141,532 research outputs found
"Graph Entropy, Network Coding and Guessing games"
We introduce the (private) entropy of a directed graph (in a new network coding sense) as well as a number of related concepts. We show that the entropy of a directed graph is identical to its guessing number and can be bounded from below with the number of vertices minus the size of the graph’s shortest index code. We show that the Network Coding solvability of each specific multiple unicast network is completely determined by the entropy (as well as by the shortest index code) of the directed graph that occur by identifying each source node with each corresponding target node. Shannon’s information inequalities can be used to calculate up- per bounds on a graph’s entropy as well as calculating the size of the minimal index code. Recently, a number of new families of so-called non-shannon-type information inequalities have been discovered. It has been shown that there exist communication networks with a ca- pacity strictly ess than required for solvability, but where this fact cannot be derived using Shannon’s classical information inequalities. Based on this result we show that there exist graphs with an entropy that cannot be calculated using only Shannon’s classical information inequalities, and show that better estimate can be obtained by use of certain non-shannon-type information inequalities
Asymmetric feature interaction for interpreting model predictions
In natural language processing (NLP), deep neural networks (DNNs) could model
complex interactions between context and have achieved impressive results on a
range of NLP tasks. Prior works on feature interaction attribution mainly focus
on studying symmetric interaction that only explains the additional influence
of a set of words in combination, which fails to capture asymmetric influence
that contributes to model prediction. In this work, we propose an asymmetric
feature interaction attribution explanation model that aims to explore
asymmetric higher-order feature interactions in the inference of deep neural
NLP models. By representing our explanation with an directed interaction graph,
we experimentally demonstrate interpretability of the graph to discover
asymmetric feature interactions. Experimental results on two sentiment
classification datasets show the superiority of our model against the
state-of-the-art feature interaction attribution methods in identifying
influential features for model predictions. Our code is available at
https://github.com/StillLu/ASIV.Comment: Accepted by Findings of the Association for Computational
Linguistics: ACL 2023 (long paper
Characterizing extremal digraphs for identifying codes and extremal cases of Bondy's theorem on induced subsets
An identifying code of a (di)graph is a dominating subset of the
vertices of such that all distinct vertices of have distinct
(in)neighbourhoods within . In this paper, we classify all finite digraphs
which only admit their whole vertex set in any identifying code. We also
classify all such infinite oriented graphs. Furthermore, by relating this
concept to a well known theorem of A. Bondy on set systems we classify the
extremal cases for this theorem
Beyond Reuse Distance Analysis: Dynamic Analysis for Characterization of Data Locality Potential
Emerging computer architectures will feature drastically decreased flops/byte
(ratio of peak processing rate to memory bandwidth) as highlighted by recent
studies on Exascale architectural trends. Further, flops are getting cheaper
while the energy cost of data movement is increasingly dominant. The
understanding and characterization of data locality properties of computations
is critical in order to guide efforts to enhance data locality. Reuse distance
analysis of memory address traces is a valuable tool to perform data locality
characterization of programs. A single reuse distance analysis can be used to
estimate the number of cache misses in a fully associative LRU cache of any
size, thereby providing estimates on the minimum bandwidth requirements at
different levels of the memory hierarchy to avoid being bandwidth bound.
However, such an analysis only holds for the particular execution order that
produced the trace. It cannot estimate potential improvement in data locality
through dependence preserving transformations that change the execution
schedule of the operations in the computation. In this article, we develop a
novel dynamic analysis approach to characterize the inherent locality
properties of a computation and thereby assess the potential for data locality
enhancement via dependence preserving transformations. The execution trace of a
code is analyzed to extract a computational directed acyclic graph (CDAG) of
the data dependences. The CDAG is then partitioned into convex subsets, and the
convex partitioning is used to reorder the operations in the execution trace to
enhance data locality. The approach enables us to go beyond reuse distance
analysis of a single specific order of execution of the operations of a
computation in characterization of its data locality properties. It can serve a
valuable role in identifying promising code regions for manual transformation,
as well as assessing the effectiveness of compiler transformations for data
locality enhancement. We demonstrate the effectiveness of the approach using a
number of benchmarks, including case studies where the potential shown by the
analysis is exploited to achieve lower data movement costs and better
performance.Comment: Transaction on Architecture and Code Optimization (2014
Bounds for identifying codes in terms of degree parameters
An identifying code is a subset of vertices of a graph such that each vertex
is uniquely determined by its neighbourhood within the identifying code. If
\M(G) denotes the minimum size of an identifying code of a graph , it was
conjectured by F. Foucaud, R. Klasing, A. Kosowski and A. Raspaud that there
exists a constant such that if a connected graph with vertices and
maximum degree admits an identifying code, then \M(G)\leq
n-\tfrac{n}{d}+c. We use probabilistic tools to show that for any ,
\M(G)\leq n-\tfrac{n}{\Theta(d)} holds for a large class of graphs
containing, among others, all regular graphs and all graphs of bounded clique
number. This settles the conjecture (up to constants) for these classes of
graphs. In the general case, we prove \M(G)\leq n-\tfrac{n}{\Theta(d^{3})}.
In a second part, we prove that in any graph of minimum degree and
girth at least 5, \M(G)\leq(1+o_\delta(1))\tfrac{3\log\delta}{2\delta}n.
Using the former result, we give sharp estimates for the size of the minimum
identifying code of random -regular graphs, which is about
Sufficient conditions for a digraph to admit a (1,=l)-identifying code
A (1, = `)-identifying code in a digraph D is a subset C of vertices of D such that all distinct subsets of vertices of cardinality at most ` have distinct closed in-neighbourhoods within C. In this paper, we give some sufficient conditions for a digraph of minimum in-degree d - = 1 to admit a (1, = `)- identifying code for ` ¿ {d -, d- + 1}. As a corollary, we obtain the result by Laihonen that states that a graph of minimum degree d = 2 and girth at least 7 admits a (1, = d)-identifying code. Moreover, we prove that every 1-in-regular digraph has a (1, = 2)-identifying code if and only if the girth of the digraph is at least 5. We also characterize all the 2-in-regular digraphs admitting a (1, = `)-identifying code for ` ¿ {2, 3}.Peer ReviewedPostprint (author's final draft
- …