-
Denoising the Future: Top-p Distributions for Moving Through Time
Authors:
Florian Andreas Marwitz,
Ralf Möller,
Magnus Bender,
Marcel Gehrke
Abstract:
Inference in dynamic probabilistic models is a complex task involving expensive operations. In particular, for Hidden Markov Models, the whole state space has to be enumerated for advancing in time. Even states with negligible probabilities are considered, resulting in computational inefficiency and increased noise due to the propagation of unlikely probability mass. We propose to denoise the futu…
▽ More
Inference in dynamic probabilistic models is a complex task involving expensive operations. In particular, for Hidden Markov Models, the whole state space has to be enumerated for advancing in time. Even states with negligible probabilities are considered, resulting in computational inefficiency and increased noise due to the propagation of unlikely probability mass. We propose to denoise the future and speed up inference by using only the top-p states, i.e., the most probable states with accumulated probability p. We show that the error introduced by using only the top-p states is bound by p and the so-called minimal mixing rate of the underlying model. Moreover, in our empirical evaluation, we show that we can expect speedups of at least an order of magnitude, while the error in terms of total variation distance is below 0.09.
△ Less
Submitted 9 June, 2025;
originally announced June 2025.
-
The Case for External Graph Sketching
Authors:
Michael A. Bender,
Martín Farach-Colton,
Riko Jacob,
Hanna Komlós,
David Tench,
Evan West
Abstract:
Algorithms in the data stream model use $O(polylog(N))$ space to compute some property of an input of size $N$, and many of these algorithms are implemented and used in practice. However, sketching algorithms in the graph semi-streaming model use $O(V polylog(V))$ space for a $V$-vertex graph, and the fact that implementations of these algorithms are not used in the academic literature or in indus…
▽ More
Algorithms in the data stream model use $O(polylog(N))$ space to compute some property of an input of size $N$, and many of these algorithms are implemented and used in practice. However, sketching algorithms in the graph semi-streaming model use $O(V polylog(V))$ space for a $V$-vertex graph, and the fact that implementations of these algorithms are not used in the academic literature or in industrial applications may be because this space requirement is too large for RAM on today's hardware.
In this paper we introduce the external semi-streaming model, which addresses the aspects of the semi-streaming model that limit its practical impact. In this model, the input is in the form of a stream and $O(V polylog(V))$ space is available, but most of that space is accessible only via block I/O operations as in the external memory model. The goal in the external semi-streaming model is to simultaneously achieve small space and low I/O cost.
We present a general transformation from any vertex-based sketch algorithm to one which has a low sketching cost in the new model. We prove that this automatic transformation is tight or nearly (up to a $O(\log(V))$ factor) tight via an I/O lower bound for the task of sketching the input stream.
Using this transformation and other techniques, we present external semi-streaming algorithms for connectivity, bipartiteness testing, $(1+ε)$-approximating MST weight, testing k-edge connectivity, $(1+ε)$-approximating the minimum cut of a graph, computing $ε$-cut sparsifiers, and approximating the density of the densest subgraph. These algorithms all use $O(V poly(\log(V), ε^{-1},k)$ space. For many of these problems, our external semi-streaming algorithms outperform the state of the art algorithms in both the sketching and external-memory models.
△ Less
Submitted 24 April, 2025;
originally announced April 2025.
-
History-Independent Concurrent Hash Tables
Authors:
Hagit Attiya,
Michael A. Bender,
Martín Farach-Colton,
Rotem Oshman,
Noa Schiller
Abstract:
A history-independent data structure does not reveal the history of operations applied to it, only its current logical state, even if its internal state is examined. This paper studies history-independent concurrent dictionaries, in particular, hash tables, and establishes inherent bounds on their space requirements.
This paper shows that there is a lock-free history-independent concurrent hash…
▽ More
A history-independent data structure does not reveal the history of operations applied to it, only its current logical state, even if its internal state is examined. This paper studies history-independent concurrent dictionaries, in particular, hash tables, and establishes inherent bounds on their space requirements.
This paper shows that there is a lock-free history-independent concurrent hash table, in which each memory cell stores two elements and two bits, based on Robin Hood hashing. Our implementation is linearizable, and uses the shared memory primitive LL/SC. The expected amortized step complexity of the hash table is $O(c)$, where $c$ is an upper bound on the number of concurrent operations that access the same element, assuming the hash table is not overpopulated. We complement this positive result by showing that even if we have only two concurrent processes, no history-independent concurrent dictionary that supports sets of any size, with wait-free membership queries and obstruction-free insertions and deletions, can store only two elements of the set and a constant number of bits in each memory cell. This holds even if the step complexity of operations on the dictionary is unbounded.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
Optimal Non-Oblivious Open Addressing
Authors:
Michael A. Bender,
William Kuszmaul,
Renfei Zhou
Abstract:
A hash table is said to be open-addressed (or non-obliviously open-addressed) if it stores elements (and free slots) in an array with no additional metadata. Intuitively, open-addressed hash tables must incur a space-time tradeoff: The higher the load factor at which the hash table operates, the longer insertions/deletions/queries should take.
In this paper, we show that no such tradeoff exists:…
▽ More
A hash table is said to be open-addressed (or non-obliviously open-addressed) if it stores elements (and free slots) in an array with no additional metadata. Intuitively, open-addressed hash tables must incur a space-time tradeoff: The higher the load factor at which the hash table operates, the longer insertions/deletions/queries should take.
In this paper, we show that no such tradeoff exists: It is possible to construct an open-addressed hash table that supports constant-time operations even when the hash table is entirely full. In fact, it is even possible to construct a version of this data structure that: (1) is dynamically resized so that the number of slots in memory that it uses, at any given moment, is the same as the number of elements it contains; (2) supports $O(1)$-time operations, not just in expectation, but with high probability; and (3) requires external access to just $O(1)$ hash functions that are each just $O(1)$-wise independent.
Our results complement a recent lower bound by Bender, Kuszmaul, and Zhou showing that oblivious open-addressed hash tables must incur $Ω(\log \log \varepsilon^{-1})$-time operations. The hash tables in this paper are non-oblivious, which is why they are able to bypass the previous lower bound.
△ Less
Submitted 17 March, 2025;
originally announced March 2025.
-
Fingerprints of triaxiality in the charge radii of neutron-rich Ruthenium
Authors:
Bernhard Maass,
Wouter Ryssens,
Michael Bender,
Daniel P. Burdette,
Jason Clark,
Adam Dockery,
Guilherme Grams,
Max Horst,
Phillip Imgram,
Kristian König,
Kei Minamisono,
Patrick Müller,
Peter Müller,
Wilfried Nörtershäuser,
Skyy V. Pineda,
Simon Rausch,
Laura Renth,
Brooke Rickey,
Daniel Santiago-Gonzalez,
Guy Savard,
Felix Sommer,
Adrian A. Valverde
Abstract:
We present the first measurements with a new collinear laser spectroscopy setup at the Argonne Tandem Linac Accelerator System utilizing its unique capability to deliver neutron-rich refractory metal isotopes produced by the spontaneous fission of 252Cf. We measured isotope shifts from optical spectra for nine radioactive ruthenium isotopes 106-114Ru, reaching deep into the mid-shell region. The e…
▽ More
We present the first measurements with a new collinear laser spectroscopy setup at the Argonne Tandem Linac Accelerator System utilizing its unique capability to deliver neutron-rich refractory metal isotopes produced by the spontaneous fission of 252Cf. We measured isotope shifts from optical spectra for nine radioactive ruthenium isotopes 106-114Ru, reaching deep into the mid-shell region. The extracted charge radii are in excellent agreement with predictions from the Brussels-Skyrme-on-a-Grid models that account for the triaxial deformation of nuclear ground states in this region. We show that triaxial deformation impacts charge radii in models that feature shell effects, in contrast to what could be concluded from a liquid drop analysis. This indicates that this exotic type of deformation should not be neglected in regions where it is known to occur, even if its presence cannot be unambiguously inferred through laser spectroscopy.
△ Less
Submitted 10 March, 2025;
originally announced March 2025.
-
Solving bihomogeneous polynomial systems with a zero-dimensional projection
Authors:
Matías Bender,
Laurent Busé,
Carles Checa,
Elias Tsigaridas
Abstract:
We study bihomogeneous systems defining, non-zero dimensional, biprojective varieties for which the projection onto the first group of variables results in a finite set of points. To compute (with) the 0-dimensional projection and the corresponding quotient ring, we introduce linear maps that greatly extend the classical multiplication maps for zero-dimensional systems, but are not those associate…
▽ More
We study bihomogeneous systems defining, non-zero dimensional, biprojective varieties for which the projection onto the first group of variables results in a finite set of points. To compute (with) the 0-dimensional projection and the corresponding quotient ring, we introduce linear maps that greatly extend the classical multiplication maps for zero-dimensional systems, but are not those associated to the elimination ideal; we also call them multiplication maps. We construct them using linear algebra on the restriction of the ideal to a carefully chosen bidegree or, if available, from an arbitrary Gröbner bases. The multiplication maps allow us to compute the elimination ideal of the projection, by generalizing FGLM algorithm to bihomogenous, non-zero dimensional, varieties. We also study their properties, like their minimal polynomials and the multiplicities of their eigenvalues, and show that we can use the eigenvalues to compute numerical approximations of the zero-dimensional projection. Finally, we establish a single exponential complexity bound for computing multiplication maps and Gröbner bases, that we express in terms of the bidegrees of the generators of the corresponding bihomogeneous ideal.
△ Less
Submitted 10 February, 2025;
originally announced February 2025.
-
Exploring the Landscape of Distributed Graph Sketching
Authors:
David Tench,
Evan T. West,
Kenny Zhang,
Michael Bender,
Daniel DeLayo,
Martin Farach-Colton,
Gilvir Gill,
Tyler Seip,
Victor Zhang
Abstract:
Recent work has initiated the study of dense graph processing using graph sketching methods, which drastically reduce space costs by lossily compressing information about the input graph. In this paper, we explore the strange and surprising performance landscape of sketching algorithms. We highlight both their surprising advantages for processing dense graphs that were previously prohibitively exp…
▽ More
Recent work has initiated the study of dense graph processing using graph sketching methods, which drastically reduce space costs by lossily compressing information about the input graph. In this paper, we explore the strange and surprising performance landscape of sketching algorithms. We highlight both their surprising advantages for processing dense graphs that were previously prohibitively expensive to study, as well as the current limitations of the technique. Most notably, we show how sketching can avoid bottlenecks that limit conventional graph processing methods.
Single-machine streaming graph processing systems are typically bottlenecked by CPU performance, and distributed graph processing systems are typically bottlenecked by network latency. We present Landscape, a distributed graph-stream processing system that uses linear sketching to distribute the CPU work of computing graph properties to distributed workers with no need for worker-to-worker communication. As a result, it overcomes the CPU and network bottlenecks that limit other systems. In fact, for the connected components problem, Landscape achieves a stream ingestion rate one-fourth that of maximum sustained RAM bandwidth, and is four times faster than random access RAM bandwidth. Additionally, we prove that for any sequence of graph updates and queries Landscape consumes at most a constant factor more network bandwidth than is required to receive the input stream. We show that this system can ingest up to 332 million stream updates per second on a graph with $2^{17}$ vertices. We show that it scales well with more distributed compute power: given a cluster of 40 distributed worker machines, it can ingest updates 35 times as fast as with 1 distributed worker machine. Landscape uses heuristics to reduce its query latency by up to four orders of magnitude over the prior state of the art.
△ Less
Submitted 15 November, 2024; v1 submitted 9 October, 2024;
originally announced October 2024.
-
Dynamic Pricing Algorithms for Online Set Cover
Authors:
Max Bender,
Aum Desai,
Jialin He,
Oliver Thompson,
Pramithas Upreti
Abstract:
We consider dynamic pricing algorithms as applied to the online set cover problem. In the dynamic pricing framework, we assume the standard client server model with the additional constraint that the server can only place prices over the resources they maintain, rather than authoritatively assign them. In response, incoming clients choose the resource which minimizes their disutility when taking i…
▽ More
We consider dynamic pricing algorithms as applied to the online set cover problem. In the dynamic pricing framework, we assume the standard client server model with the additional constraint that the server can only place prices over the resources they maintain, rather than authoritatively assign them. In response, incoming clients choose the resource which minimizes their disutility when taking into account these additional prices. Our main contributions are the categorization of online algorithms which can be mimicked via dynamic pricing algorithms and the identification of a strongly competitive deterministic algorithm with respect to the frequency parameter of the online set cover input.
△ Less
Submitted 23 September, 2024;
originally announced September 2024.
-
Discovery of a new long-lived isomer in $^{114}$Rh via Penning-trap mass spectrometry
Authors:
M. Stryjczyk,
A. Jaries,
W. Ryssens,
M. Bender,
A. Kankainen,
T. Eronen,
Z. Ge,
I. D. Moore,
M. Mougeot,
A. Raggio,
J. Ruotsalainen
Abstract:
We report on mass measurements of three long-lived states in $^{114}$Rh performed with the JYFLTRAP Penning-trap mass spectrometer: the ground state and two isomers with estimated half-lives of about one second. The used Phase-Imaging Ion-Cyclotron-Resonance technique allowed for the discovery of a so far unknown second long-lived isomer. All three states were produced directly in proton-induced f…
▽ More
We report on mass measurements of three long-lived states in $^{114}$Rh performed with the JYFLTRAP Penning-trap mass spectrometer: the ground state and two isomers with estimated half-lives of about one second. The used Phase-Imaging Ion-Cyclotron-Resonance technique allowed for the discovery of a so far unknown second long-lived isomer. All three states were produced directly in proton-induced fission on a uranium target, whereas only the isomeric states were populated in the $β$ decay of the $^{114}$Ru ground state with spin-parity $0^+$. We propose spin-parity assignments of $(6^-)$ for the ground state, and $(3^+)$ and $(0^-)$ for the isomers. They resolve the puzzle of anomalous fission yields of this isotope despite the existing literature assigning a low angular momentum to the ground state. The experimental evidence is further supported by a detailed analysis based on mean-field calculations with the BSkG3 model. As for many other nuclei in this mass region, considering triaxial shapes is decisive for the interpretation of low-lying states of this nucleus. The discovery of a new isomer in $^{114}$Rh and our theoretical work challenge the currently adopted spin-parity assignments in this and several other odd-odd neutron-rich Rh isotopes.
△ Less
Submitted 20 December, 2024; v1 submitted 23 September, 2024;
originally announced September 2024.
-
Tight Bounds for Classical Open Addressing
Authors:
Michael A. Bender,
William Kuszmaul,
Renfei Zhou
Abstract:
We introduce a classical open-addressed hash table, called rainbow hashing, that supports a load factor of up to $1 - \varepsilon$, while also supporting $O(1)$ expected-time queries, and $O(\log \log \varepsilon^{-1})$ expected-time insertions and deletions. We further prove that this tradeoff curve is optimal: any classical open-addressed hash table that supports load factor $1 - \varepsilon$ mu…
▽ More
We introduce a classical open-addressed hash table, called rainbow hashing, that supports a load factor of up to $1 - \varepsilon$, while also supporting $O(1)$ expected-time queries, and $O(\log \log \varepsilon^{-1})$ expected-time insertions and deletions. We further prove that this tradeoff curve is optimal: any classical open-addressed hash table that supports load factor $1 - \varepsilon$ must incur $Ω(\log \log \varepsilon^{-1})$ expected time per operation.
Finally, we extend rainbow hashing to the setting where the hash table is dynamically resized over time. Surprisingly, the addition of dynamic resizing does not come at any time cost -- even while maintaining a load factor of $\ge 1 - \varepsilon$ at all times, we can support $O(1)$ queries and $O(\log \log \varepsilon^{-1})$ updates.
Prior to our work, achieving any time bounds of the form $o(\varepsilon^{-1})$ for all of insertions, deletions, and queries simultaneously remained an open question.
△ Less
Submitted 17 September, 2024;
originally announced September 2024.
-
Bigraded Castelnuovo-Mumford regularity and Gröbner bases
Authors:
Matías Bender,
Laurent Busé,
Carles Checa,
Elias Tsigaridas
Abstract:
We study the relation between the bigraded Castelnuovo-Mumford regularity of a bihomogeneous ideal $I$ in the coordinate ring of the product of two projective spaces and the bidegrees of a Gröbner basis of $I$ with respect to the degree reverse lexicographical monomial order in generic coordinates. For the single-graded case, Bayer and Stillman unraveled all aspects of this relationship forty year…
▽ More
We study the relation between the bigraded Castelnuovo-Mumford regularity of a bihomogeneous ideal $I$ in the coordinate ring of the product of two projective spaces and the bidegrees of a Gröbner basis of $I$ with respect to the degree reverse lexicographical monomial order in generic coordinates. For the single-graded case, Bayer and Stillman unraveled all aspects of this relationship forty years ago and these results led to complexity estimates for computations with Gröbner bases. We build on this work to introduce a bounding region of the bidegrees of minimal generators of bihomogeneous Gröbner bases for $I$. We also use this region to certify the presence of some minimal generators close to its boundary. Finally, we show that, up to a certain shift, this region is related to the bigraded Castelnuovo-Mumford regularity of $I$.
△ Less
Submitted 20 May, 2025; v1 submitted 18 July, 2024;
originally announced July 2024.
-
Enhancement of Subjective Content Descriptions by using Human Feedback
Authors:
Magnus Bender,
Tanya Braun,
Ralf Möller,
Marcel Gehrke
Abstract:
An agent providing an information retrieval service may work with a corpus of text documents. The documents in the corpus may contain annotations such as Subjective Content Descriptions (SCD) -- additional data associated with different sentences of the documents. Each SCD is associated with multiple sentences of the corpus and has relations among each other. The agent uses the SCDs to create its…
▽ More
An agent providing an information retrieval service may work with a corpus of text documents. The documents in the corpus may contain annotations such as Subjective Content Descriptions (SCD) -- additional data associated with different sentences of the documents. Each SCD is associated with multiple sentences of the corpus and has relations among each other. The agent uses the SCDs to create its answers in response to queries supplied by users. However, the SCD the agent uses might reflect the subjective perspective of another user. Hence, answers may be considered faulty by an agent's user, because the SCDs may not exactly match the perceptions of an agent's user. A naive and very costly approach would be to ask each user to completely create all the SCD themselves. To use existing knowledge, this paper presents ReFrESH, an approach for Relation-preserving Feedback-reliant Enhancement of SCDs by Humans. An agent's user can give feedback about faulty answers to the agent. This feedback is then used by ReFrESH to update the SCDs incrementally. However, human feedback is not always unambiguous. Therefore, this paper additionally presents an approach to decide how to incorporate the feedback and when to update the SCDs. Altogether, SCDs can be updated with human feedback, allowing users to create even more specific SCDs for their needs.
△ Less
Submitted 30 April, 2024;
originally announced May 2024.
-
Adaptive Quotient Filters
Authors:
Richard Wen,
Hunter McCoy,
David Tench,
Guido Tagliavini,
Michael A. Bender,
Alex Conway,
Martin Farach-Colton,
Rob Johnson,
Prashant Pandey
Abstract:
Adaptive filters, such as telescoping and adaptive cuckoo filters, update their representation upon detecting a false positive to avoid repeating the same error in the future. Adaptive filters require an auxiliary structure, typically much larger than the main filter and often residing on slow storage, to facilitate adaptation. However, existing adaptive filters are not practical and have seen no…
▽ More
Adaptive filters, such as telescoping and adaptive cuckoo filters, update their representation upon detecting a false positive to avoid repeating the same error in the future. Adaptive filters require an auxiliary structure, typically much larger than the main filter and often residing on slow storage, to facilitate adaptation. However, existing adaptive filters are not practical and have seen no adoption in real-world systems due to two main reasons. Firstly, they offer weak adaptivity guarantees, meaning that fixing a new false positive can cause a previously fixed false positive to come back. Secondly, the sub-optimal design of the auxiliary structure results in adaptivity overheads so substantial that they can actually diminish the overall system performance compared to a traditional filter.
In this paper, we design and implement AdaptiveQF, the first practical adaptive filter with minimal adaptivity overhead and strong adaptivity guarantees, which means that the performance and false-positive guarantees continue to hold even for adversarial workloads. The AdaptiveQF is based on the state-of-the-art quotient filter design and preserves all the critical features of the quotient filter such as cache efficiency and mergeability. Furthermore, we employ a new auxiliary structure design which results in considerably low adaptivity overhead and makes the AdaptiveQF practical in real systems.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
Nearly Optimal List Labeling
Authors:
Michael A. Bender,
Alex Conway,
Martín Farach-Colton,
Hanna Komlós,
Michal Koucký,
William Kuszmaul,
Michael Saks
Abstract:
The list-labeling problem captures the basic task of storing a dynamically changing set of up to $n$ elements in sorted order in an array of size $m = (1 + Θ(1))n$. The goal is to support insertions and deletions while moving around elements within the array as little as possible.
Until recently, the best known upper bound stood at $O(\log^2 n)$ amortized cost. This bound, which was first establ…
▽ More
The list-labeling problem captures the basic task of storing a dynamically changing set of up to $n$ elements in sorted order in an array of size $m = (1 + Θ(1))n$. The goal is to support insertions and deletions while moving around elements within the array as little as possible.
Until recently, the best known upper bound stood at $O(\log^2 n)$ amortized cost. This bound, which was first established in 1981, was finally improved two years ago, when a randomized $O(\log^{3/2} n)$ expected-cost algorithm was discovered. The best randomized lower bound for this problem remains $Ω(\log n)$, and closing this gap is considered to be a major open problem in data structures.
In this paper, we present the See-Saw Algorithm, a randomized list-labeling solution that achieves a nearly optimal bound of $O(\log n \operatorname{polyloglog} n)$ amortized expected cost. This bound is achieved despite at least three lower bounds showing that this type of result is impossible for large classes of solutions.
△ Less
Submitted 1 May, 2024;
originally announced May 2024.
-
Layered List Labeling
Authors:
Michael A. Bender,
Alex Conway,
Martin Farach-Colton,
Hanna Komlos,
William Kuszmaul
Abstract:
The list-labeling problem is one of the most basic and well-studied algorithmic primitives in data structures, with an extensive literature spanning upper bounds, lower bounds, and data management applications. The classical algorithm for this problem, dating back to 1981, has amortized cost $O(\log^2 n)$. Subsequent work has led to improvements in three directions: \emph{low-latency} (worst-case)…
▽ More
The list-labeling problem is one of the most basic and well-studied algorithmic primitives in data structures, with an extensive literature spanning upper bounds, lower bounds, and data management applications. The classical algorithm for this problem, dating back to 1981, has amortized cost $O(\log^2 n)$. Subsequent work has led to improvements in three directions: \emph{low-latency} (worst-case) bounds; \emph{high-throughput} (expected) bounds; and (adaptive) bounds for \emph{important workloads}.
Perhaps surprisingly, these three directions of research have remained almost entirely disjoint -- this is because, so far, the techniques that allow for progress in one direction have forced worsening bounds in the others. Thus there would appear to be a tension between worst-case, adaptive, and expected bounds. List labeling has been proposed for use in databases at least as early as PODS'99, but a database needs good throughput, response time, and needs to adapt to common workloads (e.g., bulk loads), and no current list-labeling algorithm achieve good bounds for all three.
We show that this tension is not fundamental. In fact, with the help of new data-structural techniques, one can actually \emph{combine} any three list-labeling solutions in order to cherry-pick the best worst-case, adaptive, and expected bounds from each of them.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
From "AI" to Probabilistic Automation: How Does Anthropomorphization of Technical Systems Descriptions Influence Trust?
Authors:
Nanna Inie,
Stefania Druga,
Peter Zukerman,
Emily M. Bender
Abstract:
This paper investigates the influence of anthropomorphized descriptions of so-called "AI" (artificial intelligence) systems on people's self-assessment of trust in the system. Building on prior work, we define four categories of anthropomorphization (1. Properties of a cognizer, 2. Agency, 3. Biological metaphors, and 4. Properties of a communicator). We use a survey-based approach (n=954) to inve…
▽ More
This paper investigates the influence of anthropomorphized descriptions of so-called "AI" (artificial intelligence) systems on people's self-assessment of trust in the system. Building on prior work, we define four categories of anthropomorphization (1. Properties of a cognizer, 2. Agency, 3. Biological metaphors, and 4. Properties of a communicator). We use a survey-based approach (n=954) to investigate whether participants are likely to trust one of two (fictitious) "AI" systems by randomly assigning people to see either an anthropomorphized or a de-anthropomorphized description of the systems. We find that participants are no more likely to trust anthropomorphized over de-anthropmorphized product descriptions overall. The type of product or system in combination with different anthropomorphic categories appears to exert greater influence on trust than anthropomorphizing language alone, and age is the only demographic factor that significantly correlates with people's preference for anthropomorphized or de-anthropomorphized descriptions. When elaborating on their choices, participants highlight factors such as lesser of two evils, lower or higher stakes contexts, and human favoritism as driving motivations when choosing between product A and B, irrespective of whether they saw an anthropomorphized or a de-anthropomorphized description of the product. Our results suggest that "anthropomorphism" in "AI" descriptions is an aggregate concept that may influence different groups differently, and provide nuance to the discussion of whether anthropomorphization leads to higher trust and over-reliance by the general public in systems sold as "AI".
△ Less
Submitted 8 April, 2024;
originally announced April 2024.
-
Complex phases in quantum mechanics
Authors:
Carl M. Bender,
Daniel W. Hook
Abstract:
Hamilton's equations of motion are local differential equations and boundary conditions are required to determine the solution uniquely. Depending on the choice of boundary conditions, a Hamiltonian may thereby describe several different physically observable phases, each exhibiting its own characteristic global symmetry.
Hamilton's equations of motion are local differential equations and boundary conditions are required to determine the solution uniquely. Depending on the choice of boundary conditions, a Hamiltonian may thereby describe several different physically observable phases, each exhibiting its own characteristic global symmetry.
△ Less
Submitted 31 March, 2024;
originally announced April 2024.
-
History-Independent Concurrent Objects
Authors:
Hagit Attiya,
Michael A. Bender,
Martin Farach-Colton,
Rotem Oshman,
Noa Schiller
Abstract:
A data structure is called history independent if its internal memory representation does not reveal the history of operations applied to it, only its current state. In this paper we study history independence for concurrent data structures, and establish foundational possibility and impossibility results. We show that a large class of concurrent objects cannot be implemented from smaller base obj…
▽ More
A data structure is called history independent if its internal memory representation does not reveal the history of operations applied to it, only its current state. In this paper we study history independence for concurrent data structures, and establish foundational possibility and impossibility results. We show that a large class of concurrent objects cannot be implemented from smaller base objects in a manner that is both wait-free and history independent; but if we settle for either lock-freedom instead of wait-freedom or for a weak notion of history independence, then at least one object in the class, multi-valued single-reader single-writer registers, can be implemented from smaller base objects, binary registers.
On the other hand, using large base objects, we give a strong possibility result in the form of a universal construction: an object with $s$ possible states can be implemented in a wait-free, history-independent manner from compare-and-swap base objects that each have $O(s + 2^n)$ possible memory states, where $n$ is the number of processes in the system.
△ Less
Submitted 21 March, 2024;
originally announced March 2024.
-
Precision mass measurements in the zirconium region pin down the mass surface across the neutron midshell at $N=66$
Authors:
M. Hukkanen,
W. Ryssens,
P. Ascher,
M. Bender,
T. Eronen,
S. Grévy,
A. Kankainen,
M. Stryjczyk,
O. Beliuskina,
Z. Ge,
S. Geldhof,
M. Gerbaux,
W. Gins,
A. Husson,
D. A. Nesterenko,
A. Raggio,
M. Reponen,
S. Rinta-Antila,
J. Romero,
A. de Roubin,
V. Virtanen,
A. Zadvornaya
Abstract:
Precision mass measurements of $^{104}$Y, $^{106}$Zr, $^{104,104m,109}$Nb, and $^{111,112}$Mo have been performed with the JYFLTRAP double Penning trap mass spectrometer at the Ion Guide Isotope Separator On-Line facility. The order of the long-lived states in $^{104}$Nb was unambiguously established. The trend in two-neutron separation energies around the $N=66$ neutron midshell appeared to be st…
▽ More
Precision mass measurements of $^{104}$Y, $^{106}$Zr, $^{104,104m,109}$Nb, and $^{111,112}$Mo have been performed with the JYFLTRAP double Penning trap mass spectrometer at the Ion Guide Isotope Separator On-Line facility. The order of the long-lived states in $^{104}$Nb was unambiguously established. The trend in two-neutron separation energies around the $N=66$ neutron midshell appeared to be steeper with respect to the Atomic Mass Evaluation 2020 extrapolations for the $_{39}$Y and $_{40}$Zr isotopic chains and less steep for the $_{41}$Nb chain, indicating a possible gap opening around $Z=40$. The experimental results were compared to the BSkG2 model calculations performed with and without vibrational and rotational corrections. All of them predict two low-lying minima for $^{106}$Zr. While the unaltered BSkG2 model fails to predict the trend in two-neutron separation energies, selecting the more deformed minima in calculations and removing the vibrational correction, the calculations are more in line with experimental data. The same is also true for the $2^+_1$ excitation energies and differences in charge radii in the Zr isotopes. The results stress the importance of improved treatment of collective corrections in large-scale models and further development of beyond-mean-field techniques.
△ Less
Submitted 10 July, 2024; v1 submitted 19 February, 2024;
originally announced February 2024.
-
File System Aging
Authors:
Alex Conway,
Ainesh Bakshi,
Arghya Bhattacharya,
Rory Bennett,
Yizheng Jiao,
Eric Knorr,
Yang Zhan,
Michael A. Bender,
William Jannen,
Rob Johnson,
Bradley C. Kuszmaul,
Donald E. Porter,
Jun Yuan,
Martin Farach-Colton
Abstract:
File systems must allocate space for files without knowing what will be added or removed in the future. Over the life of a file system, this may cause suboptimal file placement decisions that eventually lead to slower performance, or aging. Conventional wisdom suggests that file system aging is a solved problem in the common case; heuristics to avoid aging, such as colocating related files and dat…
▽ More
File systems must allocate space for files without knowing what will be added or removed in the future. Over the life of a file system, this may cause suboptimal file placement decisions that eventually lead to slower performance, or aging. Conventional wisdom suggests that file system aging is a solved problem in the common case; heuristics to avoid aging, such as colocating related files and data blocks, are effective until a storage device fills up, at which point space pressure exacerbates fragmentation-based aging. However, this article describes both realistic and synthetic workloads that can cause these heuristics to fail, inducing large performance declines due to aging, even when the storage device is nearly empty.
We argue that these slowdowns are caused by poor layout. We demonstrate a correlation between the read performance of a directory scan and the locality within a file system's access patterns, using a dynamic layout score. We complement these results with microbenchmarks that show that space pressure can cause a substantial amount of inter-file and intra-file fragmentation. However, our results suggest that the effect of free-space fragmentation on read performance is best described as accelerating the file system aging process. The effect on write performance is non-existent in some cases, and, in most cases, an order of magnitude smaller than the read degradation from fragmentation caused by normal usage.
In short, many file systems are exquisitely prone to read aging after a variety of write patterns. We show, however, that aging is not inevitable. BetrFS, a file system based on write-optimized dictionaries, exhibits almost no aging in our experiments. We present a framework for understanding and predicting aging, and identify the key features of BetrFS that avoid aging.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
PT-symmetric quantum mechanics
Authors:
Carl M. Bender,
Daniel W. Hook
Abstract:
It is generally assumed that a Hamiltonian for a physically acceptable quantum system (one that has a positive-definite spectrum and obeys the requirement of unitarity) must be Hermitian. However, a PT-symmetric Hamiltonian can also define a physically acceptable quantum-mechanical system even if the Hamiltonian is not Hermitian. The study of PT-symmetric quantum systems is a young and extremely a…
▽ More
It is generally assumed that a Hamiltonian for a physically acceptable quantum system (one that has a positive-definite spectrum and obeys the requirement of unitarity) must be Hermitian. However, a PT-symmetric Hamiltonian can also define a physically acceptable quantum-mechanical system even if the Hamiltonian is not Hermitian. The study of PT-symmetric quantum systems is a young and extremely active research area in both theoretical and experimental physics. The purpose of this Review is to provide established scientists as well as graduate students with a compact, easy-to-read introduction to this field that will enable them to understand more advanced publications and to begin their own theoretical or experimental research activity. The ideas and techniques of PT symmetry have been applied in the context of many different branches of physics. This Review introduces the concepts of PT symmetry by focusing on elementary one-dimensional PT-symmetric quantum and classical mechanics and relies in particular on oscillator models to illustrate and explain the basic properties of PT-symmetric quantum theory.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
How should the advent of large language models affect the practice of science?
Authors:
Marcel Binz,
Stephan Alaniz,
Adina Roskies,
Balazs Aczel,
Carl T. Bergstrom,
Colin Allen,
Daniel Schad,
Dirk Wulff,
Jevin D. West,
Qiong Zhang,
Richard M. Shiffrin,
Samuel J. Gershman,
Ven Popov,
Emily M. Bender,
Marco Marelli,
Matthew M. Botvinick,
Zeynep Akata,
Eric Schulz
Abstract:
Large language models (LLMs) are being increasingly incorporated into scientific workflows. However, we have yet to fully grasp the implications of this integration. How should the advent of large language models affect the practice of science? For this opinion piece, we have invited four diverse groups of scientists to reflect on this query, sharing their perspectives and engaging in debate. Schu…
▽ More
Large language models (LLMs) are being increasingly incorporated into scientific workflows. However, we have yet to fully grasp the implications of this integration. How should the advent of large language models affect the practice of science? For this opinion piece, we have invited four diverse groups of scientists to reflect on this query, sharing their perspectives and engaging in debate. Schulz et al. make the argument that working with LLMs is not fundamentally different from working with human collaborators, while Bender et al. argue that LLMs are often misused and over-hyped, and that their limitations warrant a focus on more specialized, easily interpretable tools. Marelli et al. emphasize the importance of transparent attribution and responsible use of LLMs. Finally, Botvinick and Gershman advocate that humans should retain responsibility for determining the scientific roadmap. To facilitate the discussion, the four perspectives are complemented with a response from each group. By putting these different perspectives in conversation, we aim to bring attention to important considerations within the academic community regarding the adoption of LLMs and their impact on both current and future scientific practices.
△ Less
Submitted 5 December, 2023;
originally announced December 2023.
-
Impact of choices for center-of-mass correction energy on the surface energy of Skyrme energy density functionals
Authors:
Philippe Da Costa,
Karim Bennaceur,
Jacques Meyer,
Wouter Ryssens,
Michael Bender
Abstract:
In the framework of nuclear energy density functional (EDF) methods, many nuclear phenomena can be related to the deformation of intrinsic states. Their accurate modeling relies on the correct description of the change of nuclear binding energy with deformation. The two most important contributions to the deformation energy have their origin in shell effects and the surface energy coefficient of n…
▽ More
In the framework of nuclear energy density functional (EDF) methods, many nuclear phenomena can be related to the deformation of intrinsic states. Their accurate modeling relies on the correct description of the change of nuclear binding energy with deformation. The two most important contributions to the deformation energy have their origin in shell effects and the surface energy coefficient of nuclear matter.
In a first step, we build nine series of parametrizations with a systematically varied surface-energy coefficient a_surf for three frequently-used options for the CM correction (none, one-body term only, full one-body and two-body contributions) combined with three values for the isoscalar effective mass m^*_0/m (0.7, 0.8, 0.85) and analyse how well each of these parametrizations can be adjusted to the properties of spherical nuclei and infinite nuclear matter. In a second step, we performed additional fits without the constraint on surface energy, adding one ``best-fit" parametrization to each of the nine series. We then benchmark these parametrizations to the deformation properties of heavy nuclei by means of three-dimensional Hartree-Fock-Bogoliubov calculations that allow for non-axial and/or non-reflection symmetric configurations.
We perform a detailed correlation analysis between surface and volume properties of nuclear matter using the nine series of parametrizations. The best fits out of each series are then benchmarked on the fission barriers of Pu240 and Hg180, as well as on the properties of deformed states at normal and superdeformation for actinides and nuclei in the neutron-deficient Hg region.
(see paper for full abstract)
△ Less
Submitted 22 March, 2024; v1 submitted 8 October, 2023;
originally announced October 2023.
-
Dyson-Schwinger equations in zero dimensions and polynomial approximations
Authors:
Carl M. Bender,
Christos Karapoulitidis,
S. P. Klevansky
Abstract:
The Dyson-Schwinger (DS) equations for a quantum field theory in $D$-dimensional space-time are an infinite sequence of coupled integro-differential equations that are satisfied exactly by the Green's functions of the field theory. This sequence of equations is underdetermined because if the infinite sequence of DS equations is truncated to a finite sequence, there are always more Green's function…
▽ More
The Dyson-Schwinger (DS) equations for a quantum field theory in $D$-dimensional space-time are an infinite sequence of coupled integro-differential equations that are satisfied exactly by the Green's functions of the field theory. This sequence of equations is underdetermined because if the infinite sequence of DS equations is truncated to a finite sequence, there are always more Green's functions than equations. An approach to this problem is to close the finite system by setting the highest Green's function(s) to zero. One can examine the accuracy of this procedure in $D=0$ because in this special case the DS equations are just a sequence of coupled polynomial equations whose roots are the Green's functions. For the closed system one can calculate the roots and compare them with the exact values of the Green's functions. This procedure raises a general mathematical question: When do the roots of a sequence of polynomial approximants to a function converge to the exact roots of that function? Some roots of the polynomial approximants may (i) converge to the exact roots of the function, or (ii) approach the exact roots at first and then veer away, or (iii) converge to limiting values that are unequal to the exact roots. In this study five field-theory models in $D=0$ are examined, Hermitian $φ^4$ and $φ^6$ theories and non-Hermitian $iφ^3$, $-φ^4$, and $-i φ^5$ theories. In all cases the sequences of roots converge to limits that differ by a few percent from the exact answers. Sophisticated asymptotic techniques are devised that increase the accuracy to one part in $10^7$. Part of this work appears in abbreviated form in Phys.~Rev.~Lett.~{\bf 130}, 101602 (2023).
△ Less
Submitted 3 July, 2023;
originally announced July 2023.
-
Binding energies of ground and isomeric states in neutron-rich ruthenium isotopes: measurements at JYFLTRAP and comparison to theory
Authors:
M. Hukkanen,
W. Ryssens,
P. Ascher,
M. Bender,
T. Eronen,
S. Grévy,
A. Kankainen,
M. Stryjczyk,
L. Al Ayoubi,
S. Ayet,
O. Beliuskina,
C. Delafosse,
Z. Ge,
M. Gerbaux,
W. Gins,
A. Husson,
A. Jaries,
S. Kujanpää,
M. Mougeot,
D. A. Nesterenko,
S. Nikas,
H. Penttilä,
I. Pohjalainen,
A. Raggio,
M. Reponen
, et al. (5 additional authors not shown)
Abstract:
We report on precision mass measurements of $^{113,115,117}$Ru performed with the JYFLTRAP double Penning trap mass spectrometer at the Accelerator Laboratory of University of Jyväskylä. The phase-imaging ion-cyclotron-resonance technique was used to resolve the ground and isomeric states in $^{113,115}$Ru and enabled for the first time a measurement of the isomer excitation energies,…
▽ More
We report on precision mass measurements of $^{113,115,117}$Ru performed with the JYFLTRAP double Penning trap mass spectrometer at the Accelerator Laboratory of University of Jyväskylä. The phase-imaging ion-cyclotron-resonance technique was used to resolve the ground and isomeric states in $^{113,115}$Ru and enabled for the first time a measurement of the isomer excitation energies, $E_x(^{113}$Ru$^{m})=100.5(8)$ keV and $E_x(^{115}$Ru$^{m})=129(5)$ keV. The ground state of $^{117}$Ru was measured using the time-of-flight ion-cyclotron-resonance technique. The new mass-excess value for $^{117}$Ru is around 36 keV lower and 7 times more precise than the previous literature value. With the more precise ground-state mass values, the evolution of the two-neutron separation energies is further constrained and a similar trend as predicted by the BSkG1 model is obtained up to the neutron number $N=71$.
△ Less
Submitted 9 October, 2023; v1 submitted 7 June, 2023;
originally announced June 2023.
-
Dimension Results for Extremal-Generic Polynomial Systems over Complete Toric Varieties
Authors:
Matías Bender,
Pierre-Jean Spaenlehauer
Abstract:
We study polynomial systems with prescribed monomial supports in the Cox rings of toric varieties built from complete polyhedral fans. We present combinatorial formulas for the dimensions of their associated subvarieties under genericity assumptions on the coefficients of the polynomials. Using these formulas, we identify at which degrees generic systems in polytopal algebras form regular sequence…
▽ More
We study polynomial systems with prescribed monomial supports in the Cox rings of toric varieties built from complete polyhedral fans. We present combinatorial formulas for the dimensions of their associated subvarieties under genericity assumptions on the coefficients of the polynomials. Using these formulas, we identify at which degrees generic systems in polytopal algebras form regular sequences. Our motivation comes from sparse elimination theory, where knowing the expected dimension of these subvarieties leads to specialized algorithms and to large speed-ups for solving sparse polynomial systems. As a special case, we classify the degrees at which regular sequences defined by weighted homogeneous polynomials can be found, answering an open question in the Gröbner bases literature. We also show that deciding whether a sparse system is generically a regular sequence in a polytopal algebra is hard from the point of view of theoretical computational complexity.
△ Less
Submitted 20 February, 2024; v1 submitted 12 May, 2023;
originally announced May 2023.
-
New classes of solutions for Euclidean scalar field theories
Authors:
Carl M. Bender,
Sarben Sarkar
Abstract:
This paper presents new classes of exact radial solutions to the nonlinear ordinary differential equation that arises as a saddle-point condition for a Euclidean scalar field theory in $D$-dimensional spacetime. These solutions are found by exploiting the dimensional consistency of the radial differential equation for a single {\it massless} scalar field, which allows one to transform to an autono…
▽ More
This paper presents new classes of exact radial solutions to the nonlinear ordinary differential equation that arises as a saddle-point condition for a Euclidean scalar field theory in $D$-dimensional spacetime. These solutions are found by exploiting the dimensional consistency of the radial differential equation for a single {\it massless} scalar field, which allows one to transform to an autonomous equation. For massive theories the radial equation is not exactly solvable but the massless solutions provide useful approximations to the results for the massive case. The solutions presented here depend on the power of the interaction and on the spatial dimension, both of which may be noninteger. Scalar equations arising in the study of conformal invariance fit into this framework and classes of new solutions are found. These solutions exhibit two distinct behaviours as $D\to2$ from above.
△ Less
Submitted 10 December, 2023; v1 submitted 23 April, 2023;
originally announced April 2023.
-
An Associativity Threshold Phenomenon in Set-Associative Caches
Authors:
Michael A. Bender,
Rathish Das,
Martín Farach-Colton,
Guido Tagliavini
Abstract:
In an $α$-way set-associative cache, the cache is partitioned into disjoint sets of size $α$, and each item can only be cached in one set, typically selected via a hash function. Set-associative caches are widely used and have many benefits, e.g., in terms of latency or concurrency, over fully associative caches, but they often incur more cache misses. As the set size $α$ decreases, the benefits i…
▽ More
In an $α$-way set-associative cache, the cache is partitioned into disjoint sets of size $α$, and each item can only be cached in one set, typically selected via a hash function. Set-associative caches are widely used and have many benefits, e.g., in terms of latency or concurrency, over fully associative caches, but they often incur more cache misses. As the set size $α$ decreases, the benefits increase, but the paging costs worsen.
In this paper we characterize the performance of an $α$-way set-associative LRU cache of total size $k$, as a function of $α= α(k)$. We prove the following, assuming that sets are selected using a fully random hash function:
- For $α= ω(\log k)$, the paging cost of an $α$-way set-associative LRU cache is within additive $O(1)$ of that a fully-associative LRU cache of size $(1-o(1))k$, with probability $1 - 1/\operatorname{poly}(k)$, for all request sequences of length $\operatorname{poly}(k)$.
- For $α= o(\log k)$, and for all $c = O(1)$ and $r = O(1)$, the paging cost of an $α$-way set-associative LRU cache is not within a factor $c$ of that a fully-associative LRU cache of size $k/r$, for some request sequence of length $O(k^{1.01})$.
- For $α= ω(\log k)$, if the hash function can be occasionally changed, the paging cost of an $α$-way set-associative LRU cache is within a factor $1 + o(1)$ of that a fully-associative LRU cache of size $(1-o(1))k$, with probability $1 - 1/\operatorname{poly}(k)$, for request sequences of arbitrary (e.g., super-polynomial) length.
Some of our results generalize to other paging algorithms besides LRU, such as least-frequently used (LFU).
△ Less
Submitted 10 April, 2023;
originally announced April 2023.
-
Fully Energy-Efficient Randomized Backoff: Slow Feedback Loops Yield Fast Contention Resolution
Authors:
Michael A. Bender,
Jeremy T. Fineman,
Seth Gilbert,
John Kuszmaul,
Maxwell Young
Abstract:
Contention resolution addresses the problem of coordinating access to a shared channel. Time proceeds in slots, and a packet transmission can be made in any slot. A packet is successfully sent if no other packet is also transmitted during that slot. If two or more packets are sent in the same slot, then none of these transmissions succeed. Listening during a slot gives ternary feedback, indicating…
▽ More
Contention resolution addresses the problem of coordinating access to a shared channel. Time proceeds in slots, and a packet transmission can be made in any slot. A packet is successfully sent if no other packet is also transmitted during that slot. If two or more packets are sent in the same slot, then none of these transmissions succeed. Listening during a slot gives ternary feedback, indicating if that slot had (0) silence, (1) a successful transmission, or (2+) noise. No other feedback is available. Packets are (adversarially) injected into the system over time. A packet departs the system once it is successful. The goal is to send all packets while optimizing throughput, which is roughly the fraction of successful slots.
Most prior algorithms with constant throughput require a short feedback loop, in the sense that a packet's sending probability in slot t+1 is fully determined by its internal state at slot t and the channel feedback at slot t. An open question is whether these short feedback loops are necessary; that is, how often must listening and updating occur in order to achieve constant throughput? This question addresses energy efficiency, since both listening and sending consume significant energy. The channel can also suffer adversarial noise ("jamming"), which causes any listener to hear noise, even when no packets are sent. How does jamming affect our goal of long feedback loops/energy efficiency?
Connecting these questions, we ask: what does a contention-resolution algorithm have to sacrifice to reduce channel accesses? Must we give up on constant throughput or robustness to noise? Here, we show that we need not concede anything. Suppose there are N packets and J jammed slots, where the input is determined by an adaptive adversary. We give an algorithm that, with high probability in N+J, has constant throughput and polylog(N+J) channel accesses per packet.
△ Less
Submitted 12 June, 2025; v1 submitted 15 February, 2023;
originally announced February 2023.
-
Skyrme-Hartree-Fock-Bogoliubov mass models on a 3D mesh. IIb. Fission properties of BSkG2
Authors:
Wouter Ryssens,
Guillaume Scamps,
Stephane Goriely,
Michael Bender
Abstract:
Large-scale models of nuclear structure are currently the only way to provide consistent datasets for the many properties of thousands of exotic nuclei that are required by nucleosynthesis simulations. In [W.Ryssens et al., Eur. Phys. J. A 58, 246 (2022)], we recently presented the new BSkG2 model based on an energy density functional of the Skyrme type. Relying on a flexible three-dimensional coo…
▽ More
Large-scale models of nuclear structure are currently the only way to provide consistent datasets for the many properties of thousands of exotic nuclei that are required by nucleosynthesis simulations. In [W.Ryssens et al., Eur. Phys. J. A 58, 246 (2022)], we recently presented the new BSkG2 model based on an energy density functional of the Skyrme type. Relying on a flexible three-dimensional coordinate representation of the nucleus, the model takes into account both triaxial deformation and time-reversal symmetry breaking. BSkG2 achieves a state-of-the-art global description of nuclear ground state (g.s.) properties and reproduces in particular the known masses with a root-mean-square (rms) deviation of 678 keV. Moving beyond g.s. properties, the model also reproduces all empirical values for the primary and secondary barriers as well as isomer excitation energies of actinide nuclei with rms deviations below 500 keV, i.e. with unprecedented accuracy. Here we discuss in detail the extension of our framework to the calculation of the fission barriers of 45 actinide nuclei, including odd-mass and odd-odd systems. We focus in particular on the impact of symmetry breaking which is key to the accuracy of the model: we allow systematically for axial, reflection and time-reversal symmetry breaking. The effect of the latter on the fission properties of odd-mass and odd-odd nuclei is small, but we find that allowing for shapes with triaxial or octupole deformation, as well as shapes with both, is crucial to achieving this accuracy. The numerical accuracy of our coordinate space approach, the variety of nuclear configurations explored and the simultaneous successful description of fission properties and known masses makes BSkG2 the tool of choice for the large-scale study of nuclear structure.
△ Less
Submitted 8 May, 2023; v1 submitted 6 February, 2023;
originally announced February 2023.
-
The shape of gold
Authors:
Benjamin Bally,
Giuliano Giacalone,
Michael Bender
Abstract:
Having a detailed theoretical knowledge of the low-energy structure of the heavy odd-mass nucleus $^{197}$Au is of prime interest as the structure of this isotope represents an important input to theoretical simulations of collider experiments involving gold ions performed worldwide at relativistic energies. In the present article, therefore, we report on new results on the structure of $^{197}$Au…
▽ More
Having a detailed theoretical knowledge of the low-energy structure of the heavy odd-mass nucleus $^{197}$Au is of prime interest as the structure of this isotope represents an important input to theoretical simulations of collider experiments involving gold ions performed worldwide at relativistic energies. In the present article, therefore, we report on new results on the structure of $^{197}$Au obtained from state-of-the-art multi-reference energy density functional (MR-EDF) calculations. Our MR-EDF calculations were realized using the Skyrme-type pseudo-potential SLyMR1, and include beyond mean-field correlations through the mixing, in the spirit of the Generator Coordinate Method (GCM), of particle-number and angular-momentum projected triaxially deformed Bogoliubov quasi-particle states. Comparison with experimental data shows that the model gives a reasonable description of $^{197}$Au with in particular a good agreement for most of the spectroscopic properties of the $3/2_1^+$ ground state. From the collective wave function of the correlated state, we compute an average deformation $\barβ(3/2_1^+)=0.13$ and $\barγ(3/2_1^+)=40^\circ$ for the ground state. We use this result to construct an intrinsic shape of $^{197}$Au representing a microscopically-motivated input for precision simulations of the associated collider processes. We discuss, in particular, how the triaxiality of this nucleus is expected to impact $^{197}$Au+$^{197}$Au collision experiments at ultrarelativistic energy.
△ Less
Submitted 6 January, 2023;
originally announced January 2023.
-
Underdetermined Dyson-Schwinger equations
Authors:
Carl M. Bender,
Christos Karapoulitidis,
S. P. Klevansky
Abstract:
This paper examines the effectiveness of the Dyson-Schwinger (DS) equations as a calculational tool in quantum field theory. The DS equations are an infinite sequence of coupled equations that are satisfied exactly by the connected Green's functions $G_n$ of the field theory. These equations link lower to higher Green's functions and, if they are truncated, the resulting finite system of equations…
▽ More
This paper examines the effectiveness of the Dyson-Schwinger (DS) equations as a calculational tool in quantum field theory. The DS equations are an infinite sequence of coupled equations that are satisfied exactly by the connected Green's functions $G_n$ of the field theory. These equations link lower to higher Green's functions and, if they are truncated, the resulting finite system of equations is underdetermined. The simplest way to solve the underdetermined system is to set all higher Green's function(s) to zero and then to solve the resulting determined system for the first few Green's functions. The $G_1$ or $G_2$ so obtained can be compared with exact results in solvable models to see if the accuracy improves for high-order truncations. Five $D=0$ models are studied: Hermitian $φ^4$ and $φ^6$ and non-Hermitian $iφ^3$, $-φ^4$, and $iφ^5$ theories. The truncated DS equations give a sequence of approximants that converge slowly to a limiting value but this limiting value always {\it differs} from the exact value by a few percent. More sophisticated truncation schemes based on mean-field-like approximations do not fix this formidable calculational problem.
△ Less
Submitted 3 February, 2023; v1 submitted 23 November, 2022;
originally announced November 2022.
-
The mass of odd-odd nuclei in microscopic mass models
Authors:
W. Ryssens,
G. Scamps,
G. Grams,
I. Kullmann,
M. Bender,
S. Goriely
Abstract:
Accurate estimates of the binding energy of nuclei far from stability that cannot be produced in the laboratory are crucial to our understanding of nuclear processes in astrophysical scenarios. Models based on energy density functionals have shown that they are capable of reproducing all known masses with root-mean-square error better than 800 keV, while retaining a firm microscopic foundation. Ho…
▽ More
Accurate estimates of the binding energy of nuclei far from stability that cannot be produced in the laboratory are crucial to our understanding of nuclear processes in astrophysical scenarios. Models based on energy density functionals have shown that they are capable of reproducing all known masses with root-mean-square error better than 800 keV, while retaining a firm microscopic foundation. However, it was recently pointed out in [M. Hukkanen et al., arXiv:2210.10674] that the recent BSkG1 model fails to account for a contribution to the binding energy that is specific to odd-odd nuclei, and which can be studied by using appropriate mass difference formulas. We analyse here the (lacking) performance of three recent microscopic mass models with respect to such formulas and examine possibilities to remedy this deficiency in the future.
△ Less
Submitted 7 November, 2022;
originally announced November 2022.
-
Odd-odd neutron-rich rhodium isotopes studied with the double Penning trap JYFLTRAP
Authors:
M. Hukkanen,
W. Ryssens,
P. Ascher,
M. Bender,
T. Eronen,
S. Grévy,
A. Kankainen,
M. Stryjczyk,
L. Al Ayoubi,
S. Ayet,
O. Beliuskina,
C. Delafosse,
W. Gins,
M. Gerbaux,
A. Husson,
A. Jokinen,
D. A. Nesterenko,
I. Pohjalainen,
M. Reponen,
S. Rinta-Antila,
A. de Roubin,
A. P. Weaver
Abstract:
Precision mass measurements of neutron-rich rhodium isotopes have been performed at the JYFLTRAP Penning trap mass spectrometer at the Ion Guide Isotope Separator On-Line (IGISOL) facility. We report results on ground- and isomeric-state masses in $^{110,112,114,116,118}$Rh and the very first mass measurement of $^{120}$Rh. The isomeric states were separated and measured for the first time using t…
▽ More
Precision mass measurements of neutron-rich rhodium isotopes have been performed at the JYFLTRAP Penning trap mass spectrometer at the Ion Guide Isotope Separator On-Line (IGISOL) facility. We report results on ground- and isomeric-state masses in $^{110,112,114,116,118}$Rh and the very first mass measurement of $^{120}$Rh. The isomeric states were separated and measured for the first time using the phase-imaging ion-cyclotron-resonance (PI-ICR) technique. For $^{112}$Rh, we also report new half-lives for both the ground state and the isomer. The results are compared to theoretical predictions using the BSkG1 mass model and discussed in terms of triaxial deformation.
△ Less
Submitted 29 November, 2022; v1 submitted 19 October, 2022;
originally announced October 2022.
-
IcebergHT: High Performance PMEM Hash Tables Through Stability and Low Associativity
Authors:
Prashant Pandey,
Michael A. Bender,
Alex Conway,
Martín Farach-Colton,
William Kuszmaul,
Guido Tagliavini,
Rob Johnson
Abstract:
Modern hash table designs strive to minimize space while maximizing speed. The most important factor in speed is the number of cache lines accessed during updates and queries. This is especially important on PMEM, which is slower than DRAM and in which writes are more expensive than reads.
This paper proposes two stronger design objectives: stability and low-associativity. A stable hash table do…
▽ More
Modern hash table designs strive to minimize space while maximizing speed. The most important factor in speed is the number of cache lines accessed during updates and queries. This is especially important on PMEM, which is slower than DRAM and in which writes are more expensive than reads.
This paper proposes two stronger design objectives: stability and low-associativity. A stable hash table doesn't move items around, and a hash table has low associativity if there are only a few locations where an item can be stored. Low associativity ensures that queries need to examine only a few memory locations, and stability ensures that insertions write to very few cache lines. Stability also simplifies scaling and crash safety.
We present IcebergHT, a fast, crash-safe, concurrent, and space-efficient hash table for PMEM based on the design principles of stability and low associativity. IcebergHT combines in-memory metadata with a new hashing technique, iceberg hashing, that is (1) space efficient, (2) stable, and (3) supports low associativity. In contrast, existing hash-tables either modify numerous cache lines during insertions (e.g. cuckoo hashing), access numerous cache lines during queries (e.g. linear probing), or waste space (e.g. chaining). Moreover, the combination of (1)-(3) yields several emergent benefits: IcebergHT scales better than other hash tables, supports crash-safety, and has excellent performance on PMEM (where writes are particularly expensive).
△ Less
Submitted 11 October, 2022; v1 submitted 8 October, 2022;
originally announced October 2022.
-
$\mathcal{P}\mathcal{T}$-symmetric $-g\varphi^4$ theory
Authors:
Wen-Yuan Ai,
Carl M. Bender,
Sarben Sarkar
Abstract:
The scalar field theory with potential $V(\varphi)=\textstyle{\frac{1}{2}} m^2\varphi^2-\textstyle{\frac{1}{4}} g\varphi^4$ ($g>0$) is ill defined as a Hermitian theory but in a non-Hermitian $\mathcal{P}\mathcal{T}$-symmetric framework it is well defined, and it has a positive real energy spectrum for the case of spacetime dimension $D=1$. While the methods used in the literature do not easily ge…
▽ More
The scalar field theory with potential $V(\varphi)=\textstyle{\frac{1}{2}} m^2\varphi^2-\textstyle{\frac{1}{4}} g\varphi^4$ ($g>0$) is ill defined as a Hermitian theory but in a non-Hermitian $\mathcal{P}\mathcal{T}$-symmetric framework it is well defined, and it has a positive real energy spectrum for the case of spacetime dimension $D=1$. While the methods used in the literature do not easily generalize to quantum field theory, in this paper the path-integral representation of a $\mathcal{P}\mathcal{T}$-symmetric $-g\varphi^4$ theory is shown to provide a unified formulation for general $D$. A new conjectural relation between the Euclidean partition functions $Z^{\mathcal{P}\mathcal{T}}(g)$ of the non-Hermitian $\mathcal{P}\mathcal{T}$-symmetric theory and $Z_{\rm Herm}(λ)$ of the $λ\varphi^4$ ($λ>0$) Hermitian theory is proposed: $\log Z^{\mathcal{P}\mathcal{T}}(g)=\textstyle{\frac{1}{2}} \log Z_{\rm Herm}(-g+{\rm i} 0^+)+\textstyle{\frac{1}{2}}\log Z_{\rm Herm}(-g-{\rm i} 0^+)$. This relation ensures a real energy spectrum for the non-Hermitian $\mathcal{P}\mathcal{T}$-symmetric $-g\varphi^4$ field theory. A closely related relation is rigorously valid in $D=0$. For $D=1$, using a semiclassical evaluation of $Z^{\mathcal{P}\mathcal{T}}(g)$, this relation is verified by comparing the imaginary parts of the ground-state energy $E_0^{\mathcal{P}\mathcal{T}}(g)$ (before cancellation) and $E_{0,\rm Herm}(-g\pm {\rm i} 0^+)$.
△ Less
Submitted 5 January, 2023; v1 submitted 16 September, 2022;
originally announced September 2022.
-
Experimentally-realizable $\mathcal{PT}$ phase transitions in reflectionless quantum scattering
Authors:
Micheline B. Soley,
Carl M. Bender,
A. Douglas Stone
Abstract:
A class of above-barrier quantum-scattering problems is shown to provide an experimentally-accessible platform for studying $\mathcal{PT}$-symmetric Schrödinger equations that exhibit spontaneous $\mathcal{PT}$ symmetry breaking despite having purely real potentials. These potentials are one-dimensional, inverted, and unstable and have the form $V(x) = - \lvert x\rvert^p$ ($p>0$), terminated at a…
▽ More
A class of above-barrier quantum-scattering problems is shown to provide an experimentally-accessible platform for studying $\mathcal{PT}$-symmetric Schrödinger equations that exhibit spontaneous $\mathcal{PT}$ symmetry breaking despite having purely real potentials. These potentials are one-dimensional, inverted, and unstable and have the form $V(x) = - \lvert x\rvert^p$ ($p>0$), terminated at a finite length or energy to a constant value as $x\to \pm\infty$. The signature of unbroken $\mathcal{PT}$ symmetry is the existence of reflectionless propagating states at discrete real energies up to arbitrarily high energy. In the $\mathcal{PT}$-broken phase, there are no such solutions. In addition, there exists an intermediate mixed phase, where reflectionless states exist at low energy but disappear at a fixed finite energy, independent of termination length. In the mixed phase exceptional points (EPs) occur at specific $p$ and energy values, with a quartic dip in the reflectivity in contrast to the quadratic behavior away from EPs. $\mathcal{PT}$-symmetry-breaking phenomena have not been previously predicted in a quantum system with a real potential and no reservoir coupling. The effects predicted here are measurable in standard cold-atom experiments with programmable optical traps. The physical origin of the symmetry-breaking transition is elucidated using a WKB force analysis that identifies the spatial location of the above-barrier scattering.
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Skyrme-Hartree-Fock-Bogoliubov mass models on a 3D mesh: II. Time-reversal symmetry breaking
Authors:
Wouter Ryssens,
Guillaume Scamps,
S. Goriely,
Michael Bender
Abstract:
Models based on nuclear energy density functionals can provide access to a multitude of observables for thousands of nuclei in a single framework with microscopic foundations. Such models can rival the accuracy of more phenomenological approaches, but doing so requires adjusting parameters to thousands of nuclear masses. To keep such large-scale fits feasible, several symmetry restrictions are gen…
▽ More
Models based on nuclear energy density functionals can provide access to a multitude of observables for thousands of nuclei in a single framework with microscopic foundations. Such models can rival the accuracy of more phenomenological approaches, but doing so requires adjusting parameters to thousands of nuclear masses. To keep such large-scale fits feasible, several symmetry restrictions are generally imposed on the nuclear configurations. One such example is time-reversal invariance, which is generally enforced via the Equal Filling Approximation (EFA). Here we lift this assumption, enabling us to access the spin and current densities in the ground states of odd-mass and odd-odd nuclei and which contribute to the total energy of such nuclei through so-called "time-odd" terms. We present here the Skyrme-based BSkG2 model whose parameters were adjusted to essentially all known nuclear masses without relying on the EFA, refining our earlier work [G. Scamps et al., EPJA 57, 333 (2021), arXiv:2011.07904]. Moving beyond ground state properties, we also incorporated information on the fission barriers of actinide nuclei in the parameter adjustment. The resulting model achieves a root-mean-square (rms) deviation of (i) 0.678 MeV on 2457 known masses, (ii) 0.027 fm on 884 measured charge radii, (iii) 0.44 MeV and 0.47 MeV, respectively, on 45 reference values for primary and secondary fission barriers of actinide nuclei, and (iv) 0.49 MeV on 28 fission isomer excitation energies. We limit ourselves here to a description of the model and the study the impact of lifting the EFA on ground state properties such as binding energies, deformation and pairing, deferring a detailed discussion of fission to a forthcoming paper.
△ Less
Submitted 12 August, 2022;
originally announced August 2022.
-
The Eclipse Megamovie Project (2017)
Authors:
Hugh S. Hudson,
Laura Peticolas,
Calvin Johnson,
Vivian White,
Mark Bender,
Jay M. Pasachoff,
Juan Carlos Martínez Oliveros,
Braxton Collier,
Alexei V. Filippenko,
Noelle Filippenko,
Andrew Fraknoi,
Juan Camilo Guevara Gómez,
Justin Koh,
David Konerding,
Larisza Krista,
Brian Kruse,
Scott McIntosh,
Brian Mendez,
Igor Ruderman,
Darlene Yan,
Dan Zevin
Abstract:
The total solar eclipse of August 21, 2017, crossed the whole width of North America, the first occasion for this during the modern age of consumer electronics. Accordingly, it became a great opportunity to engage the public and to enlist volunteer observers with relatively high-level equipment; our program ("Eclipse Megamovie") took advantage of this as a means of creating a first-ever public dat…
▽ More
The total solar eclipse of August 21, 2017, crossed the whole width of North America, the first occasion for this during the modern age of consumer electronics. Accordingly, it became a great opportunity to engage the public and to enlist volunteer observers with relatively high-level equipment; our program ("Eclipse Megamovie") took advantage of this as a means of creating a first-ever public database of such eclipse photography. This resulted in a large outreach program, involving many hundreds of individuals, supported almost entirely on a volunteer basis and with the institutional help of Google, the Astronomical Society of the Pacific, and the University of California, Berkeley. The project home page is \url{http://eclipsemegamovie.org}, which contains the movie itself. We hope that our comments here will help with planning for similar activities in the total eclipse of April 8, 2024.
△ Less
Submitted 30 July, 2022; v1 submitted 27 July, 2022;
originally announced July 2022.
-
Structure of $^{128,129,130}$Xe through multi-reference energy density functional calculations
Authors:
Benjamin Bally,
Giuliano Giacalone,
Michael Bender
Abstract:
Recently, values for the Kumar quadrupole deformation parameters of the nucleus $^{130}$Xe have been computed from the results of a Coulomb excitation experiment, indicating that this xenon isotope has a prominent triaxial ground state. Within a different context, it was recently argued that the analysis of particle correlations in the final states of ultra-relativistic heavy-ion collisions perfor…
▽ More
Recently, values for the Kumar quadrupole deformation parameters of the nucleus $^{130}$Xe have been computed from the results of a Coulomb excitation experiment, indicating that this xenon isotope has a prominent triaxial ground state. Within a different context, it was recently argued that the analysis of particle correlations in the final states of ultra-relativistic heavy-ion collisions performed at the Large Hadron Collider (LHC) points to a similar structure for the adjacent isotope, $^{129}$Xe. In the present work, we report on state-of-the-art multi-reference energy density functional calculations that combine projection on proton and neutron number as well as angular momentum with shape mixing for the three isotopes $^{128,129,130}$Xe using the Skyrme-type pseudo-potential SLyMR1. Exploring the triaxial degree of freedom, we demonstrate that the ground states of all three isotopes display a very pronounced triaxial structure. Moreover, comparison with experimental results shows that the calculations reproduce fairly well the low-energy excitation spectrum of the two even-mass isotopes. By contrast, the calculation of $^{129}$Xe reveals some deficiencies of the effective interaction.
△ Less
Submitted 27 July, 2022;
originally announced July 2022.
-
Contention Resolution for Coded Radio Networks
Authors:
Michael A. Bender,
Seth Gilbert,
Fabian Kuhn,
John Kuszmaul,
Muriel Médard
Abstract:
Randomized backoff protocols, such as exponential backoff, are a powerful tool for managing access to a shared resource, often a wireless communication channel (e.g., [1]). For a wireless device to transmit successfully, it uses a backoff protocol to ensure exclusive access to the channel. Modern radios, however, do not need exclusive access to the channel to communicate; in particular, they have…
▽ More
Randomized backoff protocols, such as exponential backoff, are a powerful tool for managing access to a shared resource, often a wireless communication channel (e.g., [1]). For a wireless device to transmit successfully, it uses a backoff protocol to ensure exclusive access to the channel. Modern radios, however, do not need exclusive access to the channel to communicate; in particular, they have the ability to receive useful information even when more than one device transmits at the same time. These capabilities have now been exploited for many years by systems that rely on interference cancellation, physical layer network coding and analog network coding to improve efficiency. For example, Zigzag decoding [56] demonstrated how a base station can decode messages sent by multiple devices simultaneously.
In this paper, we address the following question: Can we design a backoff protocol that is better than exponential backoff when exclusive channel access is not required. We define the Coded Radio Network Model, which generalizes traditional radio network models (e.g., [30]). We then introduce the Decodable Backoff Algorithm, a randomized backoff protocol that achieves an optimal throughput of $1-o(1)$. (Throughput $1$ is optimal, as simultaneous reception does not increase the channel capacity.) The algorithm breaks the constant throughput lower bound for traditional radio networks [47-49], showing the power of these new hardware capabilities.
△ Less
Submitted 24 July, 2022;
originally announced July 2022.
-
Solving sparse polynomial systems using Groebner bases and resultants
Authors:
Matías R. Bender
Abstract:
Solving systems of polynomial equations is a central problem in nonlinear and computational algebra. Since Buchberger's algorithm for computing Gröbner bases in the 60s, there has been a lot of progress in this domain. Moreover, these equations have been employed to model and solve problems from diverse disciplines such as biology, cryptography, and robotics. Currently, we have a good understandin…
▽ More
Solving systems of polynomial equations is a central problem in nonlinear and computational algebra. Since Buchberger's algorithm for computing Gröbner bases in the 60s, there has been a lot of progress in this domain. Moreover, these equations have been employed to model and solve problems from diverse disciplines such as biology, cryptography, and robotics. Currently, we have a good understanding of how to solve generic systems from a theoretical and algorithmic point of view. However, polynomial equations encountered in practice are usually structured, and so many properties and results about generic systems do not apply to them. For this reason, a common trend in the last decades has been to develop mathematical and algorithmic frameworks to exploit specific structures of systems of polynomials.
Arguably, the most common structure is sparsity; that is, the polynomials of the systems only involve a few monomials. Since Bernstein, Khovanskii, and Kushnirenko's work on the expected number of solutions of sparse systems, toric geometry has been the default mathematical framework to employ sparsity. In particular, it is the crux of the matter behind the extension of classical tools to systems, such as resultant computations, homotopy continuation methods, and most recently, Gröbner bases. In this work, we will review these classical tools, their extensions, and recent progress in exploiting sparsity for solving polynomial systems.
This manuscript complements its homonymous tutorial presented at the conference ISSAC 2022.
△ Less
Submitted 19 May, 2022;
originally announced May 2022.
-
GraphZeppelin: Storage-Friendly Sketching for Connected Components on Dynamic Graph Streams
Authors:
David Tench,
Evan West,
Victor Zhang,
Michael A. Bender,
Abiyaz Chowdhury,
J. Ahmed Dellas,
Martin Farach-Colton,
Tyler Seip,
Kenny Zhang
Abstract:
Finding the connected components of a graph is a fundamental problem with uses throughout computer science and engineering. The task of computing connected components becomes more difficult when graphs are very large, or when they are dynamic, meaning the edge set changes over time subject to a stream of edge insertions and deletions. A natural approach to computing the connected components on a l…
▽ More
Finding the connected components of a graph is a fundamental problem with uses throughout computer science and engineering. The task of computing connected components becomes more difficult when graphs are very large, or when they are dynamic, meaning the edge set changes over time subject to a stream of edge insertions and deletions. A natural approach to computing the connected components on a large, dynamic graph stream is to buy enough RAM to store the entire graph. However, the requirement that the graph fit in RAM is prohibitive for very large graphs. Thus, there is an unmet need for systems that can process dense dynamic graphs, especially when those graphs are larger than available RAM.
We present a new high-performance streaming graph-processing system for computing the connected components of a graph. This system, which we call GraphZeppelin, uses new linear sketching data structures (CubeSketches) to solve the streaming connected components problem and as a result requires space asymptotically smaller than the space required for a lossless representation of the graph. GraphZeppelin is optimized for massive dense graphs: GraphZeppelin can process millions of edge updates (both insertions and deletions) per second, even when the underlying graph is far too large to fit in available RAM. As a result GraphZeppelin vastly increases the scale of graphs that can be processed.
△ Less
Submitted 28 March, 2022;
originally announced March 2022.
-
Online List Labeling: Breaking the $\log^2n$ Barrier
Authors:
Michael A. Bender,
Alex Conway,
Martín Farach-Colton,
Hanna Komlós,
William Kuszmaul,
Nicole Wein
Abstract:
The online list labeling problem is an algorithmic primitive with a large literature of upper bounds, lower bounds, and applications. The goal is to store a dynamically-changing set of $n$ items in an array of $m$ slots, while maintaining the invariant that the items appear in sorted order, and while minimizing the relabeling cost, defined to be the number of items that are moved per insertion/del…
▽ More
The online list labeling problem is an algorithmic primitive with a large literature of upper bounds, lower bounds, and applications. The goal is to store a dynamically-changing set of $n$ items in an array of $m$ slots, while maintaining the invariant that the items appear in sorted order, and while minimizing the relabeling cost, defined to be the number of items that are moved per insertion/deletion.
For the linear regime, where $m = (1 + Θ(1)) n$, an upper bound of $O(\log^2 n)$ on the relabeling cost has been known since 1981. A lower bound of $Ω(\log^2 n)$ is known for deterministic algorithms and for so-called smooth algorithms, but the best general lower bound remains $Ω(\log n)$. The central open question in the field is whether $O(\log^2 n)$ is optimal for all algorithms.
In this paper, we give a randomized data structure that achieves an expected relabeling cost of $O(\log^{3/2} n)$ per operation. More generally, if $m = (1 + \varepsilon) n$ for $\varepsilon = O(1)$, the expected relabeling cost becomes $O(\varepsilon^{-1} \log^{3/2} n)$.
Our solution is history independent, meaning that the state of the data structure is independent of the order in which items are inserted/deleted. For history-independent data structures, we also prove a matching lower bound: for all $ε$ between $1 / n^{1/3}$ and some sufficiently small positive constant, the optimal expected cost for history-independent list-labeling solutions is $Θ(\varepsilon^{-1}\log^{3/2} n)$.
△ Less
Submitted 12 September, 2022; v1 submitted 5 March, 2022;
originally announced March 2022.
-
What Does Dynamic Optimality Mean in External Memory?
Authors:
Michael A. Bender,
Martín Farach-Colton,
William Kuszmaul
Abstract:
In this paper, we revisit the question of how the dynamic optimality of search trees should be defined in external memory. A defining characteristic of external-memory data structures is that there is a stark asymmetry between queries and inserts/updates/deletes: by making the former slightly asymptotically slower, one can make the latter significantly asymptotically faster (even allowing for oper…
▽ More
In this paper, we revisit the question of how the dynamic optimality of search trees should be defined in external memory. A defining characteristic of external-memory data structures is that there is a stark asymmetry between queries and inserts/updates/deletes: by making the former slightly asymptotically slower, one can make the latter significantly asymptotically faster (even allowing for operations with sub-constant amortized I/Os). This asymmetry makes it so that rotation-based search trees are not optimal (or even close to optimal) in insert/update/delete-heavy external-memory workloads. To study dynamic optimality for such workloads, one must consider a different class of data structures.
The natural class of data structures to consider are what we call buffered-propagation trees. Such trees can adapt dynamically to the locality properties of an input sequence in order to optimize the interactions between different inserts/updates/deletes and queries. We also present a new form of beyond-worst-case analysis that allows for us to formally study a continuum between static and dynamic optimality. Finally, we give a novel data structure, called the \jellotree, that is statically optimal and that achieves dynamic optimality for a large natural class of inputs defined by our beyond-worst-case analysis.
△ Less
Submitted 21 April, 2022; v1 submitted 5 January, 2022;
originally announced January 2022.
-
AI and the Everything in the Whole Wide World Benchmark
Authors:
Inioluwa Deborah Raji,
Emily M. Bender,
Amandalynne Paullada,
Emily Denton,
Alex Hanna
Abstract:
There is a tendency across different subfields in AI to valorize a small collection of influential benchmarks. These benchmarks operate as stand-ins for a range of anointed common problems that are frequently framed as foundational milestones on the path towards flexible and generalizable AI systems. State-of-the-art performance on these benchmarks is widely understood as indicative of progress to…
▽ More
There is a tendency across different subfields in AI to valorize a small collection of influential benchmarks. These benchmarks operate as stand-ins for a range of anointed common problems that are frequently framed as foundational milestones on the path towards flexible and generalizable AI systems. State-of-the-art performance on these benchmarks is widely understood as indicative of progress towards these long-term goals. In this position paper, we explore the limits of such benchmarks in order to reveal the construct validity issues in their framing as the functionally "general" broad measures of progress they are set up to be.
△ Less
Submitted 26 November, 2021;
originally announced November 2021.
-
Tiny Pointers
Authors:
Michael A. Bender,
Alex Conway,
Martín Farach-Colton,
William Kuszmaul,
Guido Tagliavini
Abstract:
This paper introduces a new data-structural object that we call the tiny pointer. In many applications, traditional $\log n $-bit pointers can be replaced with $o (\log n )$-bit tiny pointers at the cost of only a constant-factor time overhead. We develop a comprehensive theory of tiny pointers, and give optimal constructions for both fixed-size tiny pointers (i.e., settings in which all of the ti…
▽ More
This paper introduces a new data-structural object that we call the tiny pointer. In many applications, traditional $\log n $-bit pointers can be replaced with $o (\log n )$-bit tiny pointers at the cost of only a constant-factor time overhead. We develop a comprehensive theory of tiny pointers, and give optimal constructions for both fixed-size tiny pointers (i.e., settings in which all of the tiny pointers must be the same size) and variable-size tiny pointers (i.e., settings in which the average tiny-pointer size must be small, but some tiny pointers can be larger). If a tiny pointer references an element in an array filled to load factor $1 - 1 / k$, then the optimal tiny-pointer size is $Θ(\log \log \log n + \log k) $ bits in the fixed-size case, and $ Θ(\log k) $ expected bits in the variable-size case. Our tiny-pointer constructions also require us to revisit several classic problems having to do with balls and bins; these results may be of independent interest.
Using tiny pointers, we revisit five classic data-structure problems: the data-retrieval problem, succinct dynamic binary search trees, space-efficient stable dictionaries, space-efficient dictionaries with variable-size keys, and the internal-memory stash problem. These are all well-studied problems, and in each case tiny pointers allow for us to take a natural space-inefficient solution that uses pointers and make it space-efficient for free.
△ Less
Submitted 24 November, 2021;
originally announced November 2021.
-
On the Optimal Time/Space Tradeoff for Hash Tables
Authors:
Michael A. Bender,
Martín Farach-Colton,
John Kuszmaul,
William Kuszmaul,
Mingmou Liu
Abstract:
For nearly six decades, the central open question in the study of hash tables has been to determine the optimal achievable tradeoff curve between time and space. State-of-the-art hash tables offer the following guarantee: If keys/values are Theta(log n) bits each, then it is possible to achieve constant-time insertions/deletions/queries while wasting only O(loglog n) bits of space per key when com…
▽ More
For nearly six decades, the central open question in the study of hash tables has been to determine the optimal achievable tradeoff curve between time and space. State-of-the-art hash tables offer the following guarantee: If keys/values are Theta(log n) bits each, then it is possible to achieve constant-time insertions/deletions/queries while wasting only O(loglog n) bits of space per key when compared to the information-theoretic optimum. Even prior to this bound being achieved, the target of O(loglog n) wasted bits per key was known to be a natural end goal, and was proven to be optimal for a number of closely related problems (e.g., stable hashing, dynamic retrieval, and dynamically-resized filters).
This paper shows that O(loglog n) wasted bits per key is not the end of the line for hashing. In fact, for any k \in [log* n], it is possible to achieve O(k)-time insertions/deletions, O(1)-time queries, and O(\log^{(k)} n) wasted bits per key (all with high probability in n). This means that, each time we increase insertion/deletion time by an \emph{additive constant}, we reduce the wasted bits per key \emph{exponentially}. We further show that this tradeoff curve is the best achievable by any of a large class of hash tables, including any hash table designed using the current framework for making constant-time hash tables succinct.
△ Less
Submitted 3 November, 2021; v1 submitted 31 October, 2021;
originally announced November 2021.
-
Angular analysis of $B^+ \to ρ^+ρ^0$ decays reconstructed in 2019-2020 Belle II data
Authors:
Belle II collaboration,
F. Abudinén,
I. Adachi,
R. Adak,
K. Adamczyk,
P. Ahlburg,
J. K. Ahn,
H. Aihara,
N. Akopov,
A. Aloisio,
F. Ameli,
L. Andricek,
N. Anh Ky,
D. M. Asner,
H. Atmacan,
V. Aulchenko,
T. Aushev,
V. Aushev,
T. Aziz,
V. Babu,
S. Bacher,
S. Baehr,
S. Bahinipati,
A. M. Bakich,
P. Bambade
, et al. (527 additional authors not shown)
Abstract:
We report on the first Belle II measurement of the branching fraction ($\mathcal{B}$) and longitudinal polarization fraction ($f_L$) of $B^+\to ρ^+ρ^0$ decays. We reconstruct $B^+\to ρ^+(\to π^+π^0(\to γγ))ρ^0(\to π^+π^-)$ decays in a sample of SuperKEKB electron-positron collisions collected by the Belle II experiment in 2019 and 2020 at the $Υ$(4S) resonance and corresponding to $62.8$ fb…
▽ More
We report on the first Belle II measurement of the branching fraction ($\mathcal{B}$) and longitudinal polarization fraction ($f_L$) of $B^+\to ρ^+ρ^0$ decays. We reconstruct $B^+\to ρ^+(\to π^+π^0(\to γγ))ρ^0(\to π^+π^-)$ decays in a sample of SuperKEKB electron-positron collisions collected by the Belle II experiment in 2019 and 2020 at the $Υ$(4S) resonance and corresponding to $62.8$ fb$^{-1}$ of integrated luminosity. We fit the distributions of the difference between expected and observed $B$ candidate energy, continuum-suppression variable, dipion masses, and angular distributions of the resulting samples, to determine a signal yield of $104\pm16$ events. The signal yields are corrected for efficiencies determined from simulation and control data samples to obtain $\mathcal{B}(B^+ \to ρ^+ρ^0) = [20.6 \pm 3.2(\rm stat) \pm 4.0(\rm syst)]\times 10^{-6}$, and $f_L(B^+ \to ρ^+ρ^0) = 0.936 ^{+0.049}_{-0.041}(\rm stat)\pm 0.021(\rm syst)$. This first Belle II $B^+ \to ρ^+ρ^0$ angular analysis yields results compatible with previous determinations, and indicates Belle II performance superior to early Belle results.
△ Less
Submitted 28 September, 2021; v1 submitted 23 September, 2021;
originally announced September 2021.
-
Measurements of branching fractions and CP-violating charge asymmetries in multibody charmless $B$ decays reconstructed in 2019-2020 Belle II data
Authors:
Belle II collaboration,
F. Abudinén,
I. Adachi,
R. Adak,
K. Adamczyk,
P. Ahlburg,
J. K. Ahn,
H. Aihara,
N. Akopov,
A. Aloisio,
F. Ameli,
L. Andricek,
N. Anh Ky,
D. M. Asner,
H. Atmacan,
V. Aulchenko,
T. Aushev,
V. Aushev,
T. Aziz,
V. Babu,
S. Bacher,
S. Baehr,
S. Bahinipati,
A. M. Bakich,
P. Bambade
, et al. (527 additional authors not shown)
Abstract:
We report on measurements of branching fractions ($\mathcal{B}$) and CP-violating charge asymmetries ($\mathcal{A}_{\rm CP}$) of multibody charmless $B$ decays reconstructed by the Belle II experiment at the SuperKEKB electron-positron collider. We use a sample of collisions collected in 2019 and 2020 at the $Υ(4S)$ resonance and corresponding to $62.8$ fb$^{-1}$ of integrated luminosity. We use s…
▽ More
We report on measurements of branching fractions ($\mathcal{B}$) and CP-violating charge asymmetries ($\mathcal{A}_{\rm CP}$) of multibody charmless $B$ decays reconstructed by the Belle II experiment at the SuperKEKB electron-positron collider. We use a sample of collisions collected in 2019 and 2020 at the $Υ(4S)$ resonance and corresponding to $62.8$ fb$^{-1}$ of integrated luminosity. We use simulation to determine optimized event selections. The $ΔE$ and $M_{\rm bc}$ distributions of the resulting samples are fit to determine signal yields of approximately 690, 840, and 380 decays for the channels $B^+ \to K^+K^-K^+$, $B^+ \to K^+π^-π^+$, and $B^0 \to K^+π^-π^0$, respectively. These yields are corrected for efficiencies determined from simulation and control data samples to obtain $\mathcal{B}(B^+ \to K^+K^-K^+) = [35.8 \pm 1.6(\rm stat) \pm 1.4 (\rm syst)]\times 10^{-6}$, $\mathcal{B}(B^+ \to K^+π^-π^+) = [67.0 \pm 3.3 (\rm stat)\pm 2.3 (\rm syst)]\times 10^{-6}$, $\mathcal{B}(B^0 \to K^+π^-π^0) = [38.1 \pm 3.5 (\rm stat)\pm 3.9 (\rm syst)]\times 10^{-6}$, $\mathcal{A}_{\rm CP}(B^+ \to K^+K^-K^+) = -0.103 \pm 0.042(\rm stat) \pm 0.020 (\rm syst)$, $\mathcal{A}_{\rm CP}(B^+ \to K^+π^-π^+) = -0.010 \pm 0.050 (\rm stat)\pm 0.021(\rm syst)$, and $\mathcal{A}_{\rm CP}(B^0 \to K^+π^-π^0) = 0.207 \pm 0.088 (\rm stat)\pm 0.011(\rm syst)$. Results are consistent with previous measurements and demonstrate detector performance comparable with the best Belle results.
△ Less
Submitted 28 September, 2021; v1 submitted 22 September, 2021;
originally announced September 2021.