-
Quantum repeaters enhanced by vacuum beam guides
Authors:
Yu Gan,
Mohadeseh Azari,
Nitish Kumar Chandra,
Xin Jin,
Jinglei Cheng,
Kaushik P. Seshadreesan,
Junyu Liu
Abstract:
The development of large-scale quantum communication networks faces critical challenges due to photon loss and decoherence in optical fiber channels. These fundamentally limit transmission distances and demand dense networks of repeater stations. This work investigates using vacuum beam guides (VBGs)-a promising ultra-low-loss transmission platform-as an alternative to traditional fiber links. By…
▽ More
The development of large-scale quantum communication networks faces critical challenges due to photon loss and decoherence in optical fiber channels. These fundamentally limit transmission distances and demand dense networks of repeater stations. This work investigates using vacuum beam guides (VBGs)-a promising ultra-low-loss transmission platform-as an alternative to traditional fiber links. By incorporating VBGs into repeater-based architectures, we demonstrate that the inter-repeater spacing can be substantially extended, resulting in fewer required nodes and significantly reducing hardware and operational complexity. We perform a cost-function analysis to quantify performance trade-offs across first, second, and third-generation repeaters. Our results show that first-generation repeaters reduce costs dramatically by eliminating entanglement purification. Third-generation repeaters benefit from improved link transmission success, which is crucial for quantum error correction. In contrast, second-generation repeaters exhibit a more nuanced response; although transmission loss is reduced, their performance remains primarily limited by logical gate errors rather than channel loss. These findings highlight that while all repeater generations benefit from reduced photon loss, the magnitude of improvement depends critically on the underlying error mechanisms. Vacuum beam guides thus emerge as a powerful enabler for scalable, high-performance quantum networks, particularly in conjunction with near-term quantum hardware capabilities.
△ Less
Submitted 22 April, 2025; v1 submitted 17 April, 2025;
originally announced April 2025.
-
Topo Goes Political: TDA-Based Controversy Detection in Imbalanced Reddit Political Data
Authors:
Arvindh Arun,
Karuna K Chandra,
Akshit Sinha,
Balakumar Velayutham,
Jashn Arora,
Manish Jain,
Ponnurangam Kumaraguru
Abstract:
The detection of controversial content in political discussions on the Internet is a critical challenge in maintaining healthy digital discourse. Unlike much of the existing literature that relies on synthetically balanced data, our work preserves the natural distribution of controversial and non-controversial posts. This real-world imbalance highlights a core challenge that needs to be addressed…
▽ More
The detection of controversial content in political discussions on the Internet is a critical challenge in maintaining healthy digital discourse. Unlike much of the existing literature that relies on synthetically balanced data, our work preserves the natural distribution of controversial and non-controversial posts. This real-world imbalance highlights a core challenge that needs to be addressed for practical deployment. Our study re-evaluates well-established methods for detecting controversial content. We curate our own dataset focusing on the Indian political context that preserves the natural distribution of controversial content, with only 12.9% of the posts in our dataset being controversial. This disparity reflects the true imbalance in real-world political discussions and highlights a critical limitation in the existing evaluation methods. Benchmarking on datasets that model data imbalance is vital for ensuring real-world applicability. Thus, in this work, (i) we release our dataset, with an emphasis on class imbalance, that focuses on the Indian political context, (ii) we evaluate existing methods from this domain on this dataset and demonstrate their limitations in the imbalanced setting, (iii) we introduce an intuitive metric to measure a model's robustness to class imbalance, (iv) we also incorporate ideas from the domain of Topological Data Analysis, specifically Persistent Homology, to curate features that provide richer representations of the data. Furthermore, we benchmark models trained with topological features against established baselines.
△ Less
Submitted 5 March, 2025;
originally announced March 2025.
-
Great Models Think Alike and this Undermines AI Oversight
Authors:
Shashwat Goel,
Joschka Struber,
Ilze Amanda Auzina,
Karuna K Chandra,
Ponnurangam Kumaraguru,
Douwe Kiela,
Ameya Prabhu,
Matthias Bethge,
Jonas Geiping
Abstract:
As Language Model (LM) capabilities advance, evaluating and supervising them at scale is getting harder for humans. There is hope that other language models can automate both these tasks, which we refer to as ''AI Oversight''. We study how model similarity affects both aspects of AI oversight by proposing Chance Adjusted Probabilistic Agreement (CAPA): a metric for LM similarity based on overlap i…
▽ More
As Language Model (LM) capabilities advance, evaluating and supervising them at scale is getting harder for humans. There is hope that other language models can automate both these tasks, which we refer to as ''AI Oversight''. We study how model similarity affects both aspects of AI oversight by proposing Chance Adjusted Probabilistic Agreement (CAPA): a metric for LM similarity based on overlap in model mistakes. Using CAPA, we first show that LLM-as-a-judge scores favor models similar to the judge, generalizing recent self-preference results. Then, we study training on LM annotations, and find complementary knowledge between the weak supervisor and strong student model plays a crucial role in gains from ''weak-to-strong generalization''. As model capabilities increase, it becomes harder to find their mistakes, and we might defer more to AI oversight. However, we observe a concerning trend -- model mistakes are becoming more similar with increasing capabilities, pointing to risks from correlated failures. Our work underscores the importance of reporting and correcting for model similarity, especially in the emerging paradigm of AI oversight.
△ Less
Submitted 12 June, 2025; v1 submitted 6 February, 2025;
originally announced February 2025.
-
A Monocular SLAM-based Multi-User Positioning System with Image Occlusion in Augmented Reality
Authors:
Wei-Hsiang Lien,
Benedictus Kent Chandra,
Robin Fischer,
Ya-Hui Tang,
Shiann-Jang Wang,
Wei-En Hsu,
Li-Chen Fu
Abstract:
In recent years, with the rapid development of augmented reality (AR) technology, there is an increasing demand for multi-user collaborative experiences. Unlike for single-user experiences, ensuring the spatial localization of every user and maintaining synchronization and consistency of positioning and orientation across multiple users is a significant challenge. In this paper, we propose a multi…
▽ More
In recent years, with the rapid development of augmented reality (AR) technology, there is an increasing demand for multi-user collaborative experiences. Unlike for single-user experiences, ensuring the spatial localization of every user and maintaining synchronization and consistency of positioning and orientation across multiple users is a significant challenge. In this paper, we propose a multi-user localization system based on ORB-SLAM2 using monocular RGB images as a development platform based on the Unity 3D game engine. This system not only performs user localization but also places a common virtual object on a planar surface (such as table) in the environment so that every user holds a proper perspective view of the object. These generated virtual objects serve as reference points for multi-user position synchronization. The positioning information is passed among every user's AR devices via a central server, based on which the relative position and movement of other users in the space of a specific user are presented via virtual avatars all with respect to these virtual objects. In addition, we use deep learning techniques to estimate the depth map of an image from a single RGB image to solve occlusion problems in AR applications, making virtual objects appear more natural in AR scenes.
△ Less
Submitted 16 November, 2024;
originally announced November 2024.
-
Multiplexed bi-layered realization of fault-tolerant quantum computation over optically networked trapped-ion modules
Authors:
Nitish K. Chandra,
Saikat Guha,
Kaushik P. Seshadreesan
Abstract:
We study an architecture for fault-tolerant measurement-based quantum computation (FT-MBQC) over optically-networked trapped-ion modules. The architecture is implemented with a finite number of modules and ions per module, and leverages photonic interactions for generating remote entanglement between modules and local Coulomb interactions for intra-modular entangling gates. We focus on generating…
▽ More
We study an architecture for fault-tolerant measurement-based quantum computation (FT-MBQC) over optically-networked trapped-ion modules. The architecture is implemented with a finite number of modules and ions per module, and leverages photonic interactions for generating remote entanglement between modules and local Coulomb interactions for intra-modular entangling gates. We focus on generating the topologically protected Raussendorf-Harrington-Goyal (RHG) lattice cluster state, which is known to be robust against lattice bond failures and qubit noise, with the modules acting as lattice sites. To ensure that the remote entanglement generation rates surpass the bond-failure tolerance threshold of the RHG lattice, we employ spatial and temporal multiplexing. For realistic system timing parameters, we estimate the code cycle time of the RHG lattice and the ion resources required in a bi-layered implementation, where the number of modules matches the number of sites in two lattice layers, and qubits are reinitialized after measurement. For large distances between modules, we incorporate quantum repeaters between sites and analyze the benefits in terms of cumulative resource requirements. Finally, we derive and analyze a qubit noise-tolerance threshold inequality for the RHG lattice generation in the proposed architecture that accounts for noise from various sources. This includes the depolarizing noise arising from the photonically-mediated remote entanglement generation between modules due to finite optical detection efficiency, limited visibility, and the presence of dark clicks, in addition to the noise from imperfect gates and measurements, and memory decoherence with time. Our work thus underscores the hardware and channel threshold requirements to realize distributed FT-MBQC in a leading qubit platform today -- trapped ions.
△ Less
Submitted 13 November, 2024;
originally announced November 2024.
-
Sketching With Your Voice: "Non-Phonorealistic" Rendering of Sounds via Vocal Imitation
Authors:
Matthew Caren,
Kartik Chandra,
Joshua B. Tenenbaum,
Jonathan Ragan-Kelley,
Karima Ma
Abstract:
We present a method for automatically producing human-like vocal imitations of sounds: the equivalent of "sketching," but for auditory rather than visual representation. Starting with a simulated model of the human vocal tract, we first try generating vocal imitations by tuning the model's control parameters to make the synthesized vocalization match the target sound in terms of perceptually-salie…
▽ More
We present a method for automatically producing human-like vocal imitations of sounds: the equivalent of "sketching," but for auditory rather than visual representation. Starting with a simulated model of the human vocal tract, we first try generating vocal imitations by tuning the model's control parameters to make the synthesized vocalization match the target sound in terms of perceptually-salient auditory features. Then, to better match human intuitions, we apply a cognitive theory of communication to take into account how human speakers reason strategically about their listeners. Finally, we show through several experiments and user studies that when we add this type of communicative reasoning to our method, it aligns with human intuitions better than matching auditory features alone does. This observation has broad implications for the study of depiction in computer graphics.
△ Less
Submitted 20 September, 2024;
originally announced September 2024.
-
PIP-Loco: A Proprioceptive Infinite Horizon Planning Framework for Quadrupedal Robot Locomotion
Authors:
Aditya Shirwatkar,
Naman Saxena,
Kishore Chandra,
Shishir Kolathaya
Abstract:
A core strength of Model Predictive Control (MPC) for quadrupedal locomotion has been its ability to enforce constraints and provide interpretability of the sequence of commands over the horizon. However, despite being able to plan, MPC struggles to scale with task complexity, often failing to achieve robust behavior on rapidly changing surfaces. On the other hand, model-free Reinforcement Learnin…
▽ More
A core strength of Model Predictive Control (MPC) for quadrupedal locomotion has been its ability to enforce constraints and provide interpretability of the sequence of commands over the horizon. However, despite being able to plan, MPC struggles to scale with task complexity, often failing to achieve robust behavior on rapidly changing surfaces. On the other hand, model-free Reinforcement Learning (RL) methods have outperformed MPC on multiple terrains, showing emergent motions but inherently lack any ability to handle constraints or perform planning. To address these limitations, we propose a framework that integrates proprioceptive planning with RL, allowing for agile and safe locomotion behaviors through the horizon. Inspired by MPC, we incorporate an internal model that includes a velocity estimator and a Dreamer module. During training, the framework learns an expert policy and an internal model that are co-dependent, facilitating exploration for improved locomotion behaviors. During deployment, the Dreamer module solves an infinite-horizon MPC problem, adapting actions and velocity commands to respect the constraints. We validate the robustness of our training framework through ablation studies on internal model components and demonstrate improved robustness to training noise. Finally, we evaluate our approach across multi-terrain scenarios in both simulation and hardware.
△ Less
Submitted 15 April, 2025; v1 submitted 14 September, 2024;
originally announced September 2024.
-
Building Machines that Learn and Think with People
Authors:
Katherine M. Collins,
Ilia Sucholutsky,
Umang Bhatt,
Kartik Chandra,
Lionel Wong,
Mina Lee,
Cedegao E. Zhang,
Tan Zhi-Xuan,
Mark Ho,
Vikash Mansinghka,
Adrian Weller,
Joshua B. Tenenbaum,
Thomas L. Griffiths
Abstract:
What do we want from machine intelligence? We envision machines that are not just tools for thought, but partners in thought: reasonable, insightful, knowledgeable, reliable, and trustworthy systems that think with us. Current artificial intelligence (AI) systems satisfy some of these criteria, some of the time. In this Perspective, we show how the science of collaborative cognition can be put to…
▽ More
What do we want from machine intelligence? We envision machines that are not just tools for thought, but partners in thought: reasonable, insightful, knowledgeable, reliable, and trustworthy systems that think with us. Current artificial intelligence (AI) systems satisfy some of these criteria, some of the time. In this Perspective, we show how the science of collaborative cognition can be put to work to engineer systems that really can be called ``thought partners,'' systems built to meet our expectations and complement our limitations. We lay out several modes of collaborative thought in which humans and AI thought partners can engage and propose desiderata for human-compatible thought partnerships. Drawing on motifs from computational cognitive science, we motivate an alternative scaling path for the design of thought partners and ecosystems around their use through a Bayesian lens, whereby the partners we construct actively build and reason over models of the human and world.
△ Less
Submitted 21 July, 2024;
originally announced August 2024.
-
WatChat: Explaining perplexing programs by debugging mental models
Authors:
Kartik Chandra,
Katherine M. Collins,
Will Crichton,
Tony Chen,
Tzu-Mao Li,
Adrian Weller,
Rachit Nigam,
Joshua Tenenbaum,
Jonathan Ragan-Kelley
Abstract:
Often, a good explanation for a program's unexpected behavior is a bug in the programmer's code. But sometimes, an even better explanation is a bug in the programmer's mental model of the language or API they are using. Instead of merely debugging our current code ("giving the programmer a fish"), what if our tools could directly debug our mental models ("teaching the programmer to fish")? In this…
▽ More
Often, a good explanation for a program's unexpected behavior is a bug in the programmer's code. But sometimes, an even better explanation is a bug in the programmer's mental model of the language or API they are using. Instead of merely debugging our current code ("giving the programmer a fish"), what if our tools could directly debug our mental models ("teaching the programmer to fish")? In this paper, we apply recent ideas from computational cognitive science to offer a principled framework for doing exactly that. Given a "why?" question about a program, we automatically infer potential misconceptions about the language/API that might cause the user to be surprised by the program's behavior -- and then analyze those misconceptions to provide explanations of the program's behavior. Our key idea is to formally represent misconceptions as counterfactual (erroneous) semantics for the language/API, which can be inferred and debugged using program synthesis techniques. We demonstrate our framework, WatChat, by building systems for explanation in two domains: JavaScript type coercion, and the Git version control system. We evaluate WatChatJS and WatChatGit by comparing their outputs to experimentally-collected human-written explanations in these two domains: we show that WatChat's explanations exhibit key features of human-written explanation, unlike those of a state-of-the-art language model.
△ Less
Submitted 2 October, 2024; v1 submitted 8 March, 2024;
originally announced March 2024.
-
Understanding how social discussion platforms like Reddit are influencing financial behavior
Authors:
Sachin Thukral,
Suyash Sangwan,
Arnab Chatterjee,
Lipika Dey,
Aaditya Agrawal,
Pramit Kumar Chandra,
Animesh Mukherjee
Abstract:
This study proposes content and interaction analysis techniques for a large repository created from social media content. Though we have presented our study for a large platform dedicated to discussions around financial topics, the proposed methods are generic and applicable to all platforms. Along with an extension of topic extraction method using Latent Dirichlet Allocation, we propose a few mea…
▽ More
This study proposes content and interaction analysis techniques for a large repository created from social media content. Though we have presented our study for a large platform dedicated to discussions around financial topics, the proposed methods are generic and applicable to all platforms. Along with an extension of topic extraction method using Latent Dirichlet Allocation, we propose a few measures to assess user participation, influence and topic affinities specifically. Our study also maps user-generated content to components of behavioral finance. While these types of information are usually gathered through surveys, it is obvious that large scale data analysis from social media can reveal many potentially unknown or rare insights. Characterising users based on their platform behavior to provide critical insights about how communities are formed and trust is established in these platforms using graphical analysis is also studied.
△ Less
Submitted 12 March, 2024; v1 submitted 7 March, 2024;
originally announced March 2024.
-
Measuring Social Biases in Masked Language Models by Proxy of Prediction Quality
Authors:
Rahul Zalkikar,
Kanchan Chandra
Abstract:
Transformer language models have achieved state-of-the-art performance for a variety of natural language tasks but have been shown to encode unwanted biases. We evaluate the social biases encoded by transformers trained with the masked language modeling objective using proposed proxy functions within an iterative masking experiment to measure the quality of transformer models' predictions and asse…
▽ More
Transformer language models have achieved state-of-the-art performance for a variety of natural language tasks but have been shown to encode unwanted biases. We evaluate the social biases encoded by transformers trained with the masked language modeling objective using proposed proxy functions within an iterative masking experiment to measure the quality of transformer models' predictions and assess the preference of MLMs towards disadvantaged and advantaged groups. We find all models encode concerning social biases. We compare bias estimations with those produced by other evaluation methods using benchmark datasets and assess their alignment with human annotated biases. We extend previous work by evaluating social biases introduced after retraining an MLM under the masked language modeling objective and find proposed measures produce more accurate and sensitive estimations of biases introduced by retraining MLMs based on relative preference for biased sentences between models, while other methods tend to underestimate biases after retraining on sentences biased towards disadvantaged groups.
△ Less
Submitted 5 February, 2025; v1 submitted 21 February, 2024;
originally announced February 2024.
-
InVA: Integrative Variational Autoencoder for Harmonization of Multi-modal Neuroimaging Data
Authors:
Bowen Lei,
Rajarshi Guhaniyogi,
Krishnendu Chandra,
Aaron Scheffler,
Bani Mallick
Abstract:
There is a significant interest in exploring non-linear associations among multiple images derived from diverse imaging modalities. While there is a growing literature on image-on-image regression to delineate predictive inference of an image based on multiple images, existing approaches have limitations in efficiently borrowing information between multiple imaging modalities in the prediction of…
▽ More
There is a significant interest in exploring non-linear associations among multiple images derived from diverse imaging modalities. While there is a growing literature on image-on-image regression to delineate predictive inference of an image based on multiple images, existing approaches have limitations in efficiently borrowing information between multiple imaging modalities in the prediction of an image. Building on the literature of Variational Auto Encoders (VAEs), this article proposes a novel approach, referred to as Integrative Variational Autoencoder (\texttt{InVA}) method, which borrows information from multiple images obtained from different sources to draw predictive inference of an image. The proposed approach captures complex non-linear association between the outcome image and input images, while allowing rapid computation. Numerical results demonstrate substantial advantages of \texttt{InVA} over VAEs, which typically do not allow borrowing information between input images. The proposed framework offers highly accurate predictive inferences for costly positron emission topography (PET) from multiple measures of cortical structure in human brain scans readily available from magnetic resonance imaging (MRI).
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
How to guess a gradient
Authors:
Utkarsh Singhal,
Brian Cheung,
Kartik Chandra,
Jonathan Ragan-Kelley,
Joshua B. Tenenbaum,
Tomaso A. Poggio,
Stella X. Yu
Abstract:
How much can you say about the gradient of a neural network without computing a loss or knowing the label? This may sound like a strange question: surely the answer is "very little." However, in this paper, we show that gradients are more structured than previously thought. Gradients lie in a predictable low-dimensional subspace which depends on the network architecture and incoming features. Expl…
▽ More
How much can you say about the gradient of a neural network without computing a loss or knowing the label? This may sound like a strange question: surely the answer is "very little." However, in this paper, we show that gradients are more structured than previously thought. Gradients lie in a predictable low-dimensional subspace which depends on the network architecture and incoming features. Exploiting this structure can significantly improve gradient-free optimization schemes based on directional derivatives, which have struggled to scale beyond small networks trained on toy datasets. We study how to narrow the gap in optimization performance between methods that calculate exact gradients and those that use directional derivatives. Furthermore, we highlight new challenges in overcoming the large gap between optimizing with exact gradients and guessing the gradients.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Differentiating Metropolis-Hastings to Optimize Intractable Densities
Authors:
Gaurav Arya,
Ruben Seyer,
Frank Schäfer,
Kartik Chandra,
Alexander K. Lew,
Mathieu Huot,
Vikash K. Mansinghka,
Jonathan Ragan-Kelley,
Christopher Rackauckas,
Moritz Schauer
Abstract:
We develop an algorithm for automatic differentiation of Metropolis-Hastings samplers, allowing us to differentiate through probabilistic inference, even if the model has discrete components within it. Our approach fuses recent advances in stochastic automatic differentiation with traditional Markov chain coupling schemes, providing an unbiased and low-variance gradient estimator. This allows us t…
▽ More
We develop an algorithm for automatic differentiation of Metropolis-Hastings samplers, allowing us to differentiate through probabilistic inference, even if the model has discrete components within it. Our approach fuses recent advances in stochastic automatic differentiation with traditional Markov chain coupling schemes, providing an unbiased and low-variance gradient estimator. This allows us to apply gradient-based optimization to objectives expressed as expectations over intractable target densities. We demonstrate our approach by finding an ambiguous observation in a Gaussian mixture model and by maximizing the specific heat in an Ising model.
△ Less
Submitted 30 June, 2023; v1 submitted 13 June, 2023;
originally announced June 2023.
-
Inferring the Future by Imagining the Past
Authors:
Kartik Chandra,
Tony Chen,
Tzu-Mao Li,
Jonathan Ragan-Kelley,
Josh Tenenbaum
Abstract:
A single panel of a comic book can say a lot: it can depict not only where the characters currently are, but also their motions, their motivations, their emotions, and what they might do next. More generally, humans routinely infer complex sequences of past and future events from a *static snapshot* of a *dynamic scene*, even in situations they have never seen before.
In this paper, we model how…
▽ More
A single panel of a comic book can say a lot: it can depict not only where the characters currently are, but also their motions, their motivations, their emotions, and what they might do next. More generally, humans routinely infer complex sequences of past and future events from a *static snapshot* of a *dynamic scene*, even in situations they have never seen before.
In this paper, we model how humans make such rapid and flexible inferences. Building on a long line of work in cognitive science, we offer a Monte Carlo algorithm whose inferences correlate well with human intuitions in a wide variety of domains, while only using a small, cognitively-plausible number of samples. Our key technical insight is a surprising connection between our inference problem and Monte Carlo path tracing, which allows us to apply decades of ideas from the computer graphics community to this seemingly-unrelated theory of mind task.
△ Less
Submitted 30 October, 2023; v1 submitted 26 May, 2023;
originally announced May 2023.
-
Acting as Inverse Inverse Planning
Authors:
Kartik Chandra,
Tzu-Mao Li,
Josh Tenenbaum,
Jonathan Ragan-Kelley
Abstract:
Great storytellers know how to take us on a journey. They direct characters to act -- not necessarily in the most rational way -- but rather in a way that leads to interesting situations, and ultimately creates an impactful experience for audience members looking on.
If audience experience is what matters most, then can we help artists and animators *directly* craft such experiences, independent…
▽ More
Great storytellers know how to take us on a journey. They direct characters to act -- not necessarily in the most rational way -- but rather in a way that leads to interesting situations, and ultimately creates an impactful experience for audience members looking on.
If audience experience is what matters most, then can we help artists and animators *directly* craft such experiences, independent of the concrete character actions needed to evoke those experiences? In this paper, we offer a novel computational framework for such tools. Our key idea is to optimize animations with respect to *simulated* audience members' experiences. To simulate the audience, we borrow an established principle from cognitive science: that human social intuition can be modeled as "inverse planning," the task of inferring an agent's (hidden) goals from its (observed) actions. Building on this model, we treat storytelling as "*inverse* inverse planning," the task of choosing actions to manipulate an inverse planner's inferences. Our framework is grounded in literary theory, naturally capturing many storytelling elements from first principles. We give a series of examples to demonstrate this, with supporting evidence from human subject studies.
△ Less
Submitted 26 May, 2023;
originally announced May 2023.
-
Designing Perceptual Puzzles by Differentiating Probabilistic Programs
Authors:
Kartik Chandra,
Tzu-Mao Li,
Joshua Tenenbaum,
Jonathan Ragan-Kelley
Abstract:
We design new visual illusions by finding "adversarial examples" for principled models of human perception -- specifically, for probabilistic models, which treat vision as Bayesian inference. To perform this search efficiently, we design a differentiable probabilistic programming language, whose API exposes MCMC inference as a first-class differentiable function. We demonstrate our method by autom…
▽ More
We design new visual illusions by finding "adversarial examples" for principled models of human perception -- specifically, for probabilistic models, which treat vision as Bayesian inference. To perform this search efficiently, we design a differentiable probabilistic programming language, whose API exposes MCMC inference as a first-class differentiable function. We demonstrate our method by automatically creating illusions for three features of human vision: color constancy, size constancy, and face perception.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
Digital Passport and Visa Asset Management Using Private and Permissioned Blockchain
Authors:
Keenu Chandra,
Maroof Mushtaq,
Nalini N
Abstract:
Blockchain is currently one of the fastest-growing technologies in the field of Computer Science. It has found a prevalent use in financial applications like cryptocurrency, for example, Bitcoin and Ethereum. They have been able to bring an unforeseen disruption in the field of finance. However, permissionless Blockchains like these have some downsides, namely the computation cost of the Proof of…
▽ More
Blockchain is currently one of the fastest-growing technologies in the field of Computer Science. It has found a prevalent use in financial applications like cryptocurrency, for example, Bitcoin and Ethereum. They have been able to bring an unforeseen disruption in the field of finance. However, permissionless Blockchains like these have some downsides, namely the computation cost of the Proof of Work algorithm, maximum allowed size for a block, decrease in intelligibility with the increase of the number of blocks in the chain, domination of nodes with higher computing power as miners and validators. These factors have restricted the adoption of permissionless blockchain technology outside the field of finance, such as in medical or legal fields. This paper proposes a solution to these problems using a permissioned blockchain. It does not require a computationally expensive consensus mechanism as permissioned chains call for trust between participating organizations which is achieved via exclusive invitations. We have utilized a third-party orderer to maintain the trust between organizations.
△ Less
Submitted 27 July, 2021; v1 submitted 14 July, 2021;
originally announced July 2021.
-
Gradient Descent: The Ultimate Optimizer
Authors:
Kartik Chandra,
Audrey Xie,
Jonathan Ragan-Kelley,
Erik Meijer
Abstract:
Working with any gradient-based machine learning algorithm involves the tedious task of tuning the optimizer's hyperparameters, such as its step size. Recent work has shown how the step size can itself be optimized alongside the model parameters by manually deriving expressions for "hypergradients" ahead of time.
We show how to automatically compute hypergradients with a simple and elegant modif…
▽ More
Working with any gradient-based machine learning algorithm involves the tedious task of tuning the optimizer's hyperparameters, such as its step size. Recent work has shown how the step size can itself be optimized alongside the model parameters by manually deriving expressions for "hypergradients" ahead of time.
We show how to automatically compute hypergradients with a simple and elegant modification to backpropagation. This allows us to easily apply the method to other optimizers and hyperparameters (e.g. momentum coefficients). We can even recursively apply the method to its own hyper-hyperparameters, and so on ad infinitum. As these towers of optimizers grow taller, they become less sensitive to the initial choice of hyperparameters. We present experiments validating this for MLPs, CNNs, and RNNs. Finally, we provide a simple PyTorch implementation of this algorithm (see people.csail.mit.edu/kach/gradient-descent-the-ultimate-optimizer).
△ Less
Submitted 14 October, 2022; v1 submitted 29 September, 2019;
originally announced September 2019.
-
Adaptive Beamwidth Selection for Contention Based Access Periods in Millimeter Wave WLANs
Authors:
Kishor Chandra,
R. Venkatesha Prasad,
I. G. M. M. Niemegeers,
Abdur R. Biswas
Abstract:
60GHz wireless local area networks (WLANs) standards (e.g., IEEE 802.11ad and IEEE 802.15.3c) employ hybrid MAC protocols consisting of contention based access using CSMA/CA as well as dedicated service periods using time division multiple access (TDMA). To provide the channel access in the contention part of the protocol, quasi omni (QO) antenna patterns are defined which span over the particular…
▽ More
60GHz wireless local area networks (WLANs) standards (e.g., IEEE 802.11ad and IEEE 802.15.3c) employ hybrid MAC protocols consisting of contention based access using CSMA/CA as well as dedicated service periods using time division multiple access (TDMA). To provide the channel access in the contention part of the protocol, quasi omni (QO) antenna patterns are defined which span over the particular spatial directions and cover a limited area around access points. In this paper, we propose an algorithm to determine the beamwidth of each QO level. The proposed algorithm takes into account the spatial distribution of nodes to allocate the beamwidth of each QO level in an adaptive fashion in order to maximizes the channel utilization and satisfy the required link budget criterion. Since the proposed algorithm minimizes the collisions, it also minimizes the average time required to transmit total packets in a QO level. Proposed algorithm improves the average channel utilization up to 20-30% and reduces the time required to transmit total packets up to 40-50% for the given network parameters.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
Performance Analysis of IEEE 802.11ad MAC Protocol
Authors:
Kishor Chandra,
R. Venkatesha Prasad,
Ignas Niemegeers
Abstract:
IEEE 802.11ad specifies a hybrid medium access control (MAC) protocol consisting of contention as well as noncontention-based channel access mechanisms. Further, it also employs directional antennas to compensate for the high freespace path loss observed in 60GHz frequency band. Therefore, it significantly differs from other IEEE 802.11(b/g/n/ac) MAC protocols and thus requires new methods to anal…
▽ More
IEEE 802.11ad specifies a hybrid medium access control (MAC) protocol consisting of contention as well as noncontention-based channel access mechanisms. Further, it also employs directional antennas to compensate for the high freespace path loss observed in 60GHz frequency band. Therefore, it significantly differs from other IEEE 802.11(b/g/n/ac) MAC protocols and thus requires new methods to analyze its performance. In this paper, we propose a new analytical model for performance analysis of IEEE 802.11ad employing a threedimensional Markov chain considering all the features of IEEE 802.11ad medium access mechanisms including the presence of non-contention access and the different number of sectors due to the use of directional antennas. We show that the number of sectors has a high impact on the network throughput. We also show that the MAC packet delay is significantly affected by the duration of the contention period. Our results indicate that a suitable choice of the number of sectors and contention period can illustriously improve the channel utilization and MAC delay performance.
△ Less
Submitted 9 September, 2019;
originally announced September 2019.
-
SPoC: Search-based Pseudocode to Code
Authors:
Sumith Kulal,
Panupong Pasupat,
Kartik Chandra,
Mina Lee,
Oded Padon,
Alex Aiken,
Percy Liang
Abstract:
We consider the task of mapping pseudocode to long programs that are functionally correct. Given test cases as a mechanism to validate programs, we search over the space of possible translations of the pseudocode to find a program that passes the validation. However, without proper credit assignment to localize the sources of program failures, it is difficult to guide search toward more promising…
▽ More
We consider the task of mapping pseudocode to long programs that are functionally correct. Given test cases as a mechanism to validate programs, we search over the space of possible translations of the pseudocode to find a program that passes the validation. However, without proper credit assignment to localize the sources of program failures, it is difficult to guide search toward more promising programs. We propose to perform credit assignment based on signals from compilation errors, which constitute 88.7% of program failures. Concretely, we treat the translation of each pseudocode line as a discrete portion of the program, and whenever a synthesized program fails to compile, an error localization method tries to identify the portion of the program responsible for the failure. We then focus search over alternative translations of the pseudocode for those portions. For evaluation, we collected the SPoC dataset (Search-based Pseudocode to Code) containing 18,356 programs with human-authored pseudocode and test cases. Under a budget of 100 program compilations, performing search improves the synthesis success rate over using the top-one translation of the pseudocode from 25.6% to 44.7%.
△ Less
Submitted 11 June, 2019;
originally announced June 2019.
-
Teaching Programming Concepts by Developing Games
Authors:
Kailash Chandra,
Shyamal Suhana Chandra
Abstract:
Learning to program could possibly be analogous to acquiring expertise in abstract mathematics, which may be boring or dull for a majority of students. Thus, among the countless options to approach learning coding [1-14], acquiring concepts through game creation could possibly be the most enriching experience for students. Consequently, it is important to select a lucid and familiar game for stude…
▽ More
Learning to program could possibly be analogous to acquiring expertise in abstract mathematics, which may be boring or dull for a majority of students. Thus, among the countless options to approach learning coding [1-14], acquiring concepts through game creation could possibly be the most enriching experience for students. Consequently, it is important to select a lucid and familiar game for students. Then, the following step is to choose a language that introduces the basic concepts of object-oriented programming really well. For this paper, we chose the game of Tic-Tac-Toe, which is straight-forward for most people. The programming language chosen here is C++.
△ Less
Submitted 12 March, 2019;
originally announced March 2019.
-
Bonsai: Synthesis-Based Reasoning for Type Systems
Authors:
Kartik Chandra,
Rastislav Bodik
Abstract:
We describe algorithms for symbolic reasoning about executable models of type systems, supporting three queries intended for designers of type systems. First, we check for type soundness bugs and synthesize a counterexample program if such a bug is found. Second, we compare two versions of a type system, synthesizing a program accepted by one but rejected by the other. Third, we minimize the size…
▽ More
We describe algorithms for symbolic reasoning about executable models of type systems, supporting three queries intended for designers of type systems. First, we check for type soundness bugs and synthesize a counterexample program if such a bug is found. Second, we compare two versions of a type system, synthesizing a program accepted by one but rejected by the other. Third, we minimize the size of synthesized counterexample programs.
These algorithms symbolically evaluate typecheckers and interpreters, producing formulas that characterize the set of programs that fail or succeed in the typechecker and the interpreter. However, symbolically evaluating interpreters poses efficiency challenges, which are caused by having to merge execution paths of the various possible input programs. Our main contribution is the Bonsai tree, a novel symbolic representation of programs and program states which addresses these challenges. Bonsai trees encode complex syntactic information in terms of logical constraints, enabling more efficient merging.
We implement these algorithms in the Bonsai tool, an assistant for type system designers. We perform case studies on how Bonsai helps test and explore a variety of type systems. Bonsai efficiently synthesizes counterexamples for soundness bugs that have been inaccessible to automatic tools, and is the first automated tool to find a counterexample for the recently discovered Scala soundness bug SI-9633.
△ Less
Submitted 1 August, 2017;
originally announced August 2017.
-
CogCell: Cognitive Interplay between 60GHz Picocells and 2.4/5GHz Hotspots in the 5G Era
Authors:
Kishor Chandra,
R. Venkatesha Prasad,
Bien Quang,
I. G. M. M. Niemegeers
Abstract:
Rapid proliferation of wireless communication devices and the emergence of a variety of new applications have triggered investigations into next-generation mobile broadband systems, i.e., 5G. Legacy 2G--4G systems covering large areas were envisioned to serve both indoor and outdoor environments. However, in the 5G-era, 80\% of overall traffic is expected to be generated in indoors. Hence, the cur…
▽ More
Rapid proliferation of wireless communication devices and the emergence of a variety of new applications have triggered investigations into next-generation mobile broadband systems, i.e., 5G. Legacy 2G--4G systems covering large areas were envisioned to serve both indoor and outdoor environments. However, in the 5G-era, 80\% of overall traffic is expected to be generated in indoors. Hence, the current approach of macro-cell mobile network, where there is no differentiation between indoors and outdoors, needs to be reconsidered. We envision 60\,GHz mmWave picocell architecture to support high-speed indoor and hotspot communications. We envisage the 5G indoor network as a combination of-, and interplay between, 2.4/5\,GHz having robust coverage and 60\,GHz links offering high datarate. This requires an intelligent coordination and cooperation. We propose 60\,GHz picocellular network architecture, called CogCell, leveraging the ubiquitous WiFi. We propose to use 60\,GHz for the data plane and 2.4/5GHz for the control plane. The hybrid network architecture considers an opportunistic fall-back to 2.4/5\,GHz in case of poor connectivity in the 60\,GHz domain. Further, to avoid the frequent re-beamforming in 60\,GHz directional links due to mobility, we propose a cognitive module -- a sensor-assisted intelligent beam switching procedure -- which reduces the communication overhead. We believe that the CogCell concept will help future indoor communications and possibly outdoor hotspots, where mobile stations and access points collaborate with each other to improve the user experience.
△ Less
Submitted 7 May, 2015;
originally announced May 2015.
-
Sensor Assisted Movement Identification and Prediction for Beamformed 60 GHz Links: A Report
Authors:
A. W. Doff,
Kishor Chandra,
R. Venkatesha Prasad
Abstract:
Large available bandwidth in 60\,GHz band promises very high data rates -- in the order of Gb/s. However, high free-space path loss makes it necessary to employ beamforming capable directional antennas. When beamforming is used, the links are sensitive to misalignment in antenna directionality because of movement of devices. To identify and circumvent the misalignments, we propose to use the motio…
▽ More
Large available bandwidth in 60\,GHz band promises very high data rates -- in the order of Gb/s. However, high free-space path loss makes it necessary to employ beamforming capable directional antennas. When beamforming is used, the links are sensitive to misalignment in antenna directionality because of movement of devices. To identify and circumvent the misalignments, we propose to use the motion sensors (i.e., accelerometer and gyroscope) which are already present in most of the modern mobile devices. By finding the extent of misaligned beams, corrective actions are carried out to reconfigure the antennas. Motion sensors on mobile devices provide means to estimate the extent of misalignments. We collected real data from motion sensors and steer the beams appropriately. The results from our study show that the sensors are capable of detecting the cause of errors as translational or rotational movements. Furthermore it is also shown that the sensor data can be used to predict the next location of the user. This can be used to reconfigure the directional antenna to switch the antenna beam directions and hence avoid frequent link disruptions. This decreases the number of beam searches thus lowering the MAC overhead.
△ Less
Submitted 13 March, 2015; v1 submitted 13 February, 2015;
originally announced February 2015.
-
60 GHz MAC Standardization: Progress and Way Forward
Authors:
Kishor Chandra,
Arjan Doff,
Zizheng Cao,
R. Venkatesha Prasad,
Ignas Niemegeers
Abstract:
Communication at mmWave frequencies has been the focus in the recent years. In this paper, we discuss standardization efforts in 60 GHz short range communication and the progress therein. We compare the available standards in terms of network architecture, medium access control mechanisms, physical layer techniques and several other features. Comparative analysis indicates that IEEE 802.11ad is li…
▽ More
Communication at mmWave frequencies has been the focus in the recent years. In this paper, we discuss standardization efforts in 60 GHz short range communication and the progress therein. We compare the available standards in terms of network architecture, medium access control mechanisms, physical layer techniques and several other features. Comparative analysis indicates that IEEE 802.11ad is likely to lead the short-range indoor communication at 60 GHz. We bring to the fore resolved and unresolved issues pertaining to robust WLAN connectivity at 60 GHz. Further, we discuss the role of mmWave bands in 5G communication scenarios and highlight the further efforts required in terms of research and standardization.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
Improving Entity Resolution with Global Constraints
Authors:
Jim Gemmell,
Benjamin I. P. Rubinstein,
Ashok K. Chandra
Abstract:
Some of the greatest advances in web search have come from leveraging socio-economic properties of online user behavior. Past advances include PageRank, anchor text, hubs-authorities, and TF-IDF. In this paper, we investigate another socio-economic property that, to our knowledge, has not yet been exploited: sites that create lists of entities, such as IMDB and Netflix, have an incentive to avoid…
▽ More
Some of the greatest advances in web search have come from leveraging socio-economic properties of online user behavior. Past advances include PageRank, anchor text, hubs-authorities, and TF-IDF. In this paper, we investigate another socio-economic property that, to our knowledge, has not yet been exploited: sites that create lists of entities, such as IMDB and Netflix, have an incentive to avoid gratuitous duplicates. We leverage this property to resolve entities across the different web sites, and find that we can obtain substantial improvements in resolution accuracy. This improvement in accuracy also translates into robustness, which often reduces the amount of training data that must be labeled for comparing entities across many sites. Furthermore, the technique provides robustness when resolving sites that have some duplicates, even without first removing these duplicates. We present algorithms with very strong precision and recall, and show that max weight matching, while appearing to be a natural choice turns out to have poor performance in some situations. The presented techniques are now being used in the back-end entity resolution system at a major Internet search engine.
△ Less
Submitted 30 August, 2011;
originally announced August 2011.
-
Phase transitions and non-equilibrium relaxation in kinetic models of opinion formation
Authors:
Soumyajyoti Biswas,
Anjan Kumar Chandra,
Arnab Chatterjee,
Bikas K. Chakrabarti
Abstract:
We review in details some recently proposed kinetic models of opinion dynamics. We discuss the several variants including a generalised model. We provide mean field estimates for the critical points, which are numerically supported with reasonable accuracy. Using non-equilibrium relaxation techniques, we also investigate the nature of phase transitions observed in these models. We study the nature…
▽ More
We review in details some recently proposed kinetic models of opinion dynamics. We discuss the several variants including a generalised model. We provide mean field estimates for the critical points, which are numerically supported with reasonable accuracy. Using non-equilibrium relaxation techniques, we also investigate the nature of phase transitions observed in these models. We study the nature of correlations as the critical points are approached, and comment on the universality of the phase transitions observed.
△ Less
Submitted 27 May, 2011; v1 submitted 15 October, 2010;
originally announced October 2010.
-
Coevolution of Glauber-like Ising dynamics on typical networks
Authors:
Kamalika Basu Hajra,
Anjan Kumar Chandra
Abstract:
We consider coevolution of site status and link structures from two different initial networks: a one dimensional Ising chain and a scale free network. The dynamics is governed by a preassigned stability parameter $S$, and a rewiring factor $φ$, that determines whether the Ising spin at the chosen site flips or whether the node gets rewired to another node in the system. This dynamics has also bee…
▽ More
We consider coevolution of site status and link structures from two different initial networks: a one dimensional Ising chain and a scale free network. The dynamics is governed by a preassigned stability parameter $S$, and a rewiring factor $φ$, that determines whether the Ising spin at the chosen site flips or whether the node gets rewired to another node in the system. This dynamics has also been studied with Ising spins distributed randomly among nodes which lie on a network with preferential attachment. We have observed the steady state average stability and magnetisation for both kinds of systems to have an idea about the effect of initial network topology. Although the average stability shows almost similar behaviour, the magnetisation depends on the initial condition we start from. Apart from the local dynamics, the global effect on the dynamics has also been studied. These parameters show interesting variations for different values of $S$ and $φ$, which helps in determining the steady-state condition for a given substrate.
△ Less
Submitted 5 October, 2010;
originally announced October 2010.