首页 > 最新文献

arXiv - CS - Symbolic Computation最新文献

英文 中文
clauseSMT: A NLSAT-Based Clause-Level Framework for Satisfiability Modulo Nonlinear Real Arithmetic Theory clauseSMT: 基于 NLSAT 的可满足性模态非线性实数算术理论的条款级框架
Pub Date : 2024-06-04 DOI: arxiv-2406.02122
Zhonghan Wang
Model-constructing satisfiability calculus (MCSAT) framework has been appliedto SMT problems on different arithmetic theories. NLSAT, an implementationusing cylindrical algebraic decomposition for explanation, is especiallycompetitive among nonlinear real arithmetic constraints. However, currentConflict-Driven Clause Learning (CDCL)-style algorithms only consider literalinformation for decision, and thus ignore clause-level influence on arithmeticvariables. As a consequence, NLSAT encounters unnecessary conflicts caused byimproper literal decisions. In this work, we analyze the literal decision caused conflicts, and introduceclause-level information with a direct effect on arithmetic variables. Two mainalgorithm improvements are presented: clause-level feasible-set basedlook-ahead mechanism and arithmetic propagation based branching heuristic. Weimplement our solver named clauseSMT on our dynamic variable orderingframework. Experiments show that clauseSMT is competitive on nonlinear realarithmetic theory against existing SMT solvers (cvc5, Z3, Yices2), andoutperforms all these solvers on satisfiable instances of SMT(QF_NRA) inSMT-LIB. The effectiveness of our proposed methods are also studied.
模型构造可满足性微积分(MCSAT)框架已被应用于不同算术理论的 SMT 问题。NLSAT 是一种使用圆柱代数分解进行解释的实现方法,在非线性实算术约束中尤其具有竞争力。然而,目前的冲突驱动条款学习(Conflict-Driven Clause Learning,CDCL)式算法只考虑字面信息进行决策,从而忽略了条款层面对算术变量的影响。因此,NLSAT 会遇到因字面决策不当而导致的不必要冲突。在这项工作中,我们分析了字面决策引起的冲突,并引入了对算术变量有直接影响的条款级信息。我们提出了两个主要的算法改进:基于子句级可行集的前瞻机制和基于算术传播的分支启发式。我们在动态变量排序框架上实现了名为 clauseSMT 的求解器。实验表明,与现有的 SMT 求解器(cvc5、Z3、Yices2)相比,c clauseSMT 在非线性实数理论上具有竞争力,并且在 SMT-LIB 中的 SMT(QF_NRA)可满足实例上优于所有这些求解器。此外,还研究了我们提出的方法的有效性。
{"title":"clauseSMT: A NLSAT-Based Clause-Level Framework for Satisfiability Modulo Nonlinear Real Arithmetic Theory","authors":"Zhonghan Wang","doi":"arxiv-2406.02122","DOIUrl":"https://doi.org/arxiv-2406.02122","url":null,"abstract":"Model-constructing satisfiability calculus (MCSAT) framework has been applied\u0000to SMT problems on different arithmetic theories. NLSAT, an implementation\u0000using cylindrical algebraic decomposition for explanation, is especially\u0000competitive among nonlinear real arithmetic constraints. However, current\u0000Conflict-Driven Clause Learning (CDCL)-style algorithms only consider literal\u0000information for decision, and thus ignore clause-level influence on arithmetic\u0000variables. As a consequence, NLSAT encounters unnecessary conflicts caused by\u0000improper literal decisions. In this work, we analyze the literal decision caused conflicts, and introduce\u0000clause-level information with a direct effect on arithmetic variables. Two main\u0000algorithm improvements are presented: clause-level feasible-set based\u0000look-ahead mechanism and arithmetic propagation based branching heuristic. We\u0000implement our solver named clauseSMT on our dynamic variable ordering\u0000framework. Experiments show that clauseSMT is competitive on nonlinear real\u0000arithmetic theory against existing SMT solvers (cvc5, Z3, Yices2), and\u0000outperforms all these solvers on satisfiable instances of SMT(QF_NRA) in\u0000SMT-LIB. The effectiveness of our proposed methods are also studied.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141252324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Representing Piecewise-Linear Functions by Functions with Minimal Arity 用具有最小 Arity 的函数表示片线性函数
Pub Date : 2024-06-04 DOI: arxiv-2406.02421
Christoph Koutschan, Anton Ponomarchuk, Josef Schicho
Any continuous piecewise-linear function $Fcolon mathbb{R}^{n}tomathbb{R}$ can be represented as a linear combination of $max$ functions ofat most $n+1$ affine-linear functions. In our previous paper [``Representingpiecewise linear functions by functions with small arity'', AAECC, 2023], weshowed that this upper bound of $n+1$ arguments is tight. In the present paper,we extend this result by establishing a correspondence between the function $F$and the minimal number of arguments that are needed in any such decomposition.We show that the tessellation of the input space $mathbb{R}^{n}$ induced bythe function $F$ has a direct connection to the number of arguments in the$max$ functions.
任何连续的片断线性函数 $Fcolon mathbb{R}^{n}tomathbb{R}$ 都可以表示为最多 $n+1$ 仿真线性函数的 $max$ 函数的线性组合。在我们之前的论文["Representingpiecewise linear functions by functions with small arity'', AAECC, 2023]中,我们证明了这个 $n+1$ 参数的上限是很紧的。在本文中,我们通过建立函数 $F$ 与任何此类分解所需的最小参数数之间的对应关系来扩展这一结果。我们证明,函数 $F$ 所诱导的输入空间 $mathbb{R}^{n}$ 的细分与 $max$ 函数中的参数数有直接联系。
{"title":"Representing Piecewise-Linear Functions by Functions with Minimal Arity","authors":"Christoph Koutschan, Anton Ponomarchuk, Josef Schicho","doi":"arxiv-2406.02421","DOIUrl":"https://doi.org/arxiv-2406.02421","url":null,"abstract":"Any continuous piecewise-linear function $Fcolon mathbb{R}^{n}to\u0000mathbb{R}$ can be represented as a linear combination of $max$ functions of\u0000at most $n+1$ affine-linear functions. In our previous paper [``Representing\u0000piecewise linear functions by functions with small arity'', AAECC, 2023], we\u0000showed that this upper bound of $n+1$ arguments is tight. In the present paper,\u0000we extend this result by establishing a correspondence between the function $F$\u0000and the minimal number of arguments that are needed in any such decomposition.\u0000We show that the tessellation of the input space $mathbb{R}^{n}$ induced by\u0000the function $F$ has a direct connection to the number of arguments in the\u0000$max$ functions.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141252320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polynomial Bounds of CFLOBDDs against BDDs CFLOBDD 针对 BDD 的多项式边界
Pub Date : 2024-06-03 DOI: arxiv-2406.01525
Xusheng ZhiUniversity of Wisconsin-Madison and Peking University, Thomas RepsUniversity of Wisconsin-Madison
Binary Decision Diagrams (BDDs) are widely used for the representation ofBoolean functions. Context-Free-Language Ordered Decision Diagrams (CFLOBDDs)are a plug-compatible replacement for BDDs -- roughly, they are BDDs augmentedwith a certain form of procedure call. A natural question to ask is, ``For agiven Boolean function $f$, what is the relationship between the size of a BDDfor $f$ and the size of a CFLOBDD for $f$?'' Sistla et al. established that, inthe best case, the CFLOBDD for a function $f$ can be exponentially smaller thanany BDD for $f$ (regardless of what variable ordering is used in the BDD);however, they did not give a worst-case bound -- i.e., they left open thequestion, ``Is there a family of functions ${ f_i }$ for which the size of aCFLOBDD for $f_i$ must be substantially larger than a BDD for $f_i$?'' Forinstance, it could be that there is a family of functions for which the BDDsare exponentially more succinct than any corresponding CFLOBDDs. This paper studies such questions, and answers the second question posedabove in the negative. In particular, we show that by using the same variableordering in the CFLOBDD that is used in the BDD, the size of a CFLOBDD for anyfunction $f$ cannot be far worse than the size of the BDD for $f$. The boundthat relates their sizes is polynomial: If BDD $B$ for function $f$ is of size$|B|$ and uses variable ordering $textit{Ord}$, then the size of the CFLOBDD$C$ for $f$ that also uses $textit{Ord}$ is bounded by $O(|B|^3)$. The paper also shows that the bound is tight: there is a family of functionsfor which $|C|$ grows as $Omega(|B|^3)$.
二进制判定图(BDD)被广泛用于布尔函数的表示。上下文自由语言有序判定图(Context-Free-Language Ordered Decision Diagrams,CFLOBDDs)是二元判定图的插件兼容替代品--粗略地说,它们是带有某种过程调用形式的二元判定图。一个自然的问题是:"对于给定的布尔函数 $f$,$f$ 的 BDD 大小与 $f$ 的 CFLOBDD 大小之间的关系是什么?Sistla 等人确定,在最好的情况下,函数 $f$ 的 CFLOBDD 可以比任何 $f$ 的 BDD 小指数级(无论 BDD 中使用了什么变量排序);但是,他们没有给出最坏情况下的约束,也就是说,他们留下了这样一个问题:"是否存在函数 ${ f_i }$族,对于这个函数族,$f_i$ 的 CFLOBDD 的大小必须远远大于 $f_i$ 的 BDD 的大小?举例来说,可能有一类函数的BDD比任何相应的CFLOBDD都要简洁得多。本文对此类问题进行了研究,并对上述第二个问题做出了否定的回答。我们特别指出,通过在 CFLOBDD 中使用与 BDD 相同的变量排序,对于任何函数 $f$ 的 CFLOBDD 的大小不会比对于 $f$ 的 BDD 的大小差很多。它们的大小之间的关系是多项式:如果函数 $f$ 的 BDD $B$ 大小为 $|B|$,并使用变量排序 $textit{Ord}$,那么同样使用 $textit{Ord}$的 $f$ 的 CFLOBDD$C$ 大小的边界为 $O(|B|^3)$。本文还证明了这一约束的严密性:存在一个函数族,其 $|C|$ 的增长为 $Omega(|B|^3)$。
{"title":"Polynomial Bounds of CFLOBDDs against BDDs","authors":"Xusheng ZhiUniversity of Wisconsin-Madison and Peking University, Thomas RepsUniversity of Wisconsin-Madison","doi":"arxiv-2406.01525","DOIUrl":"https://doi.org/arxiv-2406.01525","url":null,"abstract":"Binary Decision Diagrams (BDDs) are widely used for the representation of\u0000Boolean functions. Context-Free-Language Ordered Decision Diagrams (CFLOBDDs)\u0000are a plug-compatible replacement for BDDs -- roughly, they are BDDs augmented\u0000with a certain form of procedure call. A natural question to ask is, ``For a\u0000given Boolean function $f$, what is the relationship between the size of a BDD\u0000for $f$ and the size of a CFLOBDD for $f$?'' Sistla et al. established that, in\u0000the best case, the CFLOBDD for a function $f$ can be exponentially smaller than\u0000any BDD for $f$ (regardless of what variable ordering is used in the BDD);\u0000however, they did not give a worst-case bound -- i.e., they left open the\u0000question, ``Is there a family of functions ${ f_i }$ for which the size of a\u0000CFLOBDD for $f_i$ must be substantially larger than a BDD for $f_i$?'' For\u0000instance, it could be that there is a family of functions for which the BDDs\u0000are exponentially more succinct than any corresponding CFLOBDDs. This paper studies such questions, and answers the second question posed\u0000above in the negative. In particular, we show that by using the same variable\u0000ordering in the CFLOBDD that is used in the BDD, the size of a CFLOBDD for any\u0000function $f$ cannot be far worse than the size of the BDD for $f$. The bound\u0000that relates their sizes is polynomial: If BDD $B$ for function $f$ is of size\u0000$|B|$ and uses variable ordering $textit{Ord}$, then the size of the CFLOBDD\u0000$C$ for $f$ that also uses $textit{Ord}$ is bounded by $O(|B|^3)$. The paper also shows that the bound is tight: there is a family of functions\u0000for which $|C|$ grows as $Omega(|B|^3)$.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141252119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI 利用神经符号人工智能进行网络入侵检测的协同方法
Pub Date : 2024-06-03 DOI: arxiv-2406.00938
Alice Bizzarri, Chung-En Yu, Brian Jalaian, Fabrizio Riguzzi, Nathaniel D. Bastian
The prevailing approaches in Network Intrusion Detection Systems (NIDS) areoften hampered by issues such as high resource consumption, significantcomputational demands, and poor interpretability. Furthermore, these systemsgenerally struggle to identify novel, rapidly changing cyber threats. Thispaper delves into the potential of incorporating Neurosymbolic ArtificialIntelligence (NSAI) into NIDS, combining deep learning's data-driven strengthswith symbolic AI's logical reasoning to tackle the dynamic challenges incybersecurity, which also includes detailed NSAI techniques introduction forcyber professionals to explore the potential strengths of NSAI in NIDS. Theinclusion of NSAI in NIDS marks potential advancements in both the detectionand interpretation of intricate network threats, benefiting from the robustpattern recognition of neural networks and the interpretive prowess of symbolicreasoning. By analyzing network traffic data types and machine learningarchitectures, we illustrate NSAI's distinctive capability to offer moreprofound insights into network behavior, thereby improving both detectionperformance and the adaptability of the system. This merging of technologiesnot only enhances the functionality of traditional NIDS but also sets the stagefor future developments in building more resilient, interpretable, and dynamicdefense mechanisms against advanced cyber threats. The continued progress inthis area is poised to transform NIDS into a system that is both responsive toknown threats and anticipatory of emerging, unseen ones.
网络入侵检测系统(NIDS)中的主流方法往往受到资源消耗大、计算要求高和可解释性差等问题的阻碍。此外,这些系统通常难以识别新颖、快速变化的网络威胁。本文深入探讨了将神经符号人工智能(NSAI)纳入 NIDS 的潜力,将深度学习的数据驱动优势与符号人工智能的逻辑推理相结合,以应对网络安全领域的动态挑战,其中还包括详细的 NSAI 技术介绍,供网络专业人士探索 NSAI 在 NIDS 中的潜在优势。将 NSAI 纳入 NIDS 标志着在检测和解释复杂网络威胁方面的潜在进步,神经网络的强大模式识别能力和符号推理的解释能力将从中受益。通过分析网络流量数据类型和机器学习架构,我们展示了 NSAI 的独特能力,它能提供对网络行为更深刻的见解,从而提高检测性能和系统适应性。这种技术的融合不仅增强了传统 NIDS 的功能,还为未来针对高级网络威胁建立更具弹性、可解释性和动态防御机制的发展奠定了基础。这一领域的持续进步将使 NIDS 成为一个既能应对已知威胁,又能预测新出现的未知威胁的系统。
{"title":"A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI","authors":"Alice Bizzarri, Chung-En Yu, Brian Jalaian, Fabrizio Riguzzi, Nathaniel D. Bastian","doi":"arxiv-2406.00938","DOIUrl":"https://doi.org/arxiv-2406.00938","url":null,"abstract":"The prevailing approaches in Network Intrusion Detection Systems (NIDS) are\u0000often hampered by issues such as high resource consumption, significant\u0000computational demands, and poor interpretability. Furthermore, these systems\u0000generally struggle to identify novel, rapidly changing cyber threats. This\u0000paper delves into the potential of incorporating Neurosymbolic Artificial\u0000Intelligence (NSAI) into NIDS, combining deep learning's data-driven strengths\u0000with symbolic AI's logical reasoning to tackle the dynamic challenges in\u0000cybersecurity, which also includes detailed NSAI techniques introduction for\u0000cyber professionals to explore the potential strengths of NSAI in NIDS. The\u0000inclusion of NSAI in NIDS marks potential advancements in both the detection\u0000and interpretation of intricate network threats, benefiting from the robust\u0000pattern recognition of neural networks and the interpretive prowess of symbolic\u0000reasoning. By analyzing network traffic data types and machine learning\u0000architectures, we illustrate NSAI's distinctive capability to offer more\u0000profound insights into network behavior, thereby improving both detection\u0000performance and the adaptability of the system. This merging of technologies\u0000not only enhances the functionality of traditional NIDS but also sets the stage\u0000for future developments in building more resilient, interpretable, and dynamic\u0000defense mechanisms against advanced cyber threats. The continued progress in\u0000this area is poised to transform NIDS into a system that is both responsive to\u0000known threats and anticipatory of emerging, unseen ones.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141252118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shape Constraints in Symbolic Regression using Penalized Least Squares 使用惩罚性最小二乘法的符号回归中的形状约束
Pub Date : 2024-05-31 DOI: arxiv-2405.20800
Viktor Martinek, Julia Reuter, Ophelia Frotscher, Sanaz Mostaghim, Markus Richter, Roland Herzog
We study the addition of shape constraints and their consideration during theparameter estimation step of symbolic regression (SR). Shape constraints serveas a means to introduce prior knowledge about the shape of the otherwiseunknown model function into SR. Unlike previous works that have explored shapeconstraints in SR, we propose minimizing shape constraint violations duringparameter estimation using gradient-based numerical optimization. We test three algorithm variants to evaluate their performance in identifyingthree symbolic expressions from a synthetically generated data set. This paperexamines two benchmark scenarios: one with varying noise levels and anotherwith reduced amounts of training data. The results indicate that incorporatingshape constraints into the expression search is particularly beneficial whendata is scarce. Compared to using shape constraints only in the selectionprocess, our approach of minimizing violations during parameter estimationshows a statistically significant benefit in some of our test cases, withoutbeing significantly worse in any instance.
我们研究了在符号回归(SR)的参数估计步骤中增加形状约束及其考虑因素。形状约束是一种在 SR 中引入关于未知模型函数形状的先验知识的方法。与之前在 SR 中探讨形状约束的工作不同,我们建议在参数估计过程中使用基于梯度的数值优化来最小化违反形状约束的情况。我们测试了三种算法变体,以评估它们在从合成生成的数据集中识别三种符号表达式时的性能。本论文对两种基准情景进行了测试:一种是噪声水平不同的情景,另一种是训练数据量减少的情景。结果表明,在数据稀缺的情况下,将形状约束纳入表达式搜索尤其有益。与仅在选择过程中使用形状约束相比,我们在参数估计过程中最小化违规的方法在一些测试案例中显示出了统计学上的显著优势,而在任何情况下都没有明显的劣势。
{"title":"Shape Constraints in Symbolic Regression using Penalized Least Squares","authors":"Viktor Martinek, Julia Reuter, Ophelia Frotscher, Sanaz Mostaghim, Markus Richter, Roland Herzog","doi":"arxiv-2405.20800","DOIUrl":"https://doi.org/arxiv-2405.20800","url":null,"abstract":"We study the addition of shape constraints and their consideration during the\u0000parameter estimation step of symbolic regression (SR). Shape constraints serve\u0000as a means to introduce prior knowledge about the shape of the otherwise\u0000unknown model function into SR. Unlike previous works that have explored shape\u0000constraints in SR, we propose minimizing shape constraint violations during\u0000parameter estimation using gradient-based numerical optimization. We test three algorithm variants to evaluate their performance in identifying\u0000three symbolic expressions from a synthetically generated data set. This paper\u0000examines two benchmark scenarios: one with varying noise levels and another\u0000with reduced amounts of training data. The results indicate that incorporating\u0000shape constraints into the expression search is particularly beneficial when\u0000data is scarce. Compared to using shape constraints only in the selection\u0000process, our approach of minimizing violations during parameter estimation\u0000shows a statistically significant benefit in some of our test cases, without\u0000being significantly worse in any instance.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141252120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Modelling with Bigraphs 使用 Bigraphs 建立实用模型
Pub Date : 2024-05-31 DOI: arxiv-2405.20745
Blair Archibald, Muffy Calder, Michele Sevegnani
Bigraphs are a versatile modelling formalism that allows easy expression ofplacement and connectivity relations in a graphical format. System evolution isuser defined as a set of rewrite rules. This paper presents a practical, yetdetailed guide to developing, executing, and reasoning about bigraph models,including recent extensions such as parameterised, instantaneous, prioritisedand conditional rules, and probabilistic and stochastic rewriting.
Bigraphs 是一种通用的建模形式,可以用图形格式轻松表达位置和连接关系。系统演化被用户定义为一组重写规则。本文介绍了开发、执行和推理 bigraph 模型的实用而详细的指南,包括最近的扩展,如参数化、瞬时、优先和条件规则,以及概率和随机重写。
{"title":"Practical Modelling with Bigraphs","authors":"Blair Archibald, Muffy Calder, Michele Sevegnani","doi":"arxiv-2405.20745","DOIUrl":"https://doi.org/arxiv-2405.20745","url":null,"abstract":"Bigraphs are a versatile modelling formalism that allows easy expression of\u0000placement and connectivity relations in a graphical format. System evolution is\u0000user defined as a set of rewrite rules. This paper presents a practical, yet\u0000detailed guide to developing, executing, and reasoning about bigraph models,\u0000including recent extensions such as parameterised, instantaneous, prioritised\u0000and conditional rules, and probabilistic and stochastic rewriting.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141252124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ParSEL: Parameterized Shape Editing with Language ParSEL:用语言进行参数化形状编辑
Pub Date : 2024-05-30 DOI: arxiv-2405.20319
Aditya Ganeshan, Ryan Y. Huang, Xianghao Xu, R. Kenny Jones, Daniel Ritchie
The ability to edit 3D assets from natural language presents a compellingparadigm to aid in the democratization of 3D content creation. However, whilenatural language is often effective at communicating general intent, it ispoorly suited for specifying precise manipulation. To address this gap, weintroduce ParSEL, a system that enables controllable editing of high-quality 3Dassets from natural language. Given a segmented 3D mesh and an editing request,ParSEL produces a parameterized editing program. Adjusting the programparameters allows users to explore shape variations with a precise control overthe magnitudes of edits. To infer editing programs which align with an inputedit request, we leverage the abilities of large-language models (LLMs).However, while we find that LLMs excel at identifying initial edit operations,they often fail to infer complete editing programs, and produce outputs thatviolate shape semantics. To overcome this issue, we introduce Analytical EditPropagation (AEP), an algorithm which extends a seed edit with additionaloperations until a complete editing program has been formed. Unlike priormethods, AEP searches for analytical editing operations compatible with a rangeof possible user edits through the integration of computer algebra systems forgeometric analysis. Experimentally we demonstrate ParSEL's effectiveness inenabling controllable editing of 3D objects through natural language requestsover alternative system designs.
用自然语言编辑 3D 资产的能力为 3D 内容创作的民主化提供了一个引人注目的范式。然而,虽然自然语言通常能有效传达一般意图,但却不太适合指定精确操作。为了弥补这一不足,我们推出了 ParSEL 系统,它可以通过自然语言对高质量的 3D 资产进行可控编辑。给定一个分割的三维网格和一个编辑请求,ParSEL 会生成一个参数化的编辑程序。通过调整程序参数,用户可以探索形状的变化,并精确控制编辑的幅度。为了推断出与输入编辑请求相一致的编辑程序,我们利用了大型语言模型(LLM)的能力。然而,尽管我们发现 LLM 擅长识别初始编辑操作,但它们往往无法推断出完整的编辑程序,并产生违反形状语义的输出。为了克服这个问题,我们引入了分析编辑推广算法(AEP),这种算法通过附加操作来扩展种子编辑,直到形成完整的编辑程序。与传统方法不同的是,AEP 通过整合计算机代数系统的计量分析,寻找与一系列可能的用户编辑相兼容的分析编辑操作。通过实验,我们证明了 ParSEL 在通过自然语言请求对 3D 物体进行可控编辑方面的有效性。
{"title":"ParSEL: Parameterized Shape Editing with Language","authors":"Aditya Ganeshan, Ryan Y. Huang, Xianghao Xu, R. Kenny Jones, Daniel Ritchie","doi":"arxiv-2405.20319","DOIUrl":"https://doi.org/arxiv-2405.20319","url":null,"abstract":"The ability to edit 3D assets from natural language presents a compelling\u0000paradigm to aid in the democratization of 3D content creation. However, while\u0000natural language is often effective at communicating general intent, it is\u0000poorly suited for specifying precise manipulation. To address this gap, we\u0000introduce ParSEL, a system that enables controllable editing of high-quality 3D\u0000assets from natural language. Given a segmented 3D mesh and an editing request,\u0000ParSEL produces a parameterized editing program. Adjusting the program\u0000parameters allows users to explore shape variations with a precise control over\u0000the magnitudes of edits. To infer editing programs which align with an input\u0000edit request, we leverage the abilities of large-language models (LLMs).\u0000However, while we find that LLMs excel at identifying initial edit operations,\u0000they often fail to infer complete editing programs, and produce outputs that\u0000violate shape semantics. To overcome this issue, we introduce Analytical Edit\u0000Propagation (AEP), an algorithm which extends a seed edit with additional\u0000operations until a complete editing program has been formed. Unlike prior\u0000methods, AEP searches for analytical editing operations compatible with a range\u0000of possible user edits through the integration of computer algebra systems for\u0000geometric analysis. Experimentally we demonstrate ParSEL's effectiveness in\u0000enabling controllable editing of 3D objects through natural language requests\u0000over alternative system designs.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"149 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Problem of Separating Variables in Multivariate Polynomial Ideals 论多元多项式理想中的变量分离问题
Pub Date : 2024-05-29 DOI: arxiv-2405.19223
Manfred Buchacher, Manuel Kauers
For a given ideal I in K[x_1,...,x_n,y_1,...,y_m] in a polynomial ring withn+m variables, we want to find all elements that can be written as f-g for somef in K[x_1,...,x_n] and some g in K[y_1,...,y_m], i.e., all elements of I thatcontain no term involving at the same time one of the x_1,...,x_n and one ofthe y_1,...,y_m. For principal ideals and for ideals of dimension zero, we givea algorithms that compute all these polynomials in a finite number of steps.
对于具有 n+m 个变量的多项式环 K[x_1,...,x_n,y_1,...,y_m] 中的给定理想 I,我们希望找到所有元素,对于 K[x_1,...,x_n] 中的某个 f 和 K[y_1,...,y_m] 中的某个 g,都可以写成 f-g,也就是说、即 I 中的所有元素都不包含同时涉及 x_1,...,x_n 中的一个项和 y_1,...,y_m 中的一个项。对于主理想和维数为零的理想,我们给出了用有限步数计算所有这些多项式的算法。
{"title":"On the Problem of Separating Variables in Multivariate Polynomial Ideals","authors":"Manfred Buchacher, Manuel Kauers","doi":"arxiv-2405.19223","DOIUrl":"https://doi.org/arxiv-2405.19223","url":null,"abstract":"For a given ideal I in K[x_1,...,x_n,y_1,...,y_m] in a polynomial ring with\u0000n+m variables, we want to find all elements that can be written as f-g for some\u0000f in K[x_1,...,x_n] and some g in K[y_1,...,y_m], i.e., all elements of I that\u0000contain no term involving at the same time one of the x_1,...,x_n and one of\u0000the y_1,...,y_m. For principal ideals and for ideals of dimension zero, we give\u0000a algorithms that compute all these polynomials in a finite number of steps.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unit-Aware Genetic Programming for the Development of Empirical Equations 用于开发经验公式的单元感知遗传编程
Pub Date : 2024-05-29 DOI: arxiv-2405.18896
Julia Reuter, Viktor Martinek, Roland Herzog, Sanaz Mostaghim
When developing empirical equations, domain experts require these to beaccurate and adhere to physical laws. Often, constants with unknown units needto be discovered alongside the equations. Traditional unit-aware geneticprogramming (GP) approaches cannot be used when unknown constants withundetermined units are included. This paper presents a method for dimensionalanalysis that propagates unknown units as ''jokers'' and returns the magnitudeof unit violations. We propose three methods, namely evolutive culling, arepair mechanism, and a multi-objective approach, to integrate the dimensionalanalysis in the GP algorithm. Experiments on datasets with ground truthdemonstrate comparable performance of evolutive culling and the multi-objectiveapproach to a baseline without dimensional analysis. Extensive analysis of theresults on datasets without ground truth reveals that the unit-aware algorithmsmake only low sacrifices in accuracy, while producing unit-adherent solutions.Overall, we presented a promising novel approach for developing unit-adherentempirical equations.
在建立经验方程时,领域专家要求这些方程必须准确并符合物理规律。通常情况下,需要与方程一起发现未知单位的常数。当包含有确定单位的未知常数时,传统的单位感知遗传编程(GP)方法就无法使用了。本文提出了一种维度分析方法,将未知单位作为 "小丑 "进行传播,并返回违反单位的大小。我们提出了三种方法,即进化剔除、配对机制和多目标方法,将维度分析集成到 GP 算法中。在具有地面实况的数据集上进行的实验表明,进化剔除和多目标方法的性能与不进行维度分析的基线相当。对无地面实况数据集的结果进行的广泛分析表明,单元感知算法只牺牲了较低的准确性,同时产生了单元相干解。
{"title":"Unit-Aware Genetic Programming for the Development of Empirical Equations","authors":"Julia Reuter, Viktor Martinek, Roland Herzog, Sanaz Mostaghim","doi":"arxiv-2405.18896","DOIUrl":"https://doi.org/arxiv-2405.18896","url":null,"abstract":"When developing empirical equations, domain experts require these to be\u0000accurate and adhere to physical laws. Often, constants with unknown units need\u0000to be discovered alongside the equations. Traditional unit-aware genetic\u0000programming (GP) approaches cannot be used when unknown constants with\u0000undetermined units are included. This paper presents a method for dimensional\u0000analysis that propagates unknown units as ''jokers'' and returns the magnitude\u0000of unit violations. We propose three methods, namely evolutive culling, a\u0000repair mechanism, and a multi-objective approach, to integrate the dimensional\u0000analysis in the GP algorithm. Experiments on datasets with ground truth\u0000demonstrate comparable performance of evolutive culling and the multi-objective\u0000approach to a baseline without dimensional analysis. Extensive analysis of the\u0000results on datasets without ground truth reveals that the unit-aware algorithms\u0000make only low sacrifices in accuracy, while producing unit-adherent solutions.\u0000Overall, we presented a promising novel approach for developing unit-adherent\u0000empirical equations.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"100 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning from Uncertain Data: From Possible Worlds to Possible Models 从不确定性数据中学习:从可能的世界到可能的模型
Pub Date : 2024-05-28 DOI: arxiv-2405.18549
Jiongli Zhu, Su Feng, Boris Glavic, Babak Salimi
We introduce an efficient method for learning linear models from uncertaindata, where uncertainty is represented as a set of possible variations in thedata, leading to predictive multiplicity. Our approach leverages abstractinterpretation and zonotopes, a type of convex polytope, to compactly representthese dataset variations, enabling the symbolic execution of gradient descenton all possible worlds simultaneously. We develop techniques to ensure thatthis process converges to a fixed point and derive closed-form solutions forthis fixed point. Our method provides sound over-approximations of all possibleoptimal models and viable prediction ranges. We demonstrate the effectivenessof our approach through theoretical and empirical analysis, highlighting itspotential to reason about model and prediction uncertainty due to data qualityissues in training data.
我们介绍了一种从不确定性数据中学习线性模型的高效方法,其中不确定性被表示为数据中一系列可能的变化,从而导致预测的多重性。我们的方法利用抽象解释和带状多面体(一种凸多面体)来紧凑地表示这些数据集变化,从而能够同时在所有可能的世界中以符号方式执行梯度下降。我们开发了确保这一过程收敛到固定点的技术,并推导出了该固定点的闭式解。我们的方法为所有可能的最优模型和可行的预测范围提供了合理的过度逼近。我们通过理论和实证分析证明了我们方法的有效性,并强调了它在推理因训练数据质量问题而导致的模型和预测不确定性方面的潜力。
{"title":"Learning from Uncertain Data: From Possible Worlds to Possible Models","authors":"Jiongli Zhu, Su Feng, Boris Glavic, Babak Salimi","doi":"arxiv-2405.18549","DOIUrl":"https://doi.org/arxiv-2405.18549","url":null,"abstract":"We introduce an efficient method for learning linear models from uncertain\u0000data, where uncertainty is represented as a set of possible variations in the\u0000data, leading to predictive multiplicity. Our approach leverages abstract\u0000interpretation and zonotopes, a type of convex polytope, to compactly represent\u0000these dataset variations, enabling the symbolic execution of gradient descent\u0000on all possible worlds simultaneously. We develop techniques to ensure that\u0000this process converges to a fixed point and derive closed-form solutions for\u0000this fixed point. Our method provides sound over-approximations of all possible\u0000optimal models and viable prediction ranges. We demonstrate the effectiveness\u0000of our approach through theoretical and empirical analysis, highlighting its\u0000potential to reason about model and prediction uncertainty due to data quality\u0000issues in training data.","PeriodicalId":501033,"journal":{"name":"arXiv - CS - Symbolic Computation","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141192464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Symbolic Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1