-
Critical Appraisal of Fairness Metrics in Clinical Predictive AI
Authors:
João Matos,
Ben Van Calster,
Leo Anthony Celi,
Paula Dhiman,
Judy Wawira Gichoya,
Richard D. Riley,
Chris Russell,
Sara Khalid,
Gary S. Collins
Abstract:
Predictive artificial intelligence (AI) offers an opportunity to improve clinical practice and patient outcomes, but risks perpetuating biases if fairness is inadequately addressed. However, the definition of "fairness" remains unclear. We conducted a scoping review to identify and critically appraise fairness metrics for clinical predictive AI. We defined a "fairness metric" as a measure quantify…
▽ More
Predictive artificial intelligence (AI) offers an opportunity to improve clinical practice and patient outcomes, but risks perpetuating biases if fairness is inadequately addressed. However, the definition of "fairness" remains unclear. We conducted a scoping review to identify and critically appraise fairness metrics for clinical predictive AI. We defined a "fairness metric" as a measure quantifying whether a model discriminates (societally) against individuals or groups defined by sensitive attributes. We searched five databases (2014-2024), screening 820 records, to include 41 studies, and extracted 62 fairness metrics. Metrics were classified by performance-dependency, model output level, and base performance metric, revealing a fragmented landscape with limited clinical validation and overreliance on threshold-dependent measures. Eighteen metrics were explicitly developed for healthcare, including only one clinical utility metric. Our findings highlight conceptual challenges in defining and quantifying fairness and identify gaps in uncertainty quantification, intersectionality, and real-world applicability. Future work should prioritise clinically meaningful metrics.
△ Less
Submitted 20 June, 2025;
originally announced June 2025.
-
Conjugacy in a family of free-by-cyclic groups
Authors:
Martin R. Bridson,
Timothy R. Riley,
Andrew W. Sale
Abstract:
We analyse the geometry and complexity of the conjugacy problem in a family of free-by-cyclic groups $H_m=F_m\rtimes\mathbb{Z}$ where the defining free-group automorphism is positive and polynomially growing. We prove that the conjugator length function of $H_m$ is linear, and describe polynomial-time solutions to the conjugacy problem and conjugacy search problem in $H_m$.
We analyse the geometry and complexity of the conjugacy problem in a family of free-by-cyclic groups $H_m=F_m\rtimes\mathbb{Z}$ where the defining free-group automorphism is positive and polynomially growing. We prove that the conjugator length function of $H_m$ is linear, and describe polynomial-time solutions to the conjugacy problem and conjugacy search problem in $H_m$.
△ Less
Submitted 1 June, 2025;
originally announced June 2025.
-
Linear Diophantine equations and conjugator length in 2-step nilpotent groups
Authors:
Martin R. Bridson,
Timothy R. Riley
Abstract:
We establish upper bounds on the lengths of minimal conjugators in 2-step nilpotent groups. These bounds exploit the existence of small integral solutions to systems of linear Diophantine equations. We prove that in some cases these bounds are sharp. This enables us to construct a family of finitely generated 2-step nilpotent groups $(G_m)_{m\in\mathbb{N}}$ such that the conjugator length function…
▽ More
We establish upper bounds on the lengths of minimal conjugators in 2-step nilpotent groups. These bounds exploit the existence of small integral solutions to systems of linear Diophantine equations. We prove that in some cases these bounds are sharp. This enables us to construct a family of finitely generated 2-step nilpotent groups $(G_m)_{m\in\mathbb{N}}$ such that the conjugator length function of $G_m$ grows like a polynomial of degree $m+1$.
△ Less
Submitted 1 June, 2025;
originally announced June 2025.
-
The lengths of conjugators in the model filiform groups
Authors:
Martin R. Bridson,
Timothy R. Riley
Abstract:
The conjugator length function of a finitely generated group $Γ$ gives the optimal upper bound on the length of a shortest conjugator for any pair of conjugate elements in the ball of radius $n$ in the Cayley graph of $Γ$. We prove that polynomials of arbitrary degree arise as conjugator length functions of finitely presented groups. To establish this, we analyse the geometry of conjugation in the…
▽ More
The conjugator length function of a finitely generated group $Γ$ gives the optimal upper bound on the length of a shortest conjugator for any pair of conjugate elements in the ball of radius $n$ in the Cayley graph of $Γ$. We prove that polynomials of arbitrary degree arise as conjugator length functions of finitely presented groups. To establish this, we analyse the geometry of conjugation in the discrete model filiform groups $Γ_d = \mathbb{Z}^d\rtimes_φ\mathbb{Z}$ where is $φ$ is the automorphism of $\mathbb{Z}^d$ that fixes the last element of a basis $a_1,\dots,a_d$ and sends $a_i$ to $a_ia_{i+1}$ for $i<d$. The conjugator length function of $Γ_d$ is polynomial of degree $d$.
△ Less
Submitted 1 June, 2025;
originally announced June 2025.
-
A general sample size framework for developing or updating a clinical prediction model
Authors:
Richard D Riley,
Rebecca Whittle,
Mohsen Sadatsafavi,
Glen P. Martin,
Alexander Pate,
Gary S. Collins,
Joie Ensor
Abstract:
Aims: To propose a general sample size framework for developing or updating a clinical prediction model using any statistical or machine learning method, based on drawing samples from anticipated posterior distributions and targeting assurance in predictive performance.
Methods: Users provide a reference model (eg, matching outcome incidence, predictor weights and c-statistic of previous models)…
▽ More
Aims: To propose a general sample size framework for developing or updating a clinical prediction model using any statistical or machine learning method, based on drawing samples from anticipated posterior distributions and targeting assurance in predictive performance.
Methods: Users provide a reference model (eg, matching outcome incidence, predictor weights and c-statistic of previous models), and a (synthetic) dataset reflecting the joint distribution of candidate predictors in the target population. Then a fully simulation-based approach allows the impact of a chosen development sample size and modelling strategy to be examined. This generates thousands of models and, by applying each to the target population, leads to posterior distributions of individual predictions and model performance (degradation) metrics, to inform required sample size. To improve computation speed for penalised regression, we also propose a one-sample Bayesian analysis combining shrinkage priors with a likelihood decomposed into sample size and Fisher's information.
Results: The framework is illustrated when developing pre-eclampsia prediction models using logistic regression (unpenalised, uniform shrinkage, lasso or ridge) and random forests. We show it encompasses existing sample size calculation criteria whilst providing model assurance probabilities, instability metrics and degradation statistics about calibration, discrimination, clinical utility, prediction error and fairness. Crucially, the required sample size depends on the users' key estimands and planned model development or updating approach.
Conclusions: The framework generalises existing sample size proposals for model development by utilising anticipated posterior distributions conditional on a chosen sample size and development strategy. This informs the sample size required to target appropriate model performance.
△ Less
Submitted 25 April, 2025;
originally announced April 2025.
-
Bayesian sample size calculations for external validation studies of risk prediction models
Authors:
Mohsen Sadatsafavi,
Paul Gustafson,
Solmaz Setayeshgar,
Laure Wynants,
Richard D Riley
Abstract:
Contemporary sample size calculations for external validation of risk prediction models require users to specify fixed values of assumed model performance metrics alongside target precision levels (e.g., 95% CI widths). However, due to the finite samples of previous studies, our knowledge of true model performance in the target population is uncertain, and so choosing fixed values represents an in…
▽ More
Contemporary sample size calculations for external validation of risk prediction models require users to specify fixed values of assumed model performance metrics alongside target precision levels (e.g., 95% CI widths). However, due to the finite samples of previous studies, our knowledge of true model performance in the target population is uncertain, and so choosing fixed values represents an incomplete picture. As well, for net benefit (NB) as a measure of clinical utility, the relevance of conventional precision-based inference is doubtful. In this work, we propose a general Bayesian framework for multi-criteria sample size considerations for prediction models for binary outcomes. For statistical metrics of performance (e.g., discrimination and calibration), we propose sample size rules that target desired expected precision or desired assurance probability that the precision criteria will be satisfied. For NB, we propose rules based on Optimality Assurance (the probability that the planned study correctly identifies the optimal strategy) and Value of Information (VoI) analysis. We showcase these developments in a case study on the validation of a risk prediction model for deterioration of hospitalized COVID-19 patients. Compared to the conventional sample size calculation methods, a Bayesian approach requires explicit quantification of uncertainty around model performance, and thereby enables flexible sample size rules based on expected precision, assurance probabilities, and VoI. In our case study, calculations based on VoI for NB suggest considerably lower sample sizes are needed than when focusing on precision of calibration metrics.
△ Less
Submitted 23 May, 2025; v1 submitted 22 April, 2025;
originally announced April 2025.
-
Compatibility of Missing Data Handling Methods across the Stages of Producing Clinical Prediction Models
Authors:
Antonia Tsvetanova,
Matthew Sperrin,
David A. Jenkins,
Niels Peek,
Iain Buchan,
Stephanie Hyland,
Marcus Taylor,
Angela Wood,
Richard D. Riley,
Glen P. Martin
Abstract:
Missing data is a challenge when developing, validating and deploying clinical prediction models (CPMs). Traditionally, decisions concerning missing data handling during CPM development and validation havent accounted for whether missingness is allowed at deployment. We hypothesised that the missing data approach used during model development should optimise model performance upon deployment, whil…
▽ More
Missing data is a challenge when developing, validating and deploying clinical prediction models (CPMs). Traditionally, decisions concerning missing data handling during CPM development and validation havent accounted for whether missingness is allowed at deployment. We hypothesised that the missing data approach used during model development should optimise model performance upon deployment, whilst the approach used during model validation should yield unbiased predictive performance estimates upon deployment; we term this compatibility. We aimed to determine which combinations of missing data handling methods across the CPM life cycle are compatible. We considered scenarios where CPMs are intended to be deployed with missing data allowed or not, and we evaluated the impact of that choice on earlier modelling decisions. Through a simulation study and an empirical analysis of thoracic surgery data, we compared CPMs developed and validated using combinations of complete case analysis, mean imputation, single regression imputation, multiple imputation, and pattern sub-modelling. If planning to deploy a CPM without allowing missing data, then development and validation should use multiple imputation when required. Where missingness is allowed at deployment, the same imputation method must be used during development and validation. Commonly used combinations of missing data handling methods result in biased predictive performance estimates.
△ Less
Submitted 7 May, 2025; v1 submitted 9 April, 2025;
originally announced April 2025.
-
A decomposition of Fisher's information to inform sample size for developing fair and precise clinical prediction models -- Part 2: time-to-event outcomes
Authors:
Richard D Riley,
Gary S Collins,
Lucinda Archer,
Rebecca Whittle,
Amardeep Legha,
Laura Kirton,
Paula Dhiman,
Mohsen Sadatsafavi,
Nicola J Adderley,
Joseph Alderman,
Glen P Martin,
Joie Ensor
Abstract:
Background: When developing a clinical prediction model using time-to-event data, previous research focuses on the sample size to minimise overfitting and precisely estimate the overall risk. However, instability of individual-level risk estimates may still be large. Methods: We propose a decomposition of Fisher's information matrix to examine and calculate the sample size required for developing…
▽ More
Background: When developing a clinical prediction model using time-to-event data, previous research focuses on the sample size to minimise overfitting and precisely estimate the overall risk. However, instability of individual-level risk estimates may still be large. Methods: We propose a decomposition of Fisher's information matrix to examine and calculate the sample size required for developing a model that aims for precise and fair risk estimates. We propose a six-step process which can be used before data collection or when an existing dataset is available. Steps (1) to (5) require researchers to specify the overall risk in the target population at a key time-point of interest; an assumed pragmatic 'core model' in the form of an exponential regression model; the (anticipated) joint distribution of core predictors included in that model; and the distribution of any censoring. Results: We derive closed-form solutions that decompose the variance of an individual's estimated event rate into Fisher's unit information matrix, predictor values and total sample size; this allows researchers to calculate and examine uncertainty distributions around individual risk estimates and misclassification probabilities for specified sample sizes. We provide an illustrative example in breast cancer and emphasise the importance of clinical context, including risk thresholds for decision making, and examine fairness concerns for pre- and post-menopausal women. Lastly, in two empirical evaluations, we provide reassurance that uncertainty interval widths based on our approach are close to using more flexible models. Conclusions: Our approach allows users to identify the (target) sample size required to develop a prediction model for time-to-event outcomes, via the pmstabilityss module. It aims to facilitate models with improved trust, reliability and fairness in individual-level predictions.
△ Less
Submitted 24 January, 2025;
originally announced January 2025.
-
A decomposition of Fisher's information to inform sample size for developing fair and precise clinical prediction models -- part 1: binary outcomes
Authors:
Richard D Riley,
Gary S Collins,
Rebecca Whittle,
Lucinda Archer,
Kym IE Snell,
Paula Dhiman,
Laura Kirton,
Amardeep Legha,
Xiaoxuan Liu,
Alastair Denniston,
Frank E Harrell Jr,
Laure Wynants,
Glen P Martin,
Joie Ensor
Abstract:
When developing a clinical prediction model, the sample size of the development dataset is a key consideration. Small sample sizes lead to greater concerns of overfitting, instability, poor performance and lack of fairness. Previous research has outlined minimum sample size calculations to minimise overfitting and precisely estimate the overall risk. However even when meeting these criteria, the u…
▽ More
When developing a clinical prediction model, the sample size of the development dataset is a key consideration. Small sample sizes lead to greater concerns of overfitting, instability, poor performance and lack of fairness. Previous research has outlined minimum sample size calculations to minimise overfitting and precisely estimate the overall risk. However even when meeting these criteria, the uncertainty (instability) in individual-level risk estimates may be considerable. In this article we propose how to examine and calculate the sample size required for developing a model with acceptably precise individual-level risk estimates to inform decisions and improve fairness. We outline a five-step process to be used before data collection or when an existing dataset is available. It requires researchers to specify the overall risk in the target population, the (anticipated) distribution of key predictors in the model, and an assumed 'core model' either specified directly (i.e., a logistic regression equation is provided) or based on specified C-statistic and relative effects of (standardised) predictors. We produce closed-form solutions that decompose the variance of an individual's risk estimate into Fisher's unit information matrix, predictor values and total sample size; this allows researchers to quickly calculate and examine individual-level uncertainty interval widths and classification instability for specified sample sizes. Such information can be presented to key stakeholders (e.g., health professionals, patients, funders) using prediction and classification instability plots to help identify the (target) sample size required to improve trust, reliability and fairness in individual predictions. Our proposal is implemented in software module pmstabilityss. We provide real examples and emphasise the importance of clinical context including any risk thresholds for decision making.
△ Less
Submitted 24 January, 2025; v1 submitted 12 July, 2024;
originally announced July 2024.
-
Extended sample size calculations for evaluation of prediction models using a threshold for classification
Authors:
Rebecca Whittle,
Joie Ensor,
Lucinda Archer,
Gary S. Collins,
Paula Dhiman,
Alastair Denniston,
Joseph Alderman,
Amardeep Legha,
Maarten van Smeden,
Karel G. Moons,
Jean-Baptiste Cazier,
Richard D. Riley,
Kym I. E. Snell
Abstract:
When evaluating the performance of a model for individualised risk prediction, the sample size needs to be large enough to precisely estimate the performance measures of interest. Current sample size guidance is based on precisely estimating calibration, discrimination, and net benefit, which should be the first stage of calculating the minimum required sample size. However, when a clinically impo…
▽ More
When evaluating the performance of a model for individualised risk prediction, the sample size needs to be large enough to precisely estimate the performance measures of interest. Current sample size guidance is based on precisely estimating calibration, discrimination, and net benefit, which should be the first stage of calculating the minimum required sample size. However, when a clinically important threshold is used for classification, other performance measures can also be used. We extend the previously published guidance to precisely estimate threshold-based performance measures. We have developed closed-form solutions to estimate the sample size required to target sufficiently precise estimates of accuracy, specificity, sensitivity, PPV, NPV, and F1-score in an external evaluation study of a prediction model with a binary outcome. This approach requires the user to pre-specify the target standard error and the expected value for each performance measure. We describe how the sample size formulae were derived and demonstrate their use in an example. Extension to time-to-event outcomes is also considered. In our examples, the minimum sample size required was lower than that required to precisely estimate the calibration slope, and we expect this would most often be the case. Our formulae, along with corresponding Python code and updated R and Stata commands (pmvalsampsize), enable researchers to calculate the minimum sample size needed to precisely estimate threshold-based performance measures in an external evaluation study. These criteria should be used alongside previously published criteria to precisely estimate the calibration, discrimination, and net-benefit.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Calibration plots for multistate risk predictions models: an overview and simulation comparing novel approaches
Authors:
Alexander Pate,
Matthew Sperrin,
Richard D. Riley,
Niels Peek,
Tjeerd Van Staa,
Jamie C. Sergeant,
Mamas A. Mamas,
Gregory Y. H. Lip,
Martin O Flaherty,
Michael Barrowman,
Iain Buchan,
Glen P. Martin
Abstract:
Introduction. There is currently no guidance on how to assess the calibration of multistate models used for risk prediction. We introduce several techniques that can be used to produce calibration plots for the transition probabilities of a multistate model, before assessing their performance in the presence of non-informative and informative censoring through a simulation.
Methods. We studied p…
▽ More
Introduction. There is currently no guidance on how to assess the calibration of multistate models used for risk prediction. We introduce several techniques that can be used to produce calibration plots for the transition probabilities of a multistate model, before assessing their performance in the presence of non-informative and informative censoring through a simulation.
Methods. We studied pseudo-values based on the Aalen-Johansen estimator, binary logistic regression with inverse probability of censoring weights (BLR-IPCW), and multinomial logistic regression with inverse probability of censoring weights (MLR-IPCW). The MLR-IPCW approach results in a calibration scatter plot, providing extra insight about the calibration. We simulated data with varying levels of censoring and evaluated the ability of each method to estimate the calibration curve for a set of predicted transition probabilities. We also developed evaluated the calibration of a model predicting the incidence of cardiovascular disease, type 2 diabetes and chronic kidney disease among a cohort of patients derived from linked primary and secondary healthcare records.
Results. The pseudo-value, BLR-IPCW and MLR-IPCW approaches give unbiased estimates of the calibration curves under non-informative censoring. These methods remained unbiased in the presence of informative censoring, unless the mechanism was strongly informative, with bias concentrated in the areas of predicted transition probabilities of low density.
Conclusions. We recommend implementing either the pseudo-value or BLR-IPCW approaches to produce a calibration curve, combined with the MLR-IPCW approach to produce a calibration scatter plot, which provides additional information over either of the other methods.
△ Less
Submitted 25 August, 2023;
originally announced August 2023.
-
Stability of clinical prediction models developed using statistical or machine learning methods
Authors:
Richard D Riley,
Gary S Collins
Abstract:
Clinical prediction models estimate an individual's risk of a particular health outcome, conditional on their values of multiple predictors. A developed model is a consequence of the development dataset and the chosen model building strategy, including the sample size, number of predictors and analysis method (e.g., regression or machine learning). Here, we raise the concern that many models are d…
▽ More
Clinical prediction models estimate an individual's risk of a particular health outcome, conditional on their values of multiple predictors. A developed model is a consequence of the development dataset and the chosen model building strategy, including the sample size, number of predictors and analysis method (e.g., regression or machine learning). Here, we raise the concern that many models are developed using small datasets that lead to instability in the model and its predictions (estimated risks). We define four levels of model stability in estimated risks moving from the overall mean to the individual level. Then, through simulation and case studies of statistical and machine learning approaches, we show instability in a model's estimated risks is often considerable, and ultimately manifests itself as miscalibration of predictions in new data. Therefore, we recommend researchers should always examine instability at the model development stage and propose instability plots and measures to do so. This entails repeating the model building steps (those used in the development of the original prediction model) in each of multiple (e.g., 1000) bootstrap samples, to produce multiple bootstrap models, and then deriving (i) a prediction instability plot of bootstrap model predictions (y-axis) versus original model predictions (x-axis), (ii) a calibration instability plot showing calibration curves for the bootstrap models in the original sample; and (iii) the instability index, which is the mean absolute difference between individuals' original and bootstrap model predictions. A case study is used to illustrate how these instability assessments help reassure (or not) whether model predictions are likely to be reliable (or not), whilst also informing a model's critical appraisal (risk of bias rating), fairness assessment and further validation requirements.
△ Less
Submitted 2 November, 2022;
originally announced November 2022.
-
Minimum Sample Size for Developing a Multivariable Prediction Model using Multinomial Logistic Regression
Authors:
Alexander Pate,
Richard D Riley,
Gary S Collins,
Maarten van Smeden,
Ben Van Calster,
Joie Ensor,
Glen P Martin
Abstract:
Multinomial logistic regression models allow one to predict the risk of a categorical outcome with more than 2 categories. When developing such a model, researchers should ensure the number of participants (n) is appropriate relative to the number of events (E.k) and the number of predictor parameters (p.k) for each category k. We propose three criteria to determine the minimum n required in light…
▽ More
Multinomial logistic regression models allow one to predict the risk of a categorical outcome with more than 2 categories. When developing such a model, researchers should ensure the number of participants (n) is appropriate relative to the number of events (E.k) and the number of predictor parameters (p.k) for each category k. We propose three criteria to determine the minimum n required in light of existing criteria developed for binary outcomes. The first criteria aims to minimise the model overfitting. The second aims to minimise the difference between the observed and adjusted R2 Nagelkerke. The third criterion aims to ensure the overall risk is estimated precisely. For criterion (i), we show the sample size must be based on the anticipated Cox-snell R2 of distinct one-to-one logistic regression models corresponding to the sub-models of the multinomial logistic regression, rather than on the overall Cox-snell R2 of the multinomial logistic regression. We tested the performance of the proposed criteria (i) through a simulation study, and found that it resulted in the desired level of overfitting. Criterion (ii) and (iii) are natural extensions from previously proposed criteria for binary outcomes. We illustrate how to implement the sample size criteria through a worked example considering the development of a multinomial risk prediction model for tumour type when presented with an ovarian mass. Code is provided for the simulation and worked example. We will embed our proposed criteria within the pmsampsize R library and Stata modules.
△ Less
Submitted 26 July, 2022;
originally announced July 2022.
-
Proca Q-balls and Q-shells
Authors:
Julian Heeck,
Arvind Rajaraman,
Rebecca Riley,
Christopher B. Verhaaren
Abstract:
Non-topological solitons such as Q-balls and Q-shells have been studied for scalar fields invariant under global and gauged U(1) symmetries. We generalize this framework to include a Proca mass for the gauge boson, which can arise either from spontaneous symmetry breaking or via the Stückelberg mechanism. A heavy (light) gauge boson leads to solitons reminiscent of the global (gauged) case, but fo…
▽ More
Non-topological solitons such as Q-balls and Q-shells have been studied for scalar fields invariant under global and gauged U(1) symmetries. We generalize this framework to include a Proca mass for the gauge boson, which can arise either from spontaneous symmetry breaking or via the Stückelberg mechanism. A heavy (light) gauge boson leads to solitons reminiscent of the global (gauged) case, but for intermediate values these Proca solitons exhibit completely novel features such as disconnected regions of viable parameter space and Q-shells with unbounded radius. We provide numerical solutions and excellent analytic approximations for both Proca Q-balls and Q-shells. These allow us to not only demonstrate the novel features numerically, but also understand and predict their origin analytically.
△ Less
Submitted 13 October, 2021; v1 submitted 21 July, 2021;
originally announced July 2021.
-
A tutorial on individualized treatment effect prediction from randomized trials with a binary endpoint
Authors:
J Hoogland,
J IntHout,
M Belias,
MM Rovers,
RD Riley,
FE Harrell Jr,
KGM Moons,
TPA Debray,
JB Reitsma
Abstract:
Randomized trials typically estimate average relative treatment effects, but decisions on the benefit of a treatment are possibly better informed by more individualized predictions of the absolute treatment effect. In case of a binary outcome, these predictions of absolute individualized treatment effect require knowledge of the individual's risk without treatment and incorporation of a possibly d…
▽ More
Randomized trials typically estimate average relative treatment effects, but decisions on the benefit of a treatment are possibly better informed by more individualized predictions of the absolute treatment effect. In case of a binary outcome, these predictions of absolute individualized treatment effect require knowledge of the individual's risk without treatment and incorporation of a possibly differential treatment effect (i.e. varying with patient characteristics). In this paper we lay out the causal structure of individualized treatment effect in terms of potential outcomes and describe the required assumptions that underlie a causal interpretation of its prediction. Subsequently, we describe regression models and model estimation techniques that can be used to move from average to more individualized treatment effect predictions. We focus mainly on logistic regression-based methods that are both well-known and naturally provide the required probabilistic estimates. We incorporate key components from both causal inference and prediction research to arrive at individualized treatment effect predictions. While the separate components are well known, their successful amalgamation is very much an ongoing field of research. We cut the problem down to its essentials in the setting of a randomized trial, discuss the importance of a clear definition of the estimand of interest, provide insight into the required assumptions, and give guidance with respect to modeling and estimation options. Simulated data illustrates the potential of different modeling options across scenarios that vary both average treatment effect and treatment effect heterogeneity. Two applied examples illustrate individualized treatment effect prediction in randomized trial data.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
Room Clearance with Feudal Hierarchical Reinforcement Learning
Authors:
Henry Charlesworth,
Adrian Millea,
Eddie Pottrill,
Rich Riley
Abstract:
Reinforcement learning (RL) is a general framework that allows systems to learn autonomously through trial-and-error interaction with their environment. In recent years combining RL with expressive, high-capacity neural network models has led to impressive performance in a diverse range of domains. However, dealing with the large state and action spaces often required for problems in the real worl…
▽ More
Reinforcement learning (RL) is a general framework that allows systems to learn autonomously through trial-and-error interaction with their environment. In recent years combining RL with expressive, high-capacity neural network models has led to impressive performance in a diverse range of domains. However, dealing with the large state and action spaces often required for problems in the real world still remains a significant challenge. In this paper we introduce a new simulation environment, "Gambit", designed as a tool to build scenarios that can drive RL research in a direction useful for military analysis. Using this environment we focus on an abstracted and simplified room clearance scenario, where a team of blue agents have to make their way through a building and ensure that all rooms are cleared of (and remain clear) of enemy red agents. We implement a multi-agent version of feudal hierarchical RL that introduces a command hierarchy where a commander at the higher level sends orders to multiple agents at the lower level who simply have to learn to follow these orders. We find that breaking the task down in this way allows us to solve a number of non-trivial floorplans that require the coordination of multiple agents much more efficiently than the standard baseline RL algorithms we compare with. We then go on to explore how qualitatively different behaviour can emerge depending on what we prioritise in the agent's reward function (e.g. clearing the building quickly vs. prioritising rescuing civilians).
△ Less
Submitted 24 May, 2021;
originally announced May 2021.
-
Solving Quadratic and Cubic Diophantine Equations using 2-adic Valuation Trees
Authors:
Maila Brucal-Hallare,
Eva G. Goedhart,
Ryan Max Riley,
Vaishavi Sharma,
Bianca Thompson
Abstract:
For fixed integers $D \geq 0$ and $c \geq 3$, we demonstrate how to use $2$-adic valuation trees of sequences to analyze Diophantine equations of the form $x^2+D=2^cy$ and $x^3+D=2^cy$, for $y$ odd. Further, we show for what values $D \in \mathbb{Z}^+$, the numbers $x^3+D$ will generate infinite valuation trees, which lead to infinite solutions to the above Diophantine equations.
For fixed integers $D \geq 0$ and $c \geq 3$, we demonstrate how to use $2$-adic valuation trees of sequences to analyze Diophantine equations of the form $x^2+D=2^cy$ and $x^3+D=2^cy$, for $y$ odd. Further, we show for what values $D \in \mathbb{Z}^+$, the numbers $x^3+D$ will generate infinite valuation trees, which lead to infinite solutions to the above Diophantine equations.
△ Less
Submitted 7 May, 2021;
originally announced May 2021.
-
Mapping Gauged Q-Balls
Authors:
Julian Heeck,
Arvind Rajaraman,
Rebecca Riley,
Christopher B. Verhaaren
Abstract:
Scalar field theories with particular U(1)-symmetric potentials contain non-topological soliton solutions called Q-balls. Promoting the U(1) to a gauge symmetry leads to the more complicated situation of gauged Q-balls. The soliton solutions to the resulting set of nonlinear differential equations have markedly different properties, such as a maximal possible size and charge. Despite these differe…
▽ More
Scalar field theories with particular U(1)-symmetric potentials contain non-topological soliton solutions called Q-balls. Promoting the U(1) to a gauge symmetry leads to the more complicated situation of gauged Q-balls. The soliton solutions to the resulting set of nonlinear differential equations have markedly different properties, such as a maximal possible size and charge. Despite these differences, we discover a relation that allows one to extract the properties of gauged Q-balls (such as the radius, charge, and energy) from the more easily obtained properties of global Q-balls. These results provide a new guide to understanding gauged Q-balls as well as providing simple and accurate analytical characterization of the Q-ball properties.
△ Less
Submitted 13 June, 2023; v1 submitted 11 March, 2021;
originally announced March 2021.
-
Understanding Q-Balls Beyond the Thin-Wall Limit
Authors:
Julian Heeck,
Arvind Rajaraman,
Rebecca Riley,
Christopher B. Verhaaren
Abstract:
Complex scalar fields charged under a global U(1) symmetry can admit non-topological soliton configurations called Q-balls which are stable against decay into individual particles or smaller Q-balls. These Q-balls are interesting objects within quantum field theory, but are also of phenomenological interest in several cosmological and astrophysical contexts. The Q-ball profiles are determined by a…
▽ More
Complex scalar fields charged under a global U(1) symmetry can admit non-topological soliton configurations called Q-balls which are stable against decay into individual particles or smaller Q-balls. These Q-balls are interesting objects within quantum field theory, but are also of phenomenological interest in several cosmological and astrophysical contexts. The Q-ball profiles are determined by a nonlinear differential equation, and so generally require solution by numerical methods. In this work, we derive analytical approximations for the Q-ball profile in a polynomial potential and obtain simple expressions for the important Q-ball properties of charge, energy, and radius. These results improve significantly on the often-used thin-wall approximation and make it possible to describe Q-balls to excellent precision without having to solve the underlying differential equation.
△ Less
Submitted 13 September, 2021; v1 submitted 17 September, 2020;
originally announced September 2020.
-
A regression-based method for detecting publication bias in multivariate meta-analysis
Authors:
Chuan Hong,
Jing Zhang,
Yang Li,
Elena Elia,
Richard Riley,
Yong Chen
Abstract:
Publication bias occurs when the publication of research results depends not only on the quality of the research but also on its nature and direction. The consequence is that published studies may not be truly representative of all valid studies undertaken, and this bias may threaten the validity of systematic reviews and meta-analyses - on which evidence-based medicine increasingly relies. Multiv…
▽ More
Publication bias occurs when the publication of research results depends not only on the quality of the research but also on its nature and direction. The consequence is that published studies may not be truly representative of all valid studies undertaken, and this bias may threaten the validity of systematic reviews and meta-analyses - on which evidence-based medicine increasingly relies. Multivariate meta-analysis has recently received increasing attention for its ability reducing potential bias and improving statistical efficiency by borrowing information across outcomes. However, detecting and accounting for publication bias are more challenging in multivariate meta-analysis setting because some studies may be completely unpublished whereas some studies may selectively report part of multiple outcomes. In this paper, we propose a score test for jointly testing publication bias for multiple outcomes, which is novel to the multivariate setting. The proposed test is a natural multivariate extension of the univariate Egger's test, and can handle the above mentioned scenarios simultaneously, It accounts for correlations among multivariate outcomes, while allowing different types of outcomes, and can borrow information across outcomes. The proposed test is shown to be more powerful than the Egger's test, Begg's test and Trim and Fill method through simulation studies. Two data analyses are given to illustrate the performance of the proposed test in practice.
△ Less
Submitted 11 February, 2020;
originally announced February 2020.
-
Clinical Prediction Models to Predict the Risk of Multiple Binary Outcomes: a comparison of approaches
Authors:
Glen P. Martin,
Matthew Sperrin,
Kym I. E. Snell,
Iain Buchan,
Richard D. Riley
Abstract:
Clinical prediction models (CPMs) are used to predict clinically relevant outcomes or events. Typically, prognostic CPMs are derived to predict the risk of a single future outcome. However, with rising emphasis on the prediction of multi-morbidity, there is growing need for CPMs to simultaneously predict risks for each of multiple future outcomes. A common approach to multi-outcome risk prediction…
▽ More
Clinical prediction models (CPMs) are used to predict clinically relevant outcomes or events. Typically, prognostic CPMs are derived to predict the risk of a single future outcome. However, with rising emphasis on the prediction of multi-morbidity, there is growing need for CPMs to simultaneously predict risks for each of multiple future outcomes. A common approach to multi-outcome risk prediction is to derive a CPM for each outcome separately, then multiply the predicted risks. This approach is only valid if the outcomes are conditionally independent given the covariates, and it fails to exploit the potential relationships between the outcomes. This paper outlines several approaches that could be used to develop prognostic CPMs for multiple outcomes. We consider four methods, ranging in complexity and assumed conditional independence assumptions: namely, probabilistic classifier chain, multinomial logistic regression, multivariate logistic regression, and a Bayesian probit model. These are compared with methods that rely on conditional independence: separate univariate CPMs and stacked regression. Employing a simulation study and real-world example via the MIMIC-III database, we illustrate that CPMs for joint risk prediction of multiple outcomes should only be derived using methods that model the residual correlation between outcomes. In such a situation, our results suggest that probabilistic classification chains, multinomial logistic regression or the Bayesian probit model are all appropriate choices. We call into question the development of CPMs for each outcome in isolation when multiple correlated or structurally related outcomes are of interest and recommend more holistic risk prediction.
△ Less
Submitted 21 January, 2020;
originally announced January 2020.
-
Population-Induced Phase Transitions and the Verification of Chemical Reaction Networks
Authors:
James I. Lathrop,
Jack H. Lutz,
Robyn R. Lutz,
Hugh D. Potter,
Matthew R. Riley
Abstract:
We show that very simple molecular systems, modeled as chemical reaction networks, can have behaviors that exhibit dramatic phase transitions at certain population thresholds. Moreover, the magnitudes of these thresholds can thwart attempts to use simulation, model checking, or approximation by differential equations to formally verify the behaviors of such systems at realistic populations. We sho…
▽ More
We show that very simple molecular systems, modeled as chemical reaction networks, can have behaviors that exhibit dramatic phase transitions at certain population thresholds. Moreover, the magnitudes of these thresholds can thwart attempts to use simulation, model checking, or approximation by differential equations to formally verify the behaviors of such systems at realistic populations. We show how formal theorem provers can successfully verify some such systems at populations where other verification methods fail.
△ Less
Submitted 1 June, 2020; v1 submitted 11 September, 2019;
originally announced September 2019.
-
A general route to form topologically-protected surface and bulk Dirac fermions along high-symmetry lines
Authors:
O. J. Clark,
F. Mazzola,
I. Marković,
J. R. Riley,
B. -J. Yang,
K. Sumida,
T. Okuda,
J. Fujii,
I. Vobornik,
T. K. Kim,
K. Okawa,
T. Sasagawa,
M. S. Bahramy,
P. D. C. King
Abstract:
The band inversions that generate the topologically non-trivial band gaps of topological insulators and the isolated Dirac touching points of three-dimensional Dirac semimetals generally arise from the crossings of electronic states derived from different orbital manifolds. Recently, the concept of single orbital-manifold band inversions occurring along high-symmetry lines has been demonstrated, s…
▽ More
The band inversions that generate the topologically non-trivial band gaps of topological insulators and the isolated Dirac touching points of three-dimensional Dirac semimetals generally arise from the crossings of electronic states derived from different orbital manifolds. Recently, the concept of single orbital-manifold band inversions occurring along high-symmetry lines has been demonstrated, stabilising multiple bulk and surface Dirac fermions. Here, we discuss the underlying ingredients necessary to achieve such phases, and discuss their existence within the family of transition metal dichalcogenides. We show how their three-dimensional band structures naturally produce only small $k_z$ projected band gaps, and demonstrate how these play a significant role in shaping the surface electronic structure of these materials. We demonstrate, through spin- and angle-resolved photoemission and density functional theory calculations, how the surface electronic structures of the group-X TMDs PtSe$_2$ and PdTe$_2$ are host to up to five distinct surface states, each with complex band dispersions and spin textures. Finally, we discuss how the origin of several recently-realised instances of topological phenomena in systems outside of the TMDs, including the iron-based superconductors, can be understood as a consequence of the same underlying mechanism driving $k_z$-mediated band inversions in the TMDs.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Robustness and Games Against Nature in Molecular Programming
Authors:
Jack H. Lutz,
Neil Lutz,
Robyn R. Lutz,
Matthew R. Riley
Abstract:
Matter, especially DNA, is now programmed to carry out useful processes at the nanoscale. As these programs and processes become more complex and their envisioned safety-critical applications approach deployment, it is essential to develop methods for engineering trustworthiness into molecular programs. Some of this can be achieved by adapting existing software engineering methods, but molecular p…
▽ More
Matter, especially DNA, is now programmed to carry out useful processes at the nanoscale. As these programs and processes become more complex and their envisioned safety-critical applications approach deployment, it is essential to develop methods for engineering trustworthiness into molecular programs. Some of this can be achieved by adapting existing software engineering methods, but molecular programming also presents new challenges that will require new methods. This paper presents a method for dealing with one such challenge, namely, the difficulty of ascertaining how robust a molecular program is to perturbations of the relative "clock speeds" of its various reactions. The method proposed here is game-theoretic. The robustness of a molecular program is quantified in terms of its ability to win (achieve its original objective) in games against other molecular programs that manipulate its relative clock speeds. This game-theoretic approach is general enough to quantify the security of a molecular program against malicious manipulations of its relative clock speeds. However, this preliminary report focuses on games against nature, games in which the molecular program's opponent perturbs clock speeds randomly (indifferently) according to the probabilities inherent in chemical kinetics.
△ Less
Submitted 16 February, 2019;
originally announced February 2019.
-
The $τ$ Magnetic Dipole Moment at Future Lepton Colliders
Authors:
Jessica N. Howard,
Arvind Rajaraman,
Rebecca Riley,
Tim M. P. Tait
Abstract:
The magnetic moment of the $τ$ lepton is an interesting quantity that is potentially sensitive to physics beyond the Standard Model. Electroweak gauge invariance implies that a heavy new physics contribution to it takes the form of an operator which involves the Higgs boson, implying that rare Higgs decays are able to probe the same physics as $a_τ$. We examine the prospects for rare Higgs decays…
▽ More
The magnetic moment of the $τ$ lepton is an interesting quantity that is potentially sensitive to physics beyond the Standard Model. Electroweak gauge invariance implies that a heavy new physics contribution to it takes the form of an operator which involves the Higgs boson, implying that rare Higgs decays are able to probe the same physics as $a_τ$. We examine the prospects for rare Higgs decays at future high energy lepton (electron or muon) colliders, and find that such a project collecting a few ab$^{-1}$ would be able to advance our understanding of this physics by roughly a factor of 10 compared to the expected reach of the high luminosity LHC.
△ Less
Submitted 22 October, 2018;
originally announced October 2018.
-
Testing small study effects in multivariate meta-analysis
Authors:
Chuan Hong,
Georgia Salanti,
Sally Morton,
Richard Riley,
Haitao Chu,
Stephen E. Kimmel,
Yong Chen
Abstract:
Small study effects occur when smaller studies show different, often larger, treatment effects than large ones, which may threaten the validity of systematic reviews and meta-analyses. The most well-known reasons for small study effects include publication bias, outcome reporting bias and clinical heterogeneity. Methods to account for small study effects in univariate meta-analysis have been exten…
▽ More
Small study effects occur when smaller studies show different, often larger, treatment effects than large ones, which may threaten the validity of systematic reviews and meta-analyses. The most well-known reasons for small study effects include publication bias, outcome reporting bias and clinical heterogeneity. Methods to account for small study effects in univariate meta-analysis have been extensively studied. However, detecting small study effects in a multivariate meta-analysis setting remains an untouched research area. One of the complications is that different types of selection processes can be involved in the reporting of multivariate outcomes. For example, some studies may be completely unpublished while others may selectively report multiple outcomes. In this paper, we propose a score test as an overall test of small study effects in multivariate meta-analysis. Two detailed case studies are given to demonstrate the advantage of the proposed test over various naive applications of univariate tests in practice. Through simulation studies, the proposed test is found to retain nominal Type I error with considerable power in moderate sample size settings. Finally, we also evaluate the concordance between the proposed test with the naive application of univariate tests by evaluating 44 systematic reviews with multiple outcomes from the Cochrane Database.
△ Less
Submitted 24 May, 2018;
originally announced May 2018.
-
Exploring the Urban - Rural Incarceration Divide: Drivers of Local Jail Incarceration Rates in the U.S
Authors:
Rachael Weiss Riley,
Jacob Kang-Brown,
Chris Mulligan,
Vinod Valsalam,
Soumyo Chakraborty,
Christian Henrichson
Abstract:
As the rate of incarceration in the United States continues to grow, a large body of research has been primarily focused on understanding the determinants and drivers of federal and state prison growth. However, local jail systems, with 11 million admissions each year, have generated less research attention even though they have a far broader impact on communities. Preliminary time trend analysis…
▽ More
As the rate of incarceration in the United States continues to grow, a large body of research has been primarily focused on understanding the determinants and drivers of federal and state prison growth. However, local jail systems, with 11 million admissions each year, have generated less research attention even though they have a far broader impact on communities. Preliminary time trend analysis conducted by the Vera Institute of Justice (Vera) uncovered disparities in county jail incarceration rates by geography. Contrary to assumptions that incarceration is an urban phenomenon, Vera discovered that during the past few decades, pretrial jail rates have declined in many urban areas whereas rates have grown or remained flat in rural counties. In an effort to uncover the factors contributing to continued jail growth in rural areas, Vera joined forces with Two Sigma's Data Clinic, a volunteer-based program that leverages employees' data science expertise. Using county jail data from 2000 - 2013 and county-specific demographic, political, socioeconomic, jail and prison population variables, a generalized estimating equations (GEE) model was specified to account for correlations within counties over time. The results revealed that county-level poverty, police expenditures, and spillover effects from other county and state authorities are all significant predictors of local jail rates. In addition, geographic investigation of model residuals revealed clusters of counties where observed rates were much higher (and much lower) than expected conditioned upon county variables.
△ Less
Submitted 6 October, 2017;
originally announced October 2017.
-
A matrix-based method of moments for fitting multivariate network meta-analysis models with multiple outcomes and random inconsistency effects
Authors:
Dan Jackson,
Sylwia Bujkiewicz,
Martin Law,
Richard D Riley,
Ian White
Abstract:
Random-effects meta-analyses are very commonly used in medical statistics. Recent methodological developments include multivariate (multiple outcomes) and network (multiple treatments) meta-analysis. Here we provide a new model and corresponding estimation procedure for multivariate network meta-analysis, so that multiple outcomes and treatments can be included in a single analysis. Our new multiv…
▽ More
Random-effects meta-analyses are very commonly used in medical statistics. Recent methodological developments include multivariate (multiple outcomes) and network (multiple treatments) meta-analysis. Here we provide a new model and corresponding estimation procedure for multivariate network meta-analysis, so that multiple outcomes and treatments can be included in a single analysis. Our new multivariate model is a direct extension of a univariate model for network meta-analysis that has recently been proposed. We allow two types of unknown variance parameters in our model, which represent between-study heterogeneity and inconsistency. Inconsistency arises when different forms of direct and indirect evidence are not in agreement, even having taken between-study heterogeneity into account. However the consistency assumption is often assumed in practice and so we also explain how to fit a reduced model which makes this assumption. Our estimation method extends several other commonly used methods for meta-analysis, including the method proposed by DerSimonian and Laird (1986). We investigate the use of our proposed methods in the context of a real example.
△ Less
Submitted 25 May, 2017;
originally announced May 2017.
-
DroidNative: Semantic-Based Detection of Android Native Code Malware
Authors:
Shahid Alam,
Zhengyang Qu,
Ryan Riley,
Yan Chen,
Vaibhav Rastogi
Abstract:
According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively ~99% on the Android platform. Malware writers are applying stealthy mutations (obfuscations) to create malware variants, thwarting detection by signature based detectors. In addition, the plethora of more sophisticated detectors making use of static analysis…
▽ More
According to the Symantec and F-Secure threat reports, mobile malware development in 2013 and 2014 has continued to focus almost exclusively ~99% on the Android platform. Malware writers are applying stealthy mutations (obfuscations) to create malware variants, thwarting detection by signature based detectors. In addition, the plethora of more sophisticated detectors making use of static analysis techniques to detect such variants operate only at the bytecode level, meaning that malware embedded in native code goes undetected. A recent study shows that 86% of the most popular Android applications contain native code, making this a plausible threat. This paper proposes DroidNative, an Android malware detector that uses specific control flow patterns to reduce the effect of obfuscations, provides automation and platform independence, and as far as we know is the first system that operates at the Android native code level, allowing it to detect malware embedded in both native code and bytecode. When tested with traditional malware variants it achieves a detection rate (DR) of 99.48%, compared to academic and commercial tools' DRs that range from 8.33% -- 93.22%. When tested with a dataset of 2240 samples DroidNative achieves a DR of 99.16%, a false positive rate of 0.4% and an average detection time of 26.87 sec/sample.
△ Less
Submitted 21 February, 2016; v1 submitted 15 February, 2016;
originally announced February 2016.
-
Taming the hydra: the word problem and extreme integer compression
Authors:
W. Dison,
E. Einstein,
T. R. Riley
Abstract:
For a finitely presented group, the word problem asks for an algorithm which declares whether or not words on the generators represent the identity. The Dehn function is a complexity measure of a direct attack on the word problem by applying the defining relations. Dison & Riley showed that a "hydra phenomenon" gives rise to novel groups with extremely fast growing (Ackermannian) Dehn functions. H…
▽ More
For a finitely presented group, the word problem asks for an algorithm which declares whether or not words on the generators represent the identity. The Dehn function is a complexity measure of a direct attack on the word problem by applying the defining relations. Dison & Riley showed that a "hydra phenomenon" gives rise to novel groups with extremely fast growing (Ackermannian) Dehn functions. Here we show that nevertheless, there are efficient (polynomial time) solutions to the word problems of these groups. Our main innovation is a means of computing efficiently with enormous integers which are represented in compressed forms by strings of Ackermann functions.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.
-
Palindromic width of wreath products, metabelian groups, and max-n solvable groups
Authors:
T. R. Riley,
A. W. Sale
Abstract:
A group has finite palindromic width if there exists $n$ such that every element can be expressed as a product of $n$ or fewer palindromic words. We show that if $G$ has finite palindromic width with respect to some generating set, then so does $G \wr \mathbb{Z}^{r}$. We also give a new, self-contained, proof that finitely generated metabelian groups have finite palindromic width. Finally, we show…
▽ More
A group has finite palindromic width if there exists $n$ such that every element can be expressed as a product of $n$ or fewer palindromic words. We show that if $G$ has finite palindromic width with respect to some generating set, then so does $G \wr \mathbb{Z}^{r}$. We also give a new, self-contained, proof that finitely generated metabelian groups have finite palindromic width. Finally, we show that solvable groups satisfying the maximal condition on normal subgroups (max-n) have finite palindromic width.
△ Less
Submitted 12 September, 2014; v1 submitted 18 July, 2013;
originally announced July 2013.
-
A personal account of the discovery of hyperbolic structures on some knot complements
Authors:
Robert Riley
Abstract:
I give my view of the early history of the discovery of hyperbolic structures on knot complements from my early work on representations of knot groups into matrix groups to my meeting with William Thurston in 1976. (This article was written by Robert Riley about ten years before his death in 2000 and never submitted for publication. An explanation of why it is being published now and some informat…
▽ More
I give my view of the early history of the discovery of hyperbolic structures on knot complements from my early work on representations of knot groups into matrix groups to my meeting with William Thurston in 1976. (This article was written by Robert Riley about ten years before his death in 2000 and never submitted for publication. An explanation of why it is being published now and some information about Riley and this article is given in the article by Brin, Jones and Singerman which accompanies this article in this issue of the [journal | arxiv].)
△ Less
Submitted 19 January, 2013;
originally announced January 2013.
-
Epimorphisms between 2-bridge link groups
Authors:
Tomotada Ohtsuki,
Robert Riley,
Makoto Sakuma
Abstract:
We give a systematic construction of epimorphisms between 2-bridge link groups. Moreover, we show that 2-bridge links having such an epimorphism between their link groups are related by a map between the ambient spaces which only have a certain specific kind of singularity. We show applications of these epimorphisms to the character varieties for 2-bridge links and pi_1-dominating maps among 3-m…
▽ More
We give a systematic construction of epimorphisms between 2-bridge link groups. Moreover, we show that 2-bridge links having such an epimorphism between their link groups are related by a map between the ambient spaces which only have a certain specific kind of singularity. We show applications of these epimorphisms to the character varieties for 2-bridge links and pi_1-dominating maps among 3-manifolds.
△ Less
Submitted 12 April, 2009;
originally announced April 2009.
-
An isoperimetric function for Stallings' group
Authors:
Will Dison,
Murray Elder,
Timothy R Riley
Abstract:
We prove that $n^{7/3}$ is an isoperimetric function for a group of Stallings that is finitely presented but not of type $\mathcal{F}_3$. Note: The authors with Robert Young have now proved a quadratic Dehn function for this group. See arXiv:0712.3877
We prove that $n^{7/3}$ is an isoperimetric function for a group of Stallings that is finitely presented but not of type $\mathcal{F}_3$. Note: The authors with Robert Young have now proved a quadratic Dehn function for this group. See arXiv:0712.3877
△ Less
Submitted 27 November, 2008; v1 submitted 5 December, 2006;
originally announced December 2006.
-
Filling functions
Authors:
T. R. Riley
Abstract:
Filling functions are asymptotic invariants of finitely presentable groups; the seminal work on the subject is by M.Gromov. They record features of combinatorial homotopy discs (van Kampen diagrams) filling loops in Cayley 2-complexes. Examples are the Dehn (or isoperimetric) function, the filling length function and the intrinsic diameter (or isodiametric) function. We discuss filling functions…
▽ More
Filling functions are asymptotic invariants of finitely presentable groups; the seminal work on the subject is by M.Gromov. They record features of combinatorial homotopy discs (van Kampen diagrams) filling loops in Cayley 2-complexes. Examples are the Dehn (or isoperimetric) function, the filling length function and the intrinsic diameter (or isodiametric) function. We discuss filling functions from geometric, combinatorial and computational points of view, we survey their interrelationships, and we sketch their roles in the studies of nilpotent groups, hyperbolic groups and asymptotic cones. Many open questions are included.
This is a set of notes for a workshop on "The Geometry of the Word Problem" at the Centre de Recerca Matematica, Barcelona in July 2005. It will be part of a Birkhauser-Verlag volume in the "Advanced Courses in Mathematics CRM Barcelona" series.
△ Less
Submitted 23 June, 2006; v1 submitted 2 March, 2006;
originally announced March 2006.
-
Free and fragmenting filling length
Authors:
M. R. Bridson,
T. R. Riley
Abstract:
The filling length of an edge-circuit ηin the Cayley 2-complex of a finite presentation of a group is the least integer L such that there is a combinatorial null-homotopy of ηdown to a base point through loops of length at most L. We introduce similar notions in which the null-homotopy is not required to fix a basepoint, and in which the contracting loop is allowed to bifurcate. We exhibit group…
▽ More
The filling length of an edge-circuit ηin the Cayley 2-complex of a finite presentation of a group is the least integer L such that there is a combinatorial null-homotopy of ηdown to a base point through loops of length at most L. We introduce similar notions in which the null-homotopy is not required to fix a basepoint, and in which the contracting loop is allowed to bifurcate. We exhibit groups in which the resulting filling invariants exhibit dramatically different behaviour to the standard notion of filling length. We also define the corresponding filling invariants for Riemannian manifolds and translate our results to this setting.
△ Less
Submitted 18 May, 2006; v1 submitted 7 December, 2005;
originally announced December 2005.
-
The absence of efficient dual pairs of spanning trees in planar graphs
Authors:
T. R. Riley,
W. P. Thurston
Abstract:
A spanning tree T in a finite planar connected graph G determines a dual spanning tree T* in the dual graph G such that T and T* do not intersect. We show that it is not always possible to find T in G, such that the diameters of T and T* are both within a uniform multiplicative constant (independent of G) of the diameters of their ambient graphs.
A spanning tree T in a finite planar connected graph G determines a dual spanning tree T* in the dual graph G such that T and T* do not intersect. We show that it is not always possible to find T in G, such that the diameters of T and T* are both within a uniform multiplicative constant (independent of G) of the diameters of their ambient graphs.
△ Less
Submitted 7 September, 2006; v1 submitted 19 November, 2005;
originally announced November 2005.
-
Extrinsic versus intrinsic diameter for Riemannian filling-discs and van Kampen diagrams
Authors:
M. R. Bridson,
T. R. Riley
Abstract:
The diameter of a disc filling a loop in the universal covering of a Riemannian manifold may be measured extrinsically using the distance function on the ambient space or intrinsically using the induced length metric on the disc. Correspondingly, the diameter of a van Kampen diagram filling a word that represents the identity in a finitely presented group can either be measured intrinsically its…
▽ More
The diameter of a disc filling a loop in the universal covering of a Riemannian manifold may be measured extrinsically using the distance function on the ambient space or intrinsically using the induced length metric on the disc. Correspondingly, the diameter of a van Kampen diagram filling a word that represents the identity in a finitely presented group can either be measured intrinsically its 1-skeleton or extrinsically in the Cayley graph of the group. We construct the first examples of closed manifolds and finitely presented groups for which this choice -- intrinsic versus extrinsic -- gives rise to qualitatively different min-diameter filling functions.
△ Less
Submitted 27 June, 2009; v1 submitted 31 October, 2005;
originally announced November 2005.
-
The unbounded dead-end depth property is not a group invariant
Authors:
Tim R. Riley,
Andrew D. Warshall
Abstract:
The dead-end depth of an element g of a group with finite generating set A is the distance from g to the complement of the radius d(1,g) closed ball, in the word metric d associated to A. We exhibit a finitely presented group K with two finite generating sets A and B such that dead-end depth is unbounded on K with respect to A but is at most two with respect to B.
The dead-end depth of an element g of a group with finite generating set A is the distance from g to the complement of the radius d(1,g) closed ball, in the word metric d associated to A. We exhibit a finitely presented group K with two finite generating sets A and B such that dead-end depth is unbounded on K with respect to A but is at most two with respect to B.
△ Less
Submitted 12 September, 2005; v1 submitted 6 April, 2005;
originally announced April 2005.
-
Navigating in the Cayley graphs of SL_N(Z) and SL_N(F_p)
Authors:
T. R. Riley
Abstract:
We give a non-deterministic algorithm that expresses elements of SL_N(Z), for N > 2, as words in a finite set of generators, with the length of these words at most a constant times the word metric. We show that the non-deterministic time-complexity of the subtractive version of Euclid's algorithm for finding the greatest common divisor of N > 2 integers a_1,..., a_N is at most a constant times N…
▽ More
We give a non-deterministic algorithm that expresses elements of SL_N(Z), for N > 2, as words in a finite set of generators, with the length of these words at most a constant times the word metric. We show that the non-deterministic time-complexity of the subtractive version of Euclid's algorithm for finding the greatest common divisor of N > 2 integers a_1,..., a_N is at most a constant times N log n where n := max {|a_1|,..., |a_N|}. This leads to an elementary proof that for N > 2 the word metric in SL_N(Z) is biLipschitz equivalent to the logarithm of the matrix norm -- an instance of a theorem of Mozes, Lubotzky and Raghunathan. And we show constructively that there exists K>0 such that for all N > 2 and primes p, the diameter of the Cayley graph of SL_N(F_p) with respect to the generating set {e_{ij} \mid i \neq j} is at most K N^2 \log p.
△ Less
Submitted 6 April, 2005;
originally announced April 2005.
-
Diameters of Cayley graphs of SL_n(Z/kZ)
Authors:
M. Kassabov,
T. R. Riley
Abstract:
We show that for integers k > 1 and n > 2, the diameter of the Cayley graph of SL_n(Z/kZ) associated to a standard two-element generating set, is at most a constant times n^2 ln k. This answers a question of A. Lubotzky concerning SL_n(F_p) and is unexpected because these Cayley graphs do not form an expander family. Our proof amounts to a quick algorithm for finding short words representing ele…
▽ More
We show that for integers k > 1 and n > 2, the diameter of the Cayley graph of SL_n(Z/kZ) associated to a standard two-element generating set, is at most a constant times n^2 ln k. This answers a question of A. Lubotzky concerning SL_n(F_p) and is unexpected because these Cayley graphs do not form an expander family. Our proof amounts to a quick algorithm for finding short words representing elements of SL_n(Z/kZ).
△ Less
Submitted 11 February, 2005;
originally announced February 2005.
-
A finitely presented group with unbounded dead-end depth
Authors:
Sean Cleary,
Tim R. Riley
Abstract:
The dead-end depth of an element g of a group G, with respect to a generating set A is the distance from g to the complement of the radius $d_A(1,g)$ closed ball, in the word metric $d_A$ defined with respect to A. We exhibit a finitely presented group G with a finite generating set with respect to which there is no upper bound on the dead-end depth of elements.
The authors regret that the pub…
▽ More
The dead-end depth of an element g of a group G, with respect to a generating set A is the distance from g to the complement of the radius $d_A(1,g)$ closed ball, in the word metric $d_A$ defined with respect to A. We exhibit a finitely presented group G with a finite generating set with respect to which there is no upper bound on the dead-end depth of elements.
The authors regret that the published version of this article (Proc. Amer. Math. Soc., 134(2), pp.343-349, 2006) contains a significant error concerning the model for G described in Section 2. We are grateful to Jorg Lehnert for pointing out our mistake. In this corrected version, that model has been overhauled, and that has necessitated a number of changes in the subsequent arguments.
△ Less
Submitted 10 April, 2007; v1 submitted 22 June, 2004;
originally announced June 2004.
-
Isoperimetric inequalities for nilpotent groups
Authors:
S. M. Gersten,
D. F. Holt,
T. R. Riley
Abstract:
We prove that every finitely generated nilpotent group of class c admits a polynomial isoperimetric function of degree c+1 and a linear upper bound on its filling length function.
We prove that every finitely generated nilpotent group of class c admits a polynomial isoperimetric function of degree c+1 and a linear upper bound on its filling length function.
△ Less
Submitted 28 January, 2002;
originally announced January 2002.