-
Efficient Search in Graph Edit Distance: Metric Search Trees vs. Brute Force Verification
Authors:
Wenqi Marshall Guo,
Jeffrey Uhlmann
Abstract:
This report evaluates the efficiency of Graph Edit Distance (GED) computation for graph similarity search, comparing Cascading Metric Trees (CMT) with brute-force verification. Despite the anticipated advantages of CMT, our findings indicate it does not consistently outperform brute-force methods in speed. The study, based on graph data from PubChem, suggests that the computational complexity of G…
▽ More
This report evaluates the efficiency of Graph Edit Distance (GED) computation for graph similarity search, comparing Cascading Metric Trees (CMT) with brute-force verification. Despite the anticipated advantages of CMT, our findings indicate it does not consistently outperform brute-force methods in speed. The study, based on graph data from PubChem, suggests that the computational complexity of GED-based GSS remains a challenge.
△ Less
Submitted 15 March, 2024;
originally announced May 2024.
-
Rank-Preference Consistency as the Appropriate Metric for Recommender Systems
Authors:
Tung Nguyen,
Jeffrey Uhlmann
Abstract:
In this paper we argue that conventional unitary-invariant measures of recommender system (RS) performance based on measuring differences between predicted ratings and actual user ratings fail to assess fundamental RS properties. More specifically, posing the optimization problem as one of predicting exact user ratings provides only an indirect suboptimal approximation for what RS applications typ…
▽ More
In this paper we argue that conventional unitary-invariant measures of recommender system (RS) performance based on measuring differences between predicted ratings and actual user ratings fail to assess fundamental RS properties. More specifically, posing the optimization problem as one of predicting exact user ratings provides only an indirect suboptimal approximation for what RS applications typically need, which is an ability to accurately predict user preferences. We argue that scalar measures such as RMSE and MAE with respect to differences between actual and predicted ratings are only proxies for measuring RS ability to accurately estimate user preferences. We propose what we consider to be a measure that is more fundamentally appropriate for assessing RS performance, rank-preference consistency, which simply counts the number of prediction pairs that are inconsistent with the user's expressed product preferences. For example, if an RS predicts the user will prefer product A over product B, but the user's withheld ratings indicate s/he prefers product B over A, then rank-preference consistency has been violated. Our test results conclusively demonstrate that methods tailored to optimize arbitrary measures such as RMSE are not generally effective at accurately predicting user preferences. Thus, we conclude that conventional methods used for assessing RS performance are arbitrary and misleading.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Optimal Structured Matrix Approximation for Robustness to Incomplete Biosequence Data
Authors:
Chris Salahub,
Jeffrey Uhlmann
Abstract:
We propose a general method for optimally approximating an arbitrary matrix $\mathbf{M}$ by a structured matrix $\mathbf{T}$ (circulant, Toeplitz/Hankel, etc.) and examine its use for estimating the spectra of genomic linkage disequilibrium matrices. This application is prototypical of a variety of genomic and proteomic problems that demand robustness to incomplete biosequence information. We perf…
▽ More
We propose a general method for optimally approximating an arbitrary matrix $\mathbf{M}$ by a structured matrix $\mathbf{T}$ (circulant, Toeplitz/Hankel, etc.) and examine its use for estimating the spectra of genomic linkage disequilibrium matrices. This application is prototypical of a variety of genomic and proteomic problems that demand robustness to incomplete biosequence information. We perform a simulation study and corroborative test of our method using real genomic data from the Mouse Genome Database. The results confirm the predicted utility of the method and provide strong evidence of its potential value to a wide range of bioinformatics applications. Our optimal general matrix approximation method is expected to be of independent interest to an even broader range of applications in applied mathematics and engineering.
△ Less
Submitted 7 September, 2024; v1 submitted 23 October, 2023;
originally announced October 2023.
-
Partial Proof of a Conjecture with Implications for Spectral Majorization
Authors:
Jeffrey Uhlmann
Abstract:
In this paper we report on new results relating to a conjecture regarding properties of $n\times n$, $n\leq 6$, positive definite matrices. The conjecture has been proven for $n\leq 4$ using computer-assisted sum of squares (SoS) methods for proving polynomial nonnegativity. Based on these proven cases, we report on the recent identification of a new family of matrices with the property that their…
▽ More
In this paper we report on new results relating to a conjecture regarding properties of $n\times n$, $n\leq 6$, positive definite matrices. The conjecture has been proven for $n\leq 4$ using computer-assisted sum of squares (SoS) methods for proving polynomial nonnegativity. Based on these proven cases, we report on the recent identification of a new family of matrices with the property that their diagonals majorize their spectrum. We then present new results showing that this family can extended via Kronecker composition to $n>6$ while retaining the special majorization property. We conclude with general considerations on the future of computer-assisted and AI-based proofs.
△ Less
Submitted 3 September, 2023;
originally announced September 2023.
-
Achieving Unit-Consistent Pseudo-Inverse-based Path-Planning for Redundant Incommensurate Robotic Manipulators
Authors:
Jacket Demby's,
Jeffrey Uhlmann,
Guilherme N. DeSouza
Abstract:
In this paper, we review and compare several velocity-level and acceleration-level Pseudo-Inverse-based Path Planning (PPP) and Pseudo-Inverse-based Repetitive Motion Planning (PRMP) schemes based on the kinematic model of robotic manipulators. We show that without unit consistency in the pseudo-inverse computation, path planning of incommensurate robotic manipulators will fail. Also, we investiga…
▽ More
In this paper, we review and compare several velocity-level and acceleration-level Pseudo-Inverse-based Path Planning (PPP) and Pseudo-Inverse-based Repetitive Motion Planning (PRMP) schemes based on the kinematic model of robotic manipulators. We show that without unit consistency in the pseudo-inverse computation, path planning of incommensurate robotic manipulators will fail. Also, we investigated the robustness and noise tolerance of six PPP and PRMP schemes in the literature against various noise types (i.e. zero, constant, time-varying and random noises). We compared the simulated results using two redundant robotic manipulators: a 3DoF (2RP), and a 7DoF (2RP4R). These experimental results demonstrate that the improper Generalized Inverse (GI) with arbitrary selection of unit and/or in the presence of noise can lead to unexpected behavior of the robot, while producing wrong instantaneous outputs in the task space, which results in distortions and/or failures in the execution of the planned path. Finally, we propose and demonstrate the efficacy of the Mixed Inverse (MX) as the proper GI to achieve unit-consistency in path planning.
△ Less
Submitted 5 August, 2023;
originally announced August 2023.
-
Choosing the Correct Generalized Inverse for the Numerical Solution of the Inverse Kinematics of Incommensurate Robotic Manipulators
Authors:
Jacket Demby's,
Jeffrey Uhlmann,
Guilherme N. DeSouza
Abstract:
Numerical methods for Inverse Kinematics (IK) employ iterative, linear approximations of the IK until the end-effector is brought from its initial pose to the desired final pose. These methods require the computation of the Jacobian of the Forward Kinematics (FK) and its inverse in the linear approximation of the IK. Despite all the successful implementations reported in the literature, Jacobian-b…
▽ More
Numerical methods for Inverse Kinematics (IK) employ iterative, linear approximations of the IK until the end-effector is brought from its initial pose to the desired final pose. These methods require the computation of the Jacobian of the Forward Kinematics (FK) and its inverse in the linear approximation of the IK. Despite all the successful implementations reported in the literature, Jacobian-based IK methods can still fail to preserve certain useful properties if an improper matrix inverse, e.g. Moore-Penrose (MP), is employed for incommensurate robotic systems. In this paper, we propose a systematic, robust and accurate numerical solution for the IK problem using the Mixed (MX) Generalized Inverse (GI) applied to any type of Jacobians (e.g., analytical, numerical or geometric) derived for any commensurate and incommensurate robot. This approach is robust to whether the system is under-determined (less than 6 DoF) or over-determined (more than 6 DoF). We investigate six robotics manipulators with various Degrees of Freedom (DoF) to demonstrate that commonly used GI's fail to guarantee the same system behaviors when the units are varied for incommensurate robotics manipulators. In addition, we evaluate the proposed methodology as a global IK solver and compare against well-known IK methods for redundant manipulators. Based on the experimental results, we conclude that the right choice of GI is crucial in preserving certain properties of the system (i.e. unit-consistency).
△ Less
Submitted 5 August, 2023;
originally announced August 2023.
-
An Admissible Shift-Consistent Method for Recommender Systems
Authors:
Tung Nguyen,
Jeffrey Uhlmann
Abstract:
In this paper, we propose a new constraint, called shift-consistency, for solving matrix/tensor completion problems in the context of recommender systems. Our method provably guarantees several key mathematical properties: (1) satisfies a recently established admissibility criterion for recommender systems; (2) satisfies a definition of fairness that eliminates a specific class of potential opport…
▽ More
In this paper, we propose a new constraint, called shift-consistency, for solving matrix/tensor completion problems in the context of recommender systems. Our method provably guarantees several key mathematical properties: (1) satisfies a recently established admissibility criterion for recommender systems; (2) satisfies a definition of fairness that eliminates a specific class of potential opportunities for users to maliciously influence system recommendations; and (3) offers robustness by exploiting provable uniqueness of missing-value imputation. We provide a rigorous mathematical description of the method, including its generalization from matrix to tensor form to permit representation and exploitation of complex structural relationships among sets of user and product attributes. We argue that our analysis suggests a structured means for defining latent-space projections that can permit provable performance properties to be established for machine learning methods.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
Imposing Consistency Properties on Blackbox Systems with Applications to SVD-Based Recommender Systems
Authors:
Tung Nguyen,
Jeffrey Uhlmann
Abstract:
In this paper we discuss pre- and post-processing methods to induce desired consistency and/or invariance properties in blackbox systems, e.g., AI-based. We demonstrate our approach in the context of blackbox SVD-based matrix-completion methods commonly used in recommender system (RS) applications. We provide empirical results showing that enforcement of unit-consistency and shift-consistency, whi…
▽ More
In this paper we discuss pre- and post-processing methods to induce desired consistency and/or invariance properties in blackbox systems, e.g., AI-based. We demonstrate our approach in the context of blackbox SVD-based matrix-completion methods commonly used in recommender system (RS) applications. We provide empirical results showing that enforcement of unit-consistency and shift-consistency, which have provable RS-relevant properties relating to robustness and fairness, also lead to improved performance according to generic RMSE and MAE performance metrics, irrespective of the initial chosen hyperparameter.
△ Less
Submitted 17 July, 2023;
originally announced July 2023.
-
Metric Search for Rank List Compatibility Matching with Applications
Authors:
Wenqi Guo,
Jeffrey Uhlmann
Abstract:
As online dating has become more popular in the past few years, an efficient and effective algorithm to match users is needed. In this project, we proposed a new dating matching algorithm that uses Kendall-Tau distance to measure the similarity between users based on their ranking for items in a list. (e.g., their favourite sports, music, etc.) To increase the performance of the search process, we…
▽ More
As online dating has become more popular in the past few years, an efficient and effective algorithm to match users is needed. In this project, we proposed a new dating matching algorithm that uses Kendall-Tau distance to measure the similarity between users based on their ranking for items in a list. (e.g., their favourite sports, music, etc.) To increase the performance of the search process, we applied a tree-based searching structure, Cascading Metric Tree (CMT), on this metric. The tree is built on ranked lists from all the users; when a query target and a radius are provided, our algorithm can return users within the radius of the target. We tested the scaling of this searching method on a synthetic dataset by varying list length, population size, and query radius. We observed that the algorithm is able to query the best matching people for the user in a practical time, given reasonable parameters. We also provided potential future improvements that can be made to this algorithm based on the limitations. Finally, we offered more use cases of this search structure on Kendall-Tau distance and new insight into real-world applications of distance search structures.
△ Less
Submitted 10 August, 2023; v1 submitted 13 March, 2023;
originally announced March 2023.
-
A Simple and Scalable Tensor Completion Algorithm via Latent Invariant Constraint for Recommendation System
Authors:
Tung Nguyen,
Sang T. Truong,
Jeffrey Uhlmann
Abstract:
In this paper we provide a latent-variable formulation and solution to the recommender system (RS) problem in terms of a fundamental property that any reasonable solution should be expected to satisfy. Specifically, we examine a novel tensor completion method to efficiently and accurately learn parameters of a model for the unobservable personal preferences that underly user ratings. By regularizi…
▽ More
In this paper we provide a latent-variable formulation and solution to the recommender system (RS) problem in terms of a fundamental property that any reasonable solution should be expected to satisfy. Specifically, we examine a novel tensor completion method to efficiently and accurately learn parameters of a model for the unobservable personal preferences that underly user ratings. By regularizing the tensor decomposition with a single latent invariant, we achieve three properties for a reliable recommender system: (1) uniqueness of the tensor completion result with minimal assumptions, (2) unit consistency that is independent of arbitrary preferences of users, and (3) a consensus ordering guarantee that provides consistent ranking between observed and unobserved rating scores. Our algorithm leads to a simple and elegant recommendation framework that has linear computational complexity and with no hyperparameter tuning. We provide empirical results demonstrating that the approach significantly outperforms current state-of-the-art methods.
△ Less
Submitted 3 July, 2022; v1 submitted 27 June, 2022;
originally announced June 2022.
-
Tensor Completion with Provable Consistency and Fairness Guarantees for Recommender Systems
Authors:
Tung Nguyen,
Jeffrey Uhlmann
Abstract:
We introduce a new consistency-based approach for defining and solving nonnegative/positive matrix and tensor completion problems. The novelty of the framework is that instead of artificially making the problem well-posed in the form of an application-arbitrary optimization problem, e.g., minimizing a bulk structural measure such as rank or norm, we show that a single property/constraint: preservi…
▽ More
We introduce a new consistency-based approach for defining and solving nonnegative/positive matrix and tensor completion problems. The novelty of the framework is that instead of artificially making the problem well-posed in the form of an application-arbitrary optimization problem, e.g., minimizing a bulk structural measure such as rank or norm, we show that a single property/constraint: preserving unit-scale consistency, guarantees the existence of both a solution and, under relatively weak support assumptions, uniqueness. The framework and solution algorithms also generalize directly to tensors of arbitrary dimensions while maintaining computational complexity that is linear in problem size for fixed dimension d. In the context of recommender system (RS) applications, we prove that two reasonable properties that should be expected to hold for any solution to the RS problem are sufficient to permit uniqueness guarantees to be established within our framework. This is remarkable because it obviates the need for heuristic-based statistical or AI methods despite what appear to be distinctly human/subjective variables at the heart of the problem. Key theoretical contributions include a general unit-consistent tensor-completion framework with proofs of its properties, e.g., consensus-order and fairness, and algorithms with optimal runtime and space complexities, e.g., O(1) term-completion with preprocessing complexity that is linear in the number of known terms of the matrix/tensor. From a practical perspective, the seamless ability of the framework to generalize to exploit high-dimensional structural relationships among key state variables, e.g., user and product attributes, offers a means for extracting significantly more information than is possible for alternative methods that cannot generalize beyond direct user-product relationships.
△ Less
Submitted 17 October, 2023; v1 submitted 4 April, 2022;
originally announced April 2022.
-
The Cascading Metric Tree
Authors:
Jeffrey Uhlmann,
Miguel R. Zuniga
Abstract:
This paper presents the Cascaded Metric Tree (CMT) for efficient satisfaction of metric search queries over a dataset of N objects. It provides extra information that permits query algorithms to exploit all distance calculations performed along each path in the tree for pruning purposes. In addition to improving standard metric range (ball) query algorithms, we present a new algorithm for exploiti…
▽ More
This paper presents the Cascaded Metric Tree (CMT) for efficient satisfaction of metric search queries over a dataset of N objects. It provides extra information that permits query algorithms to exploit all distance calculations performed along each path in the tree for pruning purposes. In addition to improving standard metric range (ball) query algorithms, we present a new algorithm for exploiting the CMT cascaded information to achieve near-optimal performance for k-nearest neighbor (kNN) queries. We demonstrate the performance advantage of CMT over classical metric search structures on synthetic datasets of up to 10 million objects and on the 564K Swiss-Prot protein sequence dataset containing over $200$ million amino acids. As a supplement to the paper, we provide reference implementations of the empirically-examined algorithms to encourage improvements and further applications of CMT to practical scientific and engineering problems
△ Less
Submitted 20 December, 2021;
originally announced December 2021.
-
Sensory Modality Mapping for Game Adaptation and Design
Authors:
Jeffrey Uhlmann
Abstract:
In this paper we examine methods for taking game-related information provided in one sensory modality and transforming it to another sensor modality in order to more effectively accommodate sensory-constrained players. We then consider methods for the adaptation and design of games for which gameplay interactions are constrained to a subset of sensory modalities in ways that preserve a common leve…
▽ More
In this paper we examine methods for taking game-related information provided in one sensory modality and transforming it to another sensor modality in order to more effectively accommodate sensory-constrained players. We then consider methods for the adaptation and design of games for which gameplay interactions are constrained to a subset of sensory modalities in ways that preserve a common level of novelty-of-experience for players with different sensory capabilities. It is hoped that improved shared experiences can promote interactions among a more diverse spectrum of players.
△ Less
Submitted 17 June, 2021;
originally announced June 2021.
-
Covapixels
Authors:
Jeffrey Uhlmann
Abstract:
We propose and discuss the summarization of superpixel-type image tiles/patches using mean and covariance information. We refer to the resulting objects as covapixels.
We propose and discuss the summarization of superpixel-type image tiles/patches using mean and covariance information. We refer to the resulting objects as covapixels.
△ Less
Submitted 18 October, 2020;
originally announced October 2020.
-
Access-Adaptive Priority Search Tree
Authors:
Haley Massa,
Jeffrey Uhlmann
Abstract:
In this paper we introduce the notion of explicit worst-case bounded adaptive algorithms for applications with fixed process-completion requirements. Such applications demand that a process be guaranteed to complete within an established time interval while adaptively reducing computational overhead during that interval, e.g., so as to reduce total energy usage. Our principal contribution is the a…
▽ More
In this paper we introduce the notion of explicit worst-case bounded adaptive algorithms for applications with fixed process-completion requirements. Such applications demand that a process be guaranteed to complete within an established time interval while adaptively reducing computational overhead during that interval, e.g., so as to reduce total energy usage. Our principal contribution is the access-adaptive priority search tree (AAPST), which can provide efficient distribution-sensitive performance comparable to the splay tree, but do so within strict - and O(logn) optimal - worst-case per-query bounds. More specifically, while the splay tree is conjectured to offer optimal adaptive amortized query complexity, it may require O(n) for individual queries, whereas the AAPST offers competitive distribution-sensitive performance with strict O(logn) time complexity. This makes the AAPST more suitable for certain interactive (e.g., online and real-time) applications such as space system modules with reliability constraints involving rigid process-completion time intervals with secondary energy-minimization incentives.
△ Less
Submitted 15 July, 2022; v1 submitted 4 September, 2020;
originally announced September 2020.
-
Gap-Measure Tests with Applications to Data Integrity Verification
Authors:
Truc Le,
Jeffrey Uhlmann
Abstract:
In this paper we propose and examine gap statistics for assessing uniform distribution hypotheses. We provide examples relevant to data integrity testing for which max-gap statistics provide greater sensitivity than chi-square ($χ^2$), thus allowing the new test to be used in place of or as a complement to $χ^2$ testing for purposes of distinguishing a larger class of deviations from uniformity. W…
▽ More
In this paper we propose and examine gap statistics for assessing uniform distribution hypotheses. We provide examples relevant to data integrity testing for which max-gap statistics provide greater sensitivity than chi-square ($χ^2$), thus allowing the new test to be used in place of or as a complement to $χ^2$ testing for purposes of distinguishing a larger class of deviations from uniformity. We establish that the proposed max-gap test has the same sequential and parallel computational complexity as $χ^2$ and thus is applicable for Big Data analytics and integrity verification.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
On Radically Expanding the Landscape of Potential Applications for Automated Proof Methods
Authors:
Jeffrey Uhlmann,
Jie Wang
Abstract:
In this paper we examine the potential of computer-assisted proof methods to be applied much more broadly than commonly recognized. More specifically, we contend that there are vast opportunities to derive useful mathematical results and properties that are extremely narrow in scope, and of practical relevance only to highly-specialized engineering applications, that are presently overlooked becau…
▽ More
In this paper we examine the potential of computer-assisted proof methods to be applied much more broadly than commonly recognized. More specifically, we contend that there are vast opportunities to derive useful mathematical results and properties that are extremely narrow in scope, and of practical relevance only to highly-specialized engineering applications, that are presently overlooked because they have characteristics atypical of those that are conventionally pursued in the areas of pure and applied mathematics. As a concrete example, we demonstrate use of automated methods for certifying polynomial nonnegativity as a part of a dimension-pinning strategy to prove that the inverse of the relative gain array (RGA) of a d-dimensional positive-definite matrix is doubly-stochastic for $d\leq 4$.
△ Less
Submitted 9 December, 2020; v1 submitted 3 June, 2019;
originally announced June 2019.
-
Software Adaptation and Generalization of Physically-Constrained Games
Authors:
Jeffrey Uhlmann
Abstract:
In this paper we provide a case study of the use of relatively sophisticated mathematics and algorithms to redefine and adapt a simple traditional game/puzzle to exploit the computational power of smart devices. The focus here is not so much on the end product as it is on the process and considerations underpinning its development. Ancillary results of the venture include generalizations of the ci…
▽ More
In this paper we provide a case study of the use of relatively sophisticated mathematics and algorithms to redefine and adapt a simple traditional game/puzzle to exploit the computational power of smart devices. The focus here is not so much on the end product as it is on the process and considerations underpinning its development. Ancillary results of the venture include generalizations of the circular-shift operator and examination of its computational complexity.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
A Scale-Consistent Approach for Recommender Systems
Authors:
Jeffrey Uhlmann
Abstract:
In this paper we propose and develop a relatively simple and efficient approach for estimating unknown elements of a user-rating matrix in the context of a recommender system (RS). The critical theoretical property of the method is its consistency with respect to arbitrary units implicitly adopted by different users to construct their quantitative ratings of products. It is argued that this proper…
▽ More
In this paper we propose and develop a relatively simple and efficient approach for estimating unknown elements of a user-rating matrix in the context of a recommender system (RS). The critical theoretical property of the method is its consistency with respect to arbitrary units implicitly adopted by different users to construct their quantitative ratings of products. It is argued that this property is needed for robust performance accuracy across a broad spectrum of RS application domains.
△ Less
Submitted 3 June, 2019; v1 submitted 30 April, 2019;
originally announced May 2019.
-
Considerations on Quantum-Based Methods for Communication Security
Authors:
Jeffrey Uhlmann
Abstract:
In this paper we provide an intuitive-level discussion of the challenges and opportunities offered by quantum-based methods for supporting secure communications, e.g., over a network. The goal is to distill down to the most fundamental issues and concepts in order to provide a clear foundation for assessing the potential value of quantum-based technologies relative to classical alternatives. It is…
▽ More
In this paper we provide an intuitive-level discussion of the challenges and opportunities offered by quantum-based methods for supporting secure communications, e.g., over a network. The goal is to distill down to the most fundamental issues and concepts in order to provide a clear foundation for assessing the potential value of quantum-based technologies relative to classical alternatives. It is hoped that this form of exposition can provide greater clarity of perspective than is typically offered by mathematically-focused treatments of the topic. It is also hoped that this clarity extends to more general applications of quantum information science such as quantum computing and quantum sensing.
△ Less
Submitted 26 August, 2018;
originally announced August 2018.
-
A Generalized Matrix Inverse with Applications to Robotic Systems
Authors:
Bo Zhang,
Jeffrey Uhlmann
Abstract:
It is well-understood that the robustness of mechanical and robotic control systems depends critically on minimizing sensitivity to arbitrary application-specific details whenever possible. For example, if a system is defined and performs well in one particular Euclidean coordinate frame then it should be expected to perform identically if that coordinate frame is arbitrarily rotated or scaled. Si…
▽ More
It is well-understood that the robustness of mechanical and robotic control systems depends critically on minimizing sensitivity to arbitrary application-specific details whenever possible. For example, if a system is defined and performs well in one particular Euclidean coordinate frame then it should be expected to perform identically if that coordinate frame is arbitrarily rotated or scaled. Similarly, the performance of the system should not be affected if its key parameters are all consistently defined in metric units or in imperial units. In this paper we show that a recently introduced generalized matrix inverse permits performance consistency to be rigorously guaranteed in control systems that require solutions to underdetermined and/or overdetermined systems of equations.
△ Less
Submitted 7 May, 2018;
originally announced June 2018.
-
A Canonical Image Set for Examining and Comparing Image Processing Algorithms
Authors:
Jeffrey Uhlmann
Abstract:
The purpose of this paper is to introduce a set of four test images containing features and structures that can facilitate effective examination and comparison of image processing algorithms. More specifically, the images are designed to more explicitly expose the characteristic properties of algorithms for image compression, virtual resolution adjustment, and enhancement. This set was developed a…
▽ More
The purpose of this paper is to introduce a set of four test images containing features and structures that can facilitate effective examination and comparison of image processing algorithms. More specifically, the images are designed to more explicitly expose the characteristic properties of algorithms for image compression, virtual resolution adjustment, and enhancement. This set was developed at the Naval Research Laboratory (NRL) in the late 1990s as a more rigorous alternative to Lena and other images that have come into common use for purely ad hoc reasons with little or no rigorous consideration of their suitability. The increasing number of test images appearing in the literature not only makes it more difficult to compare results from different papers, it also introduces the potential for cherry-picking to influence results. The key contribution of this paper is the proposal to establish {\em some} canonical set to ensure that published results can be analyzed and compared in a rigorous way from one paper to another, and consideration of the four NRL images is proposed for this purpose.
△ Less
Submitted 30 April, 2018;
originally announced May 2018.
-
Entropy Control Architectures for Next-Generation Supercomputers
Authors:
Jeffrey Uhlmann
Abstract:
Position paper for US strategic computing initiative.
Position paper for US strategic computing initiative.
△ Less
Submitted 5 September, 2017;
originally announced September 2017.
-
On the Computation of Fully Proportional Representation
Authors:
Nadja Betzler,
Arkadii Slinko,
Johannes Uhlmann
Abstract:
We investigate two systems of fully proportional representation suggested by Chamberlin Courant and Monroe. Both systems assign a representative to each voter so that the "sum of misrepresentations" is minimized. The winner determination problem for both systems is known to be NP-hard, hence this work aims at investigating whether there are variants of the proposed rules and/or specific electorat…
▽ More
We investigate two systems of fully proportional representation suggested by Chamberlin Courant and Monroe. Both systems assign a representative to each voter so that the "sum of misrepresentations" is minimized. The winner determination problem for both systems is known to be NP-hard, hence this work aims at investigating whether there are variants of the proposed rules and/or specific electorates for which these problems can be solved efficiently. As a variation of these rules, instead of minimizing the sum of misrepresentations, we considered minimizing the maximal misrepresentation introducing effectively two new rules. In the general case these "minimax" versions of classical rules appeared to be still NP-hard. We investigated the parameterized complexity of winner determination of the two classical and two new rules with respect to several parameters. Here we have a mixture of positive and negative results: e.g., we proved fixed-parameter tractability for the parameter the number of candidates but fixed-parameter intractability for the number of winners. For single-peaked electorates our results are overwhelmingly positive: we provide polynomial-time algorithms for most of the considered problems. The only rule that remains NP-hard for single-peaked electorates is the classical Monroe rule.
△ Less
Submitted 3 February, 2014;
originally announced February 2014.