[{"department":[{"_id":"ToHe"},{"_id":"KrCh"}],"article_type":"original","publication_identifier":{"eissn":["2374-3468"],"issn":["2159-5399"],"isbn":["9781577358350"]},"project":[{"name":"Vigilant Algorithmic Monitoring of Software","call_identifier":"H2020","_id":"62781420-2b32-11ec-9570-8d9b63373d4d","grant_number":"101020093"},{"_id":"0599E47C-7A3F-11EA-A408-12923DDC885E","name":"Formal Methods for Stochastic Models: Algorithms and Applications","call_identifier":"H2020","grant_number":"863818"},{"grant_number":"665385","_id":"2564DBCA-B435-11E9-9278-68D0E5697425","call_identifier":"H2020","name":"International IST Doctoral Program"}],"year":"2022","month":"06","type":"journal_article","oa_version":"Preprint","publication_status":"published","external_id":{"arxiv":["2112.09495"]},"_id":"12511","issue":"7","publisher":"Association for the Advancement of Artificial Intelligence","status":"public","author":[{"first_name":"Mathias","id":"3DC22916-F248-11E8-B48F-1D18A9856A87","last_name":"Lechner","full_name":"Lechner, Mathias"},{"first_name":"Dorde","id":"294AA7A6-F248-11E8-B48F-1D18A9856A87","full_name":"Zikelic, Dorde","last_name":"Zikelic","orcid":"0000-0002-4681-1699"},{"first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87","full_name":"Chatterjee, Krishnendu","last_name":"Chatterjee","orcid":"0000-0002-4561-241X"},{"id":"40876CD8-F248-11E8-B48F-1D18A9856A87","first_name":"Thomas A","last_name":"Henzinger","full_name":"Henzinger, Thomas A","orcid":"0000-0002-2985-7724"}],"main_file_link":[{"url":"https://arxiv.org/abs/2112.09495","open_access":"1"}],"related_material":{"record":[{"relation":"dissertation_contains","status":"public","id":"14539"}]},"keyword":["General Medicine"],"abstract":[{"lang":"eng","text":"We consider the problem of formally verifying almost-sure (a.s.) asymptotic stability in discrete-time nonlinear stochastic control systems. While verifying stability in deterministic control systems is extensively studied in the literature, verifying stability in stochastic control systems is an open problem. The few existing works on this topic either consider only specialized forms of stochasticity or make restrictive assumptions on the system, rendering them inapplicable to learning algorithms with neural network policies. \r\n In this work, we present an approach for general nonlinear stochastic control problems with two novel aspects: (a) instead of classical stochastic extensions of Lyapunov functions, we use ranking supermartingales (RSMs) to certify a.s. asymptotic stability, and (b) we present a method for learning neural network RSMs. \r\n We prove that our approach guarantees a.s. asymptotic stability of the system and\r\n provides the first method to obtain bounds on the stabilization time, which stochastic Lyapunov functions do not.\r\n Finally, we validate our approach experimentally on a set of nonlinear stochastic reinforcement learning environments with neural network policies."}],"scopus_import":"1","date_updated":"2025-07-14T09:09:58Z","language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","title":"Stability verification in stochastic control systems via neural network supermartingales","page":"7326-7336","citation":{"ieee":"M. Lechner, D. Zikelic, K. Chatterjee, and T. A. Henzinger, “Stability verification in stochastic control systems via neural network supermartingales,” <i>Proceedings of the AAAI Conference on Artificial Intelligence</i>, vol. 36, no. 7. Association for the Advancement of Artificial Intelligence, pp. 7326–7336, 2022.","short":"M. Lechner, D. Zikelic, K. Chatterjee, T.A. Henzinger, Proceedings of the AAAI Conference on Artificial Intelligence 36 (2022) 7326–7336.","ista":"Lechner M, Zikelic D, Chatterjee K, Henzinger TA. 2022. Stability verification in stochastic control systems via neural network supermartingales. Proceedings of the AAAI Conference on Artificial Intelligence. 36(7), 7326–7336.","ama":"Lechner M, Zikelic D, Chatterjee K, Henzinger TA. Stability verification in stochastic control systems via neural network supermartingales. <i>Proceedings of the AAAI Conference on Artificial Intelligence</i>. 2022;36(7):7326-7336. doi:<a href=\"https://doi.org/10.1609/aaai.v36i7.20695\">10.1609/aaai.v36i7.20695</a>","chicago":"Lechner, Mathias, Dorde Zikelic, Krishnendu Chatterjee, and Thomas A Henzinger. “Stability Verification in Stochastic Control Systems via Neural Network Supermartingales.” <i>Proceedings of the AAAI Conference on Artificial Intelligence</i>. Association for the Advancement of Artificial Intelligence, 2022. <a href=\"https://doi.org/10.1609/aaai.v36i7.20695\">https://doi.org/10.1609/aaai.v36i7.20695</a>.","apa":"Lechner, M., Zikelic, D., Chatterjee, K., &#38; Henzinger, T. A. (2022). Stability verification in stochastic control systems via neural network supermartingales. <i>Proceedings of the AAAI Conference on Artificial Intelligence</i>. Association for the Advancement of Artificial Intelligence. <a href=\"https://doi.org/10.1609/aaai.v36i7.20695\">https://doi.org/10.1609/aaai.v36i7.20695</a>","mla":"Lechner, Mathias, et al. “Stability Verification in Stochastic Control Systems via Neural Network Supermartingales.” <i>Proceedings of the AAAI Conference on Artificial Intelligence</i>, vol. 36, no. 7, Association for the Advancement of Artificial Intelligence, 2022, pp. 7326–36, doi:<a href=\"https://doi.org/10.1609/aaai.v36i7.20695\">10.1609/aaai.v36i7.20695</a>."},"date_created":"2023-02-05T17:29:50Z","arxiv":1,"quality_controlled":"1","oa":1,"article_processing_charge":"No","ec_funded":1,"doi":"10.1609/aaai.v36i7.20695","intvolume":"        36","date_published":"2022-06-28T00:00:00Z","day":"28","publication":"Proceedings of the AAAI Conference on Artificial Intelligence","acknowledgement":"This work was supported in part by the ERC-2020-AdG 101020093, ERC CoG 863818 (FoRM-SMArt) and the European Union’s Horizon 2020 research and innovation programme\r\nunder the Marie Skłodowska-Curie Grant Agreement No. 665385.","volume":36},{"type":"conference","oa_version":"Preprint","external_id":{"isi":["000921318200020"]},"alternative_title":["LNCS"],"publication_status":"published","_id":"12516","publisher":"Springer Nature","department":[{"_id":"KrPi"}],"publication_identifier":{"isbn":["9783031223648"],"issn":["0302-9743"],"eissn":["1611-3349"]},"isi":1,"year":"2022","month":"12","main_file_link":[{"url":"https://eprint.iacr.org/2022/093","open_access":"1"}],"abstract":[{"lang":"eng","text":"The homogeneous continuous LWE (hCLWE) problem is to distinguish samples of a specific high-dimensional Gaussian mixture from standard normal samples. It was shown to be at least as hard as Learning with Errors, but no reduction in the other direction is currently known.\r\nWe present four new public-key encryption schemes based on the hardness of hCLWE, with varying tradeoffs between decryption and security errors, and different discretization techniques. Our schemes yield a polynomial-time algorithm for solving hCLWE using a Statistical Zero-Knowledge oracle."}],"scopus_import":"1","date_updated":"2023-08-04T10:39:30Z","language":[{"iso":"eng"}],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","status":"public","author":[{"last_name":"Bogdanov","full_name":"Bogdanov, Andrej","first_name":"Andrej"},{"first_name":"Miguel","id":"ffc563a3-f6e0-11ea-865d-e3cce03d17cc","full_name":"Cueto Noval, Miguel","last_name":"Cueto Noval"},{"last_name":"Hoffmann","full_name":"Hoffmann, Charlotte","id":"0f78d746-dc7d-11ea-9b2f-83f92091afe7","first_name":"Charlotte"},{"first_name":"Alon","full_name":"Rosen, Alon","last_name":"Rosen"}],"citation":{"chicago":"Bogdanov, Andrej, Miguel Cueto Noval, Charlotte Hoffmann, and Alon Rosen. “Public-Key Encryption from Homogeneous CLWE.” In <i>Theory of Cryptography</i>, 13748:565–92. Springer Nature, 2022. <a href=\"https://doi.org/10.1007/978-3-031-22365-5_20\">https://doi.org/10.1007/978-3-031-22365-5_20</a>.","apa":"Bogdanov, A., Cueto Noval, M., Hoffmann, C., &#38; Rosen, A. (2022). Public-Key Encryption from Homogeneous CLWE. In <i>Theory of Cryptography</i> (Vol. 13748, pp. 565–592). Chicago, IL, United States: Springer Nature. <a href=\"https://doi.org/10.1007/978-3-031-22365-5_20\">https://doi.org/10.1007/978-3-031-22365-5_20</a>","mla":"Bogdanov, Andrej, et al. “Public-Key Encryption from Homogeneous CLWE.” <i>Theory of Cryptography</i>, vol. 13748, Springer Nature, 2022, pp. 565–92, doi:<a href=\"https://doi.org/10.1007/978-3-031-22365-5_20\">10.1007/978-3-031-22365-5_20</a>.","ista":"Bogdanov A, Cueto Noval M, Hoffmann C, Rosen A. 2022. Public-Key Encryption from Homogeneous CLWE. Theory of Cryptography. TCC: Theory of Cryptography, LNCS, vol. 13748, 565–592.","short":"A. Bogdanov, M. Cueto Noval, C. Hoffmann, A. Rosen, in:, Theory of Cryptography, Springer Nature, 2022, pp. 565–592.","ieee":"A. Bogdanov, M. Cueto Noval, C. Hoffmann, and A. Rosen, “Public-Key Encryption from Homogeneous CLWE,” in <i>Theory of Cryptography</i>, Chicago, IL, United States, 2022, vol. 13748, pp. 565–592.","ama":"Bogdanov A, Cueto Noval M, Hoffmann C, Rosen A. Public-Key Encryption from Homogeneous CLWE. In: <i>Theory of Cryptography</i>. Vol 13748. Springer Nature; 2022:565-592. doi:<a href=\"https://doi.org/10.1007/978-3-031-22365-5_20\">10.1007/978-3-031-22365-5_20</a>"},"date_created":"2023-02-05T23:01:00Z","quality_controlled":"1","conference":{"start_date":"2022-11-07","name":"TCC: Theory of Cryptography","location":"Chicago, IL, United States","end_date":"2022-11-10"},"oa":1,"title":"Public-Key Encryption from Homogeneous CLWE","page":"565-592","intvolume":"     13748","date_published":"2022-12-21T00:00:00Z","day":"21","publication":"Theory of Cryptography","acknowledgement":"We are grateful to Devika Sharma and Luca Trevisan for their insight and advice and to an anonymous reviewer for helpful comments.\r\n\r\nThis work was supported by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (Grant agreement No. 101019547). The first author was additionally supported by RGC GRF CUHK14209920 and the fourth author was additionally supported by ISF grant No. 1399/17, project PROMETHEUS (Grant 780701), and Cariplo CRYPTONOMEX grant.","volume":13748,"article_processing_charge":"No","doi":"10.1007/978-3-031-22365-5_20"},{"department":[{"_id":"GeKa"}],"title":"Data for \"Majorana-like Coulomb spectroscopy in the absence of zero bias peaks\"","contributor":[{"last_name":"Valentini","contributor_type":"contact_person","first_name":"Marco","id":"C0BB2FAC-D767-11E9-B658-BC13E6697425"}],"year":"2022","month":"09","ddc":["530"],"type":"research_data","file":[{"content_type":"application/x-zip-compressed","access_level":"open_access","date_updated":"2023-02-07T08:18:24Z","checksum":"0dbd6327bf84c7e81b295c4bc9d12826","success":1,"file_size":3609122411,"date_created":"2023-02-07T08:18:24Z","file_name":"Majorana_like.zip","creator":"dernst","file_id":"12523","relation":"main_file"}],"oa_version":"Published Version","citation":{"ama":"Valentini M, San-Jose P, Arbiol J, Marti-Sanchez S, Botifoll M. Data for “Majorana-like Coulomb spectroscopy in the absence of zero bias peaks.” 2022. doi:<a href=\"https://doi.org/10.15479/AT:ISTA:12102\">10.15479/AT:ISTA:12102</a>","ista":"Valentini M, San-Jose P, Arbiol J, Marti-Sanchez S, Botifoll M. 2022. Data for ‘Majorana-like Coulomb spectroscopy in the absence of zero bias peaks’, Institute of Science and Technology Austria, <a href=\"https://doi.org/10.15479/AT:ISTA:12102\">10.15479/AT:ISTA:12102</a>.","ieee":"M. Valentini, P. San-Jose, J. Arbiol, S. Marti-Sanchez, and M. Botifoll, “Data for ‘Majorana-like Coulomb spectroscopy in the absence of zero bias peaks.’” Institute of Science and Technology Austria, 2022.","short":"M. Valentini, P. San-Jose, J. Arbiol, S. Marti-Sanchez, M. Botifoll, (2022).","mla":"Valentini, Marco, et al. <i>Data for “Majorana-like Coulomb Spectroscopy in the Absence of Zero Bias Peaks.”</i> Institute of Science and Technology Austria, 2022, doi:<a href=\"https://doi.org/10.15479/AT:ISTA:12102\">10.15479/AT:ISTA:12102</a>.","apa":"Valentini, M., San-Jose, P., Arbiol, J., Marti-Sanchez, S., &#38; Botifoll, M. (2022). Data for “Majorana-like Coulomb spectroscopy in the absence of zero bias peaks.” Institute of Science and Technology Austria. <a href=\"https://doi.org/10.15479/AT:ISTA:12102\">https://doi.org/10.15479/AT:ISTA:12102</a>","chicago":"Valentini, Marco, Pablo San-Jose, Jordi Arbiol, Sara Marti-Sanchez, and Marc Botifoll. “Data for ‘Majorana-like Coulomb Spectroscopy in the Absence of Zero Bias Peaks.’” Institute of Science and Technology Austria, 2022. <a href=\"https://doi.org/10.15479/AT:ISTA:12102\">https://doi.org/10.15479/AT:ISTA:12102</a>."},"date_created":"2023-02-07T08:13:39Z","_id":"12522","publisher":"Institute of Science and Technology Austria","oa":1,"tmp":{"short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"status":"public","article_processing_charge":"No","author":[{"first_name":"Marco","id":"C0BB2FAC-D767-11E9-B658-BC13E6697425","full_name":"Valentini, Marco","last_name":"Valentini"},{"last_name":"San-Jose","full_name":"San-Jose, Pablo","first_name":"Pablo"},{"full_name":"Arbiol, Jordi","last_name":"Arbiol","first_name":"Jordi"},{"last_name":"Marti-Sanchez","full_name":"Marti-Sanchez, Sara","first_name":"Sara"},{"full_name":"Botifoll, Marc","last_name":"Botifoll","first_name":"Marc"}],"license":"https://creativecommons.org/licenses/by/4.0/","doi":"10.15479/AT:ISTA:12102","file_date_updated":"2023-02-07T08:18:24Z","has_accepted_license":"1","related_material":{"record":[{"status":"public","relation":"used_in_publication","id":"12118"},{"id":"13286","status":"public","relation":"used_in_publication"}]},"abstract":[{"lang":"eng","text":"This .zip File contains the transport data, the codes for the data analysis, the microscopy analysis and the codes for the theoretical simulations for \"Majorana-like Coulomb spectroscopy in the absence of zero bias peaks\" by M. Valentini, et. al. The transport data are saved with hdf5 file format. The files can be open with the log browser of Labber."}],"date_published":"2022-09-25T00:00:00Z","day":"25","date_updated":"2024-02-21T12:35:34Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"month":"05","year":"2022","department":[{"_id":"MaMo"}],"title":"The price of ignorance: How much does it cost to forget noise structure in low-rank matrix estimation?","oa":1,"article_number":"2205.10009","external_id":{"arxiv":["2205.10009"]},"arxiv":1,"publication_status":"accepted","_id":"12536","type":"preprint","oa_version":"Preprint","citation":{"ieee":"J. Barbier, T. Hou, M. Mondelli, and M. Saenz, “The price of ignorance: How much does it cost to forget noise structure in low-rank matrix estimation?,” <i>arXiv</i>. .","ista":"Barbier J, Hou T, Mondelli M, Saenz M. The price of ignorance: How much does it cost to forget noise structure in low-rank matrix estimation? arXiv, 2205.10009.","short":"J. Barbier, T. Hou, M. Mondelli, M. Saenz, ArXiv (n.d.).","ama":"Barbier J, Hou T, Mondelli M, Saenz M. The price of ignorance: How much does it cost to forget noise structure in low-rank matrix estimation? <i>arXiv</i>. doi:<a href=\"https://doi.org/10.48550/arXiv.2205.10009\">10.48550/arXiv.2205.10009</a>","chicago":"Barbier, Jean, TianQi Hou, Marco Mondelli, and Manuel Saenz. “The Price of Ignorance: How Much Does It Cost to Forget Noise Structure in Low-Rank Matrix Estimation?” <i>ArXiv</i>, n.d. <a href=\"https://doi.org/10.48550/arXiv.2205.10009\">https://doi.org/10.48550/arXiv.2205.10009</a>.","apa":"Barbier, J., Hou, T., Mondelli, M., &#38; Saenz, M. (n.d.). The price of ignorance: How much does it cost to forget noise structure in low-rank matrix estimation? <i>arXiv</i>. <a href=\"https://doi.org/10.48550/arXiv.2205.10009\">https://doi.org/10.48550/arXiv.2205.10009</a>","mla":"Barbier, Jean, et al. “The Price of Ignorance: How Much Does It Cost to Forget Noise Structure in Low-Rank Matrix Estimation?” <i>ArXiv</i>, 2205.10009, doi:<a href=\"https://doi.org/10.48550/arXiv.2205.10009\">10.48550/arXiv.2205.10009</a>."},"date_created":"2023-02-10T13:45:41Z","doi":"10.48550/arXiv.2205.10009","status":"public","article_processing_charge":"No","author":[{"full_name":"Barbier, Jean","last_name":"Barbier","first_name":"Jean"},{"full_name":"Hou, TianQi","last_name":"Hou","first_name":"TianQi"},{"first_name":"Marco","id":"27EB676C-8706-11E9-9510-7717E6697425","orcid":"0000-0002-3242-7020","full_name":"Mondelli, Marco","last_name":"Mondelli"},{"full_name":"Saenz, Manuel","last_name":"Saenz","first_name":"Manuel"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"publication":"arXiv","day":"20","date_updated":"2023-02-16T09:41:25Z","date_published":"2022-05-20T00:00:00Z","main_file_link":[{"url":"https://doi.org/10.48550/arXiv.2205.10009","open_access":"1"}],"abstract":[{"text":"We consider the problem of estimating a rank-1 signal corrupted by structured rotationally invariant noise, and address the following question: how well do inference algorithms perform when the noise statistics is unknown and hence Gaussian noise is assumed? While the matched Bayes-optimal setting with unstructured noise is well understood, the analysis of this mismatched problem is only at its premises. In this paper, we make a step towards understanding the effect of the strong source of mismatch which is the noise statistics. Our main technical contribution is the rigorous analysis of a Bayes estimator and of an approximate message passing (AMP) algorithm, both of which incorrectly assume a Gaussian setup. The first result exploits the theory of spherical integrals and of low-rank matrix perturbations; the idea behind the second one is to design and analyze an artificial AMP which, by taking advantage of the flexibility in the denoisers, is able to \"correct\" the mismatch. Armed with these sharp asymptotic characterizations, we unveil a rich and often unexpected phenomenology. For example, despite AMP is in principle designed to efficiently compute the Bayes estimator, the former is outperformed by the latter in terms of mean-square error. We show that this performance gap is due to an incorrect estimation of the signal norm. In fact, when the SNR is large enough, the overlaps of the AMP and the Bayes estimator coincide, and they even match those of optimal estimators taking into account the structure of the noise.","lang":"eng"}]},{"volume":35,"publication":"36th Conference on Neural Information Processing Systems","acknowledgement":"The authors were partially supported by the 2019 Lopez-Loreta prize, and they would like to thank\r\nQuynh Nguyen, Mahdi Soltanolkotabi and Adel Javanmard for helpful discussions.\r\n","day":"24","intvolume":"        35","date_published":"2022-07-24T00:00:00Z","article_processing_charge":"No","oa":1,"date_created":"2023-02-10T13:46:37Z","citation":{"apa":"Bombari, S., Amani, M. H., &#38; Mondelli, M. (2022). Memorization and optimization in deep neural networks with minimum over-parameterization. In <i>36th Conference on Neural Information Processing Systems</i> (Vol. 35, pp. 7628–7640). Curran Associates.","chicago":"Bombari, Simone, Mohammad Hossein Amani, and Marco Mondelli. “Memorization and Optimization in Deep Neural Networks with Minimum Over-Parameterization.” In <i>36th Conference on Neural Information Processing Systems</i>, 35:7628–40. Curran Associates, 2022.","mla":"Bombari, Simone, et al. “Memorization and Optimization in Deep Neural Networks with Minimum Over-Parameterization.” <i>36th Conference on Neural Information Processing Systems</i>, vol. 35, Curran Associates, 2022, pp. 7628–40.","ama":"Bombari S, Amani MH, Mondelli M. Memorization and optimization in deep neural networks with minimum over-parameterization. In: <i>36th Conference on Neural Information Processing Systems</i>. Vol 35. Curran Associates; 2022:7628-7640.","ista":"Bombari S, Amani MH, Mondelli M. 2022. Memorization and optimization in deep neural networks with minimum over-parameterization. 36th Conference on Neural Information Processing Systems. vol. 35, 7628–7640.","ieee":"S. Bombari, M. H. Amani, and M. Mondelli, “Memorization and optimization in deep neural networks with minimum over-parameterization,” in <i>36th Conference on Neural Information Processing Systems</i>, 2022, vol. 35, pp. 7628–7640.","short":"S. Bombari, M.H. Amani, M. Mondelli, in:, 36th Conference on Neural Information Processing Systems, Curran Associates, 2022, pp. 7628–7640."},"quality_controlled":"1","arxiv":1,"page":"7628-7640","title":"Memorization and optimization in deep neural networks with minimum over-parameterization","date_updated":"2024-09-10T13:03:19Z","language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","abstract":[{"lang":"eng","text":"The Neural Tangent Kernel (NTK) has emerged as a powerful tool to provide memorization, optimization and generalization guarantees in deep neural networks. A line of work has studied the NTK spectrum for two-layer and deep networks with at least a layer with Ω(N) neurons, N being the number of training samples. Furthermore, there is increasing evidence suggesting that deep networks with sub-linear layer widths are powerful memorizers and optimizers, as long as the number of parameters exceeds the number of samples. Thus, a natural open question is whether the NTK is well conditioned in such a challenging sub-linear setup. In this paper, we answer this question in the affirmative. Our key technical contribution is a lower bound on the smallest NTK eigenvalue for deep networks with the minimum possible over-parameterization: the number of parameters is roughly Ω(N) and, hence, the number of neurons is as little as Ω(N−−√). To showcase the applicability of our NTK bounds, we provide two results concerning memorization capacity and optimization guarantees for gradient descent training."}],"main_file_link":[{"url":" https://doi.org/10.48550/arXiv.2205.10217","open_access":"1"}],"author":[{"first_name":"Simone","id":"ca726dda-de17-11ea-bc14-f9da834f63aa","last_name":"Bombari","full_name":"Bombari, Simone"},{"first_name":"Mohammad Hossein","last_name":"Amani","full_name":"Amani, Mohammad Hossein"},{"first_name":"Marco","id":"27EB676C-8706-11E9-9510-7717E6697425","full_name":"Mondelli, Marco","last_name":"Mondelli","orcid":"0000-0002-3242-7020"}],"status":"public","publisher":"Curran Associates","type":"conference","oa_version":"Preprint","_id":"12537","external_id":{"arxiv":["2205.10217"]},"publication_status":"published","publication_identifier":{"isbn":["9781713871088"]},"month":"07","year":"2022","project":[{"name":"Prix Lopez-Loretta 2019 - Marco Mondelli","_id":"059876FA-7A3F-11EA-A408-12923DDC885E"}],"department":[{"_id":"MaMo"}]},{"status":"public","author":[{"first_name":"Mohammad Hossein","last_name":"Amani","full_name":"Amani, Mohammad Hossein"},{"first_name":"Simone","id":"ca726dda-de17-11ea-bc14-f9da834f63aa","full_name":"Bombari, Simone","last_name":"Bombari"},{"id":"27EB676C-8706-11E9-9510-7717E6697425","first_name":"Marco","orcid":"0000-0002-3242-7020","full_name":"Mondelli, Marco","last_name":"Mondelli"},{"first_name":"Rattana","last_name":"Pukdee","full_name":"Pukdee, Rattana"},{"last_name":"Rini","full_name":"Rini, Stefano","first_name":"Stefano"}],"date_updated":"2023-12-18T11:31:47Z","language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","main_file_link":[{"open_access":"1","url":" https://doi.org/10.48550/arXiv.2205.08199"}],"abstract":[{"text":"In this paper, we study the compression of a target two-layer neural network with N nodes into a compressed network with M<N nodes. More precisely, we consider the setting in which the weights of the target network are i.i.d. sub-Gaussian, and we minimize the population L_2 loss between the outputs of the target and of the compressed network, under the assumption of Gaussian inputs. By using tools from high-dimensional probability, we show that this non-convex problem can be simplified when the target network is sufficiently over-parameterized, and provide the error rate of this approximation as a function of the input dimension and N. In this mean-field limit, the simplified objective, as well as the optimal weights of the compressed network, does not depend on the realization of the target network, but only on expected scaling factors. Furthermore, for networks with ReLU activation, we conjecture that the optimum of the simplified optimization problem is achieved by taking weights on the Equiangular Tight Frame (ETF), while the scaling of the weights and the orientation of the ETF depend on the parameters of the target network. Numerical evidence is provided to support this conjecture.","lang":"eng"}],"scopus_import":"1","publication_identifier":{"isbn":["9781665483414"]},"month":"11","year":"2022","department":[{"_id":"MaMo"}],"article_type":"original","publisher":"IEEE","type":"journal_article","oa_version":"Preprint","publication_status":"published","external_id":{"arxiv":["2205.08199"]},"_id":"12538","doi":"10.1109/ITW54588.2022.9965870","article_processing_charge":"No","day":"16","publication":"IEEE Information Theory Workshop","date_published":"2022-11-16T00:00:00Z","page":"588-593","title":"Sharp asymptotics on the compression of two-layer neural networks","oa":1,"citation":{"ieee":"M. H. Amani, S. Bombari, M. Mondelli, R. Pukdee, and S. Rini, “Sharp asymptotics on the compression of two-layer neural networks,” <i>IEEE Information Theory Workshop</i>. IEEE, pp. 588–593, 2022.","ista":"Amani MH, Bombari S, Mondelli M, Pukdee R, Rini S. 2022. Sharp asymptotics on the compression of two-layer neural networks. IEEE Information Theory Workshop., 588–593.","short":"M.H. Amani, S. Bombari, M. Mondelli, R. Pukdee, S. Rini, IEEE Information Theory Workshop (2022) 588–593.","ama":"Amani MH, Bombari S, Mondelli M, Pukdee R, Rini S. Sharp asymptotics on the compression of two-layer neural networks. <i>IEEE Information Theory Workshop</i>. 2022:588-593. doi:<a href=\"https://doi.org/10.1109/ITW54588.2022.9965870\">10.1109/ITW54588.2022.9965870</a>","chicago":"Amani, Mohammad Hossein, Simone Bombari, Marco Mondelli, Rattana Pukdee, and Stefano Rini. “Sharp Asymptotics on the Compression of Two-Layer Neural Networks.” <i>IEEE Information Theory Workshop</i>. IEEE, 2022. <a href=\"https://doi.org/10.1109/ITW54588.2022.9965870\">https://doi.org/10.1109/ITW54588.2022.9965870</a>.","apa":"Amani, M. H., Bombari, S., Mondelli, M., Pukdee, R., &#38; Rini, S. (2022). Sharp asymptotics on the compression of two-layer neural networks. <i>IEEE Information Theory Workshop</i>. Mumbai, India: IEEE. <a href=\"https://doi.org/10.1109/ITW54588.2022.9965870\">https://doi.org/10.1109/ITW54588.2022.9965870</a>","mla":"Amani, Mohammad Hossein, et al. “Sharp Asymptotics on the Compression of Two-Layer Neural Networks.” <i>IEEE Information Theory Workshop</i>, IEEE, 2022, pp. 588–93, doi:<a href=\"https://doi.org/10.1109/ITW54588.2022.9965870\">10.1109/ITW54588.2022.9965870</a>."},"date_created":"2023-02-10T13:47:56Z","arxiv":1,"quality_controlled":"1","conference":{"name":"ITW: Information Theory Workshop","start_date":"2022-11-01","end_date":"2022-11-09","location":"Mumbai, India"}},{"abstract":[{"lang":"eng","text":"We consider the problem of signal estimation in generalized linear models defined via rotationally invariant design matrices. Since these matrices can have an arbitrary spectral distribution, this model is well suited for capturing complex correlation structures which often arise in applications. We propose a novel family of approximate message passing (AMP) algorithms for signal estimation, and rigorously characterize their performance in the high-dimensional limit via a state evolution recursion. Our rotationally invariant AMP has complexity of the same order as the existing AMP derived under the restrictive assumption of a Gaussian design; our algorithm also recovers this existing AMP as a special case. Numerical results showcase a performance close to Vector AMP (which is conjectured to be Bayes-optimal in some settings), but obtained with a much lower complexity, as the proposed algorithm does not require a computationally expensive singular value decomposition."}],"date_updated":"2024-09-10T13:03:17Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"author":[{"last_name":"Venkataramanan","full_name":"Venkataramanan, Ramji","first_name":"Ramji"},{"first_name":"Kevin","id":"94ec913c-dc85-11ea-9058-e5051ab2428b","full_name":"Kögler, Kevin","last_name":"Kögler"},{"full_name":"Mondelli, Marco","last_name":"Mondelli","orcid":"0000-0002-3242-7020","first_name":"Marco","id":"27EB676C-8706-11E9-9510-7717E6697425"}],"status":"public","type":"conference","oa_version":"Published Version","ddc":["000"],"file":[{"file_id":"12547","creator":"dernst","relation":"main_file","file_name":"2022_PMLR_Venkataramanan.pdf","success":1,"checksum":"67436eb0a660789514cdf9db79e84683","file_size":2341343,"date_created":"2023-02-13T10:53:11Z","access_level":"open_access","content_type":"application/pdf","date_updated":"2023-02-13T10:53:11Z"}],"_id":"12540","publication_status":"published","publisher":"ML Research Press","department":[{"_id":"MaMo"}],"year":"2022","project":[{"name":"Prix Lopez-Loretta 2019 - Marco Mondelli","_id":"059876FA-7A3F-11EA-A408-12923DDC885E"}],"intvolume":"       162","has_accepted_license":"1","date_published":"2022-01-01T00:00:00Z","volume":162,"acknowledgement":"The authors would like to thank the anonymous reviewers for their helpful comments. KK and MM were partially supported by the 2019 Lopez-Loreta Prize.","publication":"Proceedings of the 39th International Conference on Machine Learning","article_processing_charge":"No","file_date_updated":"2023-02-13T10:53:11Z","date_created":"2023-02-10T13:49:04Z","citation":{"mla":"Venkataramanan, Ramji, et al. “Estimation in Rotationally Invariant Generalized Linear Models via Approximate Message Passing.” <i>Proceedings of the 39th International Conference on Machine Learning</i>, vol. 162, 22, ML Research Press, 2022.","chicago":"Venkataramanan, Ramji, Kevin Kögler, and Marco Mondelli. “Estimation in Rotationally Invariant Generalized Linear Models via Approximate Message Passing.” In <i>Proceedings of the 39th International Conference on Machine Learning</i>, Vol. 162. ML Research Press, 2022.","apa":"Venkataramanan, R., Kögler, K., &#38; Mondelli, M. (2022). Estimation in rotationally invariant generalized linear models via approximate message passing. In <i>Proceedings of the 39th International Conference on Machine Learning</i> (Vol. 162). Baltimore, MD, United States: ML Research Press.","short":"R. Venkataramanan, K. Kögler, M. Mondelli, in:, Proceedings of the 39th International Conference on Machine Learning, ML Research Press, 2022.","ista":"Venkataramanan R, Kögler K, Mondelli M. 2022. Estimation in rotationally invariant generalized linear models via approximate message passing. Proceedings of the 39th International Conference on Machine Learning. ICML: International Conference on Machine Learning vol. 162, 22.","ieee":"R. Venkataramanan, K. Kögler, and M. Mondelli, “Estimation in rotationally invariant generalized linear models via approximate message passing,” in <i>Proceedings of the 39th International Conference on Machine Learning</i>, Baltimore, MD, United States, 2022, vol. 162.","ama":"Venkataramanan R, Kögler K, Mondelli M. Estimation in rotationally invariant generalized linear models via approximate message passing. In: <i>Proceedings of the 39th International Conference on Machine Learning</i>. Vol 162. ML Research Press; 2022."},"conference":{"end_date":"2022-07-23","location":"Baltimore, MD, United States","start_date":"2022-07-17","name":"ICML: International Conference on Machine Learning"},"quality_controlled":"1","article_number":"22","oa":1,"title":"Estimation in rotationally invariant generalized linear models via approximate message passing"},{"volume":36,"day":"28","publication":"Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022","intvolume":"        36","date_published":"2022-06-28T00:00:00Z","doi":"10.1609/aaai.v36i9.21222","article_processing_charge":"No","oa":1,"citation":{"ama":"Meggendorfer T. Risk-aware stochastic shortest path. In: <i>Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022</i>. Vol 36. Association for the Advancement of Artificial Intelligence; 2022:9858-9867. doi:<a href=\"https://doi.org/10.1609/aaai.v36i9.21222\">10.1609/aaai.v36i9.21222</a>","ista":"Meggendorfer T. 2022. Risk-aware stochastic shortest path. Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022. Conference on Artificial Intelligence vol. 36, 9858–9867.","short":"T. Meggendorfer, in:, Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022, Association for the Advancement of Artificial Intelligence, 2022, pp. 9858–9867.","ieee":"T. Meggendorfer, “Risk-aware stochastic shortest path,” in <i>Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022</i>, Virtual, 2022, vol. 36, no. 9, pp. 9858–9867.","apa":"Meggendorfer, T. (2022). Risk-aware stochastic shortest path. In <i>Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022</i> (Vol. 36, pp. 9858–9867). Virtual: Association for the Advancement of Artificial Intelligence. <a href=\"https://doi.org/10.1609/aaai.v36i9.21222\">https://doi.org/10.1609/aaai.v36i9.21222</a>","chicago":"Meggendorfer, Tobias. “Risk-Aware Stochastic Shortest Path.” In <i>Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022</i>, 36:9858–67. Association for the Advancement of Artificial Intelligence, 2022. <a href=\"https://doi.org/10.1609/aaai.v36i9.21222\">https://doi.org/10.1609/aaai.v36i9.21222</a>.","mla":"Meggendorfer, Tobias. “Risk-Aware Stochastic Shortest Path.” <i>Proceedings of the 36th AAAI Conference on Artificial Intelligence, AAAI 2022</i>, vol. 36, no. 9, Association for the Advancement of Artificial Intelligence, 2022, pp. 9858–67, doi:<a href=\"https://doi.org/10.1609/aaai.v36i9.21222\">10.1609/aaai.v36i9.21222</a>."},"date_created":"2023-02-19T23:00:56Z","conference":{"end_date":"2022-03-01","location":"Virtual","start_date":"2022-02-22","name":"Conference on Artificial Intelligence"},"arxiv":1,"quality_controlled":"1","page":"9858-9867","title":"Risk-aware stochastic shortest path","date_updated":"2023-02-20T07:19:12Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"abstract":[{"lang":"eng","text":"We treat the problem of risk-aware control for stochastic shortest path (SSP) on Markov decision processes (MDP). Typically, expectation is considered for SSP, which however is oblivious to the incurred risk. We present an alternative view, instead optimizing conditional value-at-risk (CVaR), an established risk measure. We treat both Markov chains as well as MDP and introduce, through novel insights, two algorithms, based on linear programming and value iteration, respectively. Both algorithms offer precise and provably correct solutions. Evaluation of our prototype implementation shows that risk-aware control is feasible on several moderately sized models."}],"main_file_link":[{"open_access":"1","url":" https://doi.org/10.48550/arXiv.2203.01640"}],"scopus_import":"1","author":[{"orcid":"0000-0002-1712-2165","full_name":"Meggendorfer, Tobias","last_name":"Meggendorfer","id":"b21b0c15-30a2-11eb-80dc-f13ca25802e1","first_name":"Tobias"}],"status":"public","publisher":"Association for the Advancement of Artificial Intelligence","oa_version":"Preprint","type":"conference","_id":"12568","issue":"9","publication_status":"published","external_id":{"arxiv":["2203.01640"]},"publication_identifier":{"isbn":["1577358767"],"eissn":["2374-3468"]},"month":"06","year":"2022","department":[{"_id":"KrCh"}]},{"date_published":"2022-10-12T00:00:00Z","has_accepted_license":"1","abstract":[{"lang":"eng","text":"We present Cross-Client Label Propagation(XCLP), a new method for transductive federated learning. XCLP estimates a data graph jointly from the data of multiple clients and computes labels for the unlabeled data by propagating label information across the graph. To avoid clients having to share their data with anyone, XCLP employs two cryptographically secure protocols: secure Hamming distance computation and secure summation. We demonstrate two distinct applications of XCLP within federated learning. In the first, we use it in a one-shot way to predict labels for unseen test points. In the second, we use it to repeatedly pseudo-label unlabeled training data in a federated semi-supervised setting. Experiments on both real federated and standard benchmark datasets show that in both applications XCLP achieves higher classification accuracy than alternative approaches."}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"publication":"arXiv","day":"12","date_updated":"2023-02-21T08:20:18Z","status":"public","tmp":{"short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"author":[{"id":"e499926b-f6e0-11ea-865d-9c63db0031e8","first_name":"Jonathan A","full_name":"Scott, Jonathan A","last_name":"Scott"},{"full_name":"Yeo, Michelle X","last_name":"Yeo","first_name":"Michelle X","id":"2D82B818-F248-11E8-B48F-1D18A9856A87"},{"orcid":"0000-0001-8622-7887","last_name":"Lampert","full_name":"Lampert, Christoph","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph"}],"article_processing_charge":"No","file_date_updated":"2023-02-20T08:21:35Z","doi":"10.48550/arXiv.2210.06434","publication_status":"submitted","external_id":{"arxiv":["2210.06434"]},"arxiv":1,"_id":"12660","type":"preprint","file":[{"file_name":"2210.06434.pdf","file_id":"12661","creator":"chl","relation":"main_file","access_level":"open_access","content_type":"application/pdf","date_updated":"2023-02-20T08:21:35Z","file_size":291893,"success":1,"checksum":"7ab20543fd4393f14fb857ce2e4f03c6","date_created":"2023-02-20T08:21:35Z"}],"oa_version":"Preprint","ddc":["004"],"citation":{"chicago":"Scott, Jonathan A, Michelle X Yeo, and Christoph Lampert. “Cross-Client Label Propagation for Transductive Federated Learning.” <i>ArXiv</i>, n.d. <a href=\"https://doi.org/10.48550/arXiv.2210.06434\">https://doi.org/10.48550/arXiv.2210.06434</a>.","apa":"Scott, J. A., Yeo, M. X., &#38; Lampert, C. (n.d.). Cross-client Label Propagation for transductive federated learning. <i>arXiv</i>. <a href=\"https://doi.org/10.48550/arXiv.2210.06434\">https://doi.org/10.48550/arXiv.2210.06434</a>","mla":"Scott, Jonathan A., et al. “Cross-Client Label Propagation for Transductive Federated Learning.” <i>ArXiv</i>, 2210.06434, doi:<a href=\"https://doi.org/10.48550/arXiv.2210.06434\">10.48550/arXiv.2210.06434</a>.","ieee":"J. A. Scott, M. X. Yeo, and C. Lampert, “Cross-client Label Propagation for transductive federated learning,” <i>arXiv</i>. .","short":"J.A. Scott, M.X. Yeo, C. Lampert, ArXiv (n.d.).","ista":"Scott JA, Yeo MX, Lampert C. Cross-client Label Propagation for transductive federated learning. arXiv, 2210.06434.","ama":"Scott JA, Yeo MX, Lampert C. Cross-client Label Propagation for transductive federated learning. <i>arXiv</i>. doi:<a href=\"https://doi.org/10.48550/arXiv.2210.06434\">10.48550/arXiv.2210.06434</a>"},"date_created":"2023-02-20T08:21:50Z","oa":1,"article_number":"2210.06434","department":[{"_id":"ChLa"}],"title":"Cross-client Label Propagation for transductive federated learning","month":"10","year":"2022"},{"author":[{"first_name":"Peter","id":"d64d6a8d-eb8e-11eb-b029-96fd216dec3c","last_name":"Súkeník","full_name":"Súkeník, Peter"},{"full_name":"Lampert, Christoph","last_name":"Lampert","orcid":"0000-0001-8622-7887","id":"40C20FD2-F248-11E8-B48F-1D18A9856A87","first_name":"Christoph"}],"article_processing_charge":"No","status":"public","doi":"10.48550/arXiv.2208.13499","date_published":"2022-08-29T00:00:00Z","abstract":[{"text":"Modern machine learning tasks often require considering not just one but multiple objectives. For example, besides the prediction quality, this could be the efficiency, robustness or fairness of the learned models, or any of their combinations. Multi-objective learning offers a natural framework for handling such problems without having to commit to early trade-offs. Surprisingly, statistical learning theory so far offers almost no insight into the generalization properties of multi-objective learning. In this work, we make first steps to fill this gap: we establish foundational generalization bounds for the multi-objective setting as well as generalization and excess bounds for learning with scalarizations. We also provide the first theoretical analysis of the relation between the Pareto-optimal sets of the true objectives and the Pareto-optimal sets of their empirical approximations from training data. In particular, we show a surprising asymmetry: all Pareto-optimal solutions can be approximated by empirically Pareto-optimal ones, but not vice versa.","lang":"eng"}],"has_accepted_license":"1","main_file_link":[{"url":" https://doi.org/10.48550/arXiv.2208.13499","open_access":"1"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"date_updated":"2023-02-21T08:24:55Z","day":"29","publication":"arXiv","title":"Generalization in Multi-objective machine learning","department":[{"_id":"ChLa"}],"month":"08","year":"2022","_id":"12662","publication_status":"submitted","arxiv":1,"external_id":{"arxiv":["2208.13499"]},"citation":{"short":"P. Súkeník, C. Lampert, ArXiv (n.d.).","ieee":"P. Súkeník and C. Lampert, “Generalization in Multi-objective machine learning,” <i>arXiv</i>. .","ista":"Súkeník P, Lampert C. Generalization in Multi-objective machine learning. arXiv, 2208.13499.","ama":"Súkeník P, Lampert C. Generalization in Multi-objective machine learning. <i>arXiv</i>. doi:<a href=\"https://doi.org/10.48550/arXiv.2208.13499\">10.48550/arXiv.2208.13499</a>","mla":"Súkeník, Peter, and Christoph Lampert. “Generalization in Multi-Objective Machine Learning.” <i>ArXiv</i>, 2208.13499, doi:<a href=\"https://doi.org/10.48550/arXiv.2208.13499\">10.48550/arXiv.2208.13499</a>.","chicago":"Súkeník, Peter, and Christoph Lampert. “Generalization in Multi-Objective Machine Learning.” <i>ArXiv</i>, n.d. <a href=\"https://doi.org/10.48550/arXiv.2208.13499\">https://doi.org/10.48550/arXiv.2208.13499</a>.","apa":"Súkeník, P., &#38; Lampert, C. (n.d.). Generalization in Multi-objective machine learning. <i>arXiv</i>. <a href=\"https://doi.org/10.48550/arXiv.2208.13499\">https://doi.org/10.48550/arXiv.2208.13499</a>"},"date_created":"2023-02-20T08:23:06Z","ddc":["004"],"oa_version":"Preprint","type":"preprint","article_number":"2208.13499","oa":1},{"abstract":[{"lang":"eng","text":"DNA methylation plays essential homeostatic functions in eukaryotic genomes. In animals, DNA methylation is also developmentally regulated and, in turn, regulates development. In the past two decades, huge research effort has endorsed the understanding that DNA methylation plays a similar role in plant development, especially during sexual reproduction. The power of whole-genome sequencing and cell isolation techniques, as well as bioinformatics tools, have enabled recent studies to reveal dynamic changes in DNA methylation during germline development. Furthermore, the combination of these technological advances with genetics, developmental biology and cell biology tools has revealed functional methylation reprogramming events that control gene and transposon activities in flowering plant germlines. In this review, we discuss the major advances in our knowledge of DNA methylation dynamics during male and female germline development in flowering plants."}],"main_file_link":[{"open_access":"1","url":"https://doi.org/10.1111/jipb.13422"}],"keyword":["Plant Science","General Biochemistry","Genetics and Molecular Biology","Biochemistry"],"extern":"1","scopus_import":"1","date_updated":"2023-05-08T10:59:00Z","language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","author":[{"full_name":"He, Shengbo","last_name":"He","first_name":"Shengbo"},{"first_name":"Xiaoqi","id":"e0164712-22ee-11ed-b12a-d80fcdf35958","full_name":"Feng, Xiaoqi","last_name":"Feng","orcid":"0000-0002-4008-1234"}],"status":"public","type":"journal_article","oa_version":"Published Version","issue":"12","_id":"12670","external_id":{"pmid":["36478632"]},"publication_status":"published","publisher":"Wiley","department":[{"_id":"XiFe"}],"article_type":"review","publication_identifier":{"eissn":["1744-7909"],"issn":["1672-9072"]},"month":"12","year":"2022","intvolume":"        64","date_published":"2022-12-07T00:00:00Z","volume":64,"day":"07","publication":"Journal of Integrative Plant Biology","pmid":1,"article_processing_charge":"No","doi":"10.1111/jipb.13422","citation":{"ama":"He S, Feng X. DNA methylation dynamics during germline development. <i>Journal of Integrative Plant Biology</i>. 2022;64(12):2240-2251. doi:<a href=\"https://doi.org/10.1111/jipb.13422\">10.1111/jipb.13422</a>","ieee":"S. He and X. Feng, “DNA methylation dynamics during germline development,” <i>Journal of Integrative Plant Biology</i>, vol. 64, no. 12. Wiley, pp. 2240–2251, 2022.","ista":"He S, Feng X. 2022. DNA methylation dynamics during germline development. Journal of Integrative Plant Biology. 64(12), 2240–2251.","short":"S. He, X. Feng, Journal of Integrative Plant Biology 64 (2022) 2240–2251.","apa":"He, S., &#38; Feng, X. (2022). DNA methylation dynamics during germline development. <i>Journal of Integrative Plant Biology</i>. Wiley. <a href=\"https://doi.org/10.1111/jipb.13422\">https://doi.org/10.1111/jipb.13422</a>","chicago":"He, Shengbo, and Xiaoqi Feng. “DNA Methylation Dynamics during Germline Development.” <i>Journal of Integrative Plant Biology</i>. Wiley, 2022. <a href=\"https://doi.org/10.1111/jipb.13422\">https://doi.org/10.1111/jipb.13422</a>.","mla":"He, Shengbo, and Xiaoqi Feng. “DNA Methylation Dynamics during Germline Development.” <i>Journal of Integrative Plant Biology</i>, vol. 64, no. 12, Wiley, 2022, pp. 2240–51, doi:<a href=\"https://doi.org/10.1111/jipb.13422\">10.1111/jipb.13422</a>."},"date_created":"2023-02-23T09:15:57Z","quality_controlled":"1","oa":1,"title":"DNA methylation dynamics during germline development","page":"2240-2251"},{"main_file_link":[{"open_access":"1","url":"https://doi.org/10.1038/s41586-022-05386-6"}],"abstract":[{"lang":"eng","text":"Sperm chromatin is typically transformed by protamines into a compact and transcriptionally inactive state1,2. Sperm cells of flowering plants lack protamines, yet they have small, transcriptionally active nuclei with chromatin condensed through an unknown mechanism3,4. Here we show that a histone variant, H2B.8, mediates sperm chromatin and nuclear condensation in Arabidopsis thaliana. Loss of H2B.8 causes enlarged sperm nuclei with dispersed chromatin, whereas ectopic expression in somatic cells produces smaller nuclei with aggregated chromatin. This result demonstrates that H2B.8 is sufficient for chromatin condensation. H2B.8 aggregates transcriptionally inactive AT-rich chromatin into phase-separated condensates, which facilitates nuclear compaction without reducing transcription. Reciprocal crosses show that mutation of h2b.8 reduces male transmission, which suggests that H2B.8-mediated sperm compaction is important for fertility. Altogether, our results reveal a new mechanism of nuclear compaction through global aggregation of unexpressed chromatin. We propose that H2B.8 is an evolutionary innovation of flowering plants that achieves nuclear condensation compatible with active transcription."}],"scopus_import":"1","extern":"1","date_updated":"2023-05-08T10:59:22Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"status":"public","author":[{"first_name":"Toby","last_name":"Buttress","full_name":"Buttress, Toby"},{"first_name":"Shengbo","full_name":"He, Shengbo","last_name":"He"},{"first_name":"Liang","full_name":"Wang, Liang","last_name":"Wang"},{"full_name":"Zhou, Shaoli","last_name":"Zhou","first_name":"Shaoli"},{"first_name":"Gerhard","last_name":"Saalbach","full_name":"Saalbach, Gerhard"},{"last_name":"Vickers","full_name":"Vickers, Martin","first_name":"Martin"},{"last_name":"Li","full_name":"Li, Guohong","first_name":"Guohong"},{"full_name":"Li, Pilong","last_name":"Li","first_name":"Pilong"},{"full_name":"Feng, Xiaoqi","last_name":"Feng","orcid":"0000-0002-4008-1234","first_name":"Xiaoqi","id":"e0164712-22ee-11ed-b12a-d80fcdf35958"}],"oa_version":"Published Version","type":"journal_article","external_id":{"pmid":["36323776"]},"publication_status":"published","issue":"7936","_id":"12671","publisher":"Springer Nature","department":[{"_id":"XiFe"}],"article_type":"original","publication_identifier":{"issn":["0028-0836"],"eissn":["1476-4687"]},"year":"2022","month":"11","intvolume":"       611","date_published":"2022-11-17T00:00:00Z","day":"17","publication":"Nature","volume":611,"pmid":1,"article_processing_charge":"No","doi":"10.1038/s41586-022-05386-6","citation":{"ama":"Buttress T, He S, Wang L, et al. Histone H2B.8 compacts flowering plant sperm through chromatin phase separation. <i>Nature</i>. 2022;611(7936):614-622. doi:<a href=\"https://doi.org/10.1038/s41586-022-05386-6\">10.1038/s41586-022-05386-6</a>","short":"T. Buttress, S. He, L. Wang, S. Zhou, G. Saalbach, M. Vickers, G. Li, P. Li, X. Feng, Nature 611 (2022) 614–622.","ista":"Buttress T, He S, Wang L, Zhou S, Saalbach G, Vickers M, Li G, Li P, Feng X. 2022. Histone H2B.8 compacts flowering plant sperm through chromatin phase separation. Nature. 611(7936), 614–622.","ieee":"T. Buttress <i>et al.</i>, “Histone H2B.8 compacts flowering plant sperm through chromatin phase separation,” <i>Nature</i>, vol. 611, no. 7936. Springer Nature, pp. 614–622, 2022.","mla":"Buttress, Toby, et al. “Histone H2B.8 Compacts Flowering Plant Sperm through Chromatin Phase Separation.” <i>Nature</i>, vol. 611, no. 7936, Springer Nature, 2022, pp. 614–22, doi:<a href=\"https://doi.org/10.1038/s41586-022-05386-6\">10.1038/s41586-022-05386-6</a>.","apa":"Buttress, T., He, S., Wang, L., Zhou, S., Saalbach, G., Vickers, M., … Feng, X. (2022). Histone H2B.8 compacts flowering plant sperm through chromatin phase separation. <i>Nature</i>. Springer Nature. <a href=\"https://doi.org/10.1038/s41586-022-05386-6\">https://doi.org/10.1038/s41586-022-05386-6</a>","chicago":"Buttress, Toby, Shengbo He, Liang Wang, Shaoli Zhou, Gerhard Saalbach, Martin Vickers, Guohong Li, Pilong Li, and Xiaoqi Feng. “Histone H2B.8 Compacts Flowering Plant Sperm through Chromatin Phase Separation.” <i>Nature</i>. Springer Nature, 2022. <a href=\"https://doi.org/10.1038/s41586-022-05386-6\">https://doi.org/10.1038/s41586-022-05386-6</a>."},"date_created":"2023-02-23T09:17:05Z","quality_controlled":"1","oa":1,"title":"Histone H2B.8 compacts flowering plant sperm through chromatin phase separation","page":"614-622"},{"ec_funded":1,"article_processing_charge":"No","author":[{"last_name":"Chatterjee","full_name":"Chatterjee, Krishnendu","orcid":"0000-0002-4561-241X","first_name":"Krishnendu","id":"2E5DCA20-F248-11E8-B48F-1D18A9856A87"},{"id":"4363614d-b686-11ed-a7d5-ac9e4a24bc2e","first_name":"Mona","last_name":"Mohammadi","full_name":"Mohammadi, Mona"},{"last_name":"Saona Urmeneta","full_name":"Saona Urmeneta, Raimundo J","orcid":"0000-0001-5103-038X","id":"BD1DF4C4-D767-11E9-B658-BC13E6697425","first_name":"Raimundo J"}],"status":"public","doi":"10.48550/ARXIV.2209.14368","date_published":"2022-09-28T00:00:00Z","abstract":[{"lang":"eng","text":"In modern sample-driven Prophet Inequality, an adversary chooses a sequence of n items with values v1,v2,…,vn to be presented to a decision maker (DM). The process follows in two phases. In the first phase (sampling phase), some items, possibly selected at random, are revealed to the DM, but she can never accept them. In the second phase, the DM is presented with the other items in a random order and online fashion. For each item, she must make an irrevocable decision to either accept the item and stop the process or reject the item forever and proceed to the next item. The goal of the DM is to maximize the expected value as compared to a Prophet (or offline algorithm) that has access to all information. In this setting, the sampling phase has no cost and is not part of the optimization process. However, in many scenarios, the samples are obtained as part of the decision-making process.\r\nWe model this aspect as a two-phase Prophet Inequality where an adversary chooses a sequence of 2n items with values v1,v2,…,v2n and the items are randomly ordered. Finally, there are two phases of the Prophet Inequality problem with the first n-items and the rest of the items, respectively. We show that some basic algorithms achieve a ratio of at most 0.450. We present an algorithm that achieves a ratio of at least 0.495. Finally, we show that for every algorithm the ratio it can achieve is at most 0.502. Hence our algorithm is near-optimal."}],"main_file_link":[{"url":" https://doi.org/10.48550/arXiv.2209.14368","open_access":"1"}],"language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2025-07-14T09:09:51Z","acknowledgement":"This research was partially supported by the ERC CoG 863818 (ForM-SMArt) grant.","day":"28","publication":"arXiv","title":"Repeated prophet inequality with near-optimal bounds","department":[{"_id":"GradSch"},{"_id":"KrCh"}],"month":"09","year":"2022","project":[{"_id":"0599E47C-7A3F-11EA-A408-12923DDC885E","name":"Formal Methods for Stochastic Models: Algorithms and Applications","call_identifier":"H2020","grant_number":"863818"}],"_id":"12677","arxiv":1,"external_id":{"arxiv":["2209.14368"]},"publication_status":"submitted","citation":{"short":"K. Chatterjee, M. Mohammadi, R.J. Saona Urmeneta, ArXiv (n.d.).","ista":"Chatterjee K, Mohammadi M, Saona Urmeneta RJ. Repeated prophet inequality with near-optimal bounds. arXiv, 2209.14368.","ieee":"K. Chatterjee, M. Mohammadi, and R. J. Saona Urmeneta, “Repeated prophet inequality with near-optimal bounds,” <i>arXiv</i>. .","ama":"Chatterjee K, Mohammadi M, Saona Urmeneta RJ. Repeated prophet inequality with near-optimal bounds. <i>arXiv</i>. doi:<a href=\"https://doi.org/10.48550/ARXIV.2209.14368\">10.48550/ARXIV.2209.14368</a>","mla":"Chatterjee, Krishnendu, et al. “Repeated Prophet Inequality with Near-Optimal Bounds.” <i>ArXiv</i>, 2209.14368, doi:<a href=\"https://doi.org/10.48550/ARXIV.2209.14368\">10.48550/ARXIV.2209.14368</a>.","chicago":"Chatterjee, Krishnendu, Mona Mohammadi, and Raimundo J Saona Urmeneta. “Repeated Prophet Inequality with Near-Optimal Bounds.” <i>ArXiv</i>, n.d. <a href=\"https://doi.org/10.48550/ARXIV.2209.14368\">https://doi.org/10.48550/ARXIV.2209.14368</a>.","apa":"Chatterjee, K., Mohammadi, M., &#38; Saona Urmeneta, R. J. (n.d.). Repeated prophet inequality with near-optimal bounds. <i>arXiv</i>. <a href=\"https://doi.org/10.48550/ARXIV.2209.14368\">https://doi.org/10.48550/ARXIV.2209.14368</a>"},"date_created":"2023-02-24T12:21:40Z","type":"preprint","oa_version":"Preprint","article_number":"2209.14368","oa":1},{"title":"Effective equidistribution of lattice points in positive characteristic","page":"679-703","citation":{"mla":"Horesh, Tal, and Frédéric Paulin. “Effective Equidistribution of Lattice Points in Positive Characteristic.” <i>Journal de Theorie Des Nombres de Bordeaux</i>, vol. 34, no. 3, Centre Mersenne, 2022, pp. 679–703, doi:<a href=\"https://doi.org/10.5802/JTNB.1222\">10.5802/JTNB.1222</a>.","chicago":"Horesh, Tal, and Frédéric Paulin. “Effective Equidistribution of Lattice Points in Positive Characteristic.” <i>Journal de Theorie Des Nombres de Bordeaux</i>. Centre Mersenne, 2022. <a href=\"https://doi.org/10.5802/JTNB.1222\">https://doi.org/10.5802/JTNB.1222</a>.","apa":"Horesh, T., &#38; Paulin, F. (2022). Effective equidistribution of lattice points in positive characteristic. <i>Journal de Theorie Des Nombres de Bordeaux</i>. Centre Mersenne. <a href=\"https://doi.org/10.5802/JTNB.1222\">https://doi.org/10.5802/JTNB.1222</a>","ista":"Horesh T, Paulin F. 2022. Effective equidistribution of lattice points in positive characteristic. Journal de Theorie des Nombres de Bordeaux. 34(3), 679–703.","short":"T. Horesh, F. Paulin, Journal de Theorie Des Nombres de Bordeaux 34 (2022) 679–703.","ieee":"T. Horesh and F. Paulin, “Effective equidistribution of lattice points in positive characteristic,” <i>Journal de Theorie des Nombres de Bordeaux</i>, vol. 34, no. 3. Centre Mersenne, pp. 679–703, 2022.","ama":"Horesh T, Paulin F. Effective equidistribution of lattice points in positive characteristic. <i>Journal de Theorie des Nombres de Bordeaux</i>. 2022;34(3):679-703. doi:<a href=\"https://doi.org/10.5802/JTNB.1222\">10.5802/JTNB.1222</a>"},"date_created":"2023-02-26T23:01:02Z","quality_controlled":"1","arxiv":1,"oa":1,"article_processing_charge":"No","tmp":{"image":"/image/cc_by_nd.png","name":"Creative Commons Attribution-NoDerivatives 4.0 International (CC BY-ND 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nd/4.0/legalcode","short":"CC BY-ND (4.0)"},"doi":"10.5802/JTNB.1222","file_date_updated":"2023-02-27T09:10:13Z","has_accepted_license":"1","intvolume":"        34","date_published":"2022-01-27T00:00:00Z","volume":34,"acknowledgement":"The authors warmly thank Amos Nevo for having presented the authors to each other during\r\na beautiful conference in Goa in February 2016, where the idea of this paper was born. The\r\nfirst author thanks the IHES for two post-doctoral years when most of this paper was discussed,\r\nand the Topology team in Orsay for financial support at the final stage. The first author was\r\nsupported by the EPRSC EP/P026710/1 grant. Finally, we warmly thank the referee for many\r\nvery helpful comments that have improved the readability of this paper.","day":"27","publication":"Journal de Theorie des Nombres de Bordeaux","department":[{"_id":"TiBr"}],"article_type":"original","isi":1,"publication_identifier":{"issn":["1246-7405"],"eissn":["2118-8572"]},"month":"01","year":"2022","oa_version":"Published Version","ddc":["510"],"file":[{"file_name":"2023_JourTheorieNombreBordeaux_Horesh.pdf","creator":"dernst","file_id":"12689","relation":"main_file","content_type":"application/pdf","access_level":"open_access","date_updated":"2023-02-27T09:10:13Z","checksum":"08f28fded270251f568f610cf5166d69","success":1,"file_size":870468,"date_created":"2023-02-27T09:10:13Z"}],"type":"journal_article","issue":"3","_id":"12684","external_id":{"arxiv":["2001.01534"],"isi":["000926504300003"]},"publication_status":"published","publisher":"Centre Mersenne","author":[{"full_name":"Horesh, Tal","last_name":"Horesh","first_name":"Tal","id":"C8B7BF48-8D81-11E9-BCA9-F536E6697425"},{"last_name":"Paulin","full_name":"Paulin, Frédéric","first_name":"Frédéric"}],"status":"public","license":"https://creativecommons.org/licenses/by-nd/4.0/","abstract":[{"text":"Given a place  ω  of a global function field  K  over a finite field, with associated affine function ring  Rω  and completion  Kω , the aim of this paper is to give an effective joint equidistribution result for renormalized primitive lattice points  (a,b)∈Rω2  in the plane  Kω2 , and for renormalized solutions to the gcd equation  ax+by=1 . The main tools are techniques of Goronik and Nevo for counting lattice points in well-rounded families of subsets. This gives a sharper analog in positive characteristic of a result of Nevo and the first author for the equidistribution of the primitive lattice points in  \\ZZ2 .","lang":"eng"}],"scopus_import":"1","date_updated":"2023-08-04T10:41:40Z","user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","language":[{"iso":"eng"}]},{"title":"Hilbert space fragmentation and slow dynamics in particle-conserving quantum East models","department":[{"_id":"GradSch"},{"_id":"MaSe"}],"year":"2022","month":"11","citation":{"ista":"Brighi P, Ljubotina M, Serbyn M. Hilbert space fragmentation and slow dynamics in particle-conserving quantum East models. arXiv, 2210.15607.","short":"P. Brighi, M. Ljubotina, M. Serbyn, ArXiv (n.d.).","ieee":"P. Brighi, M. Ljubotina, and M. Serbyn, “Hilbert space fragmentation and slow dynamics in particle-conserving quantum East models,” <i>arXiv</i>. .","ama":"Brighi P, Ljubotina M, Serbyn M. Hilbert space fragmentation and slow dynamics in particle-conserving quantum East models. <i>arXiv</i>. doi:<a href=\"https://doi.org/10.48550/arXiv.2210.15607\">10.48550/arXiv.2210.15607</a>","mla":"Brighi, Pietro, et al. “Hilbert Space Fragmentation and Slow Dynamics in Particle-Conserving Quantum East Models.” <i>ArXiv</i>, 2210.15607, doi:<a href=\"https://doi.org/10.48550/arXiv.2210.15607\">10.48550/arXiv.2210.15607</a>.","chicago":"Brighi, Pietro, Marko Ljubotina, and Maksym Serbyn. “Hilbert Space Fragmentation and Slow Dynamics in Particle-Conserving Quantum East Models.” <i>ArXiv</i>, n.d. <a href=\"https://doi.org/10.48550/arXiv.2210.15607\">https://doi.org/10.48550/arXiv.2210.15607</a>.","apa":"Brighi, P., Ljubotina, M., &#38; Serbyn, M. (n.d.). Hilbert space fragmentation and slow dynamics in particle-conserving quantum East models. <i>arXiv</i>. <a href=\"https://doi.org/10.48550/arXiv.2210.15607\">https://doi.org/10.48550/arXiv.2210.15607</a>"},"date_created":"2023-03-23T14:33:13Z","type":"preprint","oa_version":"Preprint","_id":"12750","publication_status":"submitted","arxiv":1,"external_id":{"arxiv":["2210.15607"]},"article_number":"2210.15607","oa":1,"article_processing_charge":"No","author":[{"first_name":"Pietro","id":"4115AF5C-F248-11E8-B48F-1D18A9856A87","full_name":"Brighi, Pietro","last_name":"Brighi","orcid":"0000-0002-7969-2729"},{"last_name":"Ljubotina","full_name":"Ljubotina, Marko","orcid":"0000-0003-0038-7068","first_name":"Marko","id":"F75EE9BE-5C90-11EA-905D-16643DDC885E"},{"last_name":"Serbyn","full_name":"Serbyn, Maksym","orcid":"0000-0002-2399-5827","first_name":"Maksym","id":"47809E7E-F248-11E8-B48F-1D18A9856A87"}],"tmp":{"short":"CC BY-NC-SA (4.0)","image":"/images/cc_by_nc_sa.png","name":"Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)","legal_code_url":"https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode"},"status":"public","doi":"10.48550/arXiv.2210.15607","license":"https://creativecommons.org/licenses/by-nc-sa/4.0/","abstract":[{"lang":"eng","text":"Quantum kinetically constrained models have recently attracted significant attention due to their anomalous dynamics and thermalization. In this work, we introduce a hitherto unexplored family of kinetically constrained models featuring a conserved particle number and strong inversion-symmetry breaking due to facilitated hopping. We demonstrate that these models provide a generic example of so-called quantum Hilbert space fragmentation, that is manifested in disconnected sectors in the Hilbert space that are not apparent in the computational basis. Quantum Hilbert space fragmentation leads to an exponential in system size number of eigenstates with exactly zero entanglement entropy across several bipartite cuts. These eigenstates can be probed dynamically using quenches from simple initial product states. In addition, we study the particle spreading under unitary dynamics launched from the domain wall state, and find faster than diffusive dynamics at high particle densities, that crosses over into logarithmically slow relaxation at smaller densities. Using a classically simulable cellular automaton, we reproduce the logarithmic dynamics observed in the quantum case. Our work suggests that particle conserving constrained models with inversion symmetry breaking realize so far unexplored universality classes of dynamics and invite their further theoretical and experimental studies."}],"main_file_link":[{"url":"https://doi.org/10.48550/arXiv.2210.15607","open_access":"1"}],"related_material":{"record":[{"id":"12732","status":"public","relation":"dissertation_contains"},{"id":"14334","relation":"later_version","status":"public"}]},"date_published":"2022-11-07T00:00:00Z","date_updated":"2023-09-20T10:46:29Z","publication":"arXiv","day":"07","language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87"},{"scopus_import":"1","abstract":[{"text":"We consider the problem of approximating the reachability probabilities in Markov decision processes (MDP) with uncountable (continuous) state and action spaces. While there are algorithms that, for special classes of such MDP, provide a sequence of approximations converging to the true value in the limit, our aim is to obtain an algorithm with guarantees on the precision of the approximation.\r\nAs this problem is undecidable in general, assumptions on the MDP are necessary. Our main contribution is to identify sufficient assumptions that are as weak as possible, thus approaching the \"boundary\" of which systems can be correctly and reliably analyzed. To this end, we also argue why each of our assumptions is necessary for algorithms based on processing finitely many observations.\r\nWe present two solution variants. The first one provides converging lower bounds under weaker assumptions than typical ones from previous works concerned with guarantees. The second one then utilizes stronger assumptions to additionally provide converging upper bounds. Altogether, we obtain an anytime algorithm, i.e. yielding a sequence of approximants with known and iteratively improving precision, converging to the true value in the limit. Besides, due to the generality of our assumptions, our algorithms are very general templates, readily allowing for various heuristics from literature in contrast to, e.g., a specific discretization algorithm. Our theoretical contribution thus paves the way for future practical improvements without sacrificing correctness guarantees.","lang":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"date_updated":"2023-09-26T10:43:30Z","status":"public","author":[{"first_name":"Kush","full_name":"Grover, Kush","last_name":"Grover"},{"first_name":"Jan","id":"44CEF464-F248-11E8-B48F-1D18A9856A87","full_name":"Kretinsky, Jan","last_name":"Kretinsky","orcid":"0000-0002-8122-2881"},{"full_name":"Meggendorfer, Tobias","last_name":"Meggendorfer","orcid":"0000-0002-1712-2165","id":"b21b0c15-30a2-11eb-80dc-f13ca25802e1","first_name":"Tobias"},{"first_name":"Maimilian","last_name":"Weininger","full_name":"Weininger, Maimilian"}],"alternative_title":["LIPIcs"],"publication_status":"published","external_id":{"arxiv":["2008.04824"]},"_id":"12775","type":"conference","oa_version":"Published Version","file":[{"date_created":"2023-09-26T10:43:15Z","checksum":"e282e43d3ae0ba6e067b72f4583e13c0","file_size":960036,"success":1,"date_updated":"2023-09-26T10:43:15Z","access_level":"open_access","content_type":"application/pdf","relation":"main_file","file_id":"14372","creator":"dernst","file_name":"2022_LIPIcS_Grover.pdf"}],"ddc":["000"],"publisher":"Schloss Dagstuhl - Leibniz-Zentrum für Informatik","department":[{"_id":"KrCh"}],"year":"2022","month":"09","publication_identifier":{"issn":["1868-8969"]},"date_published":"2022-09-15T00:00:00Z","has_accepted_license":"1","intvolume":"       243","acknowledgement":"Kush Grover: The author has been supported by the DFG research training group GRK\r\n2428 ConVeY.\r\nMaximilian Weininger: The author has been partially supported by DFG projects 383882557\r\nStatistical Unbounded Verification (SUV) and 427755713 Group-By Objectives in Probabilistic\r\nVerification (GOPro)","publication":"33rd International Conference on Concurrency Theory ","day":"15","volume":243,"tmp":{"short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"article_processing_charge":"No","file_date_updated":"2023-09-26T10:43:15Z","doi":"10.4230/LIPIcs.CONCUR.2022.11","quality_controlled":"1","arxiv":1,"conference":{"name":"CONCUR: Conference on Concurrency Theory","start_date":"2022-09-13","location":"Warsaw, Poland","end_date":"2022-09-16"},"citation":{"ista":"Grover K, Kretinsky J, Meggendorfer T, Weininger M. 2022. Anytime guarantees for reachability in uncountable Markov decision processes. 33rd International Conference on Concurrency Theory . CONCUR: Conference on Concurrency Theory, LIPIcs, vol. 243, 11.","short":"K. Grover, J. Kretinsky, T. Meggendorfer, M. Weininger, in:, 33rd International Conference on Concurrency Theory , Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022.","ieee":"K. Grover, J. Kretinsky, T. Meggendorfer, and M. Weininger, “Anytime guarantees for reachability in uncountable Markov decision processes,” in <i>33rd International Conference on Concurrency Theory </i>, Warsaw, Poland, 2022, vol. 243.","ama":"Grover K, Kretinsky J, Meggendorfer T, Weininger M. Anytime guarantees for reachability in uncountable Markov decision processes. In: <i>33rd International Conference on Concurrency Theory </i>. Vol 243. Schloss Dagstuhl - Leibniz-Zentrum für Informatik; 2022. doi:<a href=\"https://doi.org/10.4230/LIPIcs.CONCUR.2022.11\">10.4230/LIPIcs.CONCUR.2022.11</a>","chicago":"Grover, Kush, Jan Kretinsky, Tobias Meggendorfer, and Maimilian Weininger. “Anytime Guarantees for Reachability in Uncountable Markov Decision Processes.” In <i>33rd International Conference on Concurrency Theory </i>, Vol. 243. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022. <a href=\"https://doi.org/10.4230/LIPIcs.CONCUR.2022.11\">https://doi.org/10.4230/LIPIcs.CONCUR.2022.11</a>.","apa":"Grover, K., Kretinsky, J., Meggendorfer, T., &#38; Weininger, M. (2022). Anytime guarantees for reachability in uncountable Markov decision processes. In <i>33rd International Conference on Concurrency Theory </i> (Vol. 243). Warsaw, Poland: Schloss Dagstuhl - Leibniz-Zentrum für Informatik. <a href=\"https://doi.org/10.4230/LIPIcs.CONCUR.2022.11\">https://doi.org/10.4230/LIPIcs.CONCUR.2022.11</a>","mla":"Grover, Kush, et al. “Anytime Guarantees for Reachability in Uncountable Markov Decision Processes.” <i>33rd International Conference on Concurrency Theory </i>, vol. 243, 11, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2022, doi:<a href=\"https://doi.org/10.4230/LIPIcs.CONCUR.2022.11\">10.4230/LIPIcs.CONCUR.2022.11</a>."},"date_created":"2023-03-28T08:09:32Z","oa":1,"article_number":"11","title":"Anytime guarantees for reachability in uncountable Markov decision processes"},{"author":[{"orcid":"0000-0002-8314-0177","full_name":"Browning, Timothy D","last_name":"Browning","id":"35827D50-F248-11E8-B48F-1D18A9856A87","first_name":"Timothy D"}],"status":"public","abstract":[{"text":"An improved asymptotic formula is established for the number of rational points of bounded height on the split smooth del Pezzo surface of degree 5. The proof uses the five conic bundle structures on the surface.","lang":"eng"}],"language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2023-10-18T07:59:13Z","article_type":"original","department":[{"_id":"TiBr"}],"year":"2022","month":"08","project":[{"grant_number":"P32428","name":"New frontiers of the Manin conjecture","call_identifier":"FWF","_id":"26AEDAB2-B435-11E9-9278-68D0E5697425"}],"publication_identifier":{"issn":["1076-9803"]},"_id":"12776","publication_status":"published","type":"journal_article","file":[{"date_updated":"2023-03-30T07:09:35Z","access_level":"open_access","content_type":"application/pdf","date_created":"2023-03-30T07:09:35Z","checksum":"c01e8291794a1bdb7416aa103cb68ef8","success":1,"file_size":897267,"file_name":"2022_NYJM_Browning.pdf","relation":"main_file","file_id":"12778","creator":"dernst"}],"oa_version":"Published Version","ddc":["510"],"publisher":"State University of New York","article_processing_charge":"No","tmp":{"short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"file_date_updated":"2023-03-30T07:09:35Z","date_published":"2022-08-24T00:00:00Z","intvolume":"        28","has_accepted_license":"1","volume":28,"acknowledgement":"This work was begun while the author was participating in the programme on \"Diophantine equations\" at the Hausdorff Research Institute for Mathematics in Bonn in 2009. The hospitality and financial support of the institute is gratefully acknowledged. The idea of using conic bundles to study the split del Pezzo surface of degree 5 was explained to the author by Professor Salberger. The author is very grateful to him for his input into this project and also to Shuntaro Yamagishi for many useful comments on an earlier version of this manuscript. While working on this paper the author was supported by FWF grant P32428-N35.","day":"24","publication":"New York Journal of Mathematics","title":"Revisiting the Manin–Peyre conjecture for the split del Pezzo surface of degree 5","page":"1193 - 1229","quality_controlled":"1","date_created":"2023-03-28T09:21:09Z","citation":{"short":"T.D. Browning, New York Journal of Mathematics 28 (2022) 1193–1229.","ieee":"T. D. Browning, “Revisiting the Manin–Peyre conjecture for the split del Pezzo surface of degree 5,” <i>New York Journal of Mathematics</i>, vol. 28. State University of New York, pp. 1193–1229, 2022.","ista":"Browning TD. 2022. Revisiting the Manin–Peyre conjecture for the split del Pezzo surface of degree 5. New York Journal of Mathematics. 28, 1193–1229.","ama":"Browning TD. Revisiting the Manin–Peyre conjecture for the split del Pezzo surface of degree 5. <i>New York Journal of Mathematics</i>. 2022;28:1193-1229.","mla":"Browning, Timothy D. “Revisiting the Manin–Peyre Conjecture for the Split Del Pezzo Surface of Degree 5.” <i>New York Journal of Mathematics</i>, vol. 28, State University of New York, 2022, pp. 1193–229.","chicago":"Browning, Timothy D. “Revisiting the Manin–Peyre Conjecture for the Split Del Pezzo Surface of Degree 5.” <i>New York Journal of Mathematics</i>. State University of New York, 2022.","apa":"Browning, T. D. (2022). Revisiting the Manin–Peyre conjecture for the split del Pezzo surface of degree 5. <i>New York Journal of Mathematics</i>. State University of New York."},"oa":1},{"has_accepted_license":"1","date_published":"2022-11-01T00:00:00Z","publication":"Proceedings of the 23rd ACM/IFIP International Middleware Conference","day":"01","acknowledgement":"The authors sincerely thank Nikoli Dryden, Tal Ben-Nun, Torsten Hoefler and Bapi Chatterjee for useful discussions throughout the development of this project.","article_processing_charge":"Yes (via OA deal)","tmp":{"short":"CC BY (4.0)","name":"Creative Commons Attribution 4.0 International Public License (CC-BY 4.0)","image":"/images/cc_by.png","legal_code_url":"https://creativecommons.org/licenses/by/4.0/legalcode"},"doi":"10.1145/3528535.3565248","file_date_updated":"2023-04-03T06:17:58Z","date_created":"2023-03-31T06:17:00Z","citation":{"ama":"Markov I, Ramezanikebrya H, Alistarh D-A. CGX: Adaptive system support for communication-efficient deep learning. In: <i>Proceedings of the 23rd ACM/IFIP International Middleware Conference</i>. Association for Computing Machinery; 2022:241-254. doi:<a href=\"https://doi.org/10.1145/3528535.3565248\">10.1145/3528535.3565248</a>","ista":"Markov I, Ramezanikebrya H, Alistarh D-A. 2022. CGX: Adaptive system support for communication-efficient deep learning. Proceedings of the 23rd ACM/IFIP International Middleware Conference. Middleware: International Middleware Conference, 241–254.","ieee":"I. Markov, H. Ramezanikebrya, and D.-A. Alistarh, “CGX: Adaptive system support for communication-efficient deep learning,” in <i>Proceedings of the 23rd ACM/IFIP International Middleware Conference</i>, Quebec, QC, Canada, 2022, pp. 241–254.","short":"I. Markov, H. Ramezanikebrya, D.-A. Alistarh, in:, Proceedings of the 23rd ACM/IFIP International Middleware Conference, Association for Computing Machinery, 2022, pp. 241–254.","mla":"Markov, Ilia, et al. “CGX: Adaptive System Support for Communication-Efficient Deep Learning.” <i>Proceedings of the 23rd ACM/IFIP International Middleware Conference</i>, Association for Computing Machinery, 2022, pp. 241–54, doi:<a href=\"https://doi.org/10.1145/3528535.3565248\">10.1145/3528535.3565248</a>.","apa":"Markov, I., Ramezanikebrya, H., &#38; Alistarh, D.-A. (2022). CGX: Adaptive system support for communication-efficient deep learning. In <i>Proceedings of the 23rd ACM/IFIP International Middleware Conference</i> (pp. 241–254). Quebec, QC, Canada: Association for Computing Machinery. <a href=\"https://doi.org/10.1145/3528535.3565248\">https://doi.org/10.1145/3528535.3565248</a>","chicago":"Markov, Ilia, Hamidreza Ramezanikebrya, and Dan-Adrian Alistarh. “CGX: Adaptive System Support for Communication-Efficient Deep Learning.” In <i>Proceedings of the 23rd ACM/IFIP International Middleware Conference</i>, 241–54. Association for Computing Machinery, 2022. <a href=\"https://doi.org/10.1145/3528535.3565248\">https://doi.org/10.1145/3528535.3565248</a>."},"conference":{"name":"Middleware: International Middleware Conference","start_date":"2022-11-07","end_date":"2022-11-11","location":"Quebec, QC, Canada"},"arxiv":1,"quality_controlled":"1","oa":1,"title":"CGX: Adaptive system support for communication-efficient deep learning","page":"241-254","abstract":[{"lang":"eng","text":"The ability to scale out training workloads has been one of the key performance enablers of deep learning. The main scaling approach is data-parallel GPU-based training, which has been boosted by hardware and software support for highly efficient point-to-point communication, and in particular via hardware bandwidth over-provisioning. Overprovisioning comes at a cost: there is an order of magnitude price difference between \"cloud-grade\" servers with such support, relative to their popular \"consumer-grade\" counterparts, although single server-grade and consumer-grade GPUs can have similar computational envelopes.\r\n\r\nIn this paper, we show that the costly hardware overprovisioning approach can be supplanted via algorithmic and system design, and propose a framework called CGX, which provides efficient software support for compressed communication in ML applications, for both multi-GPU single-node training, as well as larger-scale multi-node training. CGX is based on two technical advances: At the system level, it relies on a re-developed communication stack for ML frameworks, which provides flexible, highly-efficient support for compressed communication. At the application level, it provides seamless, parameter-free integration with popular frameworks, so that end-users do not have to modify training recipes, nor significant training code. This is complemented by a layer-wise adaptive compression technique which dynamically balances compression gains with accuracy preservation. CGX integrates with popular ML frameworks, providing up to 3X speedups for multi-GPU nodes based on commodity hardware, and order-of-magnitude improvements in the multi-node setting, with negligible impact on accuracy."}],"date_updated":"2023-04-03T06:21:04Z","user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","language":[{"iso":"eng"}],"author":[{"full_name":"Markov, Ilia","last_name":"Markov","id":"D0CF4148-C985-11E9-8066-0BDEE5697425","first_name":"Ilia"},{"last_name":"Ramezanikebrya","full_name":"Ramezanikebrya, Hamidreza","first_name":"Hamidreza"},{"last_name":"Alistarh","full_name":"Alistarh, Dan-Adrian","orcid":"0000-0003-3650-940X","id":"4A899BFC-F248-11E8-B48F-1D18A9856A87","first_name":"Dan-Adrian"}],"status":"public","ddc":["000"],"oa_version":"Published Version","type":"conference","file":[{"date_created":"2023-04-03T06:17:58Z","success":1,"checksum":"1a397746235f245da5468819247ff663","file_size":1514169,"date_updated":"2023-04-03T06:17:58Z","content_type":"application/pdf","access_level":"open_access","relation":"main_file","creator":"dernst","file_id":"12795","file_name":"2022_ACMMiddleware_Markov.pdf"}],"_id":"12780","publication_status":"published","external_id":{"arxiv":["2111.08617"]},"publisher":"Association for Computing Machinery","department":[{"_id":"DaAl"}],"publication_identifier":{"isbn":["9781450393409"]},"month":"11","year":"2022"},{"date_published":"2022-08-29T00:00:00Z","intvolume":"       321","volume":321,"acknowledgement":"I’d like to thank Prof. Chaudouard for introducing me to this area. I’d like to thank Prof. Harris for asking me the question that makes Section 10 possible. I’m grateful for the support of Prof. Hausel and IST Austria. The author was funded by an ISTplus fellowship: This project has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie Grant Agreement No. 754411.","day":"29","publication":"Pacific Journal of Mathematics","article_processing_charge":"No","ec_funded":1,"doi":"10.2140/pjm.2022.321.193","quality_controlled":"1","arxiv":1,"date_created":"2023-04-02T22:01:11Z","citation":{"mla":"Yu, Hongjie. “ A Coarse Geometric Expansion of a Variant of Arthur’s Truncated Traces and Some Applications.” <i>Pacific Journal of Mathematics</i>, vol. 321, no. 1, Mathematical Sciences Publishers, 2022, pp. 193–237, doi:<a href=\"https://doi.org/10.2140/pjm.2022.321.193\">10.2140/pjm.2022.321.193</a>.","apa":"Yu, H. (2022).  A coarse geometric expansion of a variant of Arthur’s truncated traces and some applications. <i>Pacific Journal of Mathematics</i>. Mathematical Sciences Publishers. <a href=\"https://doi.org/10.2140/pjm.2022.321.193\">https://doi.org/10.2140/pjm.2022.321.193</a>","chicago":"Yu, Hongjie. “ A Coarse Geometric Expansion of a Variant of Arthur’s Truncated Traces and Some Applications.” <i>Pacific Journal of Mathematics</i>. Mathematical Sciences Publishers, 2022. <a href=\"https://doi.org/10.2140/pjm.2022.321.193\">https://doi.org/10.2140/pjm.2022.321.193</a>.","ama":"Yu H.  A coarse geometric expansion of a variant of Arthur’s truncated traces and some applications. <i>Pacific Journal of Mathematics</i>. 2022;321(1):193-237. doi:<a href=\"https://doi.org/10.2140/pjm.2022.321.193\">10.2140/pjm.2022.321.193</a>","short":"H. Yu, Pacific Journal of Mathematics 321 (2022) 193–237.","ieee":"H. Yu, “ A coarse geometric expansion of a variant of Arthur’s truncated traces and some applications,” <i>Pacific Journal of Mathematics</i>, vol. 321, no. 1. Mathematical Sciences Publishers, pp. 193–237, 2022.","ista":"Yu H. 2022.  A coarse geometric expansion of a variant of Arthur’s truncated traces and some applications. Pacific Journal of Mathematics. 321(1), 193–237."},"oa":1,"title":" A coarse geometric expansion of a variant of Arthur's truncated traces and some applications","page":"193-237","scopus_import":"1","abstract":[{"text":"Let F be a global function field with constant field Fq. Let G be a reductive group over Fq. We establish a variant of Arthur's truncated kernel for G and for its Lie algebra which generalizes Arthur's original construction. We establish a coarse geometric expansion for our variant truncation.\r\nAs applications, we consider some existence and uniqueness problems of some cuspidal automorphic representations for the functions field of the projective line P1Fq with two points of ramifications.","lang":"eng"}],"main_file_link":[{"open_access":"1","url":"https://doi.org/10.48550/arXiv.2109.10245"}],"keyword":["Arthur–Selberg trace formula","cuspidal automorphic representations","global function fields"],"user_id":"4359f0d1-fa6c-11eb-b949-802e58b17ae8","language":[{"iso":"eng"}],"date_updated":"2023-08-04T10:42:38Z","author":[{"first_name":"Hongjie","id":"3D7DD9BE-F248-11E8-B48F-1D18A9856A87","orcid":"0000-0001-5128-7126","full_name":"Yu, Hongjie","last_name":"Yu"}],"status":"public","_id":"12793","issue":"1","external_id":{"isi":["000954466300006"],"arxiv":["2109.10245"]},"publication_status":"published","oa_version":"Preprint","type":"journal_article","publisher":"Mathematical Sciences Publishers","article_type":"original","department":[{"_id":"TaHa"}],"month":"08","year":"2022","project":[{"name":"ISTplus - Postdoctoral Fellowships","call_identifier":"H2020","_id":"260C2330-B435-11E9-9278-68D0E5697425","grant_number":"754411"}],"isi":1,"publication_identifier":{"issn":["0030-8730"],"eissn":["1945-5844"]}},{"article_processing_charge":"No","author":[{"last_name":"Bombari","full_name":"Bombari, Simone","id":"ca726dda-de17-11ea-bc14-f9da834f63aa","first_name":"Simone"},{"first_name":"Alessandro","full_name":"Achille, Alessandro","last_name":"Achille"},{"first_name":"Zijian","full_name":"Wang, Zijian","last_name":"Wang"},{"first_name":"Yu-Xiang","full_name":"Wang, Yu-Xiang","last_name":"Wang"},{"first_name":"Yusheng","last_name":"Xie","full_name":"Xie, Yusheng"},{"last_name":"Singh","full_name":"Singh, Kunwar Yashraj","first_name":"Kunwar Yashraj"},{"last_name":"Appalaraju","full_name":"Appalaraju, Srikar","first_name":"Srikar"},{"first_name":"Vijay","last_name":"Mahadevan","full_name":"Mahadevan, Vijay"},{"full_name":"Soatto, Stefano","last_name":"Soatto","first_name":"Stefano"}],"status":"public","doi":"10.48550/arXiv.2203.16701","date_published":"2022-03-30T00:00:00Z","abstract":[{"text":"Memorization of the relation between entities in a dataset can lead to privacy issues when using a trained model for question answering. We introduce Relational Memorization (RM) to understand, quantify and control this phenomenon. While bounding general memorization can have detrimental effects on the performance of a trained model, bounding RM does not prevent effective learning. The difference is most pronounced when the data distribution is long-tailed, with many queries having only few training examples: Impeding general memorization prevents effective learning, while impeding only relational memorization still allows learning general properties of the underlying concepts. We formalize the notion of Relational Privacy (RP) and, inspired by Differential Privacy (DP), we provide a possible definition of Differential Relational Privacy (DrP). These notions can be used to describe and compute bounds on the amount of RM in a trained model. We illustrate Relational Privacy concepts in experiments with large-scale models for Question Answering.","lang":"eng"}],"main_file_link":[{"url":"https://doi.org/10.48550/arXiv.2203.16701","open_access":"1"}],"language":[{"iso":"eng"}],"user_id":"2DF688A6-F248-11E8-B48F-1D18A9856A87","date_updated":"2023-04-25T07:34:49Z","publication":"arXiv","day":"30","title":"Towards differential relational privacy and its use in question answering","department":[{"_id":"GradSch"},{"_id":"MaMo"}],"month":"03","year":"2022","_id":"12860","publication_status":"submitted","arxiv":1,"external_id":{"arxiv":["2203.16701"]},"citation":{"mla":"Bombari, Simone, et al. “Towards Differential Relational Privacy and Its Use in Question Answering.” <i>ArXiv</i>, 2203.16701, doi:<a href=\"https://doi.org/10.48550/arXiv.2203.16701\">10.48550/arXiv.2203.16701</a>.","chicago":"Bombari, Simone, Alessandro Achille, Zijian Wang, Yu-Xiang Wang, Yusheng Xie, Kunwar Yashraj Singh, Srikar Appalaraju, Vijay Mahadevan, and Stefano Soatto. “Towards Differential Relational Privacy and Its Use in Question Answering.” <i>ArXiv</i>, n.d. <a href=\"https://doi.org/10.48550/arXiv.2203.16701\">https://doi.org/10.48550/arXiv.2203.16701</a>.","apa":"Bombari, S., Achille, A., Wang, Z., Wang, Y.-X., Xie, Y., Singh, K. Y., … Soatto, S. (n.d.). Towards differential relational privacy and its use in question answering. <i>arXiv</i>. <a href=\"https://doi.org/10.48550/arXiv.2203.16701\">https://doi.org/10.48550/arXiv.2203.16701</a>","short":"S. Bombari, A. Achille, Z. Wang, Y.-X. Wang, Y. Xie, K.Y. Singh, S. Appalaraju, V. Mahadevan, S. Soatto, ArXiv (n.d.).","ieee":"S. Bombari <i>et al.</i>, “Towards differential relational privacy and its use in question answering,” <i>arXiv</i>. .","ista":"Bombari S, Achille A, Wang Z, Wang Y-X, Xie Y, Singh KY, Appalaraju S, Mahadevan V, Soatto S. Towards differential relational privacy and its use in question answering. arXiv, 2203.16701.","ama":"Bombari S, Achille A, Wang Z, et al. Towards differential relational privacy and its use in question answering. <i>arXiv</i>. doi:<a href=\"https://doi.org/10.48550/arXiv.2203.16701\">10.48550/arXiv.2203.16701</a>"},"date_created":"2023-04-23T16:11:48Z","oa_version":"Preprint","type":"preprint","article_number":"2203.16701","oa":1}]
