-
NFTs as a Data-Rich Test Bed: Conspicuous Consumption and its Determinants
Authors:
Taylor Lundy,
Narun Raman,
Scott Duke Kominers,
Kevin Leyton-Brown
Abstract:
Conspicuous consumption occurs when a consumer derives value from a good based on its social meaning as a signal of wealth, taste, and/or community affiliation. Common conspicuous goods include designer footwear, country club memberships, and artwork; conspicuous goods also exist in the digital sphere, with non-fungible tokens (NFTs) as a prominent example. The NFT market merits deeper study for t…
▽ More
Conspicuous consumption occurs when a consumer derives value from a good based on its social meaning as a signal of wealth, taste, and/or community affiliation. Common conspicuous goods include designer footwear, country club memberships, and artwork; conspicuous goods also exist in the digital sphere, with non-fungible tokens (NFTs) as a prominent example. The NFT market merits deeper study for two key reasons: first, it is poorly understood relative to its economic scale; and second, it is unusually amenable to analysis because NFT transactions are publicly available on the blockchain, making them useful as a test bed for conspicuous consumption dynamics. This paper introduces a model that incorporates two previously identified elements of conspicuous consumption: the \emph{bandwagon effect} (goods increase in value as they become more popular) and the \emph{snob effect} (goods increase in value as they become rarer). Our model resolves the apparent tension between these two effects, exhibiting net complementarity between others' and one's own conspicuous consumption. We also introduce a novel dataset combining NFT transactions with embeddings of the corresponding NFT images computed using an off-the-shelf vision transformer architecture. We use our dataset to validate the model, showing that the bandwagon effect raises an NFT collection's value as more consumers join, while the snob effect drives consumers to seek rarer NFTs within a given collection.
△ Less
Submitted 21 March, 2025;
originally announced March 2025.
-
Incentive-Compatible Recovery from Manipulated Signals, with Applications to Decentralized Physical Infrastructure
Authors:
Jason Milionis,
Jens Ernstberger,
Joseph Bonneau,
Scott Duke Kominers,
Tim Roughgarden
Abstract:
We introduce the first formal model capturing the elicitation of unverifiable information from a party (the "source") with implicit signals derived by other players (the "observers"). Our model is motivated in part by applications in decentralized physical infrastructure networks (a.k.a. "DePIN"), an emerging application domain in which physical services (e.g., sensor information, bandwidth, or en…
▽ More
We introduce the first formal model capturing the elicitation of unverifiable information from a party (the "source") with implicit signals derived by other players (the "observers"). Our model is motivated in part by applications in decentralized physical infrastructure networks (a.k.a. "DePIN"), an emerging application domain in which physical services (e.g., sensor information, bandwidth, or energy) are provided at least in part by untrusted and self-interested parties. A key challenge in these signal network applications is verifying the level of service that was actually provided by network participants.
We first establish a condition called source identifiability, which we show is necessary for the existence of a mechanism for which truthful signal reporting is a strict equilibrium. For a converse, we build on techniques from peer prediction to show that in every signal network that satisfies the source identifiability condition, there is in fact a strictly truthful mechanism, where truthful signal reporting gives strictly higher total expected payoff than any less informative equilibrium. We furthermore show that this truthful equilibrium is in fact the unique equilibrium of the mechanism if there is positive probability that any one observer is unconditionally honest (e.g., if an observer were run by the network owner). Also, by extending our condition to coalitions, we show that there are generally no collusion-resistant mechanisms in the settings that we consider.
We apply our framework and results to two DePIN applications: proving location, and proving bandwidth. In the location-proving setting observers learn (potentially enlarged) Euclidean distances to the source. Here, our condition has an appealing geometric interpretation, implying that the source's location can be truthfully elicited if and only if it is guaranteed to lie inside the convex hull of the observers.
△ Less
Submitted 10 March, 2025;
originally announced March 2025.
-
Shill-Proof Auctions
Authors:
Andrew Komo,
Scott Duke Kominers,
Tim Roughgarden
Abstract:
In an auction, a seller may masquerade as one or more bidders in order to manipulate the clearing price. We characterize single-item auction formats that are shill-proof in the sense that a profit-maximizing seller has no incentive to submit shill bids. We distinguish between strong shill-proofness, in which a seller with full knowledge of bidders' valuations can never profit from shilling, and we…
▽ More
In an auction, a seller may masquerade as one or more bidders in order to manipulate the clearing price. We characterize single-item auction formats that are shill-proof in the sense that a profit-maximizing seller has no incentive to submit shill bids. We distinguish between strong shill-proofness, in which a seller with full knowledge of bidders' valuations can never profit from shilling, and weak shill-proofness, which requires only that the expected equilibrium profit from shilling is nonpositive. The Dutch auction (with a suitable reserve) is the unique (revenue-)optimal and strongly shill-proof auction. Moreover, the Dutch auction (with no reserve) is the unique prior-independent auction that is both efficient and weakly shill-proof. While there are multiple ex-post incentive compatible, weakly shill-proof, and optimal auctions; any optimal auction can satisfy only two properties in the set {static, ex-post incentive compatible, weakly shill-proof}.
△ Less
Submitted 17 November, 2024; v1 submitted 30 March, 2024;
originally announced April 2024.
-
The Harvard USPTO Patent Dataset: A Large-Scale, Well-Structured, and Multi-Purpose Corpus of Patent Applications
Authors:
Mirac Suzgun,
Luke Melas-Kyriazi,
Suproteem K. Sarkar,
Scott Duke Kominers,
Stuart M. Shieber
Abstract:
Innovation is a major driver of economic and social development, and information about many kinds of innovation is embedded in semi-structured data from patents and patent applications. Although the impact and novelty of innovations expressed in patent data are difficult to measure through traditional means, ML offers a promising set of techniques for evaluating novelty, summarizing contributions,…
▽ More
Innovation is a major driver of economic and social development, and information about many kinds of innovation is embedded in semi-structured data from patents and patent applications. Although the impact and novelty of innovations expressed in patent data are difficult to measure through traditional means, ML offers a promising set of techniques for evaluating novelty, summarizing contributions, and embedding semantics. In this paper, we introduce the Harvard USPTO Patent Dataset (HUPD), a large-scale, well-structured, and multi-purpose corpus of English-language patent applications filed to the United States Patent and Trademark Office (USPTO) between 2004 and 2018. With more than 4.5 million patent documents, HUPD is two to three times larger than comparable corpora. Unlike previously proposed patent datasets in NLP, HUPD contains the inventor-submitted versions of patent applications--not the final versions of granted patents--thereby allowing us to study patentability at the time of filing using NLP methods for the first time. It is also novel in its inclusion of rich structured metadata alongside the text of patent filings: By providing each application's metadata along with all of its text fields, the dataset enables researchers to perform new sets of NLP tasks that leverage variation in structured covariates. As a case study on the types of research HUPD makes possible, we introduce a new task to the NLP community--namely, binary classification of patent decisions. We additionally show the structured metadata provided in the dataset enables us to conduct explicit studies of concept shifts for this task. Finally, we demonstrate how HUPD can be used for three additional tasks: multi-class classification of patent subject areas, language modeling, and summarization.
△ Less
Submitted 8 July, 2022;
originally announced July 2022.
-
Recommending with Recommendations
Authors:
Naveen Durvasula,
Franklyn Wang,
Scott Duke Kominers
Abstract:
Recommendation systems are a key modern application of machine learning, but they have the downside that they often draw upon sensitive user information in making their predictions. We show how to address this deficiency by basing a service's recommendation engine upon recommendations from other existing services, which contain no sensitive information by nature. Specifically, we introduce a conte…
▽ More
Recommendation systems are a key modern application of machine learning, but they have the downside that they often draw upon sensitive user information in making their predictions. We show how to address this deficiency by basing a service's recommendation engine upon recommendations from other existing services, which contain no sensitive information by nature. Specifically, we introduce a contextual multi-armed bandit recommendation framework where the agent has access to recommendations for other services. In our setting, the user's (potentially sensitive) information belongs to a high-dimensional latent space, and the ideal recommendations for the source and target tasks (which are non-sensitive) are given by unknown linear transformations of the user information. So long as the tasks rely on similar segments of the user information, we can decompose the target recommendation problem into systematic components that can be derived from the source recommendations, and idiosyncratic components that are user-specific and cannot be derived from the source, but have significantly lower dimensionality. We propose an explore-then-refine approach to learning and utilizing this decomposition; then using ideas from perturbation theory and statistical concentration of measure, we prove our algorithm achieves regret comparable to a strong skyline that has full knowledge of the source and target transformations. We also consider a generalization of our algorithm to a model with many simultaneous targets and no source. Our methods obtain superior empirical results on synthetic benchmarks.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
Deep Learning for Two-Sided Matching
Authors:
Sai Srivatsa Ravindranath,
Zhe Feng,
Shira Li,
Jonathan Ma,
Scott D. Kominers,
David C. Parkes
Abstract:
We initiate the study of deep learning for the automated design of two-sided matching mechanisms. What is of most interest is to use machine learning to understand the possibility of new tradeoffs between strategy-proofness and stability. These properties cannot be achieved simultaneously, but the efficient frontier is not understood. We introduce novel differentiable surrogates for quantifying or…
▽ More
We initiate the study of deep learning for the automated design of two-sided matching mechanisms. What is of most interest is to use machine learning to understand the possibility of new tradeoffs between strategy-proofness and stability. These properties cannot be achieved simultaneously, but the efficient frontier is not understood. We introduce novel differentiable surrogates for quantifying ordinal strategy-proofness and stability and use them to train differentiable matching mechanisms that map discrete preferences to valid randomized matchings. We demonstrate that the efficient frontier characterized by these learned mechanisms is substantially better than that achievable through a convex combination of baselines of deferred acceptance (stable and strategy-proof for only one side of the market), top trading cycles (strategy-proof for one side, but not stable), and randomized serial dictatorship (strategy-proof for both sides, but not stable). This gives a new target for economic theory and opens up new possibilities for machine learning pipelines in matching market design.
△ Less
Submitted 14 November, 2023; v1 submitted 7 July, 2021;
originally announced July 2021.
-
Prisoners, Rooms, and Lightswitches
Authors:
Daniel M. Kane,
Scott Duke Kominers
Abstract:
We examine a new variant of the classic prisoners and lightswitches puzzle: A warden leads his $n$ prisoners in and out of $r$ rooms, one at a time, in some order, with each prisoner eventually visiting every room an arbitrarily large number of times. The rooms are indistinguishable, except that each one has $s$ lightswitches; the prisoners win their freedom if at some point a prisoner can correct…
▽ More
We examine a new variant of the classic prisoners and lightswitches puzzle: A warden leads his $n$ prisoners in and out of $r$ rooms, one at a time, in some order, with each prisoner eventually visiting every room an arbitrarily large number of times. The rooms are indistinguishable, except that each one has $s$ lightswitches; the prisoners win their freedom if at some point a prisoner can correctly declare that each prisoner has been in every room at least once. What is the minimum number of switches per room, $s$, such that the prisoners can manage this? We show that if the prisoners do not know the switches' starting configuration, then they have no chance of escape -- but if the prisoners do know the starting configuration, then the minimum sufficient $s$ is surprisingly small. The analysis gives rise to a number of puzzling open questions, as well.
△ Less
Submitted 17 September, 2020;
originally announced September 2020.
-
Generalization by Recognizing Confusion
Authors:
Daniel Chiu,
Franklyn Wang,
Scott Duke Kominers
Abstract:
A recently-proposed technique called self-adaptive training augments modern neural networks by allowing them to adjust training labels on the fly, to avoid overfitting to samples that may be mislabeled or otherwise non-representative. By combining the self-adaptive objective with mixup, we further improve the accuracy of self-adaptive models for image recognition; the resulting classifier obtains…
▽ More
A recently-proposed technique called self-adaptive training augments modern neural networks by allowing them to adjust training labels on the fly, to avoid overfitting to samples that may be mislabeled or otherwise non-representative. By combining the self-adaptive objective with mixup, we further improve the accuracy of self-adaptive models for image recognition; the resulting classifier obtains state-of-the-art accuracies on datasets corrupted with label noise. Robustness to label noise implies a lower generalization gap; thus, our approach also leads to improved generalizability. We find evidence that the Rademacher complexity of these algorithms is low, suggesting a new path towards provable generalization for this type of deep learning model. Last, we highlight a novel connection between difficulties accounting for rare classes and robustness under noise, as rare classes are in a sense indistinguishable from label noise. Our code can be found at https://github.com/Tuxianeer/generalizationconfusion.
△ Less
Submitted 13 June, 2020;
originally announced June 2020.
-
Smarter Parking: Using AI to Identify Parking Inefficiencies in Vancouver
Authors:
Devon Graham,
Satish Kumar Sarraf,
Taylor Lundy,
Ali MohammadMehr,
Sara Uppal,
Tae Yoon Lee,
Hedayat Zarkoob,
Scott Duke Kominers,
Kevin Leyton-Brown
Abstract:
On-street parking is convenient, but has many disadvantages: on-street spots come at the expense of other road uses such as traffic lanes, transit lanes, bike lanes, or parklets; drivers looking for parking contribute substantially to traffic congestion and hence to greenhouse gas emissions; safety is reduced both due to the fact that drivers looking for spots are more distracted than other road u…
▽ More
On-street parking is convenient, but has many disadvantages: on-street spots come at the expense of other road uses such as traffic lanes, transit lanes, bike lanes, or parklets; drivers looking for parking contribute substantially to traffic congestion and hence to greenhouse gas emissions; safety is reduced both due to the fact that drivers looking for spots are more distracted than other road users and that people exiting parked cars pose a risk to cyclists. These social costs may not be worth paying when off-street parking lots are nearby and have surplus capacity. To see where this might be true in downtown Vancouver, we used artificial intelligence techniques to estimate the amount of time it would take drivers to both park on and off street for destinations throughout the city. For on-street parking, we developed (1) a deep-learning model of block-by-block parking availability based on data from parking meters and audits and (2) a computational simulation of drivers searching for an on-street spot. For off-street parking, we developed a computational simulation of the time it would take drivers drive from their original destination to the nearest city-owned off-street lot and then to queue for a spot based on traffic and lot occupancy data. Finally, in both cases we also computed the time it would take the driver to walk from their parking spot to their original destination. We compared these time estimates for destinations in each block of Vancouver's downtown core and each hour of the day. We found many areas where off street would actually save drivers time over searching the streets for a spot, and many more where the time cost for parking off street was small. The identification of such areas provides an opportunity for the city to repurpose valuable curbside space for community-friendly uses more in line with its transportation goals.
△ Less
Submitted 21 March, 2020;
originally announced March 2020.
-
To Infinity and Beyond: A General Framework for Scaling Economic Theories
Authors:
Yannai A. Gonczarowski,
Scott Duke Kominers,
Ran I. Shorrer
Abstract:
Many economic theory models incorporate finiteness assumptions that, while introduced for simplicity, play a real role in the analysis. We provide a principled framework for scaling results from such models by removing these finiteness assumptions. Our sufficient conditions are on the theorem statement only, and not on its proof. This results in short proofs, and even allows to use the same argume…
▽ More
Many economic theory models incorporate finiteness assumptions that, while introduced for simplicity, play a real role in the analysis. We provide a principled framework for scaling results from such models by removing these finiteness assumptions. Our sufficient conditions are on the theorem statement only, and not on its proof. This results in short proofs, and even allows to use the same argument to scale similar theorems that were proven using distinctly different tools. We demonstrate the versatility of our approach via examples from both revealed-preference theory and matching theory.
△ Less
Submitted 9 April, 2023; v1 submitted 25 June, 2019;
originally announced June 2019.
-
Ridesharing with Driver Location Preferences
Authors:
Duncan Rheingans-Yoo,
Scott Duke Kominers,
Hongyao Ma,
David C. Parkes
Abstract:
We study revenue-optimal pricing and driver compensation in ridesharing platforms when drivers have heterogeneous preferences over locations. If a platform ignores drivers' location preferences, it may make inefficient trip dispatches; moreover, drivers may strategize so as to route towards their preferred locations. In a model with stationary and continuous demand and supply, we present a mechani…
▽ More
We study revenue-optimal pricing and driver compensation in ridesharing platforms when drivers have heterogeneous preferences over locations. If a platform ignores drivers' location preferences, it may make inefficient trip dispatches; moreover, drivers may strategize so as to route towards their preferred locations. In a model with stationary and continuous demand and supply, we present a mechanism that incentivizes drivers to both (i) report their location preferences truthfully and (ii) always provide service. In settings with unconstrained driver supply or symmetric demand patterns, our mechanism achieves (full-information) first-best revenue. Under supply constraints and unbalanced demand, we show via simulation that our mechanism improves over existing mechanisms and has performance close to the first-best.
△ Less
Submitted 13 August, 2019; v1 submitted 30 May, 2019;
originally announced May 2019.
-
Configurations of Extremal Type II Codes
Authors:
Noam D. Elkies,
Scott Duke Kominers
Abstract:
We prove configuration results for extremal Type II codes, analogous to the configuration results of Ozeki and of the second author for extremal Type II lattices. Specifically, we show that for $n \in \{8, 24, 32, 48, 56, 72, 96\}$ every extremal Type II code of length $n$ is generated by its codewords of minimal weight. Where Ozeki and Kominers used spherical harmonics and weighted theta function…
▽ More
We prove configuration results for extremal Type II codes, analogous to the configuration results of Ozeki and of the second author for extremal Type II lattices. Specifically, we show that for $n \in \{8, 24, 32, 48, 56, 72, 96\}$ every extremal Type II code of length $n$ is generated by its codewords of minimal weight. Where Ozeki and Kominers used spherical harmonics and weighted theta functions, we use discrete harmonic polynomials and harmonic weight enumerators. Along we way we introduce "$t\frac12$-designs" as a discrete analog of Venkov's spherical designs of the same name.
△ Less
Submitted 14 March, 2015;
originally announced March 2015.
-
Weighted Generating Functions for Type II Lattices and Codes
Authors:
Noam D. Elkies,
Scott Duke Kominers
Abstract:
We give a new structural development of harmonic polynomials on Hamming space, and harmonic weight enumerators of binary linear codes, that parallels one approach to harmonic polynomials on Euclidean space and weighted theta functions of Euclidean lattices. Namely, we use the finite-dimensional representation theory of sl_2 to derive a decomposition theorem for the spaces of discrete homogeneous p…
▽ More
We give a new structural development of harmonic polynomials on Hamming space, and harmonic weight enumerators of binary linear codes, that parallels one approach to harmonic polynomials on Euclidean space and weighted theta functions of Euclidean lattices. Namely, we use the finite-dimensional representation theory of sl_2 to derive a decomposition theorem for the spaces of discrete homogeneous polynomials in terms of the spaces of discrete harmonic polynomials, and prove a generalized MacWilliams identity for harmonic weight enumerators. We then present several applications of harmonic weight enumerators, corresponding to some uses of weighted theta functions: an equivalent characterization of t-designs, the Assmus-Mattson Theorem in the case of extremal Type II codes, and configuration results for extremal Type II codes of lengths 8, 24, 32, 48, 56, 72, and 96.
△ Less
Submitted 9 November, 2011;
originally announced November 2011.
-
Minimal S-universality criteria may vary in size
Authors:
Noam D. Elkies,
Daniel M. Kane,
Scott D. Kominers
Abstract:
In this note, we give simple examples of sets S of quadratic forms that have minimal S-universality criteria of multiple cardinalities. This answers a question of Kim, Kim, and Oh in the negative.
In this note, we give simple examples of sets S of quadratic forms that have minimal S-universality criteria of multiple cardinalities. This answers a question of Kim, Kim, and Oh in the negative.
△ Less
Submitted 28 January, 2011;
originally announced January 2011.
-
Asymptotic Improvements of Lower Bounds for the Least Common Multiples of Arithmetic Progressions
Authors:
Daniel M. Kane,
Scott D. Kominers
Abstract:
For relatively prime positive integers $u_0$ and $r$, we consider the least common multiple $L_n:=\mathrm{lcm}(u_0,u_1,\ldots, u_n)$ of the finite arithmetic progression $\{u_k:=u_0+kr\}_{k=0}^n$. We derive new lower bounds on $L_n$ which improve upon those obtained previously when either $u_0$ or $n$ is large. When $r$ is prime, our best bound is sharp up to a factor of $n+1$ for $u_0$ properly c…
▽ More
For relatively prime positive integers $u_0$ and $r$, we consider the least common multiple $L_n:=\mathrm{lcm}(u_0,u_1,\ldots, u_n)$ of the finite arithmetic progression $\{u_k:=u_0+kr\}_{k=0}^n$. We derive new lower bounds on $L_n$ which improve upon those obtained previously when either $u_0$ or $n$ is large. When $r$ is prime, our best bound is sharp up to a factor of $n+1$ for $u_0$ properly chosen, and is also nearly sharp as $n\to\infty$.
△ Less
Submitted 1 July, 2014; v1 submitted 30 December, 2010;
originally announced January 2011.
-
Refined Configuration Results for Extremal Type II Lattices of Ranks 40 and 80
Authors:
Noam D. Elkies,
Scott D. Kominers
Abstract:
We show that, if L is an extremal Type II lattice of rank 40 or 80, then L is generated by its vectors of norm min(L)+2. This sharpens earlier results of Ozeki, and the second author and Abel, which showed that such lattices L are generated by their vectors of norms min(L) and min(L)+2.
We show that, if L is an extremal Type II lattice of rank 40 or 80, then L is generated by its vectors of norm min(L)+2. This sharpens earlier results of Ozeki, and the second author and Abel, which showed that such lattices L are generated by their vectors of norms min(L) and min(L)+2.
△ Less
Submitted 27 May, 2009;
originally announced May 2009.
-
Every Large Point Set contains Many Collinear Points or an Empty Pentagon
Authors:
Zachary Abel,
Brad Ballinger,
Prosenjit Bose,
Sébastien Collette,
Vida Dujmović,
Ferran Hurtado,
Scott D. Kominers,
Stefan Langerman,
Attila Pór,
David R. Wood
Abstract:
We prove the following generalised empty pentagon theorem: for every integer $\ell \geq 2$, every sufficiently large set of points in the plane contains $\ell$ collinear points or an empty pentagon. As an application, we settle the next open case of the "big line or big clique" conjecture of Kára, Pór, and Wood [\emph{Discrete Comput. Geom.} 34(3):497--506, 2005].
We prove the following generalised empty pentagon theorem: for every integer $\ell \geq 2$, every sufficiently large set of points in the plane contains $\ell$ collinear points or an empty pentagon. As an application, we settle the next open case of the "big line or big clique" conjecture of Kára, Pór, and Wood [\emph{Discrete Comput. Geom.} 34(3):497--506, 2005].
△ Less
Submitted 24 April, 2009; v1 submitted 1 April, 2009;
originally announced April 2009.
-
On the Classification of Type II Codes of Length 24
Authors:
Noam D. Elkies,
Scott D. Kominers
Abstract:
We give a new, purely coding-theoretic proof of Koch's criterion on the tetrad systems of Type II codes of length 24 using the theory of harmonic weight enumerators. This approach is inspired by Venkov's approach to the classification of the root systems of Type II lattices in R^{24}, and gives a new instance of the analogy between lattices and codes.
We give a new, purely coding-theoretic proof of Koch's criterion on the tetrad systems of Type II codes of length 24 using the theory of harmonic weight enumerators. This approach is inspired by Venkov's approach to the classification of the root systems of Type II lattices in R^{24}, and gives a new instance of the analogy between lattices and codes.
△ Less
Submitted 19 February, 2009; v1 submitted 11 February, 2009;
originally announced February 2009.
-
Further Improvements of Lower Bounds for the Least Common Multiples of Arithmetic Progressions
Authors:
Shaofang Hong,
Scott D. Kominers
Abstract:
For relatively prime positive integers u_0 and r, we consider the arithmetic progression {u_k := u_0+k*r} (0 <= k <= n). Define L_n := lcm{u_0,u_1,...,u_n} and let a >= 2 be any integer. In this paper, we show that, for integers alpha,r >= a and n >= 2*alpha*r, we have L_n >= u_0*r^{alpha+a-2}*(r+1)^n. In particular, letting a = 2 yields an improvement to the best previous lower bound on L_n (ob…
▽ More
For relatively prime positive integers u_0 and r, we consider the arithmetic progression {u_k := u_0+k*r} (0 <= k <= n). Define L_n := lcm{u_0,u_1,...,u_n} and let a >= 2 be any integer. In this paper, we show that, for integers alpha,r >= a and n >= 2*alpha*r, we have L_n >= u_0*r^{alpha+a-2}*(r+1)^n. In particular, letting a = 2 yields an improvement to the best previous lower bound on L_n (obtained by Hong and Yang) for all but three choices of alpha,r >= 2.
△ Less
Submitted 16 June, 2009; v1 submitted 28 November, 2008;
originally announced November 2008.
-
Candy-passing Games on General Graphs, II
Authors:
Paul M. Kominers,
Scott D. Kominers
Abstract:
We give a new proof that any candy-passing game on a graph G with at least 4|E(G)|-|V(G)| candies stabilizes. (This result was first proven in arXiv:0807.4450.) Unlike the prior literature on candy-passing games, we use methods from the general theory of chip-firing games which allow us to obtain a polynomial bound on the number of rounds before stabilization.
We give a new proof that any candy-passing game on a graph G with at least 4|E(G)|-|V(G)| candies stabilizes. (This result was first proven in arXiv:0807.4450.) Unlike the prior literature on candy-passing games, we use methods from the general theory of chip-firing games which allow us to obtain a polynomial bound on the number of rounds before stabilization.
△ Less
Submitted 29 July, 2008;
originally announced July 2008.
-
Candy-passing Games on General Graphs, I
Authors:
Paul M. Kominers,
Scott D. Kominers
Abstract:
We undertake the first study of the candy-passing game on arbitrary connected graphs. We obtain a general stabilization result which encompasses the first author's results (arXiv:0709.2156) for candy-passing games on n-cycles with at least 3n candies.
We undertake the first study of the candy-passing game on arbitrary connected graphs. We obtain a general stabilization result which encompasses the first author's results (arXiv:0709.2156) for candy-passing games on n-cycles with at least 3n candies.
△ Less
Submitted 28 July, 2008;
originally announced July 2008.
-
The 8-universality Criterion is Unique
Authors:
Scott D. Kominers
Abstract:
Using the methods developed for the proof that the 2-universality criterion is unique, we partially characterize criteria for the n-universality of positive-definite integer-matrix quadratic forms. We then obtain the uniqueness of Oh's 8-universality criterion as an application of our characterization results.
Using the methods developed for the proof that the 2-universality criterion is unique, we partially characterize criteria for the n-universality of positive-definite integer-matrix quadratic forms. We then obtain the uniqueness of Oh's 8-universality criterion as an application of our characterization results.
△ Less
Submitted 14 July, 2008;
originally announced July 2008.
-
Improved Bounds on the Sizes of S.P Numbers
Authors:
Paul M. Kominers,
Scott D. Kominers
Abstract:
A number which is S.P in base r is a positive integer which is equal to the sum of its base-r digits multiplied by the product of its base-r digits. These numbers have been studied extensively in The Mathematical Gazette. Recently, Shah Ali obtained the first effective bound on the sizes of S.P numbers. Modifying Shah Ali's method, we obtain an improved bound on the number of digits in a base-r…
▽ More
A number which is S.P in base r is a positive integer which is equal to the sum of its base-r digits multiplied by the product of its base-r digits. These numbers have been studied extensively in The Mathematical Gazette. Recently, Shah Ali obtained the first effective bound on the sizes of S.P numbers. Modifying Shah Ali's method, we obtain an improved bound on the number of digits in a base-r S.P number. Our bound is the first sharp bound found for the case r=2.
△ Less
Submitted 24 November, 2008; v1 submitted 23 June, 2008;
originally announced June 2008.
-
Perelman, Poincare, and the Ricci Flow
Authors:
Scott D. Kominers
Abstract:
In this expository article, we introduce the topological ideas and context central to the Poincare Conjecture. Our account is intended for a general audience, providing intuitive definitions and spatial intuition whenever possible. We define surfaces and their natural generalizations, manifolds. We then discuss the classification of surfaces as it relates to the Poincare and Thurston Geometrizat…
▽ More
In this expository article, we introduce the topological ideas and context central to the Poincare Conjecture. Our account is intended for a general audience, providing intuitive definitions and spatial intuition whenever possible. We define surfaces and their natural generalizations, manifolds. We then discuss the classification of surfaces as it relates to the Poincare and Thurston Geometrization conjectures. Finally, we survey Perelman's results on Ricci flows with surgery.
△ Less
Submitted 2 March, 2008;
originally announced March 2008.
-
A Universal In-Place Reconfiguration Algorithm for Sliding Cube-Shaped Robots in a Quadratic Number of Moves
Authors:
Zachary Abel,
Hugo A. Akitaya,
Scott Duke Kominers,
Matias Korman,
Frederick Stock
Abstract:
In the modular robot reconfiguration problem, we are given $n$ cube-shaped modules (or robots) as well as two configurations, i.e., placements of the $n$ modules so that their union is face-connected. The goal is to find a sequence of moves that reconfigures the modules from one configuration to the other using "sliding moves," in which a module slides over the face or edge of a neighboring module…
▽ More
In the modular robot reconfiguration problem, we are given $n$ cube-shaped modules (or robots) as well as two configurations, i.e., placements of the $n$ modules so that their union is face-connected. The goal is to find a sequence of moves that reconfigures the modules from one configuration to the other using "sliding moves," in which a module slides over the face or edge of a neighboring module, maintaining connectivity of the configuration at all times.
For many years it has been known that certain module configurations in this model require at least $Ω(n^2)$ moves to reconfigure between them. In this paper, we introduce the first universal reconfiguration algorithm -- i.e., we show that any $n$-module configuration can reconfigure itself into any specified $n$-module configuration using just sliding moves. Our algorithm achieves reconfiguration in $O(n^2)$ moves, making it asymptotically tight. We also present a variation that reconfigures in-place, it ensures that throughout the reconfiguration process, all modules, except for one, will be contained in the union of the bounding boxes of the start and end configuration.
△ Less
Submitted 14 March, 2024; v1 submitted 22 February, 2008;
originally announced February 2008.
-
On Universal Binary Hermitian Forms
Authors:
Scott D. Kominers
Abstract:
Earnest and Khosravani, Iwabuchi, and Kim and Park recently gave a complete classification of the universal binary Hermitian forms. We give a unified proof of the universalities of these Hermitian forms, relying primarily on Ramanujan's list of universal quadratic forms and on the Bhargava-Hanke 290-Theorem. Our methods bypass nearly all of the ad hoc universality arguments required in the origi…
▽ More
Earnest and Khosravani, Iwabuchi, and Kim and Park recently gave a complete classification of the universal binary Hermitian forms. We give a unified proof of the universalities of these Hermitian forms, relying primarily on Ramanujan's list of universal quadratic forms and on the Bhargava-Hanke 290-Theorem. Our methods bypass nearly all of the ad hoc universality arguments required in the original classification.
△ Less
Submitted 3 January, 2008;
originally announced January 2008.
-
Walk versus Wait: The Lazy Mathematician Wins
Authors:
Justin G. Chen,
Scott D. Kominers,
Robert W. Sinnott
Abstract:
In this recreational mathematics note, we address a simple, yet instructive question:
Justin has to travel a distance of d miles along a bus route. Along this route, there are n bus stops i, each spaced at a distance of d_i from the starting point. At each bus stop, Justin is faced with a choice: to walk or to wait. If he walks on, he can still catch a bus at the next bus stop--but if a bus pa…
▽ More
In this recreational mathematics note, we address a simple, yet instructive question:
Justin has to travel a distance of d miles along a bus route. Along this route, there are n bus stops i, each spaced at a distance of d_i from the starting point. At each bus stop, Justin is faced with a choice: to walk or to wait. If he walks on, he can still catch a bus at the next bus stop--but if a bus passes him while he walks, he is almost assured a longer wait.
We model Justin's decision constraint and completely solve the model in a special case. The answer is intuitive: the optimal strategy is the laziest.
△ Less
Submitted 27 January, 2008; v1 submitted 1 January, 2008;
originally announced January 2008.
-
Hinged Dissections Exist
Authors:
Timothy G. Abbott,
Zachary Abel,
David Charlton,
Erik D. Demaine,
Martin L. Demaine,
Scott D. Kominers
Abstract:
We prove that any finite collection of polygons of equal area has a common hinged dissection. That is, for any such collection of polygons there exists a chain of polygons hinged at vertices that can be folded in the plane continuously without self-intersection to form any polygon in the collection. This result settles the open problem about the existence of hinged dissections between pairs of p…
▽ More
We prove that any finite collection of polygons of equal area has a common hinged dissection. That is, for any such collection of polygons there exists a chain of polygons hinged at vertices that can be folded in the plane continuously without self-intersection to form any polygon in the collection. This result settles the open problem about the existence of hinged dissections between pairs of polygons that goes back implicitly to 1864 and has been studied extensively in the past ten years. Our result generalizes and indeed builds upon the result from 1814 that polygons have common dissections (without hinges). We also extend our common dissection result to edge-hinged dissections of solid 3D polyhedra that have a common (unhinged) dissection, as determined by Dehn's 1900 solution to Hilbert's Third Problem. Our proofs are constructive, giving explicit algorithms in all cases. For a constant number of planar polygons, both the number of pieces and running time required by our construction are pseudopolynomial. This bound is the best possible, even for unhinged dissections. Hinged dissections have possible applications to reconfigurable robotics, programmable matter, and nanomanufacturing.
△ Less
Submitted 12 December, 2007;
originally announced December 2007.
-
Configurations of Rank-40r Extremal Even Unimodular Lattices (r=1,2,3)
Authors:
Scott D. Kominers,
Zachary Abel
Abstract:
We show that if L is an extremal even unimodular lattice of rank 40r with r=1,2,3 then L is generated by its vectors of norms 4r and 4r+2. Our result is an extension of Ozeki's result for the case r=1.
We show that if L is an extremal even unimodular lattice of rank 40r with r=1,2,3 then L is generated by its vectors of norms 4r and 4r+2. Our result is an extension of Ozeki's result for the case r=1.
△ Less
Submitted 10 December, 2007; v1 submitted 30 October, 2007;
originally announced October 2007.
-
A Categorical Construction of Ultrafilters
Authors:
Daniel Litt,
Zachary Abel,
Scott D. Kominers
Abstract:
Ultrafilters are useful mathematical objects having applications in nonstandard analysis, Ramsey theory, Boolean algebra, topology, and other areas of mathematics. In this note, we provide a categorical construction of ultrafilters in terms of the inverse limit of an inverse family of finite partitions; this is an elementary and intuitive presentation of a consequence of the profiniteness of Sto…
▽ More
Ultrafilters are useful mathematical objects having applications in nonstandard analysis, Ramsey theory, Boolean algebra, topology, and other areas of mathematics. In this note, we provide a categorical construction of ultrafilters in terms of the inverse limit of an inverse family of finite partitions; this is an elementary and intuitive presentation of a consequence of the profiniteness of Stone spaces. We then apply this construction to answer a question of Rosinger posed in arXiv:0709.0084v2 in the negative.
△ Less
Submitted 13 May, 2009; v1 submitted 12 October, 2007;
originally announced October 2007.
-
Uniqueness of the 2-universality Criterion
Authors:
Scott D. Kominers
Abstract:
Kim, Kim, and Oh gave a minimal criterion for the 2-universality of positive-definite integer-matrix quadratic forms. We show that this 2-universality criterion is unique in the sense of the uniqueness of the Conway-Schneeberger Fifteen Theorem.
Kim, Kim, and Oh gave a minimal criterion for the 2-universality of positive-definite integer-matrix quadratic forms. We show that this 2-universality criterion is unique in the sense of the uniqueness of the Conway-Schneeberger Fifteen Theorem.
△ Less
Submitted 23 March, 2008; v1 submitted 31 August, 2007;
originally announced August 2007.
-
Configurations of Extremal Even Unimodular Lattices
Authors:
Scott D. Kominers
Abstract:
We extend the results of Ozeki on the configurations of extremal even unimodular lattices. Specifically, we show that if L is such a lattice of rank 56, 72, or 96, then L is generated by its minimal-norm vectors.
We extend the results of Ozeki on the configurations of extremal even unimodular lattices. Specifically, we show that if L is such a lattice of rank 56, 72, or 96, then L is generated by its minimal-norm vectors.
△ Less
Submitted 10 December, 2007; v1 submitted 21 June, 2007;
originally announced June 2007.