964 research outputs found

    Cooperative Online Learning: Keeping your Neighbors Updated

    Full text link
    We study an asynchronous online learning setting with a network of agents. At each time step, some of the agents are activated, requested to make a prediction, and pay the corresponding loss. The loss function is then revealed to these agents and also to their neighbors in the network. Our results characterize how much knowing the network structure affects the regret as a function of the model of agent activations. When activations are stochastic, the optimal regret (up to constant factors) is shown to be of order αT\sqrt{\alpha T}, where TT is the horizon and α\alpha is the independence number of the network. We prove that the upper bound is achieved even when agents have no information about the network structure. When activations are adversarial the situation changes dramatically: if agents ignore the network structure, a Ω(T)\Omega(T) lower bound on the regret can be proven, showing that learning is impossible. However, when agents can choose to ignore some of their neighbors based on the knowledge of the network structure, we prove a O(χ‟T)O(\sqrt{\overline{\chi} T}) sublinear regret bound, where χ‟≄α\overline{\chi} \ge \alpha is the clique-covering number of the network

    Coarse Correlation in Extensive-Form Games

    Full text link
    Coarse correlation models strategic interactions of rational agents complemented by a correlation device, that is a mediator that can recommend behavior but not enforce it. Despite being a classical concept in the theory of normal-form games for more than forty years, not much is known about the merits of coarse correlation in extensive-form settings. In this paper, we consider two instantiations of the idea of coarse correlation in extensive-form games: normal-form coarse-correlated equilibrium (NFCCE), already defined in the literature, and extensive-form coarse-correlated equilibrium (EFCCE), which we introduce for the first time. We show that EFCCE is a subset of NFCCE and a superset of the related extensive-form correlated equilibrium. We also show that, in two-player extensive-form games, social-welfare-maximizing EFCCEs and NFCEEs are bilinear saddle points, and give new efficient algorithms for the special case of games with no chance moves. In our experiments, our proposed algorithm for NFCCE is two to four orders of magnitude faster than the prior state of the art

    Progettazione di un sistema di acquisizione dati in motoveicoli, finalizzato allo sviluppo di una centralina elettronica per la gestione degli indicatori di direzione

    Get PDF
    Questa tesi si inserisce in un progetto piĂč ampio che persegue la finalitĂ  di sviluppare una centralina elettronica, a basso costo, per la gestione degli indicatori di direzione dei motoveicoli. In particolare si vuole ottenere un sistema elettronico che non richieda l’intervento umano, ma disattivi le frecce automaticamente. Si pone quindi il problema di scegliere delle grandezze fisiche, che, variando durante una manovra cambio di direzione eseguita col motoveicolo, indichino il momento in cui tale manovra possa considerarsi terminata. Per il raggiungimento del suddetto scopo si presentano in questa tesi i principali passi per la progettazione di un sistema di acquisizione dati per i motoveicoli, finalizzato a comprendere quali siano queste grandezze maggiormente soggette a variazione durante una curva. Dopo un’analisi dello stato dell’arte e una rassegna sui principali sensori utilizzabili sul motoveicolo, si arriva a delineare uno schema elettrico di massima. In seguito si procede allo sviluppo di un prototipo che si basa su di un sensore magnetico, quindi l’idea Ăš quella di riconoscere il termine della manovra cambio di direzione, mediante la variazione del campo magnetico terrestre rilevato dal sensore. Il mercato del motoveicolo impone vincoli stringenti in termini di prezzo per l’elettronica a bordo, perciĂČ sarĂ  utilizzato un sensore di Hall a basso costo. L’obiettivo che ci si propone con il prototipo Ăš quello di recuperare informazioni sul comportamento del sensore durante una manovra cambio di direzione e di verificare che riesca effettivamente a riconoscere tali manovre

    Stable allometric trajectories in picea abies (L.) karst. trees along an elevational gradient

    Get PDF
    The effect of temperature on tree phenology and growth has gained particular attention in relation to climate change. While a number of reports indicate that warming can extend the length of the growing season and enhance tree growth rates, it is still debated whether temperature also affects biomass partitioning. Addressing the question of whether trees grown at different elevations invest similarly in various organs, we established four sites along an elevational gradient (320 to 595 m a.s.l.) in managed Norway spruce (Picea abies (L.) Karts) stands regenerating after clearcuts in central Norway. There, differences in temperature, bud break, tree growth, and allometric scaling were measured in small spruce trees (up to 3 m height). The results showed that bud break and shoot growth are affected by temperature, as lower sites completed the bud break process 5 days earlier than the higher sites did. There was some evidence indicating that the summer drought of 2018 affected tree growth during the season, and the implications of this are discussed. The allometric scaling coefficients did not change for the crown volume (slope value range 2.66–2.84), crown radius (0.77–0.89), and tree diameter (0.89–0.96) against tree height. A slight difference was found in the scaling coefficients of crown length against tree height (slope value range 1.04–1.12), but this did not affect the general scaling of the crown volume with tree height. Our results showed that different local environmental conditions affect both the growth rate and phenology in Norway spruce trees but, on the contrary, that the biomass partitioning among different parts of the tree remains essentially unchanged. This demonstrates that the allometric approach is an important tool for unraveling true vs. apparent plant plasticity, which in turn is an essential awareness for predicting plant responses to environmental changes.publishedVersio

    Dynamic Pricing with Finitely Many Unknown Valuations

    Get PDF
    Motivated by posted price auctions where buyers are grouped in an unknown number of latent types characterized by their private values for the good on sale, we investigate revenue maximization in stochastic dynamic pricing when the distribution of buyers' private values is supported on an unknown set of points in [0,1] of unknown cardinality KK. This setting can be viewed as an instance of a stochastic KK-armed bandit problem where the location of the arms (the KK unknown valuations) must be learned as well. In the distribution-free case, we prove that our setting is just as hard as KK-armed stochastic bandits: no algorithm can achieve a regret significantly better than KT\sqrt{KT}, (where T is the time horizon); we present an efficient algorithm matching this lower bound up to logarithmic factors. In the distribution-dependent case, we show that for all K>2K>2 our setting is strictly harder than KK-armed stochastic bandits by proving that it is impossible to obtain regret bounds that grow logarithmically in time or slower. On the other hand, when a lower bound γ>0\gamma>0 on the smallest drop in the demand curve is known, we prove an upper bound on the regret of order (1/Δ+(log⁡log⁡T)/γ2)(Klog⁡T)(1/\Delta+(\log \log T)/\gamma^2)(K\log T). This is a significant improvement on previously known regret bounds for discontinuous demand curves, that are at best of order (K12/γ8)T(K^{12}/\gamma^8)\sqrt{T}. When K=2K=2 in the distribution-dependent case, the hardness of our setting reduces to that of a stochastic 22-armed bandit: we prove that an upper bound of order (log⁡T)/Δ(\log T)/\Delta (up to log⁡log⁡\log\log factors) on the regret can be achieved with no information on the demand curve. Finally, we show a O(T)O(\sqrt{T}) upper bound on the regret for the setting in which the buyers' decisions are nonstochastic, and the regret is measured with respect to the best between two fixed valuations one of which is known to the seller

    Evidence and knowledge use in a meta-policy: results from an Italian case study

    Get PDF
    The analysis of the case study was conducted by means of qualitative content analysis of documents and interviews of 14 stakeholders involved in the policy making processes. In-depth interviews to five policy makers were carried out, and the emerging elements were compared with the results of the content analysis of the policy documents.

    On the Minimax Regret for Online Learning with Feedback Graphs

    Full text link
    In this work, we improve on the upper and lower bounds for the regret of online learning with strongly observable undirected feedback graphs. The best known upper bound for this problem is O(αTln⁥K)\mathcal{O}\bigl(\sqrt{\alpha T\ln K}\bigr), where KK is the number of actions, α\alpha is the independence number of the graph, and TT is the time horizon. The ln⁥K\sqrt{\ln K} factor is known to be necessary when α=1\alpha = 1 (the experts case). On the other hand, when α=K\alpha = K (the bandits case), the minimax rate is known to be Θ(KT)\Theta\bigl(\sqrt{KT}\bigr), and a lower bound Ω(αT)\Omega\bigl(\sqrt{\alpha T}\bigr) is known to hold for any α\alpha. Our improved upper bound O(αT(1+ln⁥(K/α)))\mathcal{O}\bigl(\sqrt{\alpha T(1+\ln(K/\alpha))}\bigr) holds for any α\alpha and matches the lower bounds for bandits and experts, while interpolating intermediate cases. To prove this result, we use FTRL with qq-Tsallis entropy for a carefully chosen value of q∈[1/2,1)q \in [1/2, 1) that varies with α\alpha. The analysis of this algorithm requires a new bound on the variance term in the regret. We also show how to extend our techniques to time-varying graphs, without requiring prior knowledge of their independence numbers. Our upper bound is complemented by an improved Ω(αT(ln⁥K)/(ln⁥α))\Omega\bigl(\sqrt{\alpha T(\ln K)/(\ln\alpha)}\bigr) lower bound for all α>1\alpha > 1, whose analysis relies on a novel reduction to multitask learning. This shows that a logarithmic factor is necessary as soon as α<K\alpha < K

    QEVSEC: Quick Electric Vehicle SEcure Charging via Dynamic Wireless Power Transfer

    Full text link
    Dynamic Wireless Power Transfer (DWPT) can be used for on-demand recharging of Electric Vehicles (EV) while driving. However, DWPT raises numerous security and privacy concerns. Recently, researchers demonstrated that DWPT systems are vulnerable to adversarial attacks. In an EV charging scenario, an attacker can prevent the authorized customer from charging, obtain a free charge by billing a victim user and track a target vehicle. State-of-the-art authentication schemes relying on centralized solutions are either vulnerable to various attacks or have high computational complexity, making them unsuitable for a dynamic scenario. In this paper, we propose Quick Electric Vehicle SEcure Charging (QEVSEC), a novel, secure, and efficient authentication protocol for the dynamic charging of EVs. Our idea for QEVSEC originates from multiple vulnerabilities we found in the state-of-the-art protocol that allows tracking of user activity and is susceptible to replay attacks. Based on these observations, the proposed protocol solves these issues and achieves lower computational complexity by using only primitive cryptographic operations in a very short message exchange. QEVSEC provides scalability and a reduced cost in each iteration, thus lowering the impact on the power needed from the grid.Comment: 6 pages, conferenc

    Unsupervised Image Regression for Heterogeneous Change Detection

    Get PDF
    Change detection (CD) in heterogeneous multitemporal satellite images is an emerging and challenging topic in remote sensing. In particular, one of the main challenges is to tackle the problem in an unsupervised manner. In this paper, we propose an unsupervised framework for bitemporal heterogeneous CD based on the comparison of affinity matrices and image regression. First, our method quantifies the similarity of affinity matrices computed from colocated image patches in the two images. This is done to automatically identify pixels that are likely to be unchanged. With the identified pixels as pseudotraining data, we learn a transformation to map the first image to the domain of the other image and vice versa. Four regression methods are selected to carry out the transformation: Gaussian process regression, support vector regression, random forest regression (RFR), and a recently proposed kernel regression method called homogeneous pixel transformation. To evaluate the potentials and limitations of our framework and also the benefits and disadvantages of each regression method, we perform experiments on two real data sets. The results indicate that the comparison of the affinity matrices can already be considered a CD method by itself. However, image regression is shown to improve the results obtained by the previous step alone and produces accurate CD maps despite of the heterogeneity of the multitemporal input data. Notably, the RFR approach excels by achieving similar accuracy as the other methods, but with a significantly lower computational cost and with fast and robust tuning of hyperparameters
    • 

    corecore