33,901 research outputs found
Classifying Network Data with Deep Kernel Machines
Inspired by a growing interest in analyzing network data, we study the
problem of node classification on graphs, focusing on approaches based on
kernel machines. Conventionally, kernel machines are linear classifiers in the
implicit feature space. We argue that linear classification in the feature
space of kernels commonly used for graphs is often not enough to produce good
results. When this is the case, one naturally considers nonlinear classifiers
in the feature space. We show that repeating this process produces something we
call "deep kernel machines." We provide some examples where deep kernel
machines can make a big difference in classification performance, and point out
some connections to various recent literature on deep architectures in
artificial intelligence and machine learning
A New Chase-type Soft-decision Decoding Algorithm for Reed-Solomon Codes
This paper addresses three relevant issues arising in designing Chase-type
algorithms for Reed-Solomon codes: 1) how to choose the set of testing
patterns; 2) given the set of testing patterns, what is the optimal testing
order in the sense that the most-likely codeword is expected to appear earlier;
and 3) how to identify the most-likely codeword. A new Chase-type soft-decision
decoding algorithm is proposed, referred to as tree-based Chase-type algorithm.
The proposed algorithm takes the set of all vectors as the set of testing
patterns, and hence definitely delivers the most-likely codeword provided that
the computational resources are allowed. All the testing patterns are arranged
in an ordered rooted tree according to the likelihood bounds of the possibly
generated codewords. While performing the algorithm, the ordered rooted tree is
constructed progressively by adding at most two leafs at each trial. The
ordered tree naturally induces a sufficient condition for the most-likely
codeword. That is, whenever the proposed algorithm exits before a preset
maximum number of trials is reached, the output codeword must be the
most-likely one. When the proposed algorithm is combined with Guruswami-Sudan
(GS) algorithm, each trial can be implement in an extremely simple way by
removing one old point and interpolating one new point. Simulation results show
that the proposed algorithm performs better than the recently proposed
Chase-type algorithm by Bellorado et al with less trials given that the maximum
number of trials is the same. Also proposed are simulation-based performance
bounds on the MLD algorithm, which are utilized to illustrate the
near-optimality of the proposed algorithm in the high SNR region. In addition,
the proposed algorithm admits decoding with a likelihood threshold, that
searches the most-likely codeword within an Euclidean sphere rather than a
Hamming sphere
Interaction effects on 1D fermionic symmetry protected topological phases
In free fermion systems with given symmetry and dimension, the possible
topological phases are labeled by elements of only three types of Abelian
groups, Z_1, Z_2, or Z. For example non-interacting 1D fermionic
superconducting phases with S_z spin rotation and time-reversal symmetries are
classified by Z. We show that with weak interactions, this classification
reduces to Z_4. Using group cohomology, one can additionally show that there
are only four distinct phases for such 1D superconductors even with strong
interactions. Comparing their projective representations, we find all these
four symmetry protected topological phases can be realized with free fermions.
Further, we show that 1D fermionic superconducting phases with Z_n discrete S_z
spin rotation and time-reversal symmetries are classified by Z_4 when n=even
and Z_2 when n=odd; again, all these strongly interacting topological phases
can be realized by non-interacting fermions. Our approach can be applied to
systems with other symmetries to see which 1D topological phases can be
realized by free fermions
Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency
Given a social network G and a constant k, the influence maximization problem
asks for k nodes in G that (directly and indirectly) influence the largest
number of nodes under a pre-defined diffusion model. This problem finds
important applications in viral marketing, and has been extensively studied in
the literature. Existing algorithms for influence maximization, however, either
trade approximation guarantees for practical efficiency, or vice versa. In
particular, among the algorithms that achieve constant factor approximations
under the prominent independent cascade (IC) model or linear threshold (LT)
model, none can handle a million-node graph without incurring prohibitive
overheads.
This paper presents TIM, an algorithm that aims to bridge the theory and
practice in influence maximization. On the theory side, we show that TIM runs
in O((k+\ell) (n+m) \log n / \epsilon^2) expected time and returns a
(1-1/e-\epsilon)-approximate solution with at least 1 - n^{-\ell} probability.
The time complexity of TIM is near-optimal under the IC model, as it is only a
\log n factor larger than the \Omega(m + n) lower-bound established in previous
work (for fixed k, \ell, and \epsilon). Moreover, TIM supports the triggering
model, which is a general diffusion model that includes both IC and LT as
special cases. On the practice side, TIM incorporates novel heuristics that
significantly improve its empirical efficiency without compromising its
asymptotic performance. We experimentally evaluate TIM with the largest
datasets ever tested in the literature, and show that it outperforms the
state-of-the-art solutions (with approximation guarantees) by up to four orders
of magnitude in terms of running time. In particular, when k = 50, \epsilon =
0.2, and \ell = 1, TIM requires less than one hour on a commodity machine to
process a network with 41.6 million nodes and 1.4 billion edges.Comment: Revised Sections 1, 2.3, and 5 to remove incorrect claims about
reference [3]. Updated experiments accordingly. A shorter version of the
paper will appear in SIGMOD 201
A Collider for the 750 GeV Resonant State
Recent data collected by ATLAS and CMS at 13 TeV collision energy of the LHC
indicate the existence of a new resonant state with a mass of 750 GeV
decaying into two photons . The properties of should be
studied further at the LHC and also future colliders. Since only decay channel has been measured, one of the best ways to extract
more information about is to use a collider to produce
at the resonant energy. In this work we show how a
collider helps to verify the existence of and to provide some of the
most important information about the properties of , such as branching
fractions of . Here can be , , or . We
also show that by studying angular distributions of the final 's in
, one can obtain crucial information
about whether this state is a spin-0 or a spin-2 state.Comment: ReTex, 12 page with 6 figures. Expanded discussion on distinguishing
spin-0 and spin-2 cases. Several figures adde
- …