-
Laboratory Three-dimensional X-ray Micro-beam Laue Diffraction
Authors:
Yubin Zhang,
Anthony Seret,
Jette Oddershede,
Azat Slyamov,
Jan Kehres,
Florian Bachmann,
Carsten Gundlach,
Ulrik Lund Olsen,
Jacob Bowen,
Henning Friis Poulsen,
Erik Lauridsen,
Dorte Juul Jensen
Abstract:
The development of three-dimensional (3D) non-destructive X-ray characterization techniques in home laboratories is essential for enabling many more researchers to perform 3D characterization daily, overcoming the limitations imposed by competitive and scarce access to synchrotron facilities. Recent efforts have focused on techniques such as laboratory diffraction contrast tomography (LabDCT), whi…
▽ More
The development of three-dimensional (3D) non-destructive X-ray characterization techniques in home laboratories is essential for enabling many more researchers to perform 3D characterization daily, overcoming the limitations imposed by competitive and scarce access to synchrotron facilities. Recent efforts have focused on techniques such as laboratory diffraction contrast tomography (LabDCT), which allows 3D characterization of recrystallized grains with sizes larger than 15-20 $μ$m, offering a boundary resolution of approximately 5$μ$m using commercial X-ray computed tomography (CT) systems. To enhance the capabilities of laboratory instruments, we have developed a new laboratory-based 3D X-ray micro-beam diffraction (Lab-3D$μ$XRD) technique. Lab-3D$μ$XRD combines the use of a focused polychromatic beam with a scanning-tomographic data acquisition routine to enable depth-resolved crystallographic orientation characterization. This work presents the first realization of Lab-3D$μ$XRD, including hardware development through the integration of a newly developed Pt-coated twin paraboloidal capillary X-ray focusing optics into a conventional X-ray $μ$CT system, as well as the development of data acquisition and processing software. The results are validated through comparisons with LabDCT and synchrotron phase contrast tomography. The findings clearly demonstrate the feasibility of Lab-3D$μ$XRD, particularly in detecting smaller grains and providing intragranular information. Finally, we discuss future directions for developing Lab-3D$μ$XRD into a versatile tool for studying materials with smaller grain sizes and high defect densities, including the potential of combining it with LabDCT and $μ$CT for multiscale and multimodal microstructural characterization.
△ Less
Submitted 10 April, 2025;
originally announced April 2025.
-
Reclaiming the Future: American Information Technology Leadership in an Era of Global Competition
Authors:
Alex Aiken,
David Jensen,
Catherine Gill,
William Gropp,
Peter Harsha,
Brian Mosley,
Daniel Reed,
William Regli
Abstract:
The United States risks losing its global leadership in information technology research due to declining basic research funding, challenges in attracting talent, and tensions between research security and openness.
The United States risks losing its global leadership in information technology research due to declining basic research funding, challenges in attracting talent, and tensions between research security and openness.
△ Less
Submitted 3 March, 2025;
originally announced March 2025.
-
Refined Brill-Noether Theory for Complete Graphs
Authors:
Haruku Aono,
Eric Burkholder,
Owen Craig,
Ketsile Dikobe,
David Jensen,
Ella Norris
Abstract:
The divisor theory of the complete graph $K_n$ is in many ways similar to that of a plane curve of degree $n$. We compute the splitting types of all divisors on the complete graph $K_n$. We see that the possible splitting types of divisors on $K_n$ exactly match the possible splitting types of line bundles on a smooth plane curve of degree $n$. This generalizes the earlier result of Cori and Le Bo…
▽ More
The divisor theory of the complete graph $K_n$ is in many ways similar to that of a plane curve of degree $n$. We compute the splitting types of all divisors on the complete graph $K_n$. We see that the possible splitting types of divisors on $K_n$ exactly match the possible splitting types of line bundles on a smooth plane curve of degree $n$. This generalizes the earlier result of Cori and Le Borgne computing the ranks of all divisors on $K_n$, and the earlier work of Cools and Panizzut analyzing the possible ranks of divisors of fixed degree on $K_n$.
△ Less
Submitted 10 January, 2025;
originally announced January 2025.
-
A high-speed, high-resolution Transition Edge Sensor spectrometer for soft X-rays at the Advanced Photon Source
Authors:
Orlando Quaranta,
Don Jensen,
Kelsey Morgan,
Joel C. Weber,
Jessica L. McChesney,
Hao Zheng,
Tejas Guruswamy,
Jonathan Baldwin,
Ben Mates,
Nathan Ortiz,
Johnathon Gard,
Doug Bennet,
Dan Schmidt,
Lisa Gades,
Antonino Miceli
Abstract:
This project explores the design and development of a transition edge sensor (TES) spectrometer for resonant soft X- ray scattering (RSXS) measurements developed in collaboration between Argonne National Laboratory (ANL) and the National Institute of Standards and Technology (NIST). Soft X-ray scattering is a powerful technique for studying the electronic and magnetic properties of materials on a…
▽ More
This project explores the design and development of a transition edge sensor (TES) spectrometer for resonant soft X- ray scattering (RSXS) measurements developed in collaboration between Argonne National Laboratory (ANL) and the National Institute of Standards and Technology (NIST). Soft X-ray scattering is a powerful technique for studying the electronic and magnetic properties of materials on a microscopic level. However, the lack of high-performance soft X-ray spectrometers has limited the potential of this technique. TES spectrometers have the potential to overcome these limitations due to their high energy resolution, high efficiency, and broad energy range. This project aims to optimize the design of a TES spectrometer for RSXS measurements and more generally soft X-ray spectroscopy at the Advanced Photon Source (APS) 29-ID, leading to improved understanding of advanced materials. We will present a detailed description of the instrument design and implementation. The spectrometer consists of a large array of approximately 250 high-speed and high-resolution pixels. The pixels have saturation energies of approximately 1 keV, sub-ms pulse duration and energy resolution of approximately 1 eV. The array is read out using microwave multiplexing chips with MHz bandwidth per channel, enabling efficient data throughput. To facilitate measurement of samples in situ under ultra-high vacuum conditions at the beamline, the spectrometer is integrated with an approximately 1 m long snout.
△ Less
Submitted 3 January, 2025;
originally announced January 2025.
-
Adaptive Circuit Behavior and Generalization in Mechanistic Interpretability
Authors:
Jatin Nainani,
Sankaran Vaidyanathan,
AJ Yeung,
Kartik Gupta,
David Jensen
Abstract:
Mechanistic interpretability aims to understand the inner workings of large neural networks by identifying circuits, or minimal subgraphs within the model that implement algorithms responsible for performing specific tasks. These circuits are typically discovered and analyzed using a narrowly defined prompt format. However, given the abilities of large language models (LLMs) to generalize across v…
▽ More
Mechanistic interpretability aims to understand the inner workings of large neural networks by identifying circuits, or minimal subgraphs within the model that implement algorithms responsible for performing specific tasks. These circuits are typically discovered and analyzed using a narrowly defined prompt format. However, given the abilities of large language models (LLMs) to generalize across various prompt formats for the same task, it remains unclear how well these circuits generalize. For instance, it is unclear whether the models generalization results from reusing the same circuit components, the components behaving differently, or the use of entirely different components. In this paper, we investigate the generality of the indirect object identification (IOI) circuit in GPT-2 small, which is well-studied and believed to implement a simple, interpretable algorithm. We evaluate its performance on prompt variants that challenge the assumptions of this algorithm. Our findings reveal that the circuit generalizes surprisingly well, reusing all of its components and mechanisms while only adding additional input edges. Notably, the circuit generalizes even to prompt variants where the original algorithm should fail; we discover a mechanism that explains this which we term S2 Hacking. Our findings indicate that circuits within LLMs may be more flexible and general than previously recognized, underscoring the importance of studying circuit generalization to better understand the broader capabilities of these models.
△ Less
Submitted 5 December, 2024; v1 submitted 25 November, 2024;
originally announced November 2024.
-
Machine Learning Approaches for Defect Detection in a Microwell-based Medical Device
Authors:
Xueying Zhao,
Yan Chen,
Yuefu Jiang,
Amie Radenbaugh,
Jamie Moskwa,
Devon Jensen
Abstract:
Microfluidic devices offer numerous advantages in medical applications, including the capture of single cells in microwell-based platforms for genomic analysis. As the cost of sequencing decreases, the demand for high-throughput single-cell analysis devices increases, leading to more microwells in a single device. However, their small size and large quantity increase the quality control (QC) effor…
▽ More
Microfluidic devices offer numerous advantages in medical applications, including the capture of single cells in microwell-based platforms for genomic analysis. As the cost of sequencing decreases, the demand for high-throughput single-cell analysis devices increases, leading to more microwells in a single device. However, their small size and large quantity increase the quality control (QC) effort. Currently, QC steps are still performed manually in some devices, requiring intensive training and time and causing inconsistency between different operators. A way to overcome this issue is to through automated defect detection. Computer vision can quickly analyze a large number of images in a short time and can be applied in defect detection. Automated defect detection can replace manual inspection, potentially decreasing variations in QC results. We report a machine learning (ML) algorithm that applies a convolution neural network (CNN) model with 9 layers and 64 units, incorporating dropouts and regularizations. This algorithm can analyze a large number of microwells produced by injection molding, significantly increasing the number of images analyzed compared to manual operator, improving QC, and ensuring the delivery of high-quality products to customers.
△ Less
Submitted 11 September, 2024;
originally announced September 2024.
-
Fibonacci Sumsets and the Gonality of Strip Graphs
Authors:
David Jensen,
Doel Rivera Laboy
Abstract:
We provide a new perspective on the divisor theory of graphs, using additive combinatorics. As a test case for this perspective, we compute the gonality of certain families of outerplanar graphs, specifically the strip graphs. The Jacobians of such graphs are always cyclic of Fibonacci order. As a consequence, we obtain several results on the additive properties of Fibonacci numbers.
We provide a new perspective on the divisor theory of graphs, using additive combinatorics. As a test case for this perspective, we compute the gonality of certain families of outerplanar graphs, specifically the strip graphs. The Jacobians of such graphs are always cyclic of Fibonacci order. As a consequence, we obtain several results on the additive properties of Fibonacci numbers.
△ Less
Submitted 17 August, 2024;
originally announced August 2024.
-
Space Station Rotational Stability
Authors:
David W. Jensen
Abstract:
Designing for rotational stability can dramatically affect the geometry of a space station. If improperly designed, the rotating station could end up catastrophically tumbling end-over-end. Active stabilization can address this problem; however, designing the station with passive rotation stability provides a lower-cost solution. This paper presents passive rotational stability guidelines for four…
▽ More
Designing for rotational stability can dramatically affect the geometry of a space station. If improperly designed, the rotating station could end up catastrophically tumbling end-over-end. Active stabilization can address this problem; however, designing the station with passive rotation stability provides a lower-cost solution. This paper presents passive rotational stability guidelines for four space station geometries. Station stability is first analyzed with thin-shell and thick-shell models. Stability is also analyzed with models of the station's major constituent parts, including outer shells, spokes, floors, air, and shuttle bays.
△ Less
Submitted 31 July, 2024;
originally announced August 2024.
-
Design Limits on Large Space Stations
Authors:
David W. Jensen
Abstract:
As the space industry matures, large space stations will be built. This paper organizes and documents constraints on the size of these space stations. Human frailty, station design, and construction impose these constraints. Human limitations include gravity, radiation, air pressure, rotational stability, population, and psychology. Station design limitations include gravity, population, material,…
▽ More
As the space industry matures, large space stations will be built. This paper organizes and documents constraints on the size of these space stations. Human frailty, station design, and construction impose these constraints. Human limitations include gravity, radiation, air pressure, rotational stability, population, and psychology. Station design limitations include gravity, population, material, geometry, mass, air pressure, and rotational stability. Limits on space station construction include construction approaches, very large stations, and historic station examples. This paper documents all these constraints for thoroughness and review; however, only a few constraints significantly limit the station size. This paper considers rotating stations with radii greater than 10 kilometers. Such stations may seem absurd today; however, with robotic automation and artificial intelligence, such sizes may become feasible in the future.
△ Less
Submitted 31 July, 2024;
originally announced August 2024.
-
Compositional Models for Estimating Causal Effects
Authors:
Purva Pruthi,
David Jensen
Abstract:
Many real-world systems can be usefully represented as sets of interacting components. Examples include computational systems, such as query processors and compilers, natural systems, such as cells and ecosystems, and social systems, such as families and organizations. However, current approaches to estimating potential outcomes and causal effects typically treat such systems as single units, repr…
▽ More
Many real-world systems can be usefully represented as sets of interacting components. Examples include computational systems, such as query processors and compilers, natural systems, such as cells and ecosystems, and social systems, such as families and organizations. However, current approaches to estimating potential outcomes and causal effects typically treat such systems as single units, represent them with a fixed set of variables, and assume a homogeneous data-generating process. In this work, we study a compositional approach for estimating individual-level potential outcomes and causal effects in structured systems, where each unit is represented by an instance-specific composition of multiple heterogeneous components. The compositional approach decomposes unit-level causal queries into more fine-grained queries, explicitly modeling how unit-level interventions affect component-level outcomes to generate a unit's outcome. We demonstrate this approach using modular neural network architectures and show that it provides benefits for causal effect estimation from observational data, such as accurate causal effect estimation for structured units, increased sample efficiency, improved overlap between treatment and control groups, and compositional generalization to units with unseen combinations of components. Remarkably, our results show that compositional modeling can improve the accuracy of causal estimation even when component-level outcomes are unobserved. We also create and use a set of real-world evaluation environments for the empirical evaluation of compositional approaches for causal effect estimation and demonstrate the role of composition structure, varying amounts of component-level data access, and component heterogeneity in the performance of compositional models as compared to the non-compositional approaches.
△ Less
Submitted 17 March, 2025; v1 submitted 25 June, 2024;
originally announced June 2024.
-
An 808 Line Phasor-Based Dehomogenisation Matlab Code For Multi-Scale Topology Optimisation
Authors:
Rebekka Varum Woldseth,
Ole Sigmund,
Peter Dørffler Ladegaard Jensen
Abstract:
This work presents an 808-line Matlab educational code for combined multi-scale topology optimisation and phasor-based dehomogenisation titled deHomTop808. The multi-scale formulation utilises homogenisation of optimal microstructures to facilitate efficient coarse-scale optimisation. Dehomogenisation allows for a high-resolution single-scale reconstruction of the optimised multi-scale structure,…
▽ More
This work presents an 808-line Matlab educational code for combined multi-scale topology optimisation and phasor-based dehomogenisation titled deHomTop808. The multi-scale formulation utilises homogenisation of optimal microstructures to facilitate efficient coarse-scale optimisation. Dehomogenisation allows for a high-resolution single-scale reconstruction of the optimised multi-scale structure, achieving minor losses in structural performance, at a fraction of the computational cost, compared to its large-scale topology optimisation counterpart. The presented code utilises stiffness optimal Rank-2 microstructures to minimise the compliance of a single-load case problem, subject to a volume fraction constraint. By exploiting the inherent efficiency benefits of the phasor-based dehomogenisation procedure, on-the-fly dehomogenisation to a single-scale structure is obtained. The presented code includes procedures for structural verification of the final dehomogenised structure by comparison to the multi-scale solution. The code is introduced in terms of the underlying theory and its major components, including examples and potential extensions, and can be downloaded from https://github.com/peterdorffler/deHomTop808.git.
△ Less
Submitted 24 May, 2024; v1 submitted 23 May, 2024;
originally announced May 2024.
-
On the Gonality of Ferrers Rook Graphs
Authors:
David Jensen,
Marissa Morvai,
William Welch,
Sydney Yeomans
Abstract:
A Ferrers rook graph is a graph whose vertices correspond to the dots in a Ferrers diagram, and where two vertices are adjacent if they are in the same row or the same column. We propose a conjectural formula for the gonality of Ferrers rook graphs, and prove this conjecture for a few infinite families of Ferrers diagrams. We also prove the conjecture for all Ferrers diagrams $F$ with…
▽ More
A Ferrers rook graph is a graph whose vertices correspond to the dots in a Ferrers diagram, and where two vertices are adjacent if they are in the same row or the same column. We propose a conjectural formula for the gonality of Ferrers rook graphs, and prove this conjecture for a few infinite families of Ferrers diagrams. We also prove the conjecture for all Ferrers diagrams $F$ with $|F| \leq 8$.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
Automated Discovery of Functional Actual Causes in Complex Environments
Authors:
Caleb Chuck,
Sankaran Vaidyanathan,
Stephen Giguere,
Amy Zhang,
David Jensen,
Scott Niekum
Abstract:
Reinforcement learning (RL) algorithms often struggle to learn policies that generalize to novel situations due to issues such as causal confusion, overfitting to irrelevant factors, and failure to isolate control of state factors. These issues stem from a common source: a failure to accurately identify and exploit state-specific causal relationships in the environment. While some prior works in R…
▽ More
Reinforcement learning (RL) algorithms often struggle to learn policies that generalize to novel situations due to issues such as causal confusion, overfitting to irrelevant factors, and failure to isolate control of state factors. These issues stem from a common source: a failure to accurately identify and exploit state-specific causal relationships in the environment. While some prior works in RL aim to identify these relationships explicitly, they rely on informal domain-specific heuristics such as spatial and temporal proximity. Actual causality offers a principled and general framework for determining the causes of particular events. However, existing definitions of actual cause often attribute causality to a large number of events, even if many of them rarely influence the outcome. Prior work on actual causality proposes normality as a solution to this problem, but its existing implementations are challenging to scale to complex and continuous-valued RL environments. This paper introduces functional actual cause (FAC), a framework that uses context-specific independencies in the environment to restrict the set of actual causes. We additionally introduce Joint Optimization for Actual Cause Inference (JACI), an algorithm that learns from observational data to infer functional actual causes. We demonstrate empirically that FAC agrees with known results on a suite of examples from the actual causality literature, and JACI identifies actual causes with significantly higher accuracy than existing heuristic methods in a set of complex, continuous-valued environments.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Beyond Point Masses. II. Non-Keplerian Shape Effects are Detectable in Several TNO Binaries
Authors:
Benjamin C. N. Proudfoot,
Darin A. Ragozzine,
Meagan L. Thatcher,
Will Grundy,
Dallin J. Spencer,
Tahina M. Alailima,
Sawyer Allen,
Penelope C. Bowden,
Susanne Byrd,
Conner D. Camacho,
Gibson H. Campbell,
Edison P. Carlisle,
Jacob A. Christensen,
Noah K. Christensen,
Kaelyn Clement,
Benjamin J. Derieg,
Mara K. Dille,
Cristian Dorrett,
Abigail L. Ellefson,
Taylor S. Fleming,
N. J. Freeman,
Ethan J. Gibson,
William G. Giforos,
Jacob A. Guerrette,
Olivia Haddock
, et al. (38 additional authors not shown)
Abstract:
About 40 transneptunian binaries (TNBs) have fully determined orbits with about 10 others being solved except for breaking the mirror ambiguity. Despite decades of study almost all TNBs have only ever been analyzed with a model that assumes perfect Keplerian motion (e.g., two point masses). In reality, all TNB systems are non-Keplerian due to non-spherical shapes, possible presence of undetected s…
▽ More
About 40 transneptunian binaries (TNBs) have fully determined orbits with about 10 others being solved except for breaking the mirror ambiguity. Despite decades of study almost all TNBs have only ever been analyzed with a model that assumes perfect Keplerian motion (e.g., two point masses). In reality, all TNB systems are non-Keplerian due to non-spherical shapes, possible presence of undetected system components, and/or solar perturbations. In this work, we focus on identifying candidates for detectable non-Keplerian motion based on sample of 45 well-characterized binaries. We use MultiMoon, a non-Keplerian Bayesian inference tool, to analyze published relative astrometry allowing for non-spherical shapes of each TNB system's primary. We first reproduce the results of previous Keplerian fitting efforts with MultiMoon, which serves as a comparison for the non-Keplerian fits and confirms that these fits are not biased by the assumption of a Keplerian orbit. We unambiguously detect non-Keplerian motion in 8 TNB systems across a range of primary radii, mutual orbit separations, and system masses. As a proof of concept for non-Keplerian fitting, we perform detailed fits for (66652) Borasisi-Pabu, possibly revealing a $J_2 \approx 0.44$, implying Borasisi (and/or Pabu) may be a contact binary or an unresolved compact binary. However, full confirmation of this result will require new observations. This work begins the next generation of TNB analyses that go beyond the point mass assumption to provide unique and valuable information on the physical properties of TNBs with implications for their formation and evolution.
△ Less
Submitted 19 March, 2024;
originally announced March 2024.
-
Algorithmic Robustness
Authors:
David Jensen,
Brian LaMacchia,
Ufuk Topcu,
Pamela Wisniewski
Abstract:
Algorithmic robustness refers to the sustained performance of a computational system in the face of change in the nature of the environment in which that system operates or in the task that the system is meant to perform. Below, we motivate the importance of algorithmic robustness, present a conceptual framework, and highlight the relevant areas of research for which algorithmic robustness is rele…
▽ More
Algorithmic robustness refers to the sustained performance of a computational system in the face of change in the nature of the environment in which that system operates or in the task that the system is meant to perform. Below, we motivate the importance of algorithmic robustness, present a conceptual framework, and highlight the relevant areas of research for which algorithmic robustness is relevant. Why robustness? Robustness is an important enabler of other goals that are frequently cited in the context of public policy decisions about computational systems, including trustworthiness, accountability, fairness, and safety. Despite this dependence, it tends to be under-recognized compared to these other concepts. This is unfortunate, because robustness is often more immediately achievable than these other ultimate goals, which can be more subjective and exacting. Thus, we highlight robustness as an important goal for researchers, engineers, regulators, and policymakers when considering the design, implementation, and deployment of computational systems. We urge researchers and practitioners to elevate the attention paid to robustness when designing and evaluating computational systems. For many key systems, the immediate question after any demonstration of high performance should be: "How robust is that performance to realistic changes in the task or environment?" Greater robustness will set the stage for systems that are more trustworthy, accountable, fair, and safe. Toward that end, this document provides a brief roadmap to some of the concepts and existing research around the idea of algorithmic robustness.
△ Less
Submitted 17 October, 2023;
originally announced November 2023.
-
Efficient Inverse-designed Structural Infill for Complex Engineering Structures
Authors:
Peter Dørffler Ladegaard Jensen,
Tim Felle Olsen,
J. Andreas Bærentzen,
Niels Aage,
Ole Sigmund
Abstract:
Inverse design of high-resolution and fine-detailed 3D lightweight mechanical structures is notoriously expensive due to the need for vast computational resources and the use of very fine-scaled complex meshes. Furthermore, in designing for additive manufacturing, infill is often neglected as a component of the optimized structure. In this paper, both concerns are addressed using a de-homogenizati…
▽ More
Inverse design of high-resolution and fine-detailed 3D lightweight mechanical structures is notoriously expensive due to the need for vast computational resources and the use of very fine-scaled complex meshes. Furthermore, in designing for additive manufacturing, infill is often neglected as a component of the optimized structure. In this paper, both concerns are addressed using a de-homogenization topology optimization procedure on complex engineering structures discretized by 3D unstructured hexahedrals.
Using a rectangular-hole microstructure (reminiscent to the stiffness optimal orthogonal rank-3 multi-scale) as a base material for the multi-scale optimization, a coarse-scale optimized geometry can be obtained using homogenization-based topology optimization. Due to the microstructure periodicity, this coarse-scale geometry can be up-sampled to a fine physical geometry with optimized infill, with minor loss in structural performance and at a fraction of the cost of a fine-scale solution. The upsampling on 3D unstructured grids is achieved through stream surface tracing which aligns with the optimized local orientation. The periodicity of the physical geometry can be tuned, such that the material serves as a structural component and also as an efficient infill for additive manufacturing designs.
The method is demonstrated through three examples. It achieves comparable structural performance to state-of-the-art methods but stands out for its significant computational time reduction, much faster than the base-line method. By allowing multiple active layers, the mapped solution becomes more mechanically stable, leading to an increased critical buckling load factor without additional computational expense. The proposed approach achieves promising results, benchmarking against large-scale SIMP models demonstrates computational efficiency improvements of up to 250 times.
△ Less
Submitted 18 July, 2023;
originally announced July 2023.
-
On the Semigroup of Graph Gonality Sequences
Authors:
Austin Fessler,
David Jensen,
Elizabeth Kelsey,
Noah Owen
Abstract:
The $r$th gonality of a graph is the smallest degree of a divisor on the graph with rank $r$. The gonality sequence of a graph is a tropical analogue of the gonality sequence of an algebraic curve. We show that the set of truncated gonality sequences of graphs forms a semigroup under addition. Using this, we study which triples $(x,y,z)$ can be the first 3 terms of a graph gonality sequence. We sh…
▽ More
The $r$th gonality of a graph is the smallest degree of a divisor on the graph with rank $r$. The gonality sequence of a graph is a tropical analogue of the gonality sequence of an algebraic curve. We show that the set of truncated gonality sequences of graphs forms a semigroup under addition. Using this, we study which triples $(x,y,z)$ can be the first 3 terms of a graph gonality sequence. We show that nearly every such triple with $z \geq \frac{3}{2}x+2$ is the first three terms of a graph gonality sequence, and also exhibit triples where the ratio $\frac{z}{x}$ is an arbitrary rational number between 1 and 3. In the final section, we study algebraic curves whose $r$th and $(r+1)$st gonality differ by 1, and posit several questions about graphs with this property.
△ Less
Submitted 19 June, 2023;
originally announced June 2023.
-
The embedding theorem in Hurwitz-Brill-Noether Theory
Authors:
Kaelin Cook-Powell,
David Jensen,
Eric Larson,
Hannah Larson,
Isabel Vogt
Abstract:
We generalize the Embedding Theorem of Eisenbud-Harris from classical Brill-Noether theory to the setting of Hurwitz-Brill-Noether theory.
More precisely, in classical Brill-Noether theory, the embedding theorem states that a general linear series of degree d and rank r on a general curve of genus g is an embedding if r is at least 3. If \(f \colon C \to \mathbb{P}^1\) is a general cover of degr…
▽ More
We generalize the Embedding Theorem of Eisenbud-Harris from classical Brill-Noether theory to the setting of Hurwitz-Brill-Noether theory.
More precisely, in classical Brill-Noether theory, the embedding theorem states that a general linear series of degree d and rank r on a general curve of genus g is an embedding if r is at least 3. If \(f \colon C \to \mathbb{P}^1\) is a general cover of degree k, and L is a line bundle on C, recent work of the authors shows that the splitting type of \(f_* L\) provides the appropriate generalization of the pair (r, d) in classical Brill--Noether theory.
In the context of Hurwitz-Brill-Noether theory, the condition that r is at least 3 is no longer sufficient to guarantee that a general such linear series is an embedding. We show that the additional condition needed to guarantee that a general linear series |L| is an embedding is that the splitting type of \(f_* L\) has at least three nonnegative parts. This new extra condition reflects the unique geometry of k-gonal curves, which lie on scrolls in \(\mathbb{P}^r\).
△ Less
Submitted 27 March, 2023;
originally announced March 2023.
-
Autonomous Restructuring of Asteroids into Rotating Space Stations
Authors:
David W. Jensen
Abstract:
Asteroid restructuring uses robotics, self replication, and mechanical automatons to autonomously restructure an asteroid into a large rotating space station. The restructuring process makes structures from asteroid oxide materials; uses productive self-replication to make replicators, helpers, and products; and creates a multiple floor station to support a large population. In an example simulati…
▽ More
Asteroid restructuring uses robotics, self replication, and mechanical automatons to autonomously restructure an asteroid into a large rotating space station. The restructuring process makes structures from asteroid oxide materials; uses productive self-replication to make replicators, helpers, and products; and creates a multiple floor station to support a large population. In an example simulation, it takes 12 years to autonomously restructure a large asteroid into the space station. This is accomplished with a single rocket launch. The single payload contains a base station, 4 robots (spiders), and a modest set of supplies. Our simulation creates 3000 spiders and over 23,500 other pieces of equipment. Only the base station and spiders (replicators) have advanced microprocessors and algorithms. These represent 21st century technologies created and trans-ported from Earth. The equipment and tools are built using in-situ materials and represent 18th or 19th century technologies. The equipment and tools (helpers) have simple mechanical programs to perform repetitive tasks. The resulting example station would be a rotating framework almost 5 kilometers in diameter. Once completed, it could support a population of over 700,000 people. Many researchers identify the high launch costs, the harsh space environment, and the lack of gravity as the key obstacles hindering the development of space stations. The single probe addresses the high launch cost. The autonomous construction eliminates the harsh space environment for construction crews. The completed rotating station provides radiation protection and centripetal gravity for the first work crews and colonists.
△ Less
Submitted 27 November, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS
Authors:
Rishikesh Sahay,
D. A. Sepulveda Estay,
Weizhi Meng,
Christian D. Jensen,
Michael Bruhn Barfod
Abstract:
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have bee…
▽ More
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have been proposed to carry out these analyses. This paper evaluates and compares the application of three risk assessment methodologies: system theoretic process analysis (STPA-Sec), STRIDE and CORAS for identifying threats and vulnerabilities in a CyberShip system. We specifically selected these three methodologies because they identify threats not only at the component level, but also threats or hazards caused due to the interaction between components, resulting in sets of threats identified with each methodology and relevant differences. Moreover, STPA-Sec which is a variant of the STPA is widely used for safety and security analysis of cyber physical systems (CPS); CORAS offers a framework to perform cyber risk assessment in a top-down approach that aligns with STPA-Sec; and STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, Elevation of Privilege) considers threat at the component level as well as during the interaction that is similar to STPA-Sec. As a result of this analysis, this paper highlights the pros and cons of these methodologies, illustrates areas of special applicability, and suggests that their complementary use as threats identified through STRIDE can be used as an input to CORAS and STPA-Sec to make these methods more structured.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
-
Improving the Efficiency of the PC Algorithm by Using Model-Based Conditional Independence Tests
Authors:
Erica Cai,
Andrew McGregor,
David Jensen
Abstract:
Learning causal structure is useful in many areas of artificial intelligence, including planning, robotics, and explanation. Constraint-based structure learning algorithms such as PC use conditional independence (CI) tests to infer causal structure. Traditionally, constraint-based algorithms perform CI tests with a preference for smaller-sized conditioning sets, partially because the statistical p…
▽ More
Learning causal structure is useful in many areas of artificial intelligence, including planning, robotics, and explanation. Constraint-based structure learning algorithms such as PC use conditional independence (CI) tests to infer causal structure. Traditionally, constraint-based algorithms perform CI tests with a preference for smaller-sized conditioning sets, partially because the statistical power of conventional CI tests declines rapidly as the size of the conditioning set increases. However, many modern conditional independence tests are model-based, and these tests use well-regularized models that maintain statistical power even with very large conditioning sets. This suggests an intriguing new strategy for constraint-based algorithms which may result in a reduction of the total number of CI tests performed: Test variable pairs with large conditioning sets first, as a pre-processing step that finds some conditional independencies quickly, before moving on to the more conventional strategy that favors small conditioning sets. We propose such a pre-processing step for the PC algorithm which relies on performing CI tests on a few randomly selected large conditioning sets. We perform an empirical analysis on directed acyclic graphs (DAGs) that correspond to real-world systems and both empirical and theoretical analyses for Erdős-Renyi DAGs. Our results show that Pre-Processing Plus PC (P3PC) performs far fewer CI tests than the original PC algorithm, between 0.5% to 36%, and often less than 10%, of the CI tests that the PC algorithm alone performs. The efficiency gains are particularly significant for the DAGs corresponding to real-world systems.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Sliding Block Puzzles with a Twist: On Segerman's 15+4 Puzzle
Authors:
Patrick Garcia,
Angela Hanson,
David Jensen,
Noah Owen
Abstract:
Segerman's 15+4 puzzle is a hinged version of the classic 15-puzzle, in which the tiles rotate as they slide around. In 1974, Wilson classified the groups of solutions to sliding block puzzles. We generalize Wilson's result to puzzles like the 15+4 puzzle, where the tiles can rotate, and the sets of solutions are subgroups of the generalized symmetric groups. Aside from two exceptional cases, we s…
▽ More
Segerman's 15+4 puzzle is a hinged version of the classic 15-puzzle, in which the tiles rotate as they slide around. In 1974, Wilson classified the groups of solutions to sliding block puzzles. We generalize Wilson's result to puzzles like the 15+4 puzzle, where the tiles can rotate, and the sets of solutions are subgroups of the generalized symmetric groups. Aside from two exceptional cases, we see that the group of solutions to such a puzzle is always either the entire generalized symmetric group or one of two special subgroups of index two.
△ Less
Submitted 30 October, 2022;
originally announced October 2022.
-
Tropical Linear Series and Tropical Independence
Authors:
David Jensen,
Sam Payne
Abstract:
We propose a definition of tropical linear series that isolates some of the essential combinatorial properties of tropicalizations of not-necessarily-complete linear series on algebraic curves. The definition combines the Baker-Norine notion of rank with the notion of tropical independence and has the property that the restriction of a tropical linear series of rank r to a connected subgraph is a…
▽ More
We propose a definition of tropical linear series that isolates some of the essential combinatorial properties of tropicalizations of not-necessarily-complete linear series on algebraic curves. The definition combines the Baker-Norine notion of rank with the notion of tropical independence and has the property that the restriction of a tropical linear series of rank r to a connected subgraph is a tropical linear series of rank r. We show that tropical linear series of rank 1 are finitely generated as tropical modules and state a number of open problems related to algebraic, combinatorial, and topological properties of higher rank tropical linear series
△ Less
Submitted 30 September, 2022;
originally announced September 2022.
-
Measuring Interventional Robustness in Reinforcement Learning
Authors:
Katherine Avery,
Jack Kenney,
Pracheta Amaranath,
Erica Cai,
David Jensen
Abstract:
Recent work in reinforcement learning has focused on several characteristics of learned policies that go beyond maximizing reward. These properties include fairness, explainability, generalization, and robustness. In this paper, we define interventional robustness (IR), a measure of how much variability is introduced into learned policies by incidental aspects of the training procedure, such as th…
▽ More
Recent work in reinforcement learning has focused on several characteristics of learned policies that go beyond maximizing reward. These properties include fairness, explainability, generalization, and robustness. In this paper, we define interventional robustness (IR), a measure of how much variability is introduced into learned policies by incidental aspects of the training procedure, such as the order of training data or the particular exploratory actions taken by agents. A training procedure has high IR when the agents it produces take very similar actions under intervention, despite variation in these incidental aspects of the training procedure. We develop an intuitive, quantitative measure of IR and calculate it for eight algorithms in three Atari environments across dozens of interventions and states. From these experiments, we find that IR varies with the amount of training and type of algorithm and that high performance does not imply high IR, as one might expect.
△ Less
Submitted 19 September, 2022;
originally announced September 2022.
-
Inferred Properties of Planets in Mean-Motion Resonances are Biased by Measurement Noise
Authors:
David Jensen,
Sarah C. Millholland
Abstract:
Planetary systems with mean-motion resonances (MMRs) hold special value in terms of their dynamical complexity and their capacity to constrain planet formation and migration histories. The key towards making these connections, however, is to have a reliable characterization of the resonant dynamics, especially the so-called "libration amplitude", which qualitatively measures how deep the system is…
▽ More
Planetary systems with mean-motion resonances (MMRs) hold special value in terms of their dynamical complexity and their capacity to constrain planet formation and migration histories. The key towards making these connections, however, is to have a reliable characterization of the resonant dynamics, especially the so-called "libration amplitude", which qualitatively measures how deep the system is into the resonance. In this work, we identify an important complication with the interpretation of libration amplitude estimates from observational data of resonant systems. Specifically, we show that measurement noise causes inferences of the libration amplitude to be systematically biased to larger values, with noisier data yielding a larger bias. We demonstrated this through multiple approaches, including using dynamical fits of synthetic radial velocity data to explore how the the libration amplitude distribution inferred from the posterior parameter distribution varies with the degree of measurement noise. We find that even modest levels of noise still result in a slight bias. The origin of the bias stems from the topology of the resonant phase space and the fact that the available phase space volume increases non-uniformly with increasing libration amplitude. We highlight strategies for mitigating the bias through the usage of particular priors. Our results imply that many known resonant systems are likely deeper in resonance than previously appreciated.
△ Less
Submitted 10 August, 2022;
originally announced August 2022.
-
Recent Developments in Brill-Noether Theory
Authors:
David Jensen,
Sam Payne
Abstract:
We briefly survey recent results related to linear series on curves that are general in various moduli spaces, highlighting the interplay between algebraic geometry on a general curve and the combinatorics of its degenerations. Breakthroughs include the proof of the Maximal Rank Theorem, which determines the Hilbert function of the general linear series of given degree and rank on the general curv…
▽ More
We briefly survey recent results related to linear series on curves that are general in various moduli spaces, highlighting the interplay between algebraic geometry on a general curve and the combinatorics of its degenerations. Breakthroughs include the proof of the Maximal Rank Theorem, which determines the Hilbert function of the general linear series of given degree and rank on the general curve in M_g, and complete analogs of the standard Brill-Noether theorems for curves that are general in Hurwitz spaces. Other advances include partial results in a similar direction for linear series in the Prym locus of a general unramified double cover of a general k-gonal curve and instances of the Strong Maximal Rank Conjecture.
△ Less
Submitted 30 October, 2021;
originally announced November 2021.
-
The non-abelian Brill-Noether divisor on $\overline{\mathcal{M}}_{13}$ and the Kodaira dimension of $\overline{\mathcal{R}}_{13}$
Authors:
Gavril Farkas,
Dave Jensen,
Sam Payne
Abstract:
The paper is devoted to highlighting several novel aspects of the moduli space of curves of genus 13, the first genus g where phenomena related to K3 surfaces no longer govern the birational geometry of M_g. We compute the class of the non-abelian Brill-Noether divisor on M_13 of curves that have a stable rank 2 vector bundle with many sections. This provides the first example of an effective divi…
▽ More
The paper is devoted to highlighting several novel aspects of the moduli space of curves of genus 13, the first genus g where phenomena related to K3 surfaces no longer govern the birational geometry of M_g. We compute the class of the non-abelian Brill-Noether divisor on M_13 of curves that have a stable rank 2 vector bundle with many sections. This provides the first example of an effective divisor on M_g with slope less than 6+10/g. Earlier work on the Slope Conjecture suggested that such divisors may not exist. The main geometric application of our result is a proof that the Prym moduli space of genus 13 is of general type. Among other things, we also prove the Bertram-Feinberg-Mukai and the Strong Maximal Rank Conjectures on M_13
△ Less
Submitted 6 July, 2022; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Measurement of the ($π^-$, Ar) total hadronic cross section at the LArIAT experiment
Authors:
E. Gramellini,
J. Ho,
R. Acciarri,
C. Adams,
J. Asaadi,
M. Backfish,
W. Badgett,
B. Baller,
V. Basque,
O. Benevides Rodrigues,
F. d. M. Blaszczyk,
R. Bouabid,
C. Bromberg,
R. Carey,
R. Castillo Fernandez,
F. Cavanna,
J. I. Cevallos Aleman,
A. Chatterjee,
P. Dedin,
M. V. dos Santos,
D. Edmunds,
C. Escobar,
J. Esquivel,
J. J. Evans,
A. Falcone
, et al. (73 additional authors not shown)
Abstract:
We present the first measurement of the negative pion total hadronic cross section on argon, which we performed at the Liquid Argon In A Testbeam (LArIAT) experiment. All hadronic reaction channels, as well as hadronic elastic interactions with scattering angle greater than 5~degrees are included. The pions have a kinetic energies in the range 100-700~MeV and are produced by a beam of charged part…
▽ More
We present the first measurement of the negative pion total hadronic cross section on argon, which we performed at the Liquid Argon In A Testbeam (LArIAT) experiment. All hadronic reaction channels, as well as hadronic elastic interactions with scattering angle greater than 5~degrees are included. The pions have a kinetic energies in the range 100-700~MeV and are produced by a beam of charged particles impinging on a solid target at the Fermilab Test Beam Facility. LArIAT employs a 0.24~ton active mass Liquid Argon Time Projection Chamber (LArTPC) to measure the pion hadronic interactions. For this measurement, LArIAT has developed the ``thin slice method", a new technique to measure cross sections with LArTPCs. While generally higher than the prediction, our measurement of the ($π^-$,Ar) total hadronic cross section is in agreement with the prediction of the Geant4 model when considering a model uncertainty of $\sim$5.1\%.
△ Less
Submitted 7 July, 2022; v1 submitted 30 July, 2021;
originally announced August 2021.
-
Brittle AI, Causal Confusion, and Bad Mental Models: Challenges and Successes in the XAI Program
Authors:
Jeff Druce,
James Niehaus,
Vanessa Moody,
David Jensen,
Michael L. Littman
Abstract:
The advances in artificial intelligence enabled by deep learning architectures are undeniable. In several cases, deep neural network driven models have surpassed human level performance in benchmark autonomy tasks. The underlying policies for these agents, however, are not easily interpretable. In fact, given their underlying deep models, it is impossible to directly understand the mapping from ob…
▽ More
The advances in artificial intelligence enabled by deep learning architectures are undeniable. In several cases, deep neural network driven models have surpassed human level performance in benchmark autonomy tasks. The underlying policies for these agents, however, are not easily interpretable. In fact, given their underlying deep models, it is impossible to directly understand the mapping from observations to actions for any reasonably complex agent. Producing this supporting technology to "open the black box" of these AI systems, while not sacrificing performance, was the fundamental goal of the DARPA XAI program. In our journey through this program, we have several "big picture" takeaways: 1) Explanations need to be highly tailored to their scenario; 2) many seemingly high performing RL agents are extremely brittle and are not amendable to explanation; 3) causal models allow for rich explanations, but how to present them isn't always straightforward; and 4) human subjects conjure fantastically wrong mental models for AIs, and these models are often hard to break. This paper discusses the origins of these takeaways, provides amplifying information, and suggestions for future work.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
SBI: A Simulation-Based Test of Identifiability for Bayesian Causal Inference
Authors:
Sam Witty,
David Jensen,
Vikash Mansinghka
Abstract:
A growing family of approaches to causal inference rely on Bayesian formulations of assumptions that go beyond causal graph structure. For example, Bayesian approaches have been developed for analyzing instrumental variable designs, regression discontinuity designs, and within-subjects designs. This paper introduces simulation-based identifiability (SBI), a procedure for testing the identifiabilit…
▽ More
A growing family of approaches to causal inference rely on Bayesian formulations of assumptions that go beyond causal graph structure. For example, Bayesian approaches have been developed for analyzing instrumental variable designs, regression discontinuity designs, and within-subjects designs. This paper introduces simulation-based identifiability (SBI), a procedure for testing the identifiability of queries in Bayesian causal inference approaches that are implemented as probabilistic programs. SBI complements analytical approaches to identifiability, leveraging a particle-based optimization scheme on simulated data to determine identifiability for analytically intractable models. We analyze SBI's soundness for a broad class of differentiable, finite-dimensional probabilistic programs with bounded effects. Finally, we provide an implementation of SBI using stochastic gradient descent, and show empirically that it agrees with known identification results on a suite of graph-based and quasi-experimental design benchmarks, including those using Gaussian processes.
△ Less
Submitted 31 October, 2022; v1 submitted 23 February, 2021;
originally announced February 2021.
-
Preserving Privacy in Personalized Models for Distributed Mobile Services
Authors:
Akanksha Atrey,
Prashant Shenoy,
David Jensen
Abstract:
The ubiquity of mobile devices has led to the proliferation of mobile services that provide personalized and context-aware content to their users. Modern mobile services are distributed between end-devices, such as smartphones, and remote servers that reside in the cloud. Such services thrive on their ability to predict future contexts to pre-fetch content or make context-specific recommendations.…
▽ More
The ubiquity of mobile devices has led to the proliferation of mobile services that provide personalized and context-aware content to their users. Modern mobile services are distributed between end-devices, such as smartphones, and remote servers that reside in the cloud. Such services thrive on their ability to predict future contexts to pre-fetch content or make context-specific recommendations. An increasingly common method to predict future contexts, such as location, is via machine learning (ML) models. Recent work in context prediction has focused on ML model personalization where a personalized model is learned for each individual user in order to tailor predictions or recommendations to a user's mobile behavior. While the use of personalized models increases efficacy of the mobile service, we argue that it increases privacy risk since a personalized model encodes contextual behavior unique to each user. To demonstrate these privacy risks, we present several attribute inference-based privacy attacks and show that such attacks can leak privacy with up to 78% efficacy for top-3 predictions. We present Pelican, a privacy-preserving personalization system for context-aware mobile services that leverages both device and cloud resources to personalize ML models while minimizing the risk of privacy leakage for users. We evaluate Pelican using real world traces for location-aware mobile services and show that Pelican can substantially reduce privacy leakage by up to 75%.
△ Less
Submitted 21 April, 2021; v1 submitted 14 January, 2021;
originally announced January 2021.
-
Comprehensive Energy Balance Analysis of Photon-Enhanced Thermionic Power Generation Considering Concentrated Solar Absorption Distribution
Authors:
A. N. M. Taufiq Elahi,
Mohammad Ghashami,
Devon Jensen,
Keunhan Park
Abstract:
The present article reports a comprehensive energy balance analysis of a photon-enhanced thermionic emission (PETE) device when it is used for concentrated solar power (CSP) generation. To this end, we consider a realistic PETE device composed of a boron-doped silicon emitter on glass and a phosphorus-doped diamond collector on tungsten separated by the inter-electrode vacuum gap. Depth-dependent…
▽ More
The present article reports a comprehensive energy balance analysis of a photon-enhanced thermionic emission (PETE) device when it is used for concentrated solar power (CSP) generation. To this end, we consider a realistic PETE device composed of a boron-doped silicon emitter on glass and a phosphorus-doped diamond collector on tungsten separated by the inter-electrode vacuum gap. Depth-dependent spectral solar absorption and its photovoltaic and photothermal energy conversion processes are rigorously calculated to predict the PETE power output and energy conversion efficiency. Our calculation predicts that when optimized, the power output of the considered PETE device can reach 1.6 W/cm$^2$ with the energy conversion efficiency of $\sim$18 \% for 100$\times$ solar concentration, which is substantially lower than those predicted in previous works under ideal conditions. In addition, the photon-enhancement ratio is lower than 10 and decreases with the increasing solar concentration due to the photothermal heating of the emitter, suggesting that PETE may be an adequate energy conversion process for low-to-medium CSP below $\sim$100$\times$ concentration. These observations signify the importance of a rigorous energy balance analysis based on spectral and spatial solar absorption distribution for the accurate prediction of PETE power generation.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
How and Why to Use Experimental Data to Evaluate Methods for Observational Causal Inference
Authors:
Amanda Gentzel,
Purva Pruthi,
David Jensen
Abstract:
Methods that infer causal dependence from observational data are central to many areas of science, including medicine, economics, and the social sciences. A variety of theoretical properties of these methods have been proven, but empirical evaluation remains a challenge, largely due to the lack of observational data sets for which treatment effect is known. We describe and analyze observational sa…
▽ More
Methods that infer causal dependence from observational data are central to many areas of science, including medicine, economics, and the social sciences. A variety of theoretical properties of these methods have been proven, but empirical evaluation remains a challenge, largely due to the lack of observational data sets for which treatment effect is known. We describe and analyze observational sampling from randomized controlled trials (OSRCT), a method for evaluating causal inference methods using data from randomized controlled trials (RCTs). This method can be used to create constructed observational data sets with corresponding unbiased estimates of treatment effect, substantially increasing the number of data sets available for empirical evaluation of causal inference methods. We show that, in expectation, OSRCT creates data sets that are equivalent to those produced by randomly sampling from empirical data sets in which all potential outcomes are available. We then perform a large-scale evaluation of seven causal inference methods over 37 data sets, drawn from RCTs, as well as simulators, real-world computational systems, and observational data sets augmented with a synthetic response variable. We find notable performance differences when comparing across data from different sources, demonstrating the importance of using data from a variety of sources when evaluating any causal inference method.
△ Less
Submitted 7 July, 2021; v1 submitted 6 October, 2020;
originally announced October 2020.
-
Tropical Methods in Hurwitz-Brill-Noether Theory
Authors:
Kaelin Cook-Powell,
David Jensen
Abstract:
Splitting type loci are the natural generalizations of Brill-Noether varieties for curves with a distinguished map to the projective line. We give a tropical proof of a theorem of H. Larson, showing that splitting type loci have the expected dimension for general elements of the Hurwitz space. Our proof uses an explicit description of splitting type loci on a certain family of tropical curves. We…
▽ More
Splitting type loci are the natural generalizations of Brill-Noether varieties for curves with a distinguished map to the projective line. We give a tropical proof of a theorem of H. Larson, showing that splitting type loci have the expected dimension for general elements of the Hurwitz space. Our proof uses an explicit description of splitting type loci on a certain family of tropical curves. We further show that these tropical splitting type loci are connected in codimension one, and describe an algorithm for computing their cardinality when they are zero-dimensional. We provide a conjecture for the numerical class of splitting type loci, which we confirm in a number of cases.
△ Less
Submitted 27 July, 2020;
originally announced July 2020.
-
Causal Inference using Gaussian Processes with Structured Latent Confounders
Authors:
Sam Witty,
Kenta Takatsu,
David Jensen,
Vikash Mansinghka
Abstract:
Latent confounders---unobserved variables that influence both treatment and outcome---can bias estimates of causal effects. In some cases, these confounders are shared across observations, e.g. all students taking a course are influenced by the course's difficulty in addition to any educational interventions they receive individually. This paper shows how to semiparametrically model latent confoun…
▽ More
Latent confounders---unobserved variables that influence both treatment and outcome---can bias estimates of causal effects. In some cases, these confounders are shared across observations, e.g. all students taking a course are influenced by the course's difficulty in addition to any educational interventions they receive individually. This paper shows how to semiparametrically model latent confounders that have this structure and thereby improve estimates of causal effects. The key innovations are a hierarchical Bayesian model, Gaussian processes with structured latent confounders (GP-SLC), and a Monte Carlo inference algorithm for this model based on elliptical slice sampling. GP-SLC provides principled Bayesian uncertainty estimates of individual treatment effect with minimal assumptions about the functional forms relating confounders, covariates, treatment, and outcome. Finally, this paper shows GP-SLC is competitive with or more accurate than widely used causal inference techniques on three benchmark datasets, including the Infant Health and Development Program and a dataset showing the effect of changing temperatures on state-wide energy consumption across New England.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Review of the First Charged-Particle Transport Coefficient Comparison Workshop
Authors:
P. E. Grabowski,
S. B. Hansen,
M. S. Murillo,
L. G. Stanton,
F. R. Graziani,
A. B. Zylstra,
S. D. Baalrud,
P. Arnault,
A. D. Baczewski,
L. X. Benedict,
C. Blancard,
O. Certik,
J. Clerouin,
L. A. Collins,
S. Copeland,
A. A. Correa,
J. Dai,
J. Daligault,
M. P. Desjarlais,
M. W. C. Dharma-wardana,
G. Faussurier,
J. Haack,
T. Haxhimali,
A. Hayes-Sterbenz,
Y. Hou
, et al. (20 additional authors not shown)
Abstract:
We present the results of the first Charged-Particle Transport Coefficient Code Comparison Workshop, which was held in Albuquerque, NM October 4-6, 2016. In this first workshop, scientists from eight institutions and four countries gathered to compare calculations of transport coefficients including thermal and electrical conduction, electron-ion coupling, inter-ion diffusion, ion viscosity, and c…
▽ More
We present the results of the first Charged-Particle Transport Coefficient Code Comparison Workshop, which was held in Albuquerque, NM October 4-6, 2016. In this first workshop, scientists from eight institutions and four countries gathered to compare calculations of transport coefficients including thermal and electrical conduction, electron-ion coupling, inter-ion diffusion, ion viscosity, and charged particle stopping powers. Here, we give general background on Coulomb coupling and computational expense, review where some transport coefficients appear in hydrodynamic equations, and present the submitted data. Large variations are found when either the relevant Coulomb coupling parameter is large or computational expense causes difficulties. Understanding the general accuracy and uncertainty associated with such transport coefficients is important for quantifying errors in hydrodynamic simulations of inertial confinement fusion and high-energy density experiments.
△ Less
Submitted 29 September, 2020; v1 submitted 1 July, 2020;
originally announced July 2020.
-
A New Lower Bound on Graph Gonality
Authors:
Michael Harp,
Elijah Jackson,
David Jensen,
Noah Speeter
Abstract:
We define a new graph invariant called the scramble number. We show that the scramble number of a graph is a lower bound for the gonality and an upper bound for the treewidth. Unlike the treewidth, the scramble number is not minor monotone, but it is subgraph monotone and invariant under refinement. We compute the scramble number and gonality of several families of graphs for which these invariant…
▽ More
We define a new graph invariant called the scramble number. We show that the scramble number of a graph is a lower bound for the gonality and an upper bound for the treewidth. Unlike the treewidth, the scramble number is not minor monotone, but it is subgraph monotone and invariant under refinement. We compute the scramble number and gonality of several families of graphs for which these invariants are strictly greater than the treewidth.
△ Less
Submitted 4 November, 2021; v1 submitted 1 June, 2020;
originally announced June 2020.
-
Text and Causal Inference: A Review of Using Text to Remove Confounding from Causal Estimates
Authors:
Katherine A. Keith,
David Jensen,
Brendan O'Connor
Abstract:
Many applications of computational social science aim to infer causal conclusions from non-experimental data. Such observational data often contains confounders, variables that influence both potential causes and potential effects. Unmeasured or latent confounders can bias causal estimates, and this has motivated interest in measuring potential confounders from observed text. For example, an indiv…
▽ More
Many applications of computational social science aim to infer causal conclusions from non-experimental data. Such observational data often contains confounders, variables that influence both potential causes and potential effects. Unmeasured or latent confounders can bias causal estimates, and this has motivated interest in measuring potential confounders from observed text. For example, an individual's entire history of social media posts or the content of a news article could provide a rich measurement of multiple confounders. Yet, methods and applications for this problem are scattered across different communities and evaluation practices are inconsistent. This review is the first to gather and categorize these examples and provide a guide to data-processing and evaluation decisions. Despite increased attention on adjusting for confounding using text, there are still many open problems, which we highlight in this paper.
△ Less
Submitted 1 May, 2020;
originally announced May 2020.
-
The Kodaira dimensions of $\overline{\mathcal{M}}_{22}$ and $\overline{\mathcal{M}}_{23}$
Authors:
Gavril Farkas,
David Jensen,
Sam Payne
Abstract:
We prove that the moduli spaces of curves of genus 22 and 23 are of general type. To do this, we calculate certain virtual divisor classes of small slope associated to linear series of rank 6 with quadric relations. We then develop new tropical methods for studying linear series and independence of quadrics and show that these virtual classes are represented by effective divisors.
We prove that the moduli spaces of curves of genus 22 and 23 are of general type. To do this, we calculate certain virtual divisor classes of small slope associated to linear series of rank 6 with quadric relations. We then develop new tropical methods for studying linear series and independence of quadrics and show that these virtual classes are represented by effective divisors.
△ Less
Submitted 8 March, 2025; v1 submitted 1 May, 2020;
originally announced May 2020.
-
Scrollar Invariants of Tropical Curves
Authors:
David Jensen,
Kalila Lehmann
Abstract:
We define scrollar invariants of tropical curves with a fixed divisor of rank 1. We examine the behavior of scrollar invariants under specialization, and provide an algorithm for computing these invariants for a much-studied family of tropical curves. Our examples highlight many parallels between the classical and tropical theories, but also point to some substantive distinctions.
We define scrollar invariants of tropical curves with a fixed divisor of rank 1. We examine the behavior of scrollar invariants under specialization, and provide an algorithm for computing these invariants for a much-studied family of tropical curves. Our examples highlight many parallels between the classical and tropical theories, but also point to some substantive distinctions.
△ Less
Submitted 21 December, 2024; v1 submitted 8 January, 2020;
originally announced January 2020.
-
Exploratory Not Explanatory: Counterfactual Analysis of Saliency Maps for Deep Reinforcement Learning
Authors:
Akanksha Atrey,
Kaleigh Clary,
David Jensen
Abstract:
Saliency maps are frequently used to support explanations of the behavior of deep reinforcement learning (RL) agents. However, a review of how saliency maps are used in practice indicates that the derived explanations are often unfalsifiable and can be highly subjective. We introduce an empirical approach grounded in counterfactual reasoning to test the hypotheses generated from saliency maps and…
▽ More
Saliency maps are frequently used to support explanations of the behavior of deep reinforcement learning (RL) agents. However, a review of how saliency maps are used in practice indicates that the derived explanations are often unfalsifiable and can be highly subjective. We introduce an empirical approach grounded in counterfactual reasoning to test the hypotheses generated from saliency maps and assess the degree to which they correspond to the semantics of RL environments. We use Atari games, a common benchmark for deep RL, to evaluate three types of saliency maps. Our results show the extent to which existing claims about Atari games can be evaluated and suggest that saliency maps are best viewed as an exploratory tool rather than an explanatory tool.
△ Less
Submitted 20 February, 2020; v1 submitted 9 December, 2019;
originally announced December 2019.
-
The Liquid Argon In A Testbeam (LArIAT) Experiment
Authors:
LArIAT Collaboration,
R. Acciarri,
C. J. Adams,
J. Asaadi,
M. Backfish,
W. Badgett,
B. Baller,
O. Benevides Rodrigues,
F. d. M. Blaszczyk,
R. Bouabid,
C. Bromberg,
R. Carey,
R. Castillo Fernandez,
F. Cavanna,
J. I. Cevallos Aleman,
A. Chatterjee,
P. Dedin Neto,
M. V. Dos Santos,
S. Dytman,
D. Edmunds,
M. Elkins,
C. O. Escobar,
J. Esquivel,
J. Evans,
A. Falcone
, et al. (81 additional authors not shown)
Abstract:
The LArIAT liquid argon time projection chamber, placed in a tertiary beam of charged particles at the Fermilab Test Beam Facility, has collected large samples of pions, muons, electrons, protons, and kaons in the momentum range 300-1400 MeV/c. This paper describes the main aspects of the detector and beamline, and also reports on calibrations performed for the detector and beamline components.
The LArIAT liquid argon time projection chamber, placed in a tertiary beam of charged particles at the Fermilab Test Beam Facility, has collected large samples of pions, muons, electrons, protons, and kaons in the momentum range 300-1400 MeV/c. This paper describes the main aspects of the detector and beamline, and also reports on calibrations performed for the detector and beamline components.
△ Less
Submitted 6 February, 2020; v1 submitted 23 November, 2019;
originally announced November 2019.
-
Bayesian causal inference via probabilistic program synthesis
Authors:
Sam Witty,
Alexander Lew,
David Jensen,
Vikash Mansinghka
Abstract:
Causal inference can be formalized as Bayesian inference that combines a prior distribution over causal models and likelihoods that account for both observations and interventions. We show that it is possible to implement this approach using a sufficiently expressive probabilistic programming language. Priors are represented using probabilistic programs that generate source code in a domain specif…
▽ More
Causal inference can be formalized as Bayesian inference that combines a prior distribution over causal models and likelihoods that account for both observations and interventions. We show that it is possible to implement this approach using a sufficiently expressive probabilistic programming language. Priors are represented using probabilistic programs that generate source code in a domain specific language. Interventions are represented using probabilistic programs that edit this source code to modify the original generative process. This approach makes it straightforward to incorporate data from atomic interventions, as well as shift interventions, variance-scaling interventions, and other interventions that modify causal structure. This approach also enables the use of general-purpose inference machinery for probabilistic programs to infer probable causal structures and parameters from data. This abstract describes a prototype of this approach in the Gen probabilistic programming language.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
The Case for Evaluating Causal Models Using Interventional Measures and Empirical Data
Authors:
Amanda Gentzel,
Dan Garant,
David Jensen
Abstract:
Causal inference is central to many areas of artificial intelligence, including complex reasoning, planning, knowledge-base construction, robotics, explanation, and fairness. An active community of researchers develops and enhances algorithms that learn causal models from data, and this work has produced a series of impressive technical advances. However, evaluation techniques for causal modeling…
▽ More
Causal inference is central to many areas of artificial intelligence, including complex reasoning, planning, knowledge-base construction, robotics, explanation, and fairness. An active community of researchers develops and enhances algorithms that learn causal models from data, and this work has produced a series of impressive technical advances. However, evaluation techniques for causal modeling algorithms have remained somewhat primitive, limiting what we can learn from experimental studies of algorithm performance, constraining the types of algorithms and model representations that researchers consider, and creating a gap between theory and practice. We argue for more frequent use of evaluation techniques that examine interventional measures rather than structural or observational measures, and that evaluate those measures on empirical data rather than synthetic data. We survey the current practice in evaluation and show that the techniques we recommend are rarely used in practice. We show that such techniques are feasible and that data sets are available to conduct such evaluations. We also show that these techniques produce substantially different results than using structural measures and synthetic data.
△ Less
Submitted 1 November, 2019; v1 submitted 11 October, 2019;
originally announced October 2019.
-
The motivic zeta functions of a matroid
Authors:
David Jensen,
Max Kutler,
Jeremy Usatine
Abstract:
We introduce motivic zeta functions for matroids. These zeta functions are defined as sums over the lattice points of Bergman fans, and in the realizable case, they coincide with the motivic Igusa zeta functions of hyperplane arrangements. We show that these motivic zeta functions satisfy a functional equation arising from matroid Poincaré duality in the sense of Adiprasito-Huh-Katz. In the proces…
▽ More
We introduce motivic zeta functions for matroids. These zeta functions are defined as sums over the lattice points of Bergman fans, and in the realizable case, they coincide with the motivic Igusa zeta functions of hyperplane arrangements. We show that these motivic zeta functions satisfy a functional equation arising from matroid Poincaré duality in the sense of Adiprasito-Huh-Katz. In the process, we obtain a formula for the Hilbert series of the cohomology ring of a matroid, in the sense of Feichtner-Yuzvinsky. We then show that our motivic zeta functions specialize to the topological zeta functions for matroids introduced by van der Veer, and we compute the first two coefficients in the Taylor expansion of these topological zeta functions, providing affirmative answers to two questions posed by van der Veer.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
PlanAlyzer: Assessing Threats to the Validity of Online Experiments
Authors:
Emma Tosch,
Eytan Bakshy,
Emery D. Berger,
David D. Jensen,
J. Eliot B. Moss
Abstract:
Online experiments are ubiquitous. As the scale of experiments has grown, so has the complexity of their design and implementation. In response, firms have developed software frameworks for designing and deploying online experiments. Ensuring that experiments in these frameworks are correctly designed and that their results are trustworthy---referred to as *internal validity*---can be difficult. C…
▽ More
Online experiments are ubiquitous. As the scale of experiments has grown, so has the complexity of their design and implementation. In response, firms have developed software frameworks for designing and deploying online experiments. Ensuring that experiments in these frameworks are correctly designed and that their results are trustworthy---referred to as *internal validity*---can be difficult. Currently, verifying internal validity requires manual inspection by someone with substantial expertise in experimental design.
We present the first approach for statically checking the internal validity of online experiments. Our checks are based on well-known problems that arise in experimental design and causal inference. Our analyses target PlanOut, a widely deployed, open-source experimentation framework that uses a domain-specific language to specify and run complex experiments. We have built a tool, PlanAlyzer, that checks PlanOut programs for a variety of threats to internal validity, including failures of randomization, treatment assignment, and causal sufficiency. PlanAlyzer uses its analyses to automatically generate *contrasts*, a key type of information required to perform valid statistical analyses over experimental results. We demonstrate PlanAlyzer's utility on a corpus of PlanOut scripts deployed in production at Facebook, and we evaluate its ability to identify threats to validity on a mutated subset of this corpus. PlanAlyzer has both precision and recall of 92% on the mutated corpus, and 82% of the contrasts it automatically generates match hand-specified data.
△ Less
Submitted 30 September, 2019;
originally announced September 2019.
-
Components of Brill-Noether Loci for Curves with Fixed Gonality
Authors:
Kaelin Cook-Powell,
David Jensen
Abstract:
We describe a conjectural stratification of the Brill-Noether variety for general curves of fixed genus and gonality. As evidence for this conjecture, we show that this Brill-Noether variety has at least as many irreducible components as predicted by the conjecture, and that each of these components has the expected dimension. Our proof uses combinatorial and tropical techniques. Specifically, we…
▽ More
We describe a conjectural stratification of the Brill-Noether variety for general curves of fixed genus and gonality. As evidence for this conjecture, we show that this Brill-Noether variety has at least as many irreducible components as predicted by the conjecture, and that each of these components has the expected dimension. Our proof uses combinatorial and tropical techniques. Specifically, we analyze containment relations between the various strata of tropical Brill-Noether loci identified by Pflueger in his classification of special divisors on chains of loops.
△ Less
Submitted 18 July, 2019;
originally announced July 2019.
-
Revisiting Submicron-Gap Thermionic Power Generation Based on Comprehensive Charge and Thermal Transport Modeling
Authors:
Devon Jensen,
Mohammad Ghashami,
Keunhan Park
Abstract:
Over the past years, thermionic energy conversion (TEC) with a reduced inter-electrode vacuum gap has been studied as an effective way to mitigate a large potential barrier due to space charge accumulation. However, existing theoretical models do not fully consider the fundamental aspects of thermionic emission when the inter-electrode gap shrinks to the nanoscale, which results in underestimation…
▽ More
Over the past years, thermionic energy conversion (TEC) with a reduced inter-electrode vacuum gap has been studied as an effective way to mitigate a large potential barrier due to space charge accumulation. However, existing theoretical models do not fully consider the fundamental aspects of thermionic emission when the inter-electrode gap shrinks to the nanoscale, which results in underestimation of thermionic power generation for such small gaps. The present work addresses this challenge by comprehensively modeling charge and thermal transport processes with specific consideration of nanoscale gap effects, such as image charge perturbation, electron tunneling, and near-field thermal radiation. Carefully conducted energy balance analysis reveals that if optimized, submicron-gap TEC can excel the micron-gap counterpart with $\sim$4 times the power output and ~5-10 % higher energy conversion efficiency. Moreover, the high-temperature collector of the submicron-gap TEC, which is due to thermionic and near-field radiative heat transfer, allows the addition of a bottom-cycle heat engine to further enhance the power and efficiency when combined. Electric field concentration due to engineered surface roughness is also examined as a potential approach to produce an additional increase in power generation. We believe that the present work provides a theoretical framework for submicron-gap thermionic power generation as a promising energy recycling scheme for high-quality heat sources.
△ Less
Submitted 13 July, 2019;
originally announced July 2019.
-
Toybox: A Suite of Environments for Experimental Evaluation of Deep Reinforcement Learning
Authors:
Emma Tosch,
Kaleigh Clary,
John Foley,
David Jensen
Abstract:
Evaluation of deep reinforcement learning (RL) is inherently challenging. In particular, learned policies are largely opaque, and hypotheses about the behavior of deep RL agents are difficult to test in black-box environments. Considerable effort has gone into addressing opacity, but almost no effort has been devoted to producing high quality environments for experimental evaluation of agent behav…
▽ More
Evaluation of deep reinforcement learning (RL) is inherently challenging. In particular, learned policies are largely opaque, and hypotheses about the behavior of deep RL agents are difficult to test in black-box environments. Considerable effort has gone into addressing opacity, but almost no effort has been devoted to producing high quality environments for experimental evaluation of agent behavior. We present TOYBOX, a new high-performance, open-source* subset of Atari environments re-designed for the experimental evaluation of deep RL. We show that TOYBOX enables a wide range of experiments and analyses that are impossible in other environments.
*https://kdl-umass.github.io/Toybox/
△ Less
Submitted 7 May, 2019;
originally announced May 2019.
-
Let's Play Again: Variability of Deep Reinforcement Learning Agents in Atari Environments
Authors:
Kaleigh Clary,
Emma Tosch,
John Foley,
David Jensen
Abstract:
Reproducibility in reinforcement learning is challenging: uncontrolled stochasticity from many sources, such as the learning algorithm, the learned policy, and the environment itself have led researchers to report the performance of learned agents using aggregate metrics of performance over multiple random seeds for a single environment. Unfortunately, there are still pernicious sources of variabi…
▽ More
Reproducibility in reinforcement learning is challenging: uncontrolled stochasticity from many sources, such as the learning algorithm, the learned policy, and the environment itself have led researchers to report the performance of learned agents using aggregate metrics of performance over multiple random seeds for a single environment. Unfortunately, there are still pernicious sources of variability in reinforcement learning agents that make reporting common summary statistics an unsound metric for performance. Our experiments demonstrate the variability of common agents used in the popular OpenAI Baselines repository. We make the case for reporting post-training agent performance as a distribution, rather than a point estimate.
△ Less
Submitted 12 April, 2019;
originally announced April 2019.