricate system. Suitable time coordination between the operations of power grids protection relays is one of the most challenging issues to protect the power system properly. In this paper, a reliable supervisor system (RSS) with fast and precise control ability is proposed to improve power systems and smart grids protection system operations. The device utilizes a safe robust communication way which provides a condition for the available relays on two sides of a line to share their data. For this reason, the proposed device is able to diagnose the fault on a short transmission line quickly upon the event occurrence. In other words, fast communication between two sides of a short transmission line helps the protection system to work faster in the presence of a fault. In addition, quick handshaking and data sharing of the network different points provided by the RSS enable grid circuit breakers to disconnect a fault from the system as fast as possible. The proposed system, then, can easily find a defect location and disconnect a faulty line from the grid. According to the experimental results provided in this paper, the RSS can effectively corroborate the network stability.

更新日期：2020-02-18
• J. Supercomput. (IF 2.157) Pub Date : 2020-02-15
Seong-Soo Han, Yoon-Ki Kim, You-Boo Jeon, JinSoo Park, Doo-Soon Park, DuHyun Hwang, Chang-Sung Jeong

Abstract IT technology and traditional industries have been combined recently, resulting in IT convergence technology in various fields. Through convergence with the automobile, pedestrian detection technology, in particular, is used in the autonomous navigation control service of autonomous vehicles and also applied in various fields such as intelligent CCTV and robot recognition technology. For pedestrian detection, hierarchical classification and feature vector were used in early stage, and deep learning is under active progress. However, since deep learning for pedestrian detection is time-consuming for processing a large volume of image data, it requires a lot of computing resources, and hence building such a system is very expensive. Therefore, in this paper we shall present a distributed deep learning platform which can easily build a cluster, and execute deep learning process in the distributed cloud environment, while achieving performance improvement in various ways. Our platform provides a convenient interface for easily and efficiently executing the deep learning process in a distributed environment by providing a multilayered system architecture. Our system builds and utilizes computing power in easy and efficient way by leveraging container technique, so-called OS-level virtualization, rather than traditional hypervisor-based virtualization. In our system, we improve the whole performance by exploiting both of data and parameter parallelisms at once and reduce the synchronization overhead by exploiting asynchronous communication for parameter updates. Also, we propose an efficient resource allocation scheme for parameter servers and slaves which can improve the performance from the experiment.

更新日期：2020-02-18
• J. Supercomput. (IF 2.157) Pub Date : 2020-02-15
Shengzan Yan, Lijun Xu, Shushan Wang

Abstract Three-dimensional object reconstruction from multi-view images is an important topic in computer vision, which has attracted enormous attention during the past decades. With the further study in deep learning, remarkable progress of three-dimensional object reconstruct has been obtained in recent years. In this paper, we proposed three-dimensional rapid registration and reconstruction of multi-view rigid objects based on end-to-end deep surface model in the field of three-dimensional object reconstruction. Firstly, we introduce a matching algorithm called local stereo matching algorithm based on improved census transform and multi-scale spatial, aiming to improve the matching results for those regions. In cost aggregation step, guided map filtering algorithm with excellent gradient preserving property is introduced into Gaussian pyramid structure and regularization is added to strengthen cost volume consistency. Secondly, the improved inception RESNET module is added to improve the feature extraction ability of the network, and multiple features are extracted by using multiple network structures, and finally multiple features are sequentially input into the VRNN module to enhance the reconstruction effect of multi-view images. The experimental results show that our proposed method can not only achieve better reconstruction results, but also reconstruct more details and spend less time in training.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-14
Marianna Girlando; Sara Negri; Nicola Olivetti

The preferential conditional logic PCL, introduced by Burgess, and its extensions are studied. First, a natural semantics based on neighbourhood models, which generalise Lewis' sphere models for counterfactual logics, is proposed. Soundness and completeness of PCL and its extensions with respect to this class of models are proved directly. Labelled sequent calculi for all logics of the family are then introduced. The calculi are modular and have standard proof-theoretical properties, the most important of which is admissibility of cut, that entails a syntactic proof of completeness of the calculi. By adopting a general strategy, root-first proof search terminates, thereby providing a decision procedure for PCL and its extensions. Finally, the semantic completeness of the calculi is established: from a finite branch in a failed proof attempt it is possible to extract a finite countermodel of the root sequent. The latter result gives a constructive proof of the finite model property of all the logics considered.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-14
Borja G. León; Francesco Belardinelli

The combination of Formal Methods with Reinforcement Learning (RL) has recently attracted interest as a way for single-agent RL to learn multiple-task specifications. In this paper we extend this convergence to multi-agent settings and formally define Extended Markov Games as a general mathematical model that allows multiple RL agents to concurrently learn various non-Markovian specifications. To introduce this new model we provide formal definitions and proofs as well as empirical tests of RL algorithms running on this framework. Specifically, we use our model to train two different logic-based multi-agent RL algorithms to solve diverse settings of non-Markovian co-safe LTL specifications.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-14
Luca Ciccone; Elena Zucca; Francesco Dagnino

Theorem provers are tools that help users to write machine readable proofs. Some of this tools are also interactive. The need of such softwares is increasing since they provide proofs that are more certified than the hand written ones. Agda is based on type theory and on the propositions-as-types correspondence and has a Haskell-like syntax. This means that a proof of a statement is turned into a function. Inference systems are a way of defining inductive and coinductive predicates and induction and coinduction principles are provided to help proving their correctness with respect to a given specification in terms of soundness and completeness. Generalized inference systems deal with predicates whose inductive and coinductive interpretations do not provide the expected set of judgments. In this case inference systems are enriched by corules that are rules that can be applied at infinite depth in a proof tree. Induction and coinduction principles cannot be used in case of generalized inference systems and the bounded coinduction one has been proposed. We first present how Agda supports inductive and coinductive types highlighting the fact that data structures and predicates are defined using the same constructs. Then we move to the main topic of this thesis, which is investigating how generalized inference systems can be implemented and how their correctness can be proved.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-14
Franz Baader; Bartosz Bednarczyk; Sebastian Rudolph

We introduce and investigate the expressive description logic (DL) ALCSCC++, in which the global and local cardinality constraints introduced in previous papers can be mixed. On the one hand, we prove that this does not increase the complexity of satisfiability checking and other standard inference problems. On the other hand, the satisfiability problem becomes undecidable if inverse roles are added to the languages. In addition, even without inverse roles, conjunctive query entailment in this DL turns out to be undecidable. We prove that decidability of querying can be regained if global and local constraints are not mixed and the global constraints are appropriately restricted. The latter result is based on a locally-acyclic model construction, and it reduces query entailment to ABox consistency in the restricted setting, i.e., to ABox consistency w.r.t. restricted cardinality constraints in ALCSCC, for which we can show an ExpTime upper bound.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2020-02-14
Emile van Krieken; Erman Acar; Frank van Harmelen

In recent years there has been a push to integrate symbolic AI and deep learning, as it is argued that the strengths and weaknesses of these approaches are complementary. One such trend in the literature are weakly supervised learning techniques that use operators from fuzzy logics. They employ prior background knowledge described in logic to benefit the training of a neural network from unlabeled and noisy data. By interpreting logical symbols using neural networks, this background knowledge can be added to regular loss functions used in deep learning to integrate reasoning and learning. In this paper, we analyze how a large collection of logical operators from the fuzzy logic literature behave in a differentiable setting. We find large differences between the formal properties of these operators that are of crucial importance in a differentiable learning setting. We show that many of these operators, including some of the best known, are highly unsuitable for use in a differentiable learning setting. A further finding concerns the treatment of implication in these fuzzy logics, with a strong imbalance between gradients driven by the antecedent and the consequent of the implication. Finally, we empirically show that it is possible to use Differentiable Fuzzy Logics for semi-supervised learning. However, to achieve the most significant performance improvement over a supervised baseline, we have to resort to non-standard combinations of logical operators which perform well in learning, but which no longer satisfy the usual logical laws. We end with a discussion on extensions to large-scale problems.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2018-06-24
Alejandro Díaz-Caro; Octavio Malherbe

We give a fully-abstract, concrete, categorical model for Lambda-S. Lambda-S is an extension to first-order lambda calculus unifying two approaches of non-cloning in quantum lambda-calculi: to forbid duplication of variables, and to consider all lambda-terms as algebraic linear functions. The type system of Lambda-S have a superposition constructor S such that a type A is considered as the base of a vector space while SA is its span. Our model consider S as the composition of two functors in an adjunction relation between the category of sets and the category of vector spaces over C. The right adjoint is a forgetful functor U, which is hidden in the language, and plays a central role in the computational reasoning.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-01-29
Lê Thành Dũng Nguyên

This paper establishes a bridge between linear logic and mainstream graph theory, building on previous work by Retor\'e (2003). We show that the problem of correctness for MLL+Mix proof nets is equivalent to the problem of uniqueness of a perfect matching. By applying matching theory, we obtain new results for MLL+Mix proof nets: a linear-time correctness criterion, a quasi-linear sequentialization algorithm, and a characterization of the sub-polynomial complexity of the correctness problem. We also use graph algorithms to compute the dependency relation of Bagnol et al. (2015) and the kingdom ordering of Bellin (1997), and relate them to the notion of blossom which is central to combinatorial maximum matching algorithms. In this journal version, we have added an explanation of Retor\'e's "RB-graphs" in terms of a general construction on graphs with forbidden transitions. In fact, it is by analyzing RB-graphs that we arrived at this construction, and thus obtained a polynomial-time algorithm for finding trails avoiding forbidden transitions; the latter is among the material covered in another paper by the author focusing on graph theory (arXiv:1901.07028).

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-02-22
Mauricio Ayala-Rincón; Maribel Fernández; Daniele Nantes-Sobrinho

We propose a new axiomatisation of the alpha-equivalence relation for nominal terms, based on a primitive notion of fixed-point constraint. We show that the standard freshness relation between atoms and terms can be derived from the more primitive notion of permutation fixed-point, and use this result to prove the correctness of the new $\alpha$-equivalence axiomatisation. This gives rise to a new notion of nominal unification, where solutions for unification problems are pairs of a fixed-point context and a substitution. Although it may seem less natural than the standard notion of nominal unifier based on freshness constraints, the notion of unifier based on fixed-point constraints behaves better when equational theories are considered: for example, nominal unification remains finitary in the presence of commutativity, whereas it becomes infinitary when unifiers are expressed using freshness contexts. We provide a definition of $\alpha$-equivalence modulo equational theories that take into account A, C and AC theories. Based on this notion of equivalence, we show that C-unification is finitary and we provide a sound and complete C-unification algorithm, as a first step towards the development of nominal unification modulo AC and other equational theories with permutative properties.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-05-27
Amir-Hossein Karimi; Gilles Barthe; Borja Balle; Isabel Valera

Predictive models are being increasingly used to support consequential decision making at the individual level in contexts such as pretrial bail and loan approval. As a result, there is increasing social and legal pressure to provide explanations that help the affected individuals not only to understand why a prediction was output, but also how to act to obtain a desired outcome. To this end, several works have proposed optimization-based methods to generate nearest counterfactual explanations. However, these methods are often restricted to a particular subset of models (e.g., decision trees or linear models) and differentiable distance functions. In contrast, we build on standard theory and tools from formal verification and propose a novel algorithm that solves a sequence of satisfiability problems, where both the distance function (objective) and predictive model (constraints) are represented as logic formulae. As shown by our experiments on real-world data, our algorithm is: i) model-agnostic ({non-}linear, {non-}differentiable, {non-}convex); ii) data-type-agnostic (heterogeneous features); iii) distance-agnostic ($\ell_0, \ell_1, \ell_\infty$, and combinations thereof); iv) able to generate plausible and diverse counterfactuals for any sample (i.e., 100% coverage); and v) at provably optimal distances.

更新日期：2020-02-18
• arXiv.cs.LO Pub Date : 2019-07-08
Paolo Pistone; Luca Tranchini

We study a class of type isomorphisms arising from a well-known correspondence between the Yoneda lemma of category theory and the polymorphic lambda-calculus. We demonstrate that such isomorphisms provide powerful tools to investigate properties of polymorphic programs, e.g. to count the number of inhabitants of a type (up to equivalence), and to transform, whenever possible, a polymorphic program into one with bounded, or predicative, type instantiations. By investigating the equational theory arising from the Yoneda isomorphisms, we introduce some fragments of the polymorphic lambda-calculus whose program equivalence conditions can be fully characterized using non-polymorphic languages. In particular, we describe a fragment in which all types have a finite number of programs (and program equivalence is thus decidable), and one in which all universal types can be converted into recursive/co-recursive types.

更新日期：2020-02-18
• arXiv.cs.GT Pub Date : 2020-02-14
Gauthier Gidel; David Balduzzi; Wojciech Marian Czarnecki; Marta Garnelo; Yoram Bachrach

Adversarial training, a special case of multi-objective optimization, is an increasingly useful tool in machine learning. For example, two-player zero-sum games are important for generative modeling (GANs) and for mastering games like Go or Poker via self-play. A classic result in Game Theory states that one must mix strategies, as pure equilibria may not exist. Surprisingly, machine learning practitioners typically train a \emph{single} pair of agents -- instead of a pair of mixtures -- going against Nash's principle. Our main contribution is a notion of limited-capacity-equilibrium for which, as capacity grows, optimal agents -- not mixtures -- can learn increasingly expressive and realistic behaviors. We define \emph{latent games}, a new class of game where agents are mappings that transform latent distributions. Examples include generators in GANs, which transform Gaussian noise into distributions on images, and StarCraft II agents, which transform sampled build orders into policies. We show that minimax equilibria in latent games can be approximated by a \emph{single} pair of dense neural networks. Finally, we apply our latent game approach to solve differentiable Blotto, a game with an infinite strategy space.

更新日期：2020-02-17
• arXiv.cs.GT Pub Date : 2020-02-13
Manel Ayadi; Nahla Ben amor; Jérôme Lang

Classical voting rules assume that ballots are complete preference orders over candidates. However, when the number of candidates is large enough, it is too costly to ask the voters to rank all candidates. We suggest to fix a rank k, to ask all voters to specify their best k candidates, and then to consider "top-k approximations" of rules, which take only into account the top-k candidates of each ballot. We consider two measures of the quality of the approximation: the probability of selecting the same winner as the original rule, and the score ratio. We do a worst-case study (for the latter measure only), and for both measures, an average-case study and a study from real data sets.

更新日期：2020-02-17
• arXiv.cs.GT Pub Date : 2020-02-14
Ezra Tampubolon; Haris Ceribasic; Holger Boche

Congestion game is a widely used model for modern networked applications. A central issue in such applications is that the selfish behavior of the participants may result in resource overloading and negative externalities for the system participants. In this work, we propose a pricing mechanism that guarantees the sub-linear increase of the time-cumulative violation of the resource load constraints. The feature of our method is that it is resource-centric in the sense that it depends on the congestion state of the resources and not on specific characteristics of the system participants. This feature makes our mechanism scalable, flexible, and privacy-preserving. Moreover, we show by numerical simulations that our pricing mechanism has no significant effect on the agents' welfare in contrast to the improvement of the capacity violation.

更新日期：2020-02-17
• arXiv.cs.GT Pub Date : 2019-04-08
Hugo Gimbert; Claire Mathieu; Simon Mauras

Stable matching in a community consisting of $N$ men and $N$ women is a classical combinatorial problem that has been the subject of intense theoretical and empirical study since its introduction in 1962 in a seminal paper by Gale and Shapley. In this paper, we study the number of stable pairs, that is, the man/woman pairs that appear in some stable matching. We prove that if the preference lists on one side are generated at random using the popularity model of Immorlica and Mahdian, the expected number of stable edges is bounded by $N \ln N + N$, matching the asymptotic value for uniform preference lists. If in addition that popularity model is a geometric distribution, then the number of stable edges is $\mathcal O(N)$ and the incentive to manipulate is limited. If in addition the preference lists on the other side are uniform, then the number of stable edges is asymptotically $N$ up to lower order terms: most participants have a unique stable partner, hence non-manipulability.

更新日期：2020-02-17
• arXiv.cs.GT Pub Date : 2019-05-22
David Cerezo Sánchez

Zero-Knowledge Proof-of-Identity from trusted public certificates (e.g., national identity cards and/or ePassports; eSIM) is introduced here to permissionless blockchains in order to remove the inefficiencies of Sybil-resistant mechanisms such as Proof-of-Work (i.e., high energy and environmental costs) and Proof-of-Stake (i.e., capital hoarding and lower transaction volume). The proposed solution effectively limits the number of mining nodes a single individual would be able to run while keeping membership open to everyone, circumventing the impossibility of full decentralization and the blockchain scalability trilemma when instantiated on a blockchain with a consensus protocol based on the cryptographic random selection of nodes. Resistance to collusion is also considered. Solving one of the most pressing problems in blockchains, a zk-PoI cryptocurrency is proved to have the following advantageous properties: - an incentive-compatible protocol for the issuing of cryptocurrency rewards based on a unique Nash equilibrium - strict domination of mining over all other PoW/PoS cryptocurrencies, thus the zk-PoI cryptocurrency becoming the preferred choice by miners is proved to be a Nash equilibrium and the Evolutionarily Stable Strategy - PoW/PoS cryptocurrencies are condemned to pay the Price of Crypto-Anarchy, redeemed by the optimal efficiency of zk-PoI as it implements the social optimum - the circulation of a zk-PoI cryptocurrency Pareto dominates other PoW/PoS cryptocurrencies - the network effects arising from the social networks inherent to national identity cards and ePassports dominate PoW/PoS cryptocurrencies - the lower costs of its infrastructure imply the existence of a unique equilibrium where it dominates other forms of payment

更新日期：2020-02-17
Contents have been reproduced by permission of the publishers.

down
wechat
bug