critical time
- Research Report > Experimental Study (1.00)
- Research Report > New Finding (0.68)
- Research Report > Experimental Study (1.00)
- Research Report > New Finding (0.68)
Anytime Influence Bounds and the Explosive Behavior of Continuous-Time Diffusion Networks
Kevin Scaman, Rémi Lemonnier, Nicolas Vayatis
The paper studies transition phenomena in information cascades observed along a diffusion process over some graph. We introduce the Laplace Hazard matrix and show that its spectral radius fully characterizes the dynamics of the contagion both in terms of influence and of explosion time. Using this concept, we prove tight non-asymptotic bounds for the influence of a set of nodes, and we also provide an in-depth analysis of the critical time after which the contagion becomes super-critical. Our contributions include formal definitions and tight lower bounds of critical explosion time. We illustrate the relevance of our theoretical results through several examples of information cascades used in epidemiology and viral marketing models. Finally, we provide a series of numerical experiments for various types of networks which confirm the tightness of the theoretical bounds.
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.04)
- North America > United States (0.04)
- Europe > France > Île-de-France > Paris > Paris (0.04)
Computational Intractability of Strategizing against Online Learners
Assos, Angelos, Dagan, Yuval, Rajaraman, Nived
Online learning algorithms are widely used in strategic multi-agent settings, including repeated auctions, contract design, and pricing competitions, where agents adapt their strategies over time. A key question in such environments is how an optimizing agent can best respond to a learning agent to improve its own long-term outcomes. While prior work has developed efficient algorithms for the optimizer in special cases - such as structured auction settings or contract design - no general efficient algorithm is known. In this paper, we establish a strong computational hardness result: unless $\mathsf{P} = \mathsf{NP}$, no polynomial-time optimizer can compute a near-optimal strategy against a learner using a standard no-regret algorithm, specifically Multiplicative Weights Update (MWU). Our result proves an $\Omega(T)$ hardness bound, significantly strengthening previous work that only showed an additive $\Theta(1)$ impossibility result. Furthermore, while the prior hardness result focused on learners using fictitious play - an algorithm that is not no-regret - we prove intractability for a widely used no-regret learning algorithm. This establishes a fundamental computational barrier to finding optimal strategies in general game-theoretic settings.
- Leisure & Entertainment (0.46)
- Education > Educational Setting > Online (0.34)
Offline Task Assistance Planning on a Graph:Theoretic and Algorithmic Foundations
In this work we introduce the problem of task assistance planning where we are given two robots Rtask and Rassist. The first robot, Rtask, is in charge of performing a given task by executing a precomputed path. The second robot, Rassist, is in charge of assisting the task performed by Rtask using on-board sensors. The ability of Rassist to provide assistance to Rtask depends on the locations of both robots. Since Rtask is moving along its path, Rassist may also need to move to provide as much assistance as possible. The problem we study is how to compute a path for Rassist so as to maximize the portion of Rtask's path for which assistance is provided. We limit the problem to the setting where Rassist moves on a roadmap which is a graph embedded in its configuration space and show that this problem is NP-hard. Fortunately, we show that when Rassist moves on a given path, and all we have to do is compute the times at which Rassist should move from one configuration to the following one, we can solve the problem optimally in polynomial time. Together with carefully-crafted upper bounds, this polynomial-time algorithm is integrated into a Branch and Bound-based algorithm that can compute optimal solutions to the problem outperforming baselines by several orders of magnitude. We demonstrate our work empirically in simulated scenarios containing both planar manipulators and UR robots as well as in the lab on real robots.
- North America > United States > Massachusetts > Suffolk County > Boston (0.14)
- Europe > United Kingdom > England > Cambridgeshire > Cambridge (0.04)
- Asia > Middle East > Republic of Türkiye > Karaman Province > Karaman (0.04)
- (2 more...)
How JEPA Avoids Noisy Features: The Implicit Bias of Deep Linear Self Distillation Networks
Littwin, Etai, Saremi, Omid, Advani, Madhu, Thilak, Vimal, Nakkiran, Preetum, Huang, Chen, Susskind, Joshua
Two competing paradigms exist for self-supervised learning of data representations. Joint Embedding Predictive Architecture (JEPA) is a class of architectures in which semantically similar inputs are encoded into representations that are predictive of each other. A recent successful approach that falls under the JEPA framework is self-distillation, where an online encoder is trained to predict the output of the target encoder, sometimes using a lightweight predictor network. This is contrasted with the Masked AutoEncoder (MAE) paradigm, where an encoder and decoder are trained to reconstruct missing parts of the input in the data space rather, than its latent representation. A common motivation for using the JEPA approach over MAE is that the JEPA objective prioritizes abstract features over fine-grained pixel information (which can be unpredictable and uninformative). In this work, we seek to understand the mechanism behind this empirical observation by analyzing the training dynamics of deep linear models. We uncover a surprising mechanism: in a simplified linear setting where both approaches learn similar representations, JEPAs are biased to learn high-influence features, i.e., features characterized by having high regression coefficients. Our results point to a distinct implicit bias of predicting in latent space that may shed light on its success in practice.
Anytime Influence Bounds and the Explosive Behavior of Continuous-Time Diffusion Networks Kevin Scaman 1 Rémi Lemonnier
The paper studies transition phenomena in information cascades observed along a diffusion process over some graph. We introduce the Laplace Hazard matrix and show that its spectral radius fully characterizes the dynamics of the contagion both in terms of influence and of explosion time. Using this concept, we prove tight non-asymptotic bounds for the influence of a set of nodes, and we also provide an in-depth analysis of the critical time after which the contagion becomes super-critical. Our contributions include formal definitions and tight lower bounds of critical explosion time. We illustrate the relevance of our theoretical results through several examples of information cascades used in epidemiology and viral marketing models. Finally, we provide a series of numerical experiments for various types of networks which confirm the tightness of the theoretical bounds.
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.04)
- North America > United States > New York > New York County > New York City (0.04)
- Europe > France > Île-de-France > Paris > Paris (0.04)
How John Deere grew data seeds into an AI powerhouse
We are excited to bring Transform 2022 back in-person July 19 and virtually July 20 - 28. Join AI and data leaders for insightful talks and exciting networking opportunities. During CES 2022 in January, John Deere debuted a fully autonomous tractor, powered by artificial intelligence, that is ready for large-scale production. According to a press release, the tractor has six pairs of stereo cameras that capture images and pass them through a deep neural network – that then classifies each pixel in approximately 100 milliseconds and determines if the machine continues to move or stops, depending on if an obstacle is detected. And in March, the Iowa-based company launched See & Spray Ultimate, a precision-targeted herbicide spray technology designed by John Deere's fully owned subsidiary Blue River Technology. Cameras and processors use computer vision and machine learning to detect weeds from crop plants.
Workday CEO Aneel Bhusri: Machine Learning More Disruptive than Cloud
Warning that businesses that ignore machine learning will "be left in the dust," Workday CEO and longtime cloud evangelist Aneel Bhusri said yesterday that machine learning will become even more disruptive than the cloud computing he's helped turn into a global phenomenon. Those would be strong words from any executive. But when they come from Bhusri--one of the leading advocates of and evangelists for cloud computing over the past 14 years--they dramatically underscore the scale and scope of ML's impact on the business world. In his keynote address opening his company's annual Workday Rising customer conference, Bhusri pegged ML as one of the three top-priority areas at fast-growing Workday as it gets closer to topping $1 billion in quarterly revenue. Bhusri's pointed and powerful focus on the ubiquitous role machine learning is playing at Workday comes at a critical time for the rapidly growing high-flier, which is #8 on my Cloud Wars Top 10 ranking.
Anytime Influence Bounds and the Explosive Behavior of Continuous-Time Diffusion Networks
Scaman, Kevin, Lemonnier, Rémi, Vayatis, Nicolas
The paper studies transition phenomena in information cascades observed along a diffusion process over some graph. We introduce the Laplace Hazard matrix and show that its spectral radius fully characterizes the dynamics of the contagion both in terms of influence and of explosion time. Using this concept, we prove tight non-asymptotic bounds for the influence of a set of nodes, and we also provide an in-depth analysis of the critical time after which the contagion becomes super-critical. Our contributions include formal definitions and tight lower bounds of critical explosion time. We illustrate the relevance of our theoretical results through several examples of information cascades used in epidemiology and viral marketing models. Finally, we provide a series of numerical experiments for various types of networks which confirm the tightness of the theoretical bounds.
- Europe > United Kingdom > England > Oxfordshire > Oxford (0.04)
- North America > United States > New York > New York County > New York City (0.04)
- Europe > France > Île-de-France > Paris > Paris (0.04)