-
Modular Surfaces in Lorentz-Minkowski 3-Space: Curvature and Applications
Authors:
Siddharth Panigrahi,
Subham Paul,
Rahul Kumar Singh,
Priyank Vasu
Abstract:
In this paper, we study the relation of the sign of the Gaussian and mean curvature of modular surfaces in Lorentz-Minkowski $3$-space to the zeroes of the associated complex analytic functions and its derivatives. Further, we completely classify zero Gaussian curvature modular surfaces. Next we show non-existence of non-planar maximal modular surfaces, characterize CMC modular surfaces, analyze a…
▽ More
In this paper, we study the relation of the sign of the Gaussian and mean curvature of modular surfaces in Lorentz-Minkowski $3$-space to the zeroes of the associated complex analytic functions and its derivatives. Further, we completely classify zero Gaussian curvature modular surfaces. Next we show non-existence of non-planar maximal modular surfaces, characterize CMC modular surfaces, analyze asymptotic behaviour of Gaussian curvature of complete modular graphs and the Hessian of their height functions and lastly as application, demonstrate how modular surfaces can be realised as integral surfaces of some conformal field theories and non-linear sigma models.
△ Less
Submitted 25 June, 2025;
originally announced June 2025.
-
Decompositions of Scherk-Type Zero Mean Curvature Surfaces
Authors:
Subham Paul,
Priyank Vasu,
Siddharth Panigrahi,
Rahul Kumar Singh
Abstract:
In this paper, by using a special Euler-Ramanujan identity and the idea of Wick rotation, we show that a one-parameter family of solutions to the zero mean curvature equation in Lorentz-Minkowski $3$-space $\mathbb E_1^3$, namely Scherk-type zero mean curvature surfaces, can be expressed as an infinite superposition of dilated helicoids. Further, we also obtain different finite decompositions for…
▽ More
In this paper, by using a special Euler-Ramanujan identity and the idea of Wick rotation, we show that a one-parameter family of solutions to the zero mean curvature equation in Lorentz-Minkowski $3$-space $\mathbb E_1^3$, namely Scherk-type zero mean curvature surfaces, can be expressed as an infinite superposition of dilated helicoids. Further, we also obtain different finite decompositions for these surfaces. We end this paper with an application of these decompositions to formulate maximal codimension 2 surfaces into finite and infinite "sums" of weakly untrapped and *-surfaces in Lorentz-Minkowski 4-space.
△ Less
Submitted 25 June, 2025;
originally announced June 2025.
-
Federated ADMM from Bayesian Duality
Authors:
Thomas Möllenhoff,
Siddharth Swaroop,
Finale Doshi-Velez,
Mohammad Emtiyaz Khan
Abstract:
ADMM is a popular method for federated deep learning which originated in the 1970s and, even though many new variants of it have been proposed since then, its core algorithmic structure has remained unchanged. Here, we take a major departure from the old structure and present a fundamentally new way to derive and extend federated ADMM. We propose to use a structure called Bayesian Duality which ex…
▽ More
ADMM is a popular method for federated deep learning which originated in the 1970s and, even though many new variants of it have been proposed since then, its core algorithmic structure has remained unchanged. Here, we take a major departure from the old structure and present a fundamentally new way to derive and extend federated ADMM. We propose to use a structure called Bayesian Duality which exploits a duality of the posterior distributions obtained by solving a variational-Bayesian reformulation of the original problem. We show that this naturally recovers the original ADMM when isotropic Gaussian posteriors are used, and yields non-trivial extensions for other posterior forms. For instance, full-covariance Gaussians lead to Newton-like variants of ADMM, while diagonal covariances result in a cheap Adam-like variant. This is especially useful to handle heterogeneity in federated deep learning, giving up to 7% accuracy improvements over recent baselines. Our work opens a new Bayesian path to improve primal-dual methods.
△ Less
Submitted 16 June, 2025;
originally announced June 2025.
-
Random Constructions for Sharp Estimates of Mizohata-Takeuchi Type
Authors:
Siddharth Mulherkar
Abstract:
A Mizohata-Takeuchi type estimate is a type of weighted Fourier restriction estimate. Using tools from high dimensional probability, we construct a large class of weights that satisfy sharp estimates of Mizohata-Takeuchi type. One can interpret our result as saying that with high probability, a generic weight satisfies a sharp inequality of Mizohata-Takeuchi type (up to an epsilon-loss).
A Mizohata-Takeuchi type estimate is a type of weighted Fourier restriction estimate. Using tools from high dimensional probability, we construct a large class of weights that satisfy sharp estimates of Mizohata-Takeuchi type. One can interpret our result as saying that with high probability, a generic weight satisfies a sharp inequality of Mizohata-Takeuchi type (up to an epsilon-loss).
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
A condensing approach to multiple shooting neural ordinary differential equation
Authors:
Siddharth Prabhu,
Srinivas Rangarajan,
Mayuresh Kothare
Abstract:
Multiple-shooting is a parameter estimation approach for ordinary differential equations. In this approach, the trajectory is broken into small intervals, each of which can be integrated independently. Equality constraints are then applied to eliminate the shooting gap between the end of the previous trajectory and the start of the next trajectory. Unlike single-shooting, multiple-shooting is more…
▽ More
Multiple-shooting is a parameter estimation approach for ordinary differential equations. In this approach, the trajectory is broken into small intervals, each of which can be integrated independently. Equality constraints are then applied to eliminate the shooting gap between the end of the previous trajectory and the start of the next trajectory. Unlike single-shooting, multiple-shooting is more stable, especially for highly oscillatory and long trajectories. In the context of neural ordinary differential equations, multiple-shooting is not widely used due to the challenge of incorporating general equality constraints. In this work, we propose a condensing-based approach to incorporate these shooting equality constraints while training a multiple-shooting neural ordinary differential equation (MS-NODE) using first-order optimization methods such as Adam.
△ Less
Submitted 31 May, 2025;
originally announced June 2025.
-
Gaps between quadratic forms
Authors:
Siddharth Iyer
Abstract:
Let $\triangle$ denote the integers represented by the quadratic form $x^2+xy+y^2$ and $\square_{2}$ denote the numbers represented as a sum of two squares. For a non-zero integer $a$, let $S(\triangle,\square_{2},a)$ be the set of integers $n$ such that $n \in \triangle$, and $n + a \in \square_{2}$. We conduct a census of $S(\triangle,\square_{2},a)$ in short intervals by showing that there exis…
▽ More
Let $\triangle$ denote the integers represented by the quadratic form $x^2+xy+y^2$ and $\square_{2}$ denote the numbers represented as a sum of two squares. For a non-zero integer $a$, let $S(\triangle,\square_{2},a)$ be the set of integers $n$ such that $n \in \triangle$, and $n + a \in \square_{2}$. We conduct a census of $S(\triangle,\square_{2},a)$ in short intervals by showing that there exists a constant $H_{a} > 0$ with \begin{align*} \# S(\triangle,\square_{2},a)\cap [x,x+H_{a}\cdot x^{5/6}\cdot \log^{19}x] \geq x^{5/6-\varepsilon} \end{align*} for large $x$. To derive this result and its generalization, we utilize a theorem of Tolev (2012) on sums of two squares in arithmetic progressions and analyse the behavior of a multiplicative function found in Blomer, Br{ü}dern \& Dietmann (2009). Our work extends a classical result of Estermann (1932) and builds upon work of M{ü}ller (1989).
△ Less
Submitted 29 May, 2025;
originally announced May 2025.
-
Weakest Bidder Types and New Core-Selecting Combinatorial Auctions
Authors:
Siddharth Prasad,
Maria-Florina Balcan,
Tuomas Sandholm
Abstract:
Core-selecting combinatorial auctions are popular auction designs that constrain prices to eliminate the incentive for any group of bidders -- with the seller -- to renegotiate for a better deal. They help overcome the low-revenue issues of classical combinatorial auctions. We introduce a new class of core-selecting combinatorial auctions that leverage bidder information available to the auction d…
▽ More
Core-selecting combinatorial auctions are popular auction designs that constrain prices to eliminate the incentive for any group of bidders -- with the seller -- to renegotiate for a better deal. They help overcome the low-revenue issues of classical combinatorial auctions. We introduce a new class of core-selecting combinatorial auctions that leverage bidder information available to the auction designer. We model such information through constraints on the joint type space of the bidders -- these are constraints on bidders' private valuations that are known to hold by the auction designer before bids are elicited. First, we show that type space information can overcome the well-known impossibility of incentive-compatible core-selecting combinatorial auctions. We present a revised and generalized version of that impossibility result that depends on how much information is conveyed by the type spaces. We then devise a new family of core-selecting combinatorial auctions and show that they minimize the sum of bidders' incentives to deviate from truthful bidding. We develop new constraint generation techniques -- and build upon existing quadratic programming techniques -- to compute core prices, and conduct experiments to evaluate the incentive, revenue, fairness, and computational merits of our new auctions. Our new core-selecting auctions directly improve upon existing designs that have been used in many high-stakes auctions around the world. We envision that they will be a useful addition to any auction designer's toolkit.
△ Less
Submitted 19 May, 2025;
originally announced May 2025.
-
$O(1/k)$ Finite-Time Bound for Non-Linear Two-Time-Scale Stochastic Approximation
Authors:
Siddharth Chandak
Abstract:
Two-time-scale stochastic approximation is an algorithm with coupled iterations which has found broad applications in reinforcement learning, optimization and game control. While several prior works have obtained a mean square error bound of $O(1/k)$ for linear two-time-scale iterations, the best known bound in the non-linear contractive setting has been $O(1/k^{2/3})$. In this work, we obtain an…
▽ More
Two-time-scale stochastic approximation is an algorithm with coupled iterations which has found broad applications in reinforcement learning, optimization and game control. While several prior works have obtained a mean square error bound of $O(1/k)$ for linear two-time-scale iterations, the best known bound in the non-linear contractive setting has been $O(1/k^{2/3})$. In this work, we obtain an improved bound of $O(1/k)$ for non-linear two-time-scale stochastic approximation. Our result applies to algorithms such as gradient descent-ascent and two-time-scale Lagrangian optimization. The key step in our analysis involves rewriting the original iteration in terms of an averaged noise sequence which decays sufficiently fast. Additionally, we use an induction-based approach to show that the iterates are bounded in expectation.
△ Less
Submitted 27 April, 2025;
originally announced April 2025.
-
Signal Recovery from Random Dot-Product Graphs Under Local Differential Privacy
Authors:
Siddharth Vishwanath,
Jonathan Hehir
Abstract:
We consider the problem of recovering latent information from graphs under $\varepsilon$-edge local differential privacy where the presence of relationships/edges between two users/vertices remains confidential, even from the data curator. For the class of generalized random dot-product graphs, we show that a standard local differential privacy mechanism induces a specific geometric distortion in…
▽ More
We consider the problem of recovering latent information from graphs under $\varepsilon$-edge local differential privacy where the presence of relationships/edges between two users/vertices remains confidential, even from the data curator. For the class of generalized random dot-product graphs, we show that a standard local differential privacy mechanism induces a specific geometric distortion in the latent positions. Leveraging this insight, we show that consistent recovery of the latent positions is achievable by appropriately adjusting the statistical inference procedure for the privatized graph. Furthermore, we prove that our procedure is nearly minimax-optimal under local edge differential privacy constraints. Lastly, we show that this framework allows for consistent recovery of geometric and topological information underlying the latent positions, as encoded in their persistence diagrams. Our results extend previous work from the private community detection literature to a substantially richer class of models and inferential tasks.
△ Less
Submitted 24 April, 2025;
originally announced April 2025.
-
Finite-Time Bounds for Two-Time-Scale Stochastic Approximation with Arbitrary Norm Contractions and Markovian Noise
Authors:
Siddharth Chandak,
Shaan Ul Haque,
Nicholas Bambos
Abstract:
Two-time-scale Stochastic Approximation (SA) is an iterative algorithm with applications in reinforcement learning and optimization. Prior finite time analysis of such algorithms has focused on fixed point iterations with mappings contractive under Euclidean norm. Motivated by applications in reinforcement learning, we give the first mean square bound on non linear two-time-scale SA where the iter…
▽ More
Two-time-scale Stochastic Approximation (SA) is an iterative algorithm with applications in reinforcement learning and optimization. Prior finite time analysis of such algorithms has focused on fixed point iterations with mappings contractive under Euclidean norm. Motivated by applications in reinforcement learning, we give the first mean square bound on non linear two-time-scale SA where the iterations have arbitrary norm contractive mappings and Markovian noise. We show that the mean square error decays at a rate of $O(1/n^{2/3})$ in the general case, and at a rate of $O(1/n)$ in a special case where the slower timescale is noiseless. Our analysis uses the generalized Moreau envelope to handle the arbitrary norm contractions and solutions of Poisson equation to deal with the Markovian noise. By analyzing the SSP Q-Learning algorithm, we give the first $O(1/n)$ bound for an algorithm for asynchronous control of MDPs under the average reward criterion. We also obtain a rate of $O(1/n)$ for Q-Learning with Polyak-averaging and provide an algorithm for learning Generalized Nash Equilibrium (GNE) for strongly monotone games which converges at a rate of $O(1/n^{2/3})$.
△ Less
Submitted 24 March, 2025;
originally announced March 2025.
-
Distribution of $θ-$powers and their sums
Authors:
Siddharth Iyer
Abstract:
We refine a remark of Steinerberger (2024), proving that for $α\in \mathbb{R}$, there exists integers $1 \leq b_{1}, \ldots, b_{k} \leq n$ such that \[ \left\| \sum_{j=1}^k \sqrt{b_j} - α\right\| = O(n^{-γ_k}), \] where $γ_{k} \geq (k-1)/4$, $γ_2 = 1$, and $γ_k = k/2$ for $k = 2^m - 1$. We extend this to higher-order roots.
Building on the Bambah-Chowla theorem, we study gaps in…
▽ More
We refine a remark of Steinerberger (2024), proving that for $α\in \mathbb{R}$, there exists integers $1 \leq b_{1}, \ldots, b_{k} \leq n$ such that \[ \left\| \sum_{j=1}^k \sqrt{b_j} - α\right\| = O(n^{-γ_k}), \] where $γ_{k} \geq (k-1)/4$, $γ_2 = 1$, and $γ_k = k/2$ for $k = 2^m - 1$. We extend this to higher-order roots.
Building on the Bambah-Chowla theorem, we study gaps in $\{x^θ+y^θ: x,y\in \mathbb{N}\cup\{0\}\}$, yielding a modulo one result with $γ_2 = 1$ and bounded gaps for $θ= 3/2$.
Given $ρ(m) \geq 0$ with $\sum_{m=1}^{\infty} ρ(m)/m < \infty$, we show that the number of solutions to \[ \left|\sum_{j=1}^{k} a_j^θ - b\right| \leq \frac{ρ\left(\|(a_1, \dots, a_k)\|_{\infty}\right)}{\|(a_1, \dots, a_k)\|_{\infty}^{k}}, \] in the variables $((a_{j})_{j=1}^{k},b) \in \mathbb{N}^{k+1}$ is finite for almost all $θ>0$. We also identify exceptional values of $θ$, resolving a question of Dubickas (2024), by proving the existence of a transcendental $τ$ for which $\|n^τ\| \leq n^v$ has infinitely many solutions for any $v \in \mathbb{R}$.
△ Less
Submitted 19 March, 2025;
originally announced March 2025.
-
Probabilistic Forecasting for Dynamical Systems with Missing or Imperfect Data
Authors:
Siddharth Rout,
Eldad Haber,
Stéphane Gaudreault
Abstract:
The modeling of dynamical systems is essential in many fields, but applying machine learning techniques is often challenging due to incomplete or noisy data. This study introduces a variant of stochastic interpolation (SI) for probabilistic forecasting, estimating future states as distributions rather than single-point predictions. We explore its mathematical foundations and demonstrate its effect…
▽ More
The modeling of dynamical systems is essential in many fields, but applying machine learning techniques is often challenging due to incomplete or noisy data. This study introduces a variant of stochastic interpolation (SI) for probabilistic forecasting, estimating future states as distributions rather than single-point predictions. We explore its mathematical foundations and demonstrate its effectiveness on various dynamical systems, including the challenging WeatherBench dataset.
△ Less
Submitted 15 March, 2025;
originally announced March 2025.
-
Line Graph Characterization of Cyclic Subgroup Graph
Authors:
Siddharth Malviy,
Vipul Kakkar,
Swapnil Srivastava
Abstract:
The cyclic subgroup graph ${Γ(G)}$ of a group $G$ is the simple undirected graph with cyclic subgroups as a vertex set and two distinct vertices $H_1$ and $H_2$ are adjacent if and only if $H_1 \leq H_2$ and there does not exist any cyclic subgroup $K$ such that $H_1 < K < H_2$. In this paper, we classify all the finite groups $G$ such that $Γ(G)$ is the line graph of some graph.
The cyclic subgroup graph ${Γ(G)}$ of a group $G$ is the simple undirected graph with cyclic subgroups as a vertex set and two distinct vertices $H_1$ and $H_2$ are adjacent if and only if $H_1 \leq H_2$ and there does not exist any cyclic subgroup $K$ such that $H_1 < K < H_2$. In this paper, we classify all the finite groups $G$ such that $Γ(G)$ is the line graph of some graph.
△ Less
Submitted 15 March, 2025;
originally announced March 2025.
-
Classification of Temporal Graphs using Persistent Homology
Authors:
Siddharth Pritam,
Rohit Roy,
Madhav Cherupilil Sajeev
Abstract:
Temporal graphs effectively model dynamic systems by representing interactions as timestamped edges. However, analytical tools for temporal graphs are limited compared to static graphs. We propose a novel method for analyzing temporal graphs using Persistent Homology. Our approach leverages $δ$-temporal motifs (recurrent subgraphs) to capture temporal dynamics %without aggregation
. By evolving…
▽ More
Temporal graphs effectively model dynamic systems by representing interactions as timestamped edges. However, analytical tools for temporal graphs are limited compared to static graphs. We propose a novel method for analyzing temporal graphs using Persistent Homology. Our approach leverages $δ$-temporal motifs (recurrent subgraphs) to capture temporal dynamics %without aggregation
. By evolving these motifs, we define the \textit{average filtration} and compute PH on the associated clique complex. This method captures both local and global temporal structures and is stable with respect to reference models. We demonstrate the applicability of our approach to the temporal graph classification task. Experiments verify the effectiveness of our approach, achieving over 92\% accuracy, with some cases reaching 100\%. Unlike existing methods that require node classes, our approach is node class free, offering flexibility for a wide range of temporal graph analysis.
△ Less
Submitted 14 February, 2025;
originally announced February 2025.
-
HiPoNet: A Multi-View Simplicial Complex Network for High Dimensional Point-Cloud and Single-Cell Data
Authors:
Siddharth Viswanath,
Hiren Madhu,
Dhananjay Bhaskar,
Jake Kovalic,
David R Johnson,
Christopher Tape,
Ian Adelstein,
Rex Ying,
Michael Perlmutter,
Smita Krishnaswamy
Abstract:
In this paper, we propose HiPoNet, an end-to-end differentiable neural network for regression, classification, and representation learning on high-dimensional point clouds. Our work is motivated by single-cell data which can have very high-dimensionality --exceeding the capabilities of existing methods for point clouds which are mostly tailored for 3D data. Moreover, modern single-cell and spatial…
▽ More
In this paper, we propose HiPoNet, an end-to-end differentiable neural network for regression, classification, and representation learning on high-dimensional point clouds. Our work is motivated by single-cell data which can have very high-dimensionality --exceeding the capabilities of existing methods for point clouds which are mostly tailored for 3D data. Moreover, modern single-cell and spatial experiments now yield entire cohorts of datasets (i.e., one data set for every patient), necessitating models that can process large, high-dimensional point-clouds at scale. Most current approaches build a single nearest-neighbor graph, discarding important geometric and topological information. In contrast, HiPoNet models the point-cloud as a set of higher-order simplicial complexes, with each particular complex being created using a reweighting of features. This method thus generates multiple constructs corresponding to different views of high-dimensional data, which in biology offers the possibility of disentangling distinct cellular processes. It then employs simplicial wavelet transforms to extract multiscale features, capturing both local and global topology from each view. We show that geometric and topological information is preserved in this framework both theoretically and empirically. We showcase the utility of HiPoNet on point-cloud level tasks, involving classification and regression of entire point-clouds in data cohorts. Experimentally, we find that HiPoNet outperforms other point-cloud and graph-based models on single-cell data. We also apply HiPoNet to spatial transcriptomics datasets using spatial coordinates as one of the views. Overall, HiPoNet offers a robust and scalable solution for high-dimensional data analysis.
△ Less
Submitted 26 May, 2025; v1 submitted 11 February, 2025;
originally announced February 2025.
-
Minimax Optimality of Classical Scaling Under General Noise Conditions
Authors:
Siddharth Vishwanath,
Ery Arias-Castro
Abstract:
We establish the consistency of classical scaling under a broad class of noise models, encompassing many commonly studied cases in literature. Our approach requires only finite fourth moments of the noise, significantly weakening standard assumptions. We derive convergence rates for classical scaling and establish matching minimax lower bounds, demonstrating that classical scaling achieves minimax…
▽ More
We establish the consistency of classical scaling under a broad class of noise models, encompassing many commonly studied cases in literature. Our approach requires only finite fourth moments of the noise, significantly weakening standard assumptions. We derive convergence rates for classical scaling and establish matching minimax lower bounds, demonstrating that classical scaling achieves minimax optimality in recovering the true configuration even when the input dissimilarities are corrupted by noise.
△ Less
Submitted 2 February, 2025;
originally announced February 2025.
-
Non-Expansive Mappings in Two-Time-Scale Stochastic Approximation: Finite-Time Analysis
Authors:
Siddharth Chandak
Abstract:
Two-time-scale stochastic approximation is an iterative algorithm used in applications such as optimization, reinforcement learning, and control. Finite-time analysis of these algorithms has primarily focused on fixed point iterations where both time-scales have contractive mappings. In this paper, we study two-time-scale iterations, where the slower time-scale has a non-expansive mapping. For suc…
▽ More
Two-time-scale stochastic approximation is an iterative algorithm used in applications such as optimization, reinforcement learning, and control. Finite-time analysis of these algorithms has primarily focused on fixed point iterations where both time-scales have contractive mappings. In this paper, we study two-time-scale iterations, where the slower time-scale has a non-expansive mapping. For such algorithms, the slower time-scale can be considered a stochastic inexact Krasnoselskii-Mann iteration. We show that the mean square error decays at a rate $O(1/k^{1/4-ε})$, where $ε>0$ is arbitrarily small. We also show almost sure convergence of iterates to the set of fixed points. We show the applicability of our framework by applying our results to minimax optimization, linear stochastic approximation, and Lagrangian optimization.
△ Less
Submitted 18 January, 2025;
originally announced January 2025.
-
On the Convergence of Min-Max Langevin Dynamics and Algorithm
Authors:
Yang Cai,
Siddharth Mitra,
Xiuyuan Wang,
Andre Wibisono
Abstract:
We study zero-sum games in the space of probability distributions over the Euclidean space $\mathbb{R}^d$ with entropy regularization, in the setting when the interaction function between the players is smooth and strongly convex-strongly concave. We prove an exponential convergence guarantee for the mean-field min-max Langevin dynamics to compute the equilibrium distribution of the zero-sum game.…
▽ More
We study zero-sum games in the space of probability distributions over the Euclidean space $\mathbb{R}^d$ with entropy regularization, in the setting when the interaction function between the players is smooth and strongly convex-strongly concave. We prove an exponential convergence guarantee for the mean-field min-max Langevin dynamics to compute the equilibrium distribution of the zero-sum game. We also study the finite-particle approximation of the mean-field min-max Langevin dynamics, both in continuous and discrete times. We prove biased convergence guarantees for the continuous-time finite-particle min-max Langevin dynamics to the stationary mean-field equilibrium distribution with an explicit bias term which does not scale with the number of particles. We also prove biased convergence guarantees for the discrete-time finite-particle min-max Langevin algorithm to the stationary mean-field equilibrium distribution with an additional bias term which scales with the step size and the number of particles. This provides an explicit iteration complexity for the average particle along the finite-particle algorithm to approximately compute the equilibrium distribution of the zero-sum game.
△ Less
Submitted 27 June, 2025; v1 submitted 29 December, 2024;
originally announced December 2024.
-
The Minimal (Edge) Connectivity of Some Graphs of Finite Groups
Authors:
Siddharth Malviy,
Vipul Kakkar
Abstract:
In this paper, we classify all the finite groups $G$ such that the commuting graph $Γ_C(G)$, order-sum graph $Γ_{OS}(G)$ and non-inverse graph $Γ_{NI}(G)$ are minimally edge connected graphs. We also classify all the finite groups $G$ for that, these graphs are minimally connected. We also classify some groups for that the co-prime graph $Γ_{CP}(G)$ has minimal edge connectedness. In final part, w…
▽ More
In this paper, we classify all the finite groups $G$ such that the commuting graph $Γ_C(G)$, order-sum graph $Γ_{OS}(G)$ and non-inverse graph $Γ_{NI}(G)$ are minimally edge connected graphs. We also classify all the finite groups $G$ for that, these graphs are minimally connected. We also classify some groups for that the co-prime graph $Γ_{CP}(G)$ has minimal edge connectedness. In final part, we classify all the finite groups $G$ for that co-prime graph $Γ_{CP}(G)$ is minimally connected.
△ Less
Submitted 28 November, 2024;
originally announced November 2024.
-
Finite groups whose commuting graphs are line graphs
Authors:
Siddharth Malviy,
Vipul Kakkar
Abstract:
The commuting graph ${Γ(G)}$ of a group $G$ is the simple undirected graph with group elements as a vertex set and two elements $x$ and $y$ are adjacent if and only if $xy=yx$ in $G$. By eliminating the identity element of $G$ and all the dominant vertices of $Γ(G)$, the resulting subgraphs of $Γ(G)$ are $Γ^*(G)$ and $Γ^{**}(G)$, respectively. In this paper, we classify all the finite groups $G$ s…
▽ More
The commuting graph ${Γ(G)}$ of a group $G$ is the simple undirected graph with group elements as a vertex set and two elements $x$ and $y$ are adjacent if and only if $xy=yx$ in $G$. By eliminating the identity element of $G$ and all the dominant vertices of $Γ(G)$, the resulting subgraphs of $Γ(G)$ are $Γ^*(G)$ and $Γ^{**}(G)$, respectively. In this paper, we classify all the finite groups $G$ such that the graph $Δ(G) \in \{Γ(G), Γ^*(G), Γ^{**}(G)\}$ is the line graph of some graph. We also classify all the finite groups $G$ whose graph $Δ(G) \in \{Γ(G), Γ^*(G), Γ^{**}(G)\}$ is the complement of line graph.
△ Less
Submitted 7 November, 2024;
originally announced November 2024.
-
A Problem of Calculus of Variations and Game Theory
Authors:
Grace Luo,
Christopher Boyer,
Siddharth Penmetsa
Abstract:
In this paper, we study a theoretical math problem of game theory and calculus of variations in which we minimize a functional involving two players. A general relationship between the optimal strategies for both players is presented, followed by computer analysis as well as polynomial approximation. Nash equilibrium strategies are determined through algebraic manipulation and linear programming.…
▽ More
In this paper, we study a theoretical math problem of game theory and calculus of variations in which we minimize a functional involving two players. A general relationship between the optimal strategies for both players is presented, followed by computer analysis as well as polynomial approximation. Nash equilibrium strategies are determined through algebraic manipulation and linear programming. Lastly, a variation of the game is also investigated.
△ Less
Submitted 17 October, 2024;
originally announced November 2024.
-
An operator algebraic approach to symmetry defects and fractionalization
Authors:
Kyle Kawagoe,
Siddharth Vadnerkar,
Daniel Wallick
Abstract:
We provide a superselection theory of symmetry defects in 2+1D symmetry enriched topological (SET) order in the infinite volume setting. For a finite symmetry group $G$ with a unitary on-site action, our formalism produces a $G$-crossed braided tensor category $G\mathsf{Sec}$. This superselection theory is a direct generalization of the usual superselection theory of anyons, and thus is consistent…
▽ More
We provide a superselection theory of symmetry defects in 2+1D symmetry enriched topological (SET) order in the infinite volume setting. For a finite symmetry group $G$ with a unitary on-site action, our formalism produces a $G$-crossed braided tensor category $G\mathsf{Sec}$. This superselection theory is a direct generalization of the usual superselection theory of anyons, and thus is consistent with this standard analysis in the trivially graded component $G\mathsf{Sec}_1$. This framework also gives us a completely rigorous understanding of symmetry fractionalization. To demonstrate the utility of our formalism, we compute $G\mathsf{Sec}$ explicitly in both short-range and long-range entangled spin systems with symmetry and recover the relevant skeletal data.
△ Less
Submitted 24 March, 2025; v1 submitted 30 October, 2024;
originally announced October 2024.
-
Fast Convergence of $Φ$-Divergence Along the Unadjusted Langevin Algorithm and Proximal Sampler
Authors:
Siddharth Mitra,
Andre Wibisono
Abstract:
We study the mixing time of two popular discrete-time Markov chains in continuous space, the Unadjusted Langevin Algorithm and the Proximal Sampler, which are discretizations of the Langevin dynamics. We extend mixing time analyses for these Markov chains to hold in $Φ$-divergence. We show that any $Φ$-divergence arising from a twice-differentiable strictly convex function $Φ$ converges to $0$ exp…
▽ More
We study the mixing time of two popular discrete-time Markov chains in continuous space, the Unadjusted Langevin Algorithm and the Proximal Sampler, which are discretizations of the Langevin dynamics. We extend mixing time analyses for these Markov chains to hold in $Φ$-divergence. We show that any $Φ$-divergence arising from a twice-differentiable strictly convex function $Φ$ converges to $0$ exponentially fast along these Markov chains, under the assumption that their stationary distributions satisfy the corresponding $Φ$-Sobolev inequality, which holds for example when the target distribution of the Langevin dynamics is strongly log-concave. Our setting includes as special cases popular mixing time regimes, namely the mixing in chi-squared divergence under a Poincaré inequality, and the mixing in relative entropy under a log-Sobolev inequality. Our results follow by viewing the sampling algorithms as noisy channels and bounding the contraction coefficients arising in the appropriate strong data processing inequalities.
△ Less
Submitted 12 February, 2025; v1 submitted 14 October, 2024;
originally announced October 2024.
-
Function Gradient Approximation with Random Shallow ReLU Networks with Control Applications
Authors:
Andrew Lamperski,
Siddharth Salapaka
Abstract:
Neural networks are widely used to approximate unknown functions in control. A common neural network architecture uses a single hidden layer (i.e. a shallow network), in which the input parameters are fixed in advance and only the output parameters are trained. The typical formal analysis asserts that if output parameters exist to approximate the unknown function with sufficient accuracy, then des…
▽ More
Neural networks are widely used to approximate unknown functions in control. A common neural network architecture uses a single hidden layer (i.e. a shallow network), in which the input parameters are fixed in advance and only the output parameters are trained. The typical formal analysis asserts that if output parameters exist to approximate the unknown function with sufficient accuracy, then desired control performance can be achieved. A long-standing theoretical gap was that no conditions existed to guarantee that, for the fixed input parameters, required accuracy could be obtained by training the output parameters. Our recent work has partially closed this gap by demonstrating that if input parameters are chosen randomly, then for any sufficiently smooth function, with high-probability there are output parameters resulting in $O((1/m)^{1/2})$ approximation errors, where $m$ is the number of neurons. However, some applications, notably continuous-time value function approximation, require that the network approximates the both the unknown function and its gradient with sufficient accuracy. In this paper, we show that randomly generated input parameters and trained output parameters result in gradient errors of $O((\log(m)/m)^{1/2})$, and additionally, improve the constants from our prior work. We show how to apply the result to policy evaluation problems.
△ Less
Submitted 7 October, 2024;
originally announced October 2024.
-
Differential dynamic programming with stagewise equality and inequality constraints using interior point method
Authors:
Siddharth Prabhu,
Srinivas Rangarajan,
Mayuresh Kothare
Abstract:
Differential Dynamic Programming (DDP) is one of the indirect methods for solving an optimal control problem. Several extensions to DDP have been proposed to add stagewise state and control constraints, which can mainly be classified as augmented lagrangian methods, active set methods, and barrier methods. In this paper, we use an interior point method, which is a type of barrier method, to incorp…
▽ More
Differential Dynamic Programming (DDP) is one of the indirect methods for solving an optimal control problem. Several extensions to DDP have been proposed to add stagewise state and control constraints, which can mainly be classified as augmented lagrangian methods, active set methods, and barrier methods. In this paper, we use an interior point method, which is a type of barrier method, to incorporate arbitrary stagewise equality and inequality state and control constraints. We also provide explicit update formulas for all the involved variables. Finally, we apply this algorithm to example systems such as the inverted pendulum, a continuously stirred tank reactor, car parking, and obstacle avoidance.
△ Less
Submitted 18 September, 2024;
originally announced September 2024.
-
Maximizing On-Bill Savings through Battery Management Optimization
Authors:
Rene Carmona,
Xinshuo Yang,
Siddharth Bhela,
Claire Zeng
Abstract:
In many power grids, a large portion of the energy costs for commercial and industrial consumers are set with reference to the coincident peak load, the demand during the maximum system-wide peak, and their own maximum peak load, the non-coincident peak load. Coincident-peak based charges reflect the allocation of infrastructure updates to end-users for increased capacity, the amount the grid can…
▽ More
In many power grids, a large portion of the energy costs for commercial and industrial consumers are set with reference to the coincident peak load, the demand during the maximum system-wide peak, and their own maximum peak load, the non-coincident peak load. Coincident-peak based charges reflect the allocation of infrastructure updates to end-users for increased capacity, the amount the grid can handle, and for improvement of the transmission, the ability to transport energy across the network. Demand charges penalize the stress on the grid caused by each consumer's peak demand. Microgrids with a local generator, controllable loads, and/or a battery technology have the flexibility to cut their peak load contributions and thereby significantly reduce these charges. This paper investigates the optimal planning of microgrid technology for electricity bill reduction. The specificity of our approach is the leveraging of a scenario generator engine to incorporate probability estimates of coincident peaks and non-coincident peaks into the optimization problem.
△ Less
Submitted 5 September, 2024;
originally announced September 2024.
-
Associating hypergraphs defined on loops
Authors:
Siddharth Malviy,
Vipul Kakkar
Abstract:
In this paper, we define a new hypergraph $\mathcal{H(V,E)}$ on a loop $L$, where $\mathcal{V}$ is the set of points of the loop $L$ and $\mathcal{E}$ is the set of hyperedges $e=\{x,y,z\}$ such that $x,y$ and $z$ associate in the order they are written. We call this hypergraph as the associating hypergraph on a loop $L$. We study certain properites of associating hypergraphs on the Moufang loop…
▽ More
In this paper, we define a new hypergraph $\mathcal{H(V,E)}$ on a loop $L$, where $\mathcal{V}$ is the set of points of the loop $L$ and $\mathcal{E}$ is the set of hyperedges $e=\{x,y,z\}$ such that $x,y$ and $z$ associate in the order they are written. We call this hypergraph as the associating hypergraph on a loop $L$. We study certain properites of associating hypergraphs on the Moufang loop $M(D_n,2)$, where $D_n$ denotes the dihedral group of order $2n$.
△ Less
Submitted 29 August, 2024;
originally announced August 2024.
-
How Much Reserve Fuel: Quantifying the Maximal Energy Cost of System Disturbances
Authors:
Ram Padmanabhan,
Craig Bakker,
Siddharth Abhijit Dinkar,
Melkior Ornik
Abstract:
Motivated by the design question of additional fuel needed to complete a task in an uncertain environment, this paper introduces metrics to quantify the maximal additional energy used by a control system in the presence of bounded disturbances when compared to a nominal, disturbance-free system. In particular, we consider the task of finite-time stabilization for a linear time-invariant system. We…
▽ More
Motivated by the design question of additional fuel needed to complete a task in an uncertain environment, this paper introduces metrics to quantify the maximal additional energy used by a control system in the presence of bounded disturbances when compared to a nominal, disturbance-free system. In particular, we consider the task of finite-time stabilization for a linear time-invariant system. We first derive the nominal energy required to achieve this task in a disturbance-free system, and then the worst-case energy over all feasible disturbances. The latter leads to an optimal control problem with a least-squares solution, and then an infinite-dimensional optimization problem where we derive an upper bound on the solution. The comparison of these energies is accomplished using additive and multiplicative metrics, and we derive analytical bounds on these metrics. Simulation examples on an ADMIRE fighter jet model demonstrate the practicability of these metrics, and their variation with the task hardness, a combination of the distance of the initial condition from the origin and the task completion time.
△ Less
Submitted 20 August, 2024;
originally announced August 2024.
-
Fractals in Africanist Music
Authors:
Claudio Gómez-Gonzáles,
Sidhanth Raman,
Siddharth Viswanath,
Jesse Wolfson
Abstract:
We investigate fractal structures in African and African diasporic music, building on hypotheses of choreographer Reggie Wilson and research on fractals in African material culture by Ron Eglash.
We investigate fractal structures in African and African diasporic music, building on hypotheses of choreographer Reggie Wilson and research on fractals in African material culture by Ron Eglash.
△ Less
Submitted 19 August, 2024;
originally announced August 2024.
-
Time transient Simulations via Finite Element Network Analysis: Theoretical Formulation and Numerical Validation
Authors:
Mehdi Jokar,
Siddharth Nair,
Fabio Semperlotti
Abstract:
This paper extends the finite element network analysis (FENA) to include a dynamic time-transient formulation. FENA was initially formulated in the context of the linear static analysis of 1D and 2D elastic structures. By introducing the concept of super finite network element, this paper provides the necessary foundation to extend FENA to linear time-transient simulations for both homogeneous and…
▽ More
This paper extends the finite element network analysis (FENA) to include a dynamic time-transient formulation. FENA was initially formulated in the context of the linear static analysis of 1D and 2D elastic structures. By introducing the concept of super finite network element, this paper provides the necessary foundation to extend FENA to linear time-transient simulations for both homogeneous and inhomogeneous domains. The concept of neural network concatenation, originally formulated to combine networks representative of different structural components in space, is extended to the time domain. Network concatenation in time enables training neural network models based on data available in a limited time frame and then using the trained networks to simulate the system evolution beyond the initial time window characteristic of the training data set. The proposed methodology is validated by applying FENA to the transient simulation of one-dimensional structural elements (such as rods and beams) and by comparing the results with either analytical or finite element solutions. Results confirm that FENA accurately predicts the dynamic response of the physical system and, while introducing an error on the order of 1% (compared to analytical or computational solutions of the governing differential equations), it is capable of delivering extreme computational efficiency.
△ Less
Submitted 11 April, 2024;
originally announced July 2024.
-
Differentiability and Optimization of Multiparameter Persistent Homology
Authors:
Luis Scoccola,
Siddharth Setlur,
David Loiseaux,
Mathieu Carrière,
Steve Oudot
Abstract:
Real-valued functions on geometric data -- such as node attributes on a graph -- can be optimized using descriptors from persistent homology, allowing the user to incorporate topological terms in the loss function. When optimizing a single real-valued function (the one-parameter setting), there is a canonical choice of descriptor for persistent homology: the barcode. The operation mapping a real-v…
▽ More
Real-valued functions on geometric data -- such as node attributes on a graph -- can be optimized using descriptors from persistent homology, allowing the user to incorporate topological terms in the loss function. When optimizing a single real-valued function (the one-parameter setting), there is a canonical choice of descriptor for persistent homology: the barcode. The operation mapping a real-valued function to its barcode is differentiable almost everywhere, and the convergence of gradient descent for losses using barcodes is relatively well understood. When optimizing a vector-valued function (the multiparameter setting), there is no unique choice of descriptor for multiparameter persistent homology, and many distinct descriptors have been proposed. This calls for the development of a general framework for differentiability and optimization that applies to a wide range of multiparameter homological descriptors. In this article, we develop such a framework and show that it encompasses well-known descriptors of different flavors, such as signed barcodes and the multiparameter persistence landscape. We complement the theory with numerical experiments supporting the idea that optimizing multiparameter homological descriptors can lead to improved performances compared to optimizing one-parameter descriptors, even when using the simplest and most efficiently computable multiparameter descriptors.
△ Less
Submitted 30 August, 2024; v1 submitted 11 June, 2024;
originally announced June 2024.
-
Distribution of sums of square roots modulo $1$
Authors:
Siddharth Iyer
Abstract:
We improve upon a result of Steinerberger (2024) by demonstrating that for any fixed $k \in \mathbb{N}$ and sufficiently large $n$, there exist integers $1 \leq a_1, \dots, a_k \leq n$ satisfying: \begin{align*} 0 < \left\| \sum_{j=1}^{k} \sqrt{a_j} \right\| = O(n^{-k/2}). \end{align*} The exponent $k/2$ improves upon the previous exponent of $c k^{1/3}$ of Steinerberger (2024), where $c>0$ is an…
▽ More
We improve upon a result of Steinerberger (2024) by demonstrating that for any fixed $k \in \mathbb{N}$ and sufficiently large $n$, there exist integers $1 \leq a_1, \dots, a_k \leq n$ satisfying: \begin{align*} 0 < \left\| \sum_{j=1}^{k} \sqrt{a_j} \right\| = O(n^{-k/2}). \end{align*} The exponent $k/2$ improves upon the previous exponent of $c k^{1/3}$ of Steinerberger (2024), where $c>0$ is an absolute constant. We also show that for $α\in \mathbb{R}$, there exist integers $1 \leq b_1, \dots, b_k \leq n$ such that: \begin{align*} \left\| \sum_{j=1}^k \sqrt{b_j} - α\right\| = O(n^{-γ_k}), \end{align*} where $γ_k \geq \frac{k-1}{4}$ and $γ_k = k/2$ when $k=2^m - 1$, $m=1,2,\dots$. Importantly, our approach avoids the use of exponential sums.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
Study guide for "On restricted projections to planes in $\mathbb R^3$"
Authors:
Tainara Borges,
Siddharth Mulherkar,
Tongou Yang
Abstract:
This article is a study guide for ``On restricted projections to planes in $\mathbb R^3$" [arXiv:2207.13844] by Gan, Guo, Guth, Harris, Maldague and Wang. We first present the main problems and preliminaries related to restricted projections in $\mathbb R^3$. Then we introduce the high-low method and decoupling, which are the two central and novel ideas in their proofs. We hope to provide as many…
▽ More
This article is a study guide for ``On restricted projections to planes in $\mathbb R^3$" [arXiv:2207.13844] by Gan, Guo, Guth, Harris, Maldague and Wang. We first present the main problems and preliminaries related to restricted projections in $\mathbb R^3$. Then we introduce the high-low method and decoupling, which are the two central and novel ideas in their proofs. We hope to provide as many details as possible so that this study guide is self-contained, with the only exception of the Bourgain-Demeter decoupling inequality for curves in the appendix.
△ Less
Submitted 30 October, 2024; v1 submitted 25 March, 2024;
originally announced March 2024.
-
Repelling-Attracting Hamiltonian Monte Carlo
Authors:
Siddharth Vishwanath,
Hyungsuk Tak
Abstract:
We propose a variant of Hamiltonian Monte Carlo (HMC), called the Repelling-Attracting Hamiltonian Monte Carlo (RAHMC), for sampling from multimodal distributions. The key idea that underpins RAHMC is a departure from the conservative dynamics of Hamiltonian systems, which form the basis of traditional HMC, and turning instead to the dissipative dynamics of conformal Hamiltonian systems. In partic…
▽ More
We propose a variant of Hamiltonian Monte Carlo (HMC), called the Repelling-Attracting Hamiltonian Monte Carlo (RAHMC), for sampling from multimodal distributions. The key idea that underpins RAHMC is a departure from the conservative dynamics of Hamiltonian systems, which form the basis of traditional HMC, and turning instead to the dissipative dynamics of conformal Hamiltonian systems. In particular, RAHMC involves two stages: a mode-repelling stage to encourage the sampler to move away from regions of high probability density; and, a mode-attracting stage, which facilitates the sampler to find and settle near alternative modes. We achieve this by introducing just one additional tuning parameter -- the coefficient of friction. The proposed method adapts to the geometry of the target distribution, e.g., modes and density ridges, and can generate proposals that cross low-probability barriers with little to no computational overhead in comparison to traditional HMC. Notably, RAHMC requires no additional information about the target distribution or memory of previously visited modes. We establish the theoretical basis for RAHMC, and we discuss repelling-attracting extensions to several variants of HMC in literature. Finally, we provide a tuning-free implementation via dual-averaging, and we demonstrate its effectiveness in sampling from, both, multimodal and unimodal distributions in high dimensions.
△ Less
Submitted 7 March, 2024;
originally announced March 2024.
-
Characterizing Dependence of Samples along the Langevin Dynamics and Algorithms via Contraction of $Φ$-Mutual Information
Authors:
Jiaming Liang,
Siddharth Mitra,
Andre Wibisono
Abstract:
The mixing time of a Markov chain determines how fast the iterates of the Markov chain converge to the stationary distribution; however, it does not control the dependencies between samples along the Markov chain. In this paper, we study the question of how fast the samples become approximately independent along popular Markov chains for continuous-space sampling: the Langevin dynamics in continuo…
▽ More
The mixing time of a Markov chain determines how fast the iterates of the Markov chain converge to the stationary distribution; however, it does not control the dependencies between samples along the Markov chain. In this paper, we study the question of how fast the samples become approximately independent along popular Markov chains for continuous-space sampling: the Langevin dynamics in continuous time, and the Unadjusted Langevin Algorithm and the Proximal Sampler in discrete time. We measure the dependence between samples via $Φ$-mutual information, which is a broad generalization of the standard mutual information, and which is equal to $0$ if and only if the the samples are independent. We show that along these Markov chains, the $Φ$-mutual information between the first and the $k$-th iterate decreases to $0$ exponentially fast in $k$ when the target distribution is strongly log-concave. Our proof technique is based on showing the Strong Data Processing Inequalities (SDPIs) hold along the Markov chains. To prove fast mixing of the Markov chains, we only need to show the SDPIs hold for the stationary distribution. In contrast, to prove the contraction of $Φ$-mutual information, we need to show the SDPIs hold along the entire trajectories of the Markov chains; we prove this when the iterates along the Markov chains satisfy the corresponding $Φ$-Sobolev inequality, which is implied by the strong log-concavity of the target distribution.
△ Less
Submitted 26 June, 2025; v1 submitted 26 February, 2024;
originally announced February 2024.
-
Improved Upper Bound for the Size of a Trifferent Code
Authors:
Siddharth Bhandari,
Abhishek Khetan
Abstract:
A subset $\mathcal{C}\subseteq\{0,1,2\}^n$ is said to be a $\textit{trifferent}$ code (of block length $n$) if for every three distinct codewords $x,y, z \in \mathcal{C}$, there is a coordinate $i\in \{1,2,\ldots,n\}$ where they all differ, that is, $\{x(i),y(i),z(i)\}$ is same as $\{0,1,2\}$. Let $T(n)$ denote the size of the largest trifferent code of block length $n$. Understanding the asymptot…
▽ More
A subset $\mathcal{C}\subseteq\{0,1,2\}^n$ is said to be a $\textit{trifferent}$ code (of block length $n$) if for every three distinct codewords $x,y, z \in \mathcal{C}$, there is a coordinate $i\in \{1,2,\ldots,n\}$ where they all differ, that is, $\{x(i),y(i),z(i)\}$ is same as $\{0,1,2\}$. Let $T(n)$ denote the size of the largest trifferent code of block length $n$. Understanding the asymptotic behavior of $T(n)$ is closely related to determining the zero-error capacity of the $(3/2)$-channel defined by Elias'88, and is a long-standing open problem in the area. Elias had shown that $T(n)\leq 2\times (3/2)^n$ and prior to our work the best upper bound was $T(n)\leq 0.6937 \times (3/2)^n$ due to Kurz'23. We improve this bound to $T(n)\leq c \times n^{-2/5}\times (3/2)^n$ where $c$ is an absolute constant.
△ Less
Submitted 4 February, 2024;
originally announced February 2024.
-
New Sequence-Independent Lifting Techniques for Cutting Planes and When They Induce Facets
Authors:
Siddharth Prasad,
Ellen Vitercik,
Maria-Florina Balcan,
Tuomas Sandholm
Abstract:
Sequence-independent lifting is a procedure for strengthening valid inequalities of an integer program. We generalize the sequence-independent lifting method of Gu, Nemhauser, and Savelsbergh (GNS lifting) for cover inequalities and correct an error in their proposed generalization. We obtain a new sequence-independent lifting technique -- piecewise-constant (PC) lifting -- with a number of intere…
▽ More
Sequence-independent lifting is a procedure for strengthening valid inequalities of an integer program. We generalize the sequence-independent lifting method of Gu, Nemhauser, and Savelsbergh (GNS lifting) for cover inequalities and correct an error in their proposed generalization. We obtain a new sequence-independent lifting technique -- piecewise-constant (PC) lifting -- with a number of interesting properties. We derive a broad set of sufficient conditions under which PC lifting is facet defining. To our knowledge, this is the first characterization of facet-defining sequence-independent liftings that are efficiently computable from the underlying cover. Finally, we demonstrate via experiments that PC lifting can be a useful alternative to GNS lifting. We test our new lifting techniques atop a number of novel cover cut generation routines, which prove to be effective in experiments with CPLEX.
△ Less
Submitted 24 January, 2024;
originally announced January 2024.
-
A Hidden Convexity of Nonlinear Elasticity
Authors:
Siddharth Singh,
Janusz Ginster,
Amit Acharya
Abstract:
A technique for developing convex dual variational principles for the governing PDE of nonlinear elastostatics and elastodynamics is presented. This allows the definition of notions of a variational dual solution and a dual solution corresponding to the PDEs of nonlinear elasticity, even when the latter arise as formal Euler-Lagrange equations corresponding to non-quasiconvex elastic energy functi…
▽ More
A technique for developing convex dual variational principles for the governing PDE of nonlinear elastostatics and elastodynamics is presented. This allows the definition of notions of a variational dual solution and a dual solution corresponding to the PDEs of nonlinear elasticity, even when the latter arise as formal Euler-Lagrange equations corresponding to non-quasiconvex elastic energy functionals whose energy minimizers do not exist. This is demonstrated rigorously in the case of elastostatics for the Saint-Venant Kirchhoff material (in all dimensions), where the existence of variational dual solutions is also proven. The existence of a variational dual solution for the incompressible neo-Hookean material in 2-d is also shown. Stressed and unstressed elastostatic and elastodynamic solutions in 1 space dimension corresponding to a non-convex, double-well energy are computed using the dual methodology. In particular, we show the stability of a dual elastodynamic equilibrium solution for which there are regions of non-vanishing length with negative elastic stiffness, i.e.~non-hyperbolic regions, for which the corresponding primal problem is ill-posed and demonstrates an explosive `Hadamard instability;' this appears to have implications for the modeling of physically observed softening behavior in macroscopic mechanical response.
△ Less
Submitted 12 July, 2024; v1 submitted 16 January, 2024;
originally announced January 2024.
-
EV-EcoSim: A grid-aware co-simulation platform for the design and optimization of electric vehicle charging infrastructure
Authors:
Emmanuel Balogun,
Elizabeth Buechler,
Siddharth Bhela,
Simona Onori,
Ram Rajagopal
Abstract:
To enable the electrification of transportation systems, it is important to understand how technologies such as grid storage, solar photovoltaic systems, and control strategies can aid the deployment of electric vehicle charging at scale. In this work, we present EV-EcoSim, a co-simulation platform that couples electric vehicle charging, battery systems, solar photovoltaic systems, grid transforme…
▽ More
To enable the electrification of transportation systems, it is important to understand how technologies such as grid storage, solar photovoltaic systems, and control strategies can aid the deployment of electric vehicle charging at scale. In this work, we present EV-EcoSim, a co-simulation platform that couples electric vehicle charging, battery systems, solar photovoltaic systems, grid transformers, control strategies, and power distribution systems, to perform cost quantification and analyze the impacts of electric vehicle charging on the grid. This python-based platform can run a receding horizon control scheme for real-time operation and a one-shot control scheme for planning problems, with multi-timescale dynamics for different systems to simulate realistic scenarios. We demonstrate the utility of EV-EcoSim through a case study focused on economic evaluation of battery size to reduce electricity costs while considering impacts of fast charging on the power distribution grid. We present qualitative and quantitative evaluations on the battery size in tabulated results. The tabulated results delineate the trade-offs between candidate battery sizing solutions, providing comprehensive insights for decision-making under uncertainty. Additionally, we demonstrate the implications of the battery controller model fidelity on the system costs and show that the fidelity of the battery controller can completely change decisions made when planning an electric vehicle charging site.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Rational approximation with digit-restricted denominators
Authors:
Siddharth Iyer
Abstract:
We show the existence of ``good'' approximations to a real number $γ$ using rationals with denominators formed by digits $0$ and $1$ in base $b$. We derive an elementary estimate and enhance this result by managing exponential sums.
We show the existence of ``good'' approximations to a real number $γ$ using rationals with denominators formed by digits $0$ and $1$ in base $b$. We derive an elementary estimate and enhance this result by managing exponential sums.
△ Less
Submitted 2 December, 2023;
originally announced December 2023.
-
Predictive Control for Autonomous Driving with Uncertain, Multi-modal Predictions
Authors:
Siddharth H. Nair,
Hotae Lee,
Eunhyek Joa,
Yan Wang,
H. Eric Tseng,
Francesco Borrelli
Abstract:
We propose a Stochastic MPC (SMPC) formulation for path planning with autonomous vehicles in scenarios involving multiple agents with multi-modal predictions. The multi-modal predictions capture the uncertainty of urban driving in distinct modes/maneuvers (e.g., yield, keep speed) and driving trajectories (e.g., speed, turning radius), which are incorporated for multi-modal collision avoidance cha…
▽ More
We propose a Stochastic MPC (SMPC) formulation for path planning with autonomous vehicles in scenarios involving multiple agents with multi-modal predictions. The multi-modal predictions capture the uncertainty of urban driving in distinct modes/maneuvers (e.g., yield, keep speed) and driving trajectories (e.g., speed, turning radius), which are incorporated for multi-modal collision avoidance chance constraints for path planning. In the presence of multi-modal uncertainties, it is challenging to reliably compute feasible path planning solutions at real-time frequencies ($\geq$ 10 Hz). Our main technological contribution is a convex SMPC formulation that simultaneously (1) optimizes over parameterized feedback policies and (2) allocates risk levels for each mode of the prediction. The use of feedback policies and risk allocation enhances the feasibility and performance of the SMPC formulation against multi-modal predictions with large uncertainty. We evaluate our approach via simulations and road experiments with a full-scale vehicle interacting in closed-loop with virtual vehicles. We consider distinct, multi-modal driving scenarios: 1) Negotiating a traffic light and a fast, tailgating agent, 2) Executing an unprotected left turn at a traffic intersection, and 3) Changing lanes in the presence of multiple agents. For all of these scenarios, our approach reliably computes multi-modal solutions to the path-planning problem at real-time frequencies.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
New Asymptotic Limit Theory and Inference for Monotone Regression
Authors:
Soham Mallick,
Siddhaarth Sarkar,
Arun Kumar Kuchibhotla
Abstract:
Nonparametric regression problems with qualitative constraints such as monotonicity or convexity are ubiquitous in applications. For example, in predicting the yield of a factory in terms of the number of labor hours, the monotonicity of the conditional mean function is a natural constraint. One can estimate a monotone conditional mean function using nonparametric least squares estimation, which i…
▽ More
Nonparametric regression problems with qualitative constraints such as monotonicity or convexity are ubiquitous in applications. For example, in predicting the yield of a factory in terms of the number of labor hours, the monotonicity of the conditional mean function is a natural constraint. One can estimate a monotone conditional mean function using nonparametric least squares estimation, which involves no tuning parameters. Several interesting properties of the isotonic LSE are known including its rate of convergence, adaptivity properties, and pointwise asymptotic distribution. However, we believe that the full richness of the asymptotic limit theory has not been explored in the literature which we do in this paper. Moreover, the inference problem is not fully settled. In this paper, we present some new results for monotone regression including an extension of existing results to triangular arrays, and provide asymptotically valid confidence intervals that are uniformly valid over a large class of distributions.
△ Less
Submitted 17 November, 2023; v1 submitted 30 October, 2023;
originally announced October 2023.
-
Extended Set-based Tasks for Multi-task Execution and Prioritization
Authors:
Gennaro Notomista,
Mario Selvaggio,
Francesca Pagano,
María Santos,
Siddharth Mayya,
Vincenzo Lippiello,
Cristian Secchi
Abstract:
The ability of executing multiple tasks simultaneously is an important feature of redundant robotic systems. As a matter of fact, complex behaviors can often be obtained as a result of the execution of several tasks. Moreover, in safety-critical applications, tasks designed to ensure the safety of the robot and its surroundings have to be executed along with other nominal tasks. In such cases, it…
▽ More
The ability of executing multiple tasks simultaneously is an important feature of redundant robotic systems. As a matter of fact, complex behaviors can often be obtained as a result of the execution of several tasks. Moreover, in safety-critical applications, tasks designed to ensure the safety of the robot and its surroundings have to be executed along with other nominal tasks. In such cases, it is also important to prioritize the former over the latter. In this paper, we formalize the definition of extended set-based tasks, i.e., tasks which can be executed by rendering subsets of the task space asymptotically stable or forward invariant using control barrier functions. We propose a formal mathematical representation of such tasks that allows for the execution of more complex and time-varying prioritized stacks of tasks using kinematic and dynamic robot models alike. We present an optimization-based framework which is computationally efficient, accounts for input bounds, and allows for the stable execution of time-varying prioritized stacks of extended set-based tasks. The proposed framework is validated using extensive simulations, quantitative comparisons to the state-of-the-art hierarchical quadratic programming, and experiments with robotic manipulators.
△ Less
Submitted 30 May, 2025; v1 submitted 24 October, 2023;
originally announced October 2023.
-
A criterion for smooth weighted blow-downs
Authors:
Veronica Arena,
Andrea Di Lorenzo,
Giovanni Inchiostro,
Siddharth Mathur,
Stephen Obinna,
Michele Pernice
Abstract:
We establish a criterion for determining when a smooth Deligne-Mumford stack is a weighted blow-up. More precisely, given a smooth Deligne-Mumford stack $\mathcal{X}$ and a Cartier divisor $\mathcal{E} \subset \mathcal{X}$ such that (1) $\mathcal{E}$ is a weighted projective bundle over a smooth Deligne-Mumford stack $\mathcal{Y}$ and (2) for every $y\in\mathcal{Y}$ we have…
▽ More
We establish a criterion for determining when a smooth Deligne-Mumford stack is a weighted blow-up. More precisely, given a smooth Deligne-Mumford stack $\mathcal{X}$ and a Cartier divisor $\mathcal{E} \subset \mathcal{X}$ such that (1) $\mathcal{E}$ is a weighted projective bundle over a smooth Deligne-Mumford stack $\mathcal{Y}$ and (2) for every $y\in\mathcal{Y}$ we have $\mathcal{O}_{\mathcal{X}}(\mathcal{E})|_{\mathcal{E}_y}\simeq \mathcal{O}_{\mathcal{E}_y}(-1)$, then there exists a contraction $\mathcal{X}\to\mathcal{Z}$ to a smooth Deligne-Mumford stack $\mathcal{Z}$. Moreover, the stack $\mathcal{X}$ can be recovered as a weighted blow-up along $\mathcal{Y}\subset \mathcal{Z}$ with exceptional divisor $\mathcal{E}$, and $\mathcal{Z}$ is a pushout in the category of algebraic stacks. As an application, we show that the moduli stack $\overline{\mathscr{M}}_{1,n}$ of stable $n$-pointed genus one curves is a weighted blow-up of the stack of pseudo-stable curves. Along the way we also prove a reconstruction result for smooth Deligne-Mumford stacks that is of independent interest.
△ Less
Submitted 15 May, 2024; v1 submitted 23 October, 2023;
originally announced October 2023.
-
Stability of Sequential Lateration and of Stress Minimization in the Presence of Noise
Authors:
Ery Arias-Castro,
Siddharth Vishwanath
Abstract:
Sequential lateration is a class of methods for multidimensional scaling where a suitable subset of nodes is first embedded by some method, e.g., a clique embedded by classical scaling, and then the remaining nodes are recursively embedded by lateration. A graph is a lateration graph when it can be embedded by such a procedure. We provide a stability result for a particular variant of sequential l…
▽ More
Sequential lateration is a class of methods for multidimensional scaling where a suitable subset of nodes is first embedded by some method, e.g., a clique embedded by classical scaling, and then the remaining nodes are recursively embedded by lateration. A graph is a lateration graph when it can be embedded by such a procedure. We provide a stability result for a particular variant of sequential lateration. We do so in a setting where the dissimilarities represent noisy Euclidean distances between nodes in a geometric lateration graph. We then deduce, as a corollary, a perturbation bound for stress minimization. To argue that our setting applies broadly, we show that a (large) random geometric graph is a lateration graph with high probability under mild conditions, extending a previous result of Aspnes et al (2006).
△ Less
Submitted 8 December, 2024; v1 submitted 16 October, 2023;
originally announced October 2023.
-
Character sums over elements of extensions of finite fields with restricted coordinates
Authors:
Siddharth Iyer,
Igor Shparlinski
Abstract:
We obtain nontrivial bounds for character sums with multiplicative and additive characters over finite fields over elements with restricted coordinate expansion. In particular, we obtain a nontrivial estimate for such a sum over a finite field analogue of the Cantor set.
We obtain nontrivial bounds for character sums with multiplicative and additive characters over finite fields over elements with restricted coordinate expansion. In particular, we obtain a nontrivial estimate for such a sum over a finite field analogue of the Cantor set.
△ Less
Submitted 21 October, 2023; v1 submitted 6 September, 2023;
originally announced September 2023.
-
Focusing and Calibration of Large Scale Network Sensors using GraphBLAS Anonymized Hypersparse Matrices
Authors:
Jeremy Kepner,
Michael Jones,
Phil Dykstra,
Chansup Byun,
Timothy Davis,
Hayden Jananthan,
William Arcand,
David Bestor,
William Bergeron,
Vijay Gadepally,
Micheal Houle,
Matthew Hubbell,
Anna Klein,
Lauren Milechin,
Guillermo Morales,
Julie Mullen,
Ritesh Patel,
Alex Pentland,
Sandeep Pisharody,
Andrew Prout,
Albert Reuther,
Antonio Rosa,
Siddharth Samsi,
Tyler Trigg,
Charles Yee
, et al. (1 additional authors not shown)
Abstract:
Defending community-owned cyber space requires community-based efforts. Large-scale network observations that uphold the highest regard for privacy are key to protecting our shared cyberspace. Deployment of the necessary network sensors requires careful sensor placement, focusing, and calibration with significant volumes of network observations. This paper demonstrates novel focusing and calibrati…
▽ More
Defending community-owned cyber space requires community-based efforts. Large-scale network observations that uphold the highest regard for privacy are key to protecting our shared cyberspace. Deployment of the necessary network sensors requires careful sensor placement, focusing, and calibration with significant volumes of network observations. This paper demonstrates novel focusing and calibration procedures on a multi-billion packet dataset using high-performance GraphBLAS anonymized hypersparse matrices. The run-time performance on a real-world data set confirms previously observed real-time processing rates for high-bandwidth links while achieving significant data compression. The output of the analysis demonstrates the effectiveness of these procedures at focusing the traffic matrix and revealing the underlying stable heavy-tail statistical distributions that are necessary for anomaly detection. A simple model of the corresponding probability of detection ($p_{\rm d}$) and probability of false alarm ($p_{\rm fa}$) for these distributions highlights the criticality of network sensor focusing and calibration. Once a sensor is properly focused and calibrated it is then in a position to carry out two of the central tenets of good cybersecurity: (1) continuous observation of the network and (2) minimizing unbrokered network connections.
△ Less
Submitted 4 September, 2023;
originally announced September 2023.
-
Improved Approximation Algorithms for the Joint Replenishment Problem with Outliers, and with Fairness Constraints
Authors:
Varun Suriyanarayana,
Varun Sivashankar,
Siddharth Gollapudi,
David Shmoys
Abstract:
The joint replenishment problem (JRP) is a classical inventory management problem. We consider a natural generalization with outliers, where we are allowed to reject (that is, not service) a subset of demand points. In this paper, we are motivated by issues of fairness - if we do not serve all of the demands, we wish to ``spread out the pain'' in a balanced way among customers, communities, or any…
▽ More
The joint replenishment problem (JRP) is a classical inventory management problem. We consider a natural generalization with outliers, where we are allowed to reject (that is, not service) a subset of demand points. In this paper, we are motivated by issues of fairness - if we do not serve all of the demands, we wish to ``spread out the pain'' in a balanced way among customers, communities, or any specified market segmentation. One approach is to constrain the rejections allowed, and to have separate bounds for each given customer. In our most general setting, we consider a set of C features, where each demand point has an associated rejection cost for each feature, and we have a given bound on the allowed rejection cost incurred in total for each feature. This generalizes a model of fairness introduced in earlier work on the Colorful k-Center problem in which (analogously) each demand point has a given color, and we bound the number of rejections of each color class.
We give the first constant approximation algorithms for the fairness-constrained JRP with a constant number of features; specifically, we give a 2.86-approximation algorithm in this case. Even for the special case in which we bound the total (weighted) number of outliers, this performance guarantee improves upon bounds previously known for this case. Our approach is an LP-based algorithm that splits the instance into two subinstances. One is solved by a novel iterative rounding approach and the other by pipage-based rounding. The standard LP relaxation has an unbounded integrality gap, and hence another key element of our algorithm is to strengthen the relaxation by correctly guessing key attributes of the optimal solution, which are sufficiently concise, so that we can enumerate over all possible guesses in polynomial time - albeit exponential in C, the number of features.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Formal GAGA for gerbes
Authors:
Andrew Kresch,
Siddharth Mathur
Abstract:
Fix an $I$-adically complete Noetherian ring $A$ and suppose $X$ is a proper $A$-scheme. This article concerns the relationship between the Brauer group of $X$ and that of the various $X_n$ where $X_n$ is the fiber over $A/I^{n+1}$. In particular, we answer a question of Grothendieck by showing that, in positive and mixed characteristic, there are examples of $X$ with nontrivial Brauer classes tha…
▽ More
Fix an $I$-adically complete Noetherian ring $A$ and suppose $X$ is a proper $A$-scheme. This article concerns the relationship between the Brauer group of $X$ and that of the various $X_n$ where $X_n$ is the fiber over $A/I^{n+1}$. In particular, we answer a question of Grothendieck by showing that, in positive and mixed characteristic, there are examples of $X$ with nontrivial Brauer classes that restrict to zero on all the $X_n$. We characterize such behavior, prove this cannot happen in characteristic zero, and deduce a formal GAGA statement for Brauer classes.
△ Less
Submitted 1 October, 2023; v1 submitted 30 May, 2023;
originally announced May 2023.
-
The independence ratio of 4-cycle-free planar graphs
Authors:
Tom Kelly,
Sid Kolichala,
Caleb McFarland,
Jatong Su
Abstract:
We prove that every $n$-vertex planar graph $G$ with no triangle sharing an edge with a 4-cycle has independence ratio $n/α(G) \leq 4 - \varepsilon$ for $\varepsilon = 1/30$. This result implies that the same bound holds for 4-cycle-free planar graphs and planar graphs with no adjacent triangles and no triangle sharing an edge with a 5-cycle. For the latter case we strengthen the bound to…
▽ More
We prove that every $n$-vertex planar graph $G$ with no triangle sharing an edge with a 4-cycle has independence ratio $n/α(G) \leq 4 - \varepsilon$ for $\varepsilon = 1/30$. This result implies that the same bound holds for 4-cycle-free planar graphs and planar graphs with no adjacent triangles and no triangle sharing an edge with a 5-cycle. For the latter case we strengthen the bound to $\varepsilon = 2/9$.
△ Less
Submitted 3 May, 2023;
originally announced May 2023.