33,901 research outputs found

    Classifying Network Data with Deep Kernel Machines

    Full text link
    Inspired by a growing interest in analyzing network data, we study the problem of node classification on graphs, focusing on approaches based on kernel machines. Conventionally, kernel machines are linear classifiers in the implicit feature space. We argue that linear classification in the feature space of kernels commonly used for graphs is often not enough to produce good results. When this is the case, one naturally considers nonlinear classifiers in the feature space. We show that repeating this process produces something we call "deep kernel machines." We provide some examples where deep kernel machines can make a big difference in classification performance, and point out some connections to various recent literature on deep architectures in artificial intelligence and machine learning

    A New Chase-type Soft-decision Decoding Algorithm for Reed-Solomon Codes

    Full text link
    This paper addresses three relevant issues arising in designing Chase-type algorithms for Reed-Solomon codes: 1) how to choose the set of testing patterns; 2) given the set of testing patterns, what is the optimal testing order in the sense that the most-likely codeword is expected to appear earlier; and 3) how to identify the most-likely codeword. A new Chase-type soft-decision decoding algorithm is proposed, referred to as tree-based Chase-type algorithm. The proposed algorithm takes the set of all vectors as the set of testing patterns, and hence definitely delivers the most-likely codeword provided that the computational resources are allowed. All the testing patterns are arranged in an ordered rooted tree according to the likelihood bounds of the possibly generated codewords. While performing the algorithm, the ordered rooted tree is constructed progressively by adding at most two leafs at each trial. The ordered tree naturally induces a sufficient condition for the most-likely codeword. That is, whenever the proposed algorithm exits before a preset maximum number of trials is reached, the output codeword must be the most-likely one. When the proposed algorithm is combined with Guruswami-Sudan (GS) algorithm, each trial can be implement in an extremely simple way by removing one old point and interpolating one new point. Simulation results show that the proposed algorithm performs better than the recently proposed Chase-type algorithm by Bellorado et al with less trials given that the maximum number of trials is the same. Also proposed are simulation-based performance bounds on the MLD algorithm, which are utilized to illustrate the near-optimality of the proposed algorithm in the high SNR region. In addition, the proposed algorithm admits decoding with a likelihood threshold, that searches the most-likely codeword within an Euclidean sphere rather than a Hamming sphere

    Interaction effects on 1D fermionic symmetry protected topological phases

    Full text link
    In free fermion systems with given symmetry and dimension, the possible topological phases are labeled by elements of only three types of Abelian groups, Z_1, Z_2, or Z. For example non-interacting 1D fermionic superconducting phases with S_z spin rotation and time-reversal symmetries are classified by Z. We show that with weak interactions, this classification reduces to Z_4. Using group cohomology, one can additionally show that there are only four distinct phases for such 1D superconductors even with strong interactions. Comparing their projective representations, we find all these four symmetry protected topological phases can be realized with free fermions. Further, we show that 1D fermionic superconducting phases with Z_n discrete S_z spin rotation and time-reversal symmetries are classified by Z_4 when n=even and Z_2 when n=odd; again, all these strongly interacting topological phases can be realized by non-interacting fermions. Our approach can be applied to systems with other symmetries to see which 1D topological phases can be realized by free fermions

    Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency

    Full text link
    Given a social network G and a constant k, the influence maximization problem asks for k nodes in G that (directly and indirectly) influence the largest number of nodes under a pre-defined diffusion model. This problem finds important applications in viral marketing, and has been extensively studied in the literature. Existing algorithms for influence maximization, however, either trade approximation guarantees for practical efficiency, or vice versa. In particular, among the algorithms that achieve constant factor approximations under the prominent independent cascade (IC) model or linear threshold (LT) model, none can handle a million-node graph without incurring prohibitive overheads. This paper presents TIM, an algorithm that aims to bridge the theory and practice in influence maximization. On the theory side, we show that TIM runs in O((k+\ell) (n+m) \log n / \epsilon^2) expected time and returns a (1-1/e-\epsilon)-approximate solution with at least 1 - n^{-\ell} probability. The time complexity of TIM is near-optimal under the IC model, as it is only a \log n factor larger than the \Omega(m + n) lower-bound established in previous work (for fixed k, \ell, and \epsilon). Moreover, TIM supports the triggering model, which is a general diffusion model that includes both IC and LT as special cases. On the practice side, TIM incorporates novel heuristics that significantly improve its empirical efficiency without compromising its asymptotic performance. We experimentally evaluate TIM with the largest datasets ever tested in the literature, and show that it outperforms the state-of-the-art solutions (with approximation guarantees) by up to four orders of magnitude in terms of running time. In particular, when k = 50, \epsilon = 0.2, and \ell = 1, TIM requires less than one hour on a commodity machine to process a network with 41.6 million nodes and 1.4 billion edges.Comment: Revised Sections 1, 2.3, and 5 to remove incorrect claims about reference [3]. Updated experiments accordingly. A shorter version of the paper will appear in SIGMOD 201

    A γγ\gamma\gamma Collider for the 750 GeV Resonant State

    Get PDF
    Recent data collected by ATLAS and CMS at 13 TeV collision energy of the LHC indicate the existence of a new resonant state ϕ\phi with a mass of 750 GeV decaying into two photons γγ\gamma\gamma. The properties of ϕ\phi should be studied further at the LHC and also future colliders. Since only ϕ→γγ\phi \to \gamma\gamma decay channel has been measured, one of the best ways to extract more information about ϕ\phi is to use a γγ\gamma\gamma collider to produce ϕ\phi at the resonant energy. In this work we show how a γγ\gamma\gamma collider helps to verify the existence of ϕ\phi and to provide some of the most important information about the properties of ϕ\phi, such as branching fractions of ϕ→V1V2\phi\to V_1V_2. Here ViV_i can be γ\gamma, ZZ, or W±W^\pm. We also show that by studying angular distributions of the final γ\gamma's in γγ→ϕ→γγ\gamma\gamma \to \phi \to \gamma\gamma, one can obtain crucial information about whether this state is a spin-0 or a spin-2 state.Comment: ReTex, 12 page with 6 figures. Expanded discussion on distinguishing spin-0 and spin-2 cases. Several figures adde
    • …
    corecore