首页 > 最新文献

arXiv - CS - Symbolic Computation最新文献

英文 中文
Deep Neural Network for Constraint Acquisition through Tailored Loss Function 通过定制损失函数获取约束的深度神经网络
Pub Date : 2024-03-04 DOI: arxiv-2403.02042
Eduardo Vyhmeister, Rocio Paez, Gabriel Gonzalez
The significance of learning constraints from data is underscored by itspotential applications in real-world problem-solving. While constraints arepopular for modeling and solving, the approaches to learning constraints fromdata remain relatively scarce. Furthermore, the intricate task of modelingdemands expertise and is prone to errors, thus constraint acquisition methodsoffer a solution by automating this process through learnt constraints fromexamples or behaviours of solutions and non-solutions. This work introduces anovel approach grounded in Deep Neural Network (DNN) based on SymbolicRegression that, by setting suitable loss functions, constraints can beextracted directly from datasets. Using the present approach, directformulation of constraints was achieved. Furthermore, given the broadpre-developed architectures and functionalities of DNN, connections andextensions with other frameworks could be foreseen.
从数据中学习约束条件在实际问题解决中的潜在应用凸显了其重要性。虽然约束条件在建模和求解中很受欢迎,但从数据中学习约束条件的方法仍然相对匮乏。此外,复杂的建模任务需要专业知识,而且容易出错,因此约束条件获取方法提供了一种解决方案,即通过从解决方案和非解决方案的示例或行为中学习约束条件,使这一过程自动化。这项工作介绍了一种基于符号回归的深度神经网络(DNN)的新方法,通过设置合适的损失函数,可以直接从数据集中提取约束条件。使用本方法,可以直接制定约束条件。此外,鉴于 DNN 广泛的预开发架构和功能,可以预见与其他框架的连接和扩展。
{"title":"Deep Neural Network for Constraint Acquisition through Tailored Loss Function","authors":"Eduardo Vyhmeister, Rocio Paez, Gabriel Gonzalez","doi":"arxiv-2403.02042","DOIUrl":"https://doi.org/arxiv-2403.02042","url":null,"abstract":"The significance of learning constraints from data is underscored by its\u0000potential applications in real-world problem-solving. While constraints are\u0000popular for modeling and solving, the approaches to learning constraints from\u0000data remain relatively scarce. Furthermore, the intricate task of modeling\u0000demands expertise and is prone to errors, thus constraint acquisition methods\u0000offer a solution by automating this process through learnt constraints from\u0000examples or behaviours of solutions and non-solutions. This work introduces a\u0000novel approach grounded in Deep Neural Network (DNN) based on Symbolic\u0000Regression that, by setting suitable loss functions, constraints can be\u0000extracted directly from datasets. Using the present approach, direct\u0000formulation of constraints was achieved. Furthermore, given the broad\u0000pre-developed architectures and functionalities of DNN, connections and\u0000extensions with other frameworks could be foreseen.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140033239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Communication Optimal Unbalanced Private Set Union 通信最优非平衡私集联盟
Pub Date : 2024-02-26 DOI: arxiv-2402.16393
Jean-Guillaume DumasUGA, LJK, CASC, Alexis GalanCASC, Bruno GrenetCASC, Aude MaignanCASC, Daniel S. Roche
We consider the private set union (PSU) problem, where two parties each holda private set of elements, and they want one of the parties (the receiver) tolearn the union of the two sets and nothing else. Our protocols are targetedfor the unbalanced case where the receiver's set size is larger than thesender's set size, with the goal of minimizing the costs for the sender both interms of communication volume and local computation time. This setting ismotivated by applications where the receiver has significantly more data (inputset size) and computational resources than the sender which might be realizedon a small, low-power device. Asymptotically, we achieve communication costlinear in the sender's (smaller) set size, and computation costs for sender andreceiver which are nearly-linear in their respective set sizes. To ourknowledge, ours is the first algorithm to achieve nearly-linear communicationand computation for PSU in this unbalanced setting. Our protocols utilize fullyhomomorphic encryption (FHE) and, optionally, linearly homomorphic encryption(LHE) to perform the necessary computations while preserving privacy. Theunderlying computations are based on univariate polynomial arithmetic realizedwithin homomorphic encryption, namely fast multiplication, modular reduction,and multi-point evaluation. These asymptotically fast HE polynomial arithmeticalgorithms may be of independent interest.
我们考虑的是私人集合联合(PSU)问题,即双方各自持有一个私人元素集合,他们希望其中一方(接收方)只学习两个集合的联合,而不学习其他内容。我们的协议针对的是接收方集合大小大于发送方集合大小的不平衡情况,目标是最大限度地降低发送方在通信量和本地计算时间方面的成本。在这种情况下,接收方的数据量(输入集大小)和计算资源都明显多于发送方,而这种应用可能是在小型、低功耗设备上实现的。渐进地,我们实现了通信成本与发送方(较小)数据集大小的线性关系,以及发送方和接收方计算成本与各自数据集大小的近似线性关系。据我们所知,我们的算法是第一种在这种不平衡设置下实现 PSU 的近线性通信和计算的算法。我们的协议利用全同态加密(FHE)和可选的线性同态加密(LHE)来执行必要的计算,同时保护隐私。基本计算基于在同态加密中实现的单变量多项式运算,即快速乘法、模块化还原和多点评估。这些近似快速的 HE 多项式算术算法可能会引起独立的兴趣。
{"title":"Communication Optimal Unbalanced Private Set Union","authors":"Jean-Guillaume DumasUGA, LJK, CASC, Alexis GalanCASC, Bruno GrenetCASC, Aude MaignanCASC, Daniel S. Roche","doi":"arxiv-2402.16393","DOIUrl":"https://doi.org/arxiv-2402.16393","url":null,"abstract":"We consider the private set union (PSU) problem, where two parties each hold\u0000a private set of elements, and they want one of the parties (the receiver) to\u0000learn the union of the two sets and nothing else. Our protocols are targeted\u0000for the unbalanced case where the receiver's set size is larger than the\u0000sender's set size, with the goal of minimizing the costs for the sender both in\u0000terms of communication volume and local computation time. This setting is\u0000motivated by applications where the receiver has significantly more data (input\u0000set size) and computational resources than the sender which might be realized\u0000on a small, low-power device. Asymptotically, we achieve communication cost\u0000linear in the sender's (smaller) set size, and computation costs for sender and\u0000receiver which are nearly-linear in their respective set sizes. To our\u0000knowledge, ours is the first algorithm to achieve nearly-linear communication\u0000and computation for PSU in this unbalanced setting. Our protocols utilize fully\u0000homomorphic encryption (FHE) and, optionally, linearly homomorphic encryption\u0000(LHE) to perform the necessary computations while preserving privacy. The\u0000underlying computations are based on univariate polynomial arithmetic realized\u0000within homomorphic encryption, namely fast multiplication, modular reduction,\u0000and multi-point evaluation. These asymptotically fast HE polynomial arithmetic\u0000algorithms may be of independent interest.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139977247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Pseudorandom Generators for Low-Degree Polynomials Over Moderately Large Fields 中等大字段上低度多项式的最佳伪随机发生器
Pub Date : 2024-02-19 DOI: arxiv-2402.11915
Ashish Dwivedi, Zeyu Guo, Ben Lee Volk
We construct explicit pseudorandom generators that fool $n$-variatepolynomials of degree at most $d$ over a finite field $mathbb{F}_q$. The seedlength of our generators is $O(d log n + log q)$, over fields of sizeexponential in $d$ and characteristic at least $d(d-1)+1$. Previousconstructions such as Bogdanov's (STOC 2005) and Derksen and Viola's (FOCS2022) had either suboptimal seed length or required the field size to depend on$n$. Our approach follows Bogdanov's paradigm while incorporating techniques fromLecerf's factorization algorithm (J. Symb. Comput. 2007) and insights from theconstruction of Derksen and Viola regarding the role of indecomposability ofpolynomials.
我们构建了明确的伪随机发生器,这些发生器可以在有限域 $mathbb{F}_q$ 上愚弄度数最多为 $d$ 的 $n$-variatepolynomials 。我们的生成器的种子长度是 $O(dlog n + log q)$,在大小为 $d$ 的指数域上,特性至少为 $d(d-1)+1$。之前的结构,如 Bogdanov 的(STOC 2005)和 Derksen 与 Viola 的(FOCS2022),要么种子长度不够理想,要么要求域大小取决于 $n$。我们的方法沿用了 Bogdanov 的范式,同时结合了 Lecerf 因式分解算法(《符号计算杂志》,2007 年)中的技术,以及 Derksen 和 Viola 的结构中关于多项式不可分解性作用的见解。
{"title":"Optimal Pseudorandom Generators for Low-Degree Polynomials Over Moderately Large Fields","authors":"Ashish Dwivedi, Zeyu Guo, Ben Lee Volk","doi":"arxiv-2402.11915","DOIUrl":"https://doi.org/arxiv-2402.11915","url":null,"abstract":"We construct explicit pseudorandom generators that fool $n$-variate\u0000polynomials of degree at most $d$ over a finite field $mathbb{F}_q$. The seed\u0000length of our generators is $O(d log n + log q)$, over fields of size\u0000exponential in $d$ and characteristic at least $d(d-1)+1$. Previous\u0000constructions such as Bogdanov's (STOC 2005) and Derksen and Viola's (FOCS\u00002022) had either suboptimal seed length or required the field size to depend on\u0000$n$. Our approach follows Bogdanov's paradigm while incorporating techniques from\u0000Lecerf's factorization algorithm (J. Symb. Comput. 2007) and insights from the\u0000construction of Derksen and Viola regarding the role of indecomposability of\u0000polynomials.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139909598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast interpolation and multiplication of unbalanced polynomials 非平衡多项式的快速插值和乘法
Pub Date : 2024-02-15 DOI: arxiv-2402.10139
Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche
We consider the classical problems of interpolating a polynomial given ablack box for evaluation, and of multiplying two polynomials, in the settingwhere the bit-lengths of the coefficients may vary widely, so-called unbalancedpolynomials. Writing s for the total bit-length and D for the degree, our newalgorithms have expected running time $tilde{O}(s log D)$, whereas previousmethods for (resp.) dense or sparse arithmetic have at least $tilde{O}(sD)$ or$tilde{O}(s^2)$ bit complexity.
我们考虑了给定黑盒求值的多项式插值和两个多项式相乘的经典问题,在这种情况下,系数的比特长度可能变化很大,即所谓的不平衡多项式。用 s 表示总位长,用 D 表示度数,我们的新算法的预期运行时间为 $tilde{O}(s log D)$,而以前的密集或稀疏算术方法至少有 $tilde{O}(sD)$ 或 $tilde{O}(s^2)$ 的位复杂度。
{"title":"Fast interpolation and multiplication of unbalanced polynomials","authors":"Pascal Giorgi, Bruno Grenet, Armelle Perret du Cray, Daniel S. Roche","doi":"arxiv-2402.10139","DOIUrl":"https://doi.org/arxiv-2402.10139","url":null,"abstract":"We consider the classical problems of interpolating a polynomial given a\u0000black box for evaluation, and of multiplying two polynomials, in the setting\u0000where the bit-lengths of the coefficients may vary widely, so-called unbalanced\u0000polynomials. Writing s for the total bit-length and D for the degree, our new\u0000algorithms have expected running time $tilde{O}(s log D)$, whereas previous\u0000methods for (resp.) dense or sparse arithmetic have at least $tilde{O}(sD)$ or\u0000$tilde{O}(s^2)$ bit complexity.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"313 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139767434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing Krylov iterates in the time of matrix multiplication 在矩阵乘法时间内计算克雷洛夫迭代
Pub Date : 2024-02-12 DOI: arxiv-2402.07345
Vincent Neiger, Clément Pernet, Gilles Villard
Krylov methods rely on iterated matrix-vector products $A^k u_j$ for an$ntimes n$ matrix $A$ and vectors $u_1,ldots,u_m$. The space spanned by alliterates $A^k u_j$ admits a particular basis -- the emph{maximal Krylov basis}-- which consists of iterates of the first vector $u_1, Au_1, A^2u_1,ldots$,until reaching linear dependency, then iterating similarly the subsequentvectors until a basis is obtained. Finding minimal polynomials and Frobeniusnormal forms is closely related to computing maximal Krylov bases. The fastestway to produce these bases was, until this paper, Keller-Gehrig's 1985algorithm whose complexity bound $O(n^omega log(n))$ comes from repeatedsquarings of $A$ and logarithmically many Gaussian eliminations. Here$omega>2$ is a feasible exponent for matrix multiplication over the basefield. We present an algorithm computing the maximal Krylov basis in$O(n^omegaloglog(n))$ field operations when $m in O(n)$, and even$O(n^omega)$ as soon as $min O(n/log(n)^c)$ for some fixed real $c>0$. As aconsequence, we show that the Frobenius normal form together with atransformation matrix can be computed deterministically in $O(n^omegaloglog(n)^2)$, and therefore matrix exponentiation~$A^k$ can be performed inthe latter complexity if $log(k) in O(n^{omega-1-varepsilon})$, for$varepsilon>0$. A key idea for these improvements is to rely on fastalgorithms for $mtimes m$ polynomial matrices of average degree $n/m$,involving high-order lifting and minimal kernel bases.
克雷洛夫方法依赖于一个 n 次 n 元矩阵 $A$ 和向量 $u_1,ldots,u_m$ 的迭代矩阵向量积 $A^k u_j$。Alliterates $A^k u_j$ 所跨越的空间有一个特定的基础 - emph{maximal Krylov basis}--它由第一个向量 $u_1, Au_1, A^2u_1,ldots$ 的迭代组成,直到达到线性相关,然后对后面的向量进行类似的迭代,直到得到一个基础。寻找最小多项式和弗罗贝尼斯正则表达式与计算最大克雷洛夫基密切相关。在本文之前,产生这些基的最快方法是凯勒-盖里格 1985 年的算法,其复杂度边界 $O(n^omega log(n))$ 来自 $A$ 的重复求值和对数多次高斯消元。这里,$omega>2$ 是基场矩阵乘法的可行指数。我们提出了一种算法,当 $m in O(n)$ 时,只要 $min O(n/log(n)^c)$ 对于某个固定实数 $c>0$,就能在 $O(n^omegalog(n))$ 场运算中计算最大克雷洛夫基。因此,我们证明,如果 $log(k) in O(n^{omega-1-varepsilon})$, for$varepsilon>0$, Frobenius 正则表达式和变换矩阵可以在 $O(n^omegaloglog(n)^2)$ 内确定地计算,因此矩阵指数化~$A^k$ 可以在后一种复杂度内执行。这些改进的一个关键想法是依靠平均度数为 $n/m$ 的 $m/times m$ 多项式矩阵的快速算法,其中涉及高阶提升和最小核基。
{"title":"Computing Krylov iterates in the time of matrix multiplication","authors":"Vincent Neiger, Clément Pernet, Gilles Villard","doi":"arxiv-2402.07345","DOIUrl":"https://doi.org/arxiv-2402.07345","url":null,"abstract":"Krylov methods rely on iterated matrix-vector products $A^k u_j$ for an\u0000$ntimes n$ matrix $A$ and vectors $u_1,ldots,u_m$. The space spanned by all\u0000iterates $A^k u_j$ admits a particular basis -- the emph{maximal Krylov basis}\u0000-- which consists of iterates of the first vector $u_1, Au_1, A^2u_1,ldots$,\u0000until reaching linear dependency, then iterating similarly the subsequent\u0000vectors until a basis is obtained. Finding minimal polynomials and Frobenius\u0000normal forms is closely related to computing maximal Krylov bases. The fastest\u0000way to produce these bases was, until this paper, Keller-Gehrig's 1985\u0000algorithm whose complexity bound $O(n^omega log(n))$ comes from repeated\u0000squarings of $A$ and logarithmically many Gaussian eliminations. Here\u0000$omega>2$ is a feasible exponent for matrix multiplication over the base\u0000field. We present an algorithm computing the maximal Krylov basis in\u0000$O(n^omegaloglog(n))$ field operations when $m in O(n)$, and even\u0000$O(n^omega)$ as soon as $min O(n/log(n)^c)$ for some fixed real $c>0$. As a\u0000consequence, we show that the Frobenius normal form together with a\u0000transformation matrix can be computed deterministically in $O(n^omega\u0000loglog(n)^2)$, and therefore matrix exponentiation~$A^k$ can be performed in\u0000the latter complexity if $log(k) in O(n^{omega-1-varepsilon})$, for\u0000$varepsilon>0$. A key idea for these improvements is to rely on fast\u0000algorithms for $mtimes m$ polynomial matrices of average degree $n/m$,\u0000involving high-order lifting and minimal kernel bases.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139767521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring trustworthy and ethical behaviour in intelligent logical agents 确保智能逻辑代理的可信和道德行为
Pub Date : 2024-02-12 DOI: arxiv-2402.07547
Stefania Costantini
Autonomous Intelligent Agents are employed in many applications upon whichthe life and welfare of living beings and vital social functions may depend.Therefore, agents should be trustworthy. A priori certification techniques(i.e., techniques applied prior to system's deployment) can be useful, but arenot sufficient for agents that evolve, and thus modify their epistemic andbelief state, and for open Multi-Agent Systems, where heterogeneous agents canjoin or leave the system at any stage of its operation. In this paper, wepropose/refine/extend dynamic (runtime) logic-based self-checking techniques,devised in order to be able to ensure agents' trustworthy and ethicalbehaviour.
自主智能代理在许多应用中都会用到,而生物的生命和福祉以及重要的社会功能都可能依赖于此。先验的认证技术(即在系统部署前应用的技术)可能有用,但对于不断发展从而改变其认识和信念状态的代理,以及开放的多代理系统(异构代理可以在系统运行的任何阶段加入或离开系统)来说是不够的。在本文中,我们提出/完善/扩展了基于动态(运行时)逻辑的自我检查技术,目的是确保代理的行为值得信赖并符合道德规范。
{"title":"Ensuring trustworthy and ethical behaviour in intelligent logical agents","authors":"Stefania Costantini","doi":"arxiv-2402.07547","DOIUrl":"https://doi.org/arxiv-2402.07547","url":null,"abstract":"Autonomous Intelligent Agents are employed in many applications upon which\u0000the life and welfare of living beings and vital social functions may depend.\u0000Therefore, agents should be trustworthy. A priori certification techniques\u0000(i.e., techniques applied prior to system's deployment) can be useful, but are\u0000not sufficient for agents that evolve, and thus modify their epistemic and\u0000belief state, and for open Multi-Agent Systems, where heterogeneous agents can\u0000join or leave the system at any stage of its operation. In this paper, we\u0000propose/refine/extend dynamic (runtime) logic-based self-checking techniques,\u0000devised in order to be able to ensure agents' trustworthy and ethical\u0000behaviour.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"98 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139767368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Parallel Summation Algorithm 迈向并行求和算法
Pub Date : 2024-02-07 DOI: arxiv-2402.04684
Shaoshi Chen, Ruyong Feng, Manuel Kauers, Xiuyun Li
We propose a summation analog of the paradigm of parallel integration. Usingthis paradigm, we make some first steps towards an indefinite summationalgorithm applicable to summands that rationally depend on the summation indexand a P-recursive sequence and its shifts. Under the assumption that thecorresponding difference field has no unnatural constants, we are able tocompute a bound on the normal part of the denominator of a potential closedform. We can also handle the numerator. Our algorithm is incomplete so far aswe cannot predict the special part of the denominator. However, we do have somestructural results about special polynomials for the setting underconsideration.
我们提出了一种类似于并行积分范式的求和方法。利用这一范式,我们迈出了第一步,建立了一种不定求和算法,适用于合理地依赖于求和指数和 P 递推序列及其移位的求和。假定相应的差分场没有非自然常数,我们就能计算出潜在闭合形式分母法向部分的约束。我们还可以处理分子。由于我们无法预测分母的特殊部分,所以我们的算法并不完整。不过,我们确实有一些关于所考虑的特殊多项式的结构性结果。
{"title":"Towards a Parallel Summation Algorithm","authors":"Shaoshi Chen, Ruyong Feng, Manuel Kauers, Xiuyun Li","doi":"arxiv-2402.04684","DOIUrl":"https://doi.org/arxiv-2402.04684","url":null,"abstract":"We propose a summation analog of the paradigm of parallel integration. Using\u0000this paradigm, we make some first steps towards an indefinite summation\u0000algorithm applicable to summands that rationally depend on the summation index\u0000and a P-recursive sequence and its shifts. Under the assumption that the\u0000corresponding difference field has no unnatural constants, we are able to\u0000compute a bound on the normal part of the denominator of a potential closed\u0000form. We can also handle the numerator. Our algorithm is incomplete so far as\u0000we cannot predict the special part of the denominator. However, we do have some\u0000structural results about special polynomials for the setting under\u0000consideration.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139909656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SymbolicAI: A framework for logic-based approaches combining generative models and solvers SymbolicAI:结合生成模型和求解器的基于逻辑的方法框架
Pub Date : 2024-02-01 DOI: arxiv-2402.00854
Marius-Constantin Dinu, Claudiu Leoveanu-Condrei, Markus Holzleitner, Werner Zellinger, Sepp Hochreiter
We introduce SymbolicAI, a versatile and modular framework employing alogic-based approach to concept learning and flow management in generativeprocesses. SymbolicAI enables the seamless integration of generative modelswith a diverse range of solvers by treating large language models (LLMs) assemantic parsers that execute tasks based on both natural and formal languageinstructions, thus bridging the gap between symbolic reasoning and generativeAI. We leverage probabilistic programming principles to tackle complex tasks,and utilize differentiable and classical programming paradigms with theirrespective strengths. The framework introduces a set of polymorphic,compositional, and self-referential operations for data stream manipulation,aligning LLM outputs with user objectives. As a result, we can transitionbetween the capabilities of various foundation models endowed with zero- andfew-shot learning capabilities and specialized, fine-tuned models or solversproficient in addressing specific problems. In turn, the framework facilitatesthe creation and evaluation of explainable computational graphs. We conclude byintroducing a quality measure and its empirical score for evaluating thesecomputational graphs, and propose a benchmark that compares variousstate-of-the-art LLMs across a set of complex workflows. We refer to theempirical score as the "Vector Embedding for Relational Trajectory Evaluationthrough Cross-similarity", or VERTEX score for short. The framework codebaseand benchmark are linked below.
我们介绍的 SymbolicAI 是一个多功能模块化框架,它采用基于逻辑的方法来进行生成过程中的概念学习和流程管理。SymbolicAI 将大型语言模型(LLM)视为基于自然语言和形式语言指令执行任务的语义解析器,从而弥合了符号推理与生成式人工智能之间的差距,实现了生成模型与各种求解器的无缝集成。我们利用概率编程原理来处理复杂任务,并利用可微编程和经典编程范式各自的优势。该框架为数据流操作引入了一系列多态、组合和自反操作,使 LLM 输出与用户目标保持一致。因此,我们可以在具有零学习能力和少量学习能力的各种基础模型与专门的微调模型或擅长解决特定问题的求解器之间进行转换。反过来,该框架也有助于创建和评估可解释的计算图。最后,我们介绍了用于评估这些计算图的质量度量及其经验分数,并提出了一个基准,用于在一组复杂的工作流中比较各种最先进的 LLM。我们将经验分数称为 "通过交叉相似性进行关系轨迹评估的矢量嵌入",简称 VERTEX 分数。框架代码库和基准链接如下。
{"title":"SymbolicAI: A framework for logic-based approaches combining generative models and solvers","authors":"Marius-Constantin Dinu, Claudiu Leoveanu-Condrei, Markus Holzleitner, Werner Zellinger, Sepp Hochreiter","doi":"arxiv-2402.00854","DOIUrl":"https://doi.org/arxiv-2402.00854","url":null,"abstract":"We introduce SymbolicAI, a versatile and modular framework employing a\u0000logic-based approach to concept learning and flow management in generative\u0000processes. SymbolicAI enables the seamless integration of generative models\u0000with a diverse range of solvers by treating large language models (LLMs) as\u0000semantic parsers that execute tasks based on both natural and formal language\u0000instructions, thus bridging the gap between symbolic reasoning and generative\u0000AI. We leverage probabilistic programming principles to tackle complex tasks,\u0000and utilize differentiable and classical programming paradigms with their\u0000respective strengths. The framework introduces a set of polymorphic,\u0000compositional, and self-referential operations for data stream manipulation,\u0000aligning LLM outputs with user objectives. As a result, we can transition\u0000between the capabilities of various foundation models endowed with zero- and\u0000few-shot learning capabilities and specialized, fine-tuned models or solvers\u0000proficient in addressing specific problems. In turn, the framework facilitates\u0000the creation and evaluation of explainable computational graphs. We conclude by\u0000introducing a quality measure and its empirical score for evaluating these\u0000computational graphs, and propose a benchmark that compares various\u0000state-of-the-art LLMs across a set of complex workflows. We refer to the\u0000empirical score as the \"Vector Embedding for Relational Trajectory Evaluation\u0000through Cross-similarity\", or VERTEX score for short. The framework codebase\u0000and benchmark are linked below.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139666345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Creative Telescoping for Hypergeometric Double Sums 超几何双和的创造性伸缩
Pub Date : 2024-01-29 DOI: arxiv-2401.16314
Peter Paule, Carsten Schneider
We present efficient methods for calculating linear recurrences ofhypergeometric double sums and, more generally, of multiple sums. Inparticular, we supplement this approach with the algorithmic theory ofcontiguous relations, which guarantees the applicability of our method for manyinput sums. In addition, we elaborate new techniques to optimize the underlyingkey task of our method to compute rational solutions of parameterized linearrecurrences.
我们提出了计算超几何双和线性递归的有效方法,更广泛地说,我们提出了计算多重和线性递归的有效方法。特别是,我们用连续关系的算法理论对这一方法进行了补充,从而保证了我们的方法适用于多输入和。此外,我们还阐述了一些新技术,以优化我们方法的基本关键任务,即计算参数化线性回归的有理解。
{"title":"Creative Telescoping for Hypergeometric Double Sums","authors":"Peter Paule, Carsten Schneider","doi":"arxiv-2401.16314","DOIUrl":"https://doi.org/arxiv-2401.16314","url":null,"abstract":"We present efficient methods for calculating linear recurrences of\u0000hypergeometric double sums and, more generally, of multiple sums. In\u0000particular, we supplement this approach with the algorithmic theory of\u0000contiguous relations, which guarantees the applicability of our method for many\u0000input sums. In addition, we elaborate new techniques to optimize the underlying\u0000key task of our method to compute rational solutions of parameterized linear\u0000recurrences.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"323 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139588164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbolic Equation Solving via Reinforcement Learning 通过强化学习解符号方程
Pub Date : 2024-01-24 DOI: arxiv-2401.13447
Lennart Dabelow, Masahito Ueda
Machine-learning methods are gradually being adopted in a great variety ofsocial, economic, and scientific contexts, yet they are notorious forstruggling with exact mathematics. A typical example is computer algebra, whichincludes tasks like simplifying mathematical terms, calculating formalderivatives, or finding exact solutions of algebraic equations. Traditionalsoftware packages for these purposes are commonly based on a huge database ofrules for how a specific operation (e.g., differentiation) transforms a certainterm (e.g., sine function) into another one (e.g., cosine function). Thus far,these rules have usually needed to be discovered and subsequently programmed byhumans. Focusing on the paradigmatic example of solving linear equations insymbolic form, we demonstrate how the process of finding elementarytransformation rules and step-by-step solutions can be automated usingreinforcement learning with deep neural networks.
机器学习方法正逐渐被广泛应用于社会、经济和科学领域,但它们却因在精确数学方面的困难而臭名昭著。一个典型的例子是计算机代数,其中包括简化数学术语、计算形式化的余数或查找代数方程的精确解等任务。用于这些目的的传统软件包通常基于一个庞大的规则数据库,这些规则规定了特定运算(如微分)如何将某个术语(如正弦函数)转化为另一个术语(如余弦函数)。迄今为止,这些规则通常需要人类自己发现并编程。我们将重点放在以符号形式求解线性方程的典型例子上,展示了如何利用深度神经网络的强化学习来自动完成寻找基本变换规则和逐步求解的过程。
{"title":"Symbolic Equation Solving via Reinforcement Learning","authors":"Lennart Dabelow, Masahito Ueda","doi":"arxiv-2401.13447","DOIUrl":"https://doi.org/arxiv-2401.13447","url":null,"abstract":"Machine-learning methods are gradually being adopted in a great variety of\u0000social, economic, and scientific contexts, yet they are notorious for\u0000struggling with exact mathematics. A typical example is computer algebra, which\u0000includes tasks like simplifying mathematical terms, calculating formal\u0000derivatives, or finding exact solutions of algebraic equations. Traditional\u0000software packages for these purposes are commonly based on a huge database of\u0000rules for how a specific operation (e.g., differentiation) transforms a certain\u0000term (e.g., sine function) into another one (e.g., cosine function). Thus far,\u0000these rules have usually needed to be discovered and subsequently programmed by\u0000humans. Focusing on the paradigmatic example of solving linear equations in\u0000symbolic form, we demonstrate how the process of finding elementary\u0000transformation rules and step-by-step solutions can be automated using\u0000reinforcement learning with deep neural networks.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139554610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Symbolic Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1