123,885 research outputs found

    Skewed Factor Models Using Selection Mechanisms

    Get PDF
    Traditional factor models explicitly or implicitly assume that the factors follow a multivariate normal distribution; that is, only moments up to order two are involved. However, it may happen in real data problems that the first two moments cannot explain the factors. Based on this motivation, here we devise three new skewed factor models, the skew-normal, the skew-t, and the generalized skew-normal factor models depending on a selection mechanism on the factors. The ECME algorithms are adopted to estimate related parameters for statistical inference. Monte Carlo simulations validate our new models and we demonstrate the need for skewed factor models using the classic open/closed book exam scores dataset

    The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux

    Get PDF
    The increasing availability of cloud computing and scientific super computers brings great potential for making R accessible through public or shared resources. This allows us to efficiently run code requiring lots of cycles and memory, or embed R functionality into, e.g., systems and web services. However some important security concerns need to be addressed before this can be put in production. The prime use case in the design of R has always been a single statistician running R on the local machine through the interactive console. Therefore the execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive use of hardware resources in a shared environment. Properly securing an R process turns out to be a complex problem. We describe various approaches and illustrate potential issues using some of our personal experiences in hosting public web services. Finally we introduce the RAppArmor package: a Linux based reference implementation for dynamic sandboxing in R on the level of the operating system

    Fluids with quenched disorder: Scaling of the free energy barrier near critical points

    Full text link
    In the context of Monte Carlo simulations, the analysis of the probability distribution PL(m)P_L(m) of the order parameter mm, as obtained in simulation boxes of finite linear extension LL, allows for an easy estimation of the location of the critical point and the critical exponents. For Ising-like systems without quenched disorder, PL(m)P_L(m) becomes scale invariant at the critical point, where it assumes a characteristic bimodal shape featuring two overlapping peaks. In particular, the ratio between the value of PL(m)P_L(m) at the peaks (PL,maxP_{L, max}) and the value at the minimum in-between (PL,minP_{L, min}) becomes LL-independent at criticality. However, for Ising-like systems with quenched random fields, we argue that instead ΔFL:=ln(PL,max/PL,min)Lθ\Delta F_L := \ln (P_{L, max} / P_{L, min}) \propto L^\theta should be observed, where θ>0\theta>0 is the "violation of hyperscaling" exponent. Since θ\theta is substantially non-zero, the scaling of ΔFL\Delta F_L with system size should be easily detectable in simulations. For two fluid models with quenched disorder, ΔFL\Delta F_L versus LL was measured, and the expected scaling was confirmed. This provides further evidence that fluids with quenched disorder belong to the universality class of the random-field Ising model.Comment: sent to J. Phys. Cond. Mat

    A New Approximate Min-Max Theorem with Applications in Cryptography

    Full text link
    We propose a novel proof technique that can be applied to attack a broad class of problems in computational complexity, when switching the order of universal and existential quantifiers is helpful. Our approach combines the standard min-max theorem and convex approximation techniques, offering quantitative improvements over the standard way of using min-max theorems as well as more concise and elegant proofs

    Approximating random quantum optimization problems

    Full text link
    We report a cluster of results regarding the difficulty of finding approximate ground states to typical instances of the quantum satisfiability problem kk-QSAT on large random graphs. As an approximation strategy, we optimize the solution space over `classical' product states, which in turn introduces a novel autonomous classical optimization problem, PSAT, over a space of continuous degrees of freedom rather than discrete bits. Our central results are: (i) The derivation of a set of bounds and approximations in various limits of the problem, several of which we believe may be amenable to a rigorous treatment. (ii) A demonstration that an approximation based on a greedy algorithm borrowed from the study of frustrated magnetism performs well over a wide range in parameter space, and its performance reflects structure of the solution space of random kk-QSAT. Simulated annealing exhibits metastability in similar `hard' regions of parameter space. (iii) A generalization of belief propagation algorithms introduced for classical problems to the case of continuous spins. This yields both approximate solutions, as well as insights into the free energy `landscape' of the approximation problem, including a so-called dynamical transition near the satisfiability threshold. Taken together, these results allow us to elucidate the phase diagram of random kk-QSAT in a two-dimensional energy-density--clause-density space.Comment: 14 pages, 9 figure

    A Primal-Dual Convergence Analysis of Boosting

    Full text link
    Boosting combines weak learners into a predictor with low empirical risk. Its dual constructs a high entropy distribution upon which weak learners and training labels are uncorrelated. This manuscript studies this primal-dual relationship under a broad family of losses, including the exponential loss of AdaBoost and the logistic loss, revealing: - Weak learnability aids the whole loss family: for any {\epsilon}>0, O(ln(1/{\epsilon})) iterations suffice to produce a predictor with empirical risk {\epsilon}-close to the infimum; - The circumstances granting the existence of an empirical risk minimizer may be characterized in terms of the primal and dual problems, yielding a new proof of the known rate O(ln(1/{\epsilon})); - Arbitrary instances may be decomposed into the above two, granting rate O(1/{\epsilon}), with a matching lower bound provided for the logistic loss.Comment: 40 pages, 8 figures; the NIPS 2011 submission "The Fast Convergence of Boosting" is a brief presentation of the primary results; compared with the JMLR version, this arXiv version has hyperref and some formatting tweak

    Focused Local Search for Random 3-Satisfiability

    Full text link
    A local search algorithm solving an NP-complete optimisation problem can be viewed as a stochastic process moving in an 'energy landscape' towards eventually finding an optimal solution. For the random 3-satisfiability problem, the heuristic of focusing the local moves on the presently unsatisfiedclauses is known to be very effective: the time to solution has been observed to grow only linearly in the number of variables, for a given clauses-to-variables ratio α\alpha sufficiently far below the critical satisfiability threshold αc4.27\alpha_c \approx 4.27. We present numerical results on the behaviour of three focused local search algorithms for this problem, considering in particular the characteristics of a focused variant of the simple Metropolis dynamics. We estimate the optimal value for the ``temperature'' parameter η\eta for this algorithm, such that its linear-time regime extends as close to αc\alpha_c as possible. Similar parameter optimisation is performed also for the well-known WalkSAT algorithm and for the less studied, but very well performing Focused Record-to-Record Travel method. We observe that with an appropriate choice of parameters, the linear time regime for each of these algorithms seems to extend well into ratios α>4.2\alpha > 4.2 -- much further than has so far been generally assumed. We discuss the statistics of solution times for the algorithms, relate their performance to the process of ``whitening'', and present some conjectures on the shape of their computational phase diagrams.Comment: 20 pages, lots of figure
    corecore