-
Learning-Augmented Robust Algorithmic Recourse
Authors:
Kshitij Kayastha,
Vasilis Gkatzelis,
Shahin Jabbari
Abstract:
The widespread use of machine learning models in high-stakes domains can have a major negative impact, especially on individuals who receive undesirable outcomes. Algorithmic recourse provides such individuals with suggestions of minimum-cost improvements they can make to achieve a desirable outcome in the future. However, machine learning models often get updated over time and this can cause a re…
▽ More
The widespread use of machine learning models in high-stakes domains can have a major negative impact, especially on individuals who receive undesirable outcomes. Algorithmic recourse provides such individuals with suggestions of minimum-cost improvements they can make to achieve a desirable outcome in the future. However, machine learning models often get updated over time and this can cause a recourse to become invalid (i.e., not lead to the desirable outcome). The robust recourse literature aims to choose recourses that are less sensitive, even against adversarial model changes, but this comes at a higher cost. To overcome this obstacle, we initiate the study of algorithmic recourse through the learning-augmented framework and evaluate the extent to which a designer equipped with a prediction regarding future model changes can reduce the cost of recourse when the prediction is accurate (consistency) while also limiting the cost even when the prediction is inaccurate (robustness). We propose a novel algorithm for this problem, study the robustness-consistency trade-off, and analyze how prediction accuracy affects performance.
△ Less
Submitted 2 October, 2024;
originally announced October 2024.
-
Mathematical modelling of the vitamin C clock reaction: a study of two kinetic regimes
Authors:
Aliya Alsaleh,
David J. Smith,
Sara Jabbari
Abstract:
Chemically reacting systems exhibiting a repeatable delay period before a visible and sudden change are referred to as clock reactions; they have a long history in education and provide an idealisation of various biochemical and industrial processes. We focus on a purely substrate-depletive clock reaction utilising vitamin C, hydrogen peroxide, iodine and starch. Building on a recent study of a si…
▽ More
Chemically reacting systems exhibiting a repeatable delay period before a visible and sudden change are referred to as clock reactions; they have a long history in education and provide an idealisation of various biochemical and industrial processes. We focus on a purely substrate-depletive clock reaction utilising vitamin C, hydrogen peroxide, iodine and starch. Building on a recent study of a simplified two-reaction model under high hydrogen peroxide concentrations, we develop a more detailed model which breaks the slow reaction into two steps, one of which is rate-limiting unless hydrogen peroxide levels are very high. Through asymptotic analysis, this model enables the effect of hydrogen peroxide concentration to be elucidated in a principled way, resolving an apparent discrepancy with earlier literature regarding the order of the slow reaction kinetics. The model is analysed in moderate- and high-hydrogen peroxide regimes, providing approximate solutions and expressions for the switchover time which take into account hydrogen peroxide concentration. The solutions are validated through simultaneously fitting the same set of parameters to several experimental series, then testing on independent experiments across widely varying hydrogen peroxide concentration. The study thereby presents and further develops a validated mechanistic understanding of a paradigm chemical kinetics system.
△ Less
Submitted 7 August, 2024;
originally announced August 2024.
-
Improving Fairness in Adaptive Social Exergames via Shapley Bandits
Authors:
Robert C. Gray,
Jennifer Villareale,
Thomas B. Fox,
Diane H. Dallal,
Santiago Ontañón,
Danielle Arigo,
Shahin Jabbari,
Jichen Zhu
Abstract:
Algorithmic fairness is an essential requirement as AI becomes integrated in society. In the case of social applications where AI distributes resources, algorithms often must make decisions that will benefit a subset of users, sometimes repeatedly or exclusively, while attempting to maximize specific outcomes. How should we design such systems to serve users more fairly? This paper explores this q…
▽ More
Algorithmic fairness is an essential requirement as AI becomes integrated in society. In the case of social applications where AI distributes resources, algorithms often must make decisions that will benefit a subset of users, sometimes repeatedly or exclusively, while attempting to maximize specific outcomes. How should we design such systems to serve users more fairly? This paper explores this question in the case where a group of users works toward a shared goal in a social exergame called Step Heroes. We identify adverse outcomes in traditional multi-armed bandits (MABs) and formalize the Greedy Bandit Problem. We then propose a solution based on a new type of fairness-aware multi-armed bandit, Shapley Bandits. It uses the Shapley Value for increasing overall player participation and intervention adherence rather than the maximization of total group output, which is traditionally achieved by favoring only high-performing participants. We evaluate our approach via a user study (n=46). Our results indicate that our Shapley Bandits effectively mediates the Greedy Bandit Problem and achieves better user retention and motivation across the participants.
△ Less
Submitted 21 February, 2023; v1 submitted 18 February, 2023;
originally announced February 2023.
-
TorchFL: A Performant Library for Bootstrapping Federated Learning Experiments
Authors:
Vivek Khimani,
Shahin Jabbari
Abstract:
With the increased legislation around data privacy, federated learning (FL) has emerged as a promising technique that allows the clients (end-user) to collaboratively train deep learning (DL) models without transferring and storing the data in a centralized, third-party server. We introduce TorchFL, a performant library for (i) bootstrapping the FL experiments, (ii) executing them using various ha…
▽ More
With the increased legislation around data privacy, federated learning (FL) has emerged as a promising technique that allows the clients (end-user) to collaboratively train deep learning (DL) models without transferring and storing the data in a centralized, third-party server. We introduce TorchFL, a performant library for (i) bootstrapping the FL experiments, (ii) executing them using various hardware accelerators, (iii) profiling the performance, and (iv) logging the overall and agent-specific results on the go. Being built on a bottom-up design using PyTorch and Lightning, TorchFL provides ready-to-use abstractions for models, datasets, and FL algorithms, while allowing the developers to customize them as and when required. This paper aims to dig deeper into the architecture and design of TorchFL, elaborate on how it allows researchers to bootstrap the federated learning experience, and provide experiments and code snippets for the same. With the ready-to-use implementation of state-of-the-art DL models, datasets, and federated learning support, TorchFL aims to allow researchers with little to no engineering background to set up FL experiments with minimal coding and infrastructure overhead.
△ Less
Submitted 17 February, 2023; v1 submitted 1 November, 2022;
originally announced November 2022.
-
The Disagreement Problem in Explainable Machine Learning: A Practitioner's Perspective
Authors:
Satyapriya Krishna,
Tessa Han,
Alex Gu,
Steven Wu,
Shahin Jabbari,
Himabindu Lakkaraju
Abstract:
As various post hoc explanation methods are increasingly being leveraged to explain complex models in high-stakes settings, it becomes critical to develop a deeper understanding of if and when the explanations output by these methods disagree with each other, and how such disagreements are resolved in practice. However, there is little to no research that provides answers to these critical questio…
▽ More
As various post hoc explanation methods are increasingly being leveraged to explain complex models in high-stakes settings, it becomes critical to develop a deeper understanding of if and when the explanations output by these methods disagree with each other, and how such disagreements are resolved in practice. However, there is little to no research that provides answers to these critical questions. In this work, we introduce and study the disagreement problem in explainable machine learning. More specifically, we formalize the notion of disagreement between explanations, analyze how often such disagreements occur in practice, and how practitioners resolve these disagreements. We first conduct interviews with data scientists to understand what constitutes disagreement between explanations generated by different methods for the same model prediction and introduce a novel quantitative framework to formalize this understanding. We then leverage this framework to carry out a rigorous empirical analysis with four real-world datasets, six state-of-the-art post hoc explanation methods, and six different predictive models, to measure the extent of disagreement between the explanations generated by various popular explanation methods. In addition, we carry out an online user study with data scientists to understand how they resolve the aforementioned disagreements. Our results indicate that (1) state-of-the-art explanation methods often disagree in terms of the explanations they output, and (2) machine learning practitioners often employ ad hoc heuristics when resolving such disagreements. These findings suggest that practitioners may be relying on misleading explanations when making consequential decisions. They also underscore the importance of developing principled frameworks for effectively evaluating and comparing explanations output by various explanation techniques.
△ Less
Submitted 8 July, 2024; v1 submitted 3 February, 2022;
originally announced February 2022.
-
Solving Structured Hierarchical Games Using Differential Backward Induction
Authors:
Zun Li,
Feiran Jia,
Aditya Mate,
Shahin Jabbari,
Mithun Chakraborty,
Milind Tambe,
Yevgeniy Vorobeychik
Abstract:
From large-scale organizations to decentralized political systems, hierarchical strategic decision making is commonplace. We introduce a novel class of structured hierarchical games (SHGs) that formally capture such hierarchical strategic interactions. In an SHG, each player is a node in a tree, and strategic choices of players are sequenced from root to leaves, with root moving first, followed by…
▽ More
From large-scale organizations to decentralized political systems, hierarchical strategic decision making is commonplace. We introduce a novel class of structured hierarchical games (SHGs) that formally capture such hierarchical strategic interactions. In an SHG, each player is a node in a tree, and strategic choices of players are sequenced from root to leaves, with root moving first, followed by its children, then followed by their children, and so on until the leaves. A player's utility in an SHG depends on its own decision, and on the choices of its parent and all the tree leaves. SHGs thus generalize simultaneous-move games, as well as Stackelberg games with many followers. We leverage the structure of both the sequence of player moves as well as payoff dependence to develop a gradient-based back propagation-style algorithm, which we call Differential Backward Induction (DBI), for approximating equilibria of SHGs. We provide a sufficient condition for convergence of DBI and demonstrate its efficacy in finding approximate equilibrium solutions to several SHG models of hierarchical policy-making problems.
△ Less
Submitted 27 June, 2022; v1 submitted 8 June, 2021;
originally announced June 2021.
-
A Game-Theoretic Approach for Hierarchical Epidemic Control
Authors:
Feiran Jia,
Aditya Mate,
Zun Li,
Shahin Jabbari,
Mithun Chakraborty,
Milind Tambe,
Michael Wellman,
Yevgeniy Vorobeychik
Abstract:
We design and analyze a multi-level game-theoretic model of hierarchical policy interventions for epidemic control, such as those in response to the COVID-19 pandemic. Our model captures the potentially mismatched priorities among a hierarchy of policy-makers (e.g., federal, state, and local governments) with respect to two cost components that have opposite dependence on the policy strength -- po…
▽ More
We design and analyze a multi-level game-theoretic model of hierarchical policy interventions for epidemic control, such as those in response to the COVID-19 pandemic. Our model captures the potentially mismatched priorities among a hierarchy of policy-makers (e.g., federal, state, and local governments) with respect to two cost components that have opposite dependence on the policy strength -- post-intervention infection rates and the socio-economic cost of policy implementation. Additionally, our model includes a crucial third factor in decisions: a cost of non-compliance with the policy-maker immediately above in the hierarchy, such as non-compliance of counties with state-level policies. We propose two novel algorithms for approximating solutions to such games. The first is based on best response dynamics (BRD), and exploits the tree structure of the game. The second combines quadratic integer programming (QIP), which enables us to collapse the two lowest levels of the game, with best response dynamics. Through extensive experiments, we show that our QIP-based approach significantly outperforms the BRD algorithm both in running time and the quality of equilibrium solutions. Finally, we apply the QIP-based algorithm to experiments based on both synthetic and real-world data under various parameter configurations and analyze the resulting (approximate) equilibria to gain insight into the impact of decentralization on overall welfare (measured as the negative sum of costs) as well as emergent properties like free-riding and fairness in cost distribution among policy-makers.
△ Less
Submitted 3 August, 2022; v1 submitted 21 February, 2021;
originally announced February 2021.
-
Towards the Unification and Robustness of Perturbation and Gradient Based Explanations
Authors:
Sushant Agarwal,
Shahin Jabbari,
Chirag Agarwal,
Sohini Upadhyay,
Zhiwei Steven Wu,
Himabindu Lakkaraju
Abstract:
As machine learning black boxes are increasingly being deployed in critical domains such as healthcare and criminal justice, there has been a growing emphasis on developing techniques for explaining these black boxes in a post hoc manner. In this work, we analyze two popular post hoc interpretation techniques: SmoothGrad which is a gradient based method, and a variant of LIME which is a perturbati…
▽ More
As machine learning black boxes are increasingly being deployed in critical domains such as healthcare and criminal justice, there has been a growing emphasis on developing techniques for explaining these black boxes in a post hoc manner. In this work, we analyze two popular post hoc interpretation techniques: SmoothGrad which is a gradient based method, and a variant of LIME which is a perturbation based method. More specifically, we derive explicit closed form expressions for the explanations output by these two methods and show that they both converge to the same explanation in expectation, i.e., when the number of perturbed samples used by these methods is large. We then leverage this connection to establish other desirable properties, such as robustness, for these techniques. We also derive finite sample complexity bounds for the number of perturbations required for these methods to converge to their expected explanation. Finally, we empirically validate our theory using extensive experimentation on both synthetic and real world datasets.
△ Less
Submitted 19 July, 2021; v1 submitted 21 February, 2021;
originally announced February 2021.
-
Active Screening for Recurrent Diseases: A Reinforcement Learning Approach
Authors:
Han-Ching Ou,
Haipeng Chen,
Shahin Jabbari,
Milind Tambe
Abstract:
Active screening is a common approach in controlling the spread of recurring infectious diseases such as tuberculosis and influenza. In this approach, health workers periodically select a subset of population for screening. However, given the limited number of health workers, only a small subset of the population can be visited in any given time period. Given the recurrent nature of the disease an…
▽ More
Active screening is a common approach in controlling the spread of recurring infectious diseases such as tuberculosis and influenza. In this approach, health workers periodically select a subset of population for screening. However, given the limited number of health workers, only a small subset of the population can be visited in any given time period. Given the recurrent nature of the disease and rapid spreading, the goal is to minimize the number of infections over a long time horizon. Active screening can be formalized as a sequential combinatorial optimization over the network of people and their connections. The main computational challenges in this formalization arise from i) the combinatorial nature of the problem, ii) the need of sequential planning and iii) the uncertainties in the infectiousness states of the population.
Previous works on active screening fail to scale to large time horizon while fully considering the future effect of current interventions. In this paper, we propose a novel reinforcement learning (RL) approach based on Deep Q-Networks (DQN), with several innovative adaptations that are designed to address the above challenges. First, we use graph convolutional networks (GCNs) to represent the Q-function that exploit the node correlations of the underlying contact network. Second, to avoid solving a combinatorial optimization problem in each time period, we decompose the node set selection as a sub-sequence of decisions, and further design a two-level RL framework that solves the problem in a hierarchical way. Finally, to speed-up the slow convergence of RL which arises from reward sparseness, we incorporate ideas from curriculum learning into our hierarchical RL approach. We evaluate our RL algorithm on several real-world networks.
△ Less
Submitted 19 April, 2021; v1 submitted 7 January, 2021;
originally announced January 2021.
-
Fair Influence Maximization: A Welfare Optimization Approach
Authors:
Aida Rahmattalabi,
Shahin Jabbari,
Himabindu Lakkaraju,
Phebe Vayanos,
Max Izenberg,
Ryan Brown,
Eric Rice,
Milind Tambe
Abstract:
Several behavioral, social, and public health interventions, such as suicide/HIV prevention or community preparedness against natural disasters, leverage social network information to maximize outreach. Algorithmic influence maximization techniques have been proposed to aid with the choice of "peer leaders" or "influencers" in such interventions. Yet, traditional algorithms for influence maximizat…
▽ More
Several behavioral, social, and public health interventions, such as suicide/HIV prevention or community preparedness against natural disasters, leverage social network information to maximize outreach. Algorithmic influence maximization techniques have been proposed to aid with the choice of "peer leaders" or "influencers" in such interventions. Yet, traditional algorithms for influence maximization have not been designed with these interventions in mind. As a result, they may disproportionately exclude minority communities from the benefits of the intervention. This has motivated research on fair influence maximization. Existing techniques come with two major drawbacks. First, they require committing to a single fairness measure. Second, these measures are typically imposed as strict constraints leading to undesirable properties such as wastage of resources.
To address these shortcomings, we provide a principled characterization of the properties that a fair influence maximization algorithm should satisfy. In particular, we propose a framework based on social welfare theory, wherein the cardinal utilities derived by each community are aggregated using the isoelastic social welfare functions. Under this framework, the trade-off between fairness and efficiency can be controlled by a single inequality aversion design parameter. We then show under what circumstances our proposed principles can be satisfied by a welfare function. The resulting optimization problem is monotone and submodular and can be solved efficiently with optimality guarantees. Our framework encompasses as special cases leximin and proportional fairness. Extensive experiments on synthetic and real world datasets including a case study on landslide risk management demonstrate the efficacy of the proposed framework.
△ Less
Submitted 15 December, 2020; v1 submitted 14 June, 2020;
originally announced June 2020.
-
Intracellular Energy Variability Modulates Cellular Decision-Making Capacity
Authors:
Ryan Kerr,
Sara Jabbari,
Iain G. Johnston
Abstract:
Cells are able to generate phenotypic diversity both during development and in response to stressful and changing environments, aiding survival. The biologically and medically vital process of a cell assuming a functionally important fate from a range of phenotypic possibilities can be thought of as a cell decision. To make these decisions, a cell relies on energy dependent pathways of signalling…
▽ More
Cells are able to generate phenotypic diversity both during development and in response to stressful and changing environments, aiding survival. The biologically and medically vital process of a cell assuming a functionally important fate from a range of phenotypic possibilities can be thought of as a cell decision. To make these decisions, a cell relies on energy dependent pathways of signalling and expression. However, energy availability is often overlooked as a modulator of cellular decision-making. As cells can vary dramatically in energy availability, this limits our knowledge of how this key biological axis affects cell behaviour. Here, we consider the energy dependence of a highly generalisable decision-making regulatory network, and show that energy variability changes the sets of decisions a cell can make and the ease with which they can be made. Increasing intracellular energy levels can increase the number of stable phenotypes it can generate, corresponding to increased decision-making capacity. For this decision-making architecture, a cell with intracellular energy below a threshold is limited to a singular phenotype, potentially forcing the adoption of a specific cell fate. We suggest that common energetic differences between cells may explain some of the observed variability in cellular decision-making, and demonstrate the importance of considering energy levels in several diverse biological decision-making phenomena.
△ Less
Submitted 13 December, 2019;
originally announced December 2019.
-
Network Formation under Random Attack and Probabilistic Spread
Authors:
Yu Chen,
Shahin Jabbari,
Michael Kearns,
Sanjeev Khanna,
Jamie Morgenstern
Abstract:
We study a network formation game where agents receive benefits by forming connections to other agents but also incur both direct and indirect costs from the formed connections. Specifically, once the agents have purchased their connections, an attack starts at a randomly chosen vertex in the network and spreads according to the independent cascade model with a fixed probability, destroying any in…
▽ More
We study a network formation game where agents receive benefits by forming connections to other agents but also incur both direct and indirect costs from the formed connections. Specifically, once the agents have purchased their connections, an attack starts at a randomly chosen vertex in the network and spreads according to the independent cascade model with a fixed probability, destroying any infected agents. The utility or welfare of an agent in our game is defined to be the expected size of the agent's connected component post-attack minus her expenditure in forming connections.
Our goal is to understand the properties of the equilibrium networks formed in this game. Our first result concerns the edge density of equilibrium networks. A network connection increases both the likelihood of remaining connected to other agents after an attack as well the likelihood of getting infected by a cascading spread of infection. We show that the latter concern primarily prevails and any equilibrium network in our game contains only $O(n\log n)$ edges where $n$ denotes the number of agents. On the other hand, there are equilibrium networks that contain $Ω(n)$ edges showing that our edge density bound is tight up to a logarithmic factor. Our second result shows that the presence of attack and its spread through a cascade does not significantly lower social welfare as long as the network is not too dense. We show that any non-trivial equilibrium network with $O(n)$ edges has $Θ(n^2)$ social welfare, asymptotically similar to the social welfare guarantee in the game without any attacks.
△ Less
Submitted 1 June, 2019;
originally announced June 2019.
-
Equilibrium Characterization for Data Acquisition Games
Authors:
Jinshuo Dong,
Hadi Elzayn,
Shahin Jabbari,
Michael Kearns,
Zachary Schutzman
Abstract:
We study a game between two firms in which each provide a service based on machine learning. The firms are presented with the opportunity to purchase a new corpus of data, which will allow them to potentially improve the quality of their products. The firms can decide whether or not they want to buy the data, as well as which learning model to build with that data. We demonstrate a reduction from…
▽ More
We study a game between two firms in which each provide a service based on machine learning. The firms are presented with the opportunity to purchase a new corpus of data, which will allow them to potentially improve the quality of their products. The firms can decide whether or not they want to buy the data, as well as which learning model to build with that data. We demonstrate a reduction from this potentially complicated action space to a one-shot, two-action game in which each firm only decides whether or not to buy the data. The game admits several regimes which depend on the relative strength of the two firms at the outset and the price at which the data is being offered. We analyze the game's Nash equilibria in all parameter regimes and demonstrate that, in expectation, the outcome of the game is that the initially stronger firm's market position weakens whereas the initially weaker firm's market position becomes stronger. Finally, we consider the perspective of the users of the service and demonstrate that the expected outcome at equilibrium is not the one which maximizes the welfare of the consumers.
△ Less
Submitted 23 May, 2019; v1 submitted 21 May, 2019;
originally announced May 2019.
-
Simultaneous Parameter Estimation and Variable Selection via the LN-CASS Prior
Authors:
William Thomson,
Sara Jabbari,
Angela Taylor,
Wiebke Arlt,
David Smith
Abstract:
We introduce a Bayesian prior distribution, the Logit-Normal continuous analogue of the spike-and-slab (LN-CASS), which enables flexible parameter estimation and variable/model selection in a variety of settings. We demonstrate its use and efficacy in three case studies -- a simulation study and two studies on real biological data from the fields of metabolomics and genomics. The prior allows the…
▽ More
We introduce a Bayesian prior distribution, the Logit-Normal continuous analogue of the spike-and-slab (LN-CASS), which enables flexible parameter estimation and variable/model selection in a variety of settings. We demonstrate its use and efficacy in three case studies -- a simulation study and two studies on real biological data from the fields of metabolomics and genomics. The prior allows the use of classical statistical models, which are easily interpretable and well-known to applied scientists, but performs comparably to common machine learning methods in terms of generalisability to previously unseen data.
△ Less
Submitted 3 October, 2018;
originally announced October 2018.
-
Fair Algorithms for Learning in Allocation Problems
Authors:
Hadi Elzayn,
Shahin Jabbari,
Christopher Jung,
Michael Kearns,
Seth Neel,
Aaron Roth,
Zachary Schutzman
Abstract:
Settings such as lending and policing can be modeled by a centralized agent allocating a resource (loans or police officers) amongst several groups, in order to maximize some objective (loans given that are repaid or criminals that are apprehended). Often in such problems fairness is also a concern. A natural notion of fairness, based on general principles of equality of opportunity, asks that con…
▽ More
Settings such as lending and policing can be modeled by a centralized agent allocating a resource (loans or police officers) amongst several groups, in order to maximize some objective (loans given that are repaid or criminals that are apprehended). Often in such problems fairness is also a concern. A natural notion of fairness, based on general principles of equality of opportunity, asks that conditional on an individual being a candidate for the resource, the probability of actually receiving it is approximately independent of the individual's group. In lending this means that equally creditworthy individuals in different racial groups have roughly equal chances of receiving a loan. In policing it means that two individuals committing the same crime in different districts would have roughly equal chances of being arrested.
We formalize this fairness notion for allocation problems and investigate its algorithmic consequences. Our main technical results include an efficient learning algorithm that converges to an optimal fair allocation even when the frequency of candidates (creditworthy individuals or criminals) in each group is unknown. The algorithm operates in a censored feedback model in which only the number of candidates who received the resource in a given allocation can be observed, rather than the true number of candidates. This models the fact that we do not learn the creditworthiness of individuals we do not give loans to nor learn about crimes committed if the police presence in a district is low.
As an application of our framework, we consider the predictive policing problem. The learning algorithm is trained on arrest data gathered from its own deployments on previous days, resulting in a potential feedback loop that our algorithm provably overcomes. We empirically investigate the performance of our algorithm on the Philadelphia Crime Incidents dataset.
△ Less
Submitted 14 November, 2018; v1 submitted 30 August, 2018;
originally announced August 2018.
-
Predictive modelling of a novel anti-adhesion therapy to combat bacterial colonisation of burn wounds
Authors:
Paul A. Roberts,
Ryan M. Huebinger,
Emma Keen,
Anne-Marie Krachler,
Sara Jabbari
Abstract:
As the development of new classes of antibiotics slows, bacterial resistance to existing antibiotics is becoming an increasing problem. A potential solution is to develop treatment strategies with an alternative mode of action. We consider one such strategy: anti-adhesion therapy. Whereas antibiotics act directly upon bacteria, either killing them or inhibiting their growth, anti-adhesion therapy…
▽ More
As the development of new classes of antibiotics slows, bacterial resistance to existing antibiotics is becoming an increasing problem. A potential solution is to develop treatment strategies with an alternative mode of action. We consider one such strategy: anti-adhesion therapy. Whereas antibiotics act directly upon bacteria, either killing them or inhibiting their growth, anti-adhesion therapy impedes the binding of bacteria to host cells. This prevents bacteria from deploying their arsenal of virulence mechanisms, while simultaneously rendering them more susceptible to natural and artificial clearance. In this paper, we consider a particular form of anti-adhesion therapy, involving biomimetic multivalent adhesion molecule (MAM) 7 coupled polystyrene microbeads, which competitively inhibit the binding of bacteria to host cells. We develop a mathematical model, formulated as a system of ordinary differential equations, to describe inhibitor treatment of a Pseudomonas aeruginosa burn wound infection in the rat. Benchmarking our model against in vivo data from an ongoing experimental programme, we use the model to explain bacteria population dynamics and to predict the efficacy of a range of treatment strategies, with the aim of improving treatment outcome. The model consists of two physical compartments: the epithelium and the exudate. It is found that, when effective in reducing the bacterial burden, inhibitor treatment operates both by preventing bacteria from binding to the epithelium and by reducing the flux of daughter cells from the epithelium into the exudate. Our model predicts that inhibitor treatment cannot eliminate the bacterial burden when used in isolation; however, when combined with regular or continuous debridement of the exudate, elimination is theoretically possible. Lastly, we present ways to improve therapeutic efficacy, as predicted by our mathematical model.
△ Less
Submitted 10 August, 2017;
originally announced August 2017.
-
Compensating Faraday depolarization by magnetic helicity in the solar corona
Authors:
Axel Brandenburg,
Mohira B. Ashurova,
Sarah Jabbari
Abstract:
A turbulent dynamo in spherical geometry with an outer corona is simulated to study the sign of magnetic helicity in the outer parts. In agreement with earlier studies, the sign in the outer corona is found to be opposite to that inside the dynamo. Line-of-sight observations of polarized emission are synthesized to explore the feasibility of using the local reduction of Faraday depolarization to i…
▽ More
A turbulent dynamo in spherical geometry with an outer corona is simulated to study the sign of magnetic helicity in the outer parts. In agreement with earlier studies, the sign in the outer corona is found to be opposite to that inside the dynamo. Line-of-sight observations of polarized emission are synthesized to explore the feasibility of using the local reduction of Faraday depolarization to infer the sign of helicity of magnetic fields in the solar corona. This approach was previously identified as an observational diagnostic in the context of galactic magnetic fields. Based on our simulations, we show that this method can be successful in the solar context if sufficient statistics is gathered by using averages over ring segments in the corona separately for the regions north and south of the solar equator.
△ Less
Submitted 17 August, 2017; v1 submitted 28 June, 2017;
originally announced June 2017.
-
A Convex Framework for Fair Regression
Authors:
Richard Berk,
Hoda Heidari,
Shahin Jabbari,
Matthew Joseph,
Michael Kearns,
Jamie Morgenstern,
Seth Neel,
Aaron Roth
Abstract:
We introduce a flexible family of fairness regularizers for (linear and logistic) regression problems. These regularizers all enjoy convexity, permitting fast optimization, and they span the rang from notions of group fairness to strong individual fairness. By varying the weight on the fairness regularizer, we can compute the efficient frontier of the accuracy-fairness trade-off on any given datas…
▽ More
We introduce a flexible family of fairness regularizers for (linear and logistic) regression problems. These regularizers all enjoy convexity, permitting fast optimization, and they span the rang from notions of group fairness to strong individual fairness. By varying the weight on the fairness regularizer, we can compute the efficient frontier of the accuracy-fairness trade-off on any given dataset, and we measure the severity of this trade-off via a numerical quantity we call the Price of Fairness (PoF). The centerpiece of our results is an extensive comparative study of the PoF across six different datasets in which fairness is a primary consideration.
△ Less
Submitted 7 June, 2017;
originally announced June 2017.
-
Fairness in Criminal Justice Risk Assessments: The State of the Art
Authors:
Richard Berk,
Hoda Heidari,
Shahin Jabbari,
Michael Kearns,
Aaron Roth
Abstract:
Objectives: Discussions of fairness in criminal justice risk assessments typically lack conceptual precision. Rhetoric too often substitutes for careful analysis. In this paper, we seek to clarify the tradeoffs between different kinds of fairness and between fairness and accuracy.
Methods: We draw on the existing literatures in criminology, computer science and statistics to provide an integrate…
▽ More
Objectives: Discussions of fairness in criminal justice risk assessments typically lack conceptual precision. Rhetoric too often substitutes for careful analysis. In this paper, we seek to clarify the tradeoffs between different kinds of fairness and between fairness and accuracy.
Methods: We draw on the existing literatures in criminology, computer science and statistics to provide an integrated examination of fairness and accuracy in criminal justice risk assessments. We also provide an empirical illustration using data from arraignments.
Results: We show that there are at least six kinds of fairness, some of which are incompatible with one another and with accuracy.
Conclusions: Except in trivial cases, it is impossible to maximize accuracy and fairness at the same time, and impossible simultaneously to satisfy all kinds of fairness. In practice, a major complication is different base rates across different legally protected groups. There is a need to consider challenging tradeoffs.
△ Less
Submitted 27 May, 2017; v1 submitted 27 March, 2017;
originally announced March 2017.
-
Fairness in Reinforcement Learning
Authors:
Shahin Jabbari,
Matthew Joseph,
Michael Kearns,
Jamie Morgenstern,
Aaron Roth
Abstract:
We initiate the study of fairness in reinforcement learning, where the actions of a learning algorithm may affect its environment and future rewards. Our fairness constraint requires that an algorithm never prefers one action over another if the long-term (discounted) reward of choosing the latter action is higher. Our first result is negative: despite the fact that fairness is consistent with the…
▽ More
We initiate the study of fairness in reinforcement learning, where the actions of a learning algorithm may affect its environment and future rewards. Our fairness constraint requires that an algorithm never prefers one action over another if the long-term (discounted) reward of choosing the latter action is higher. Our first result is negative: despite the fact that fairness is consistent with the optimal policy, any learning algorithm satisfying fairness must take time exponential in the number of states to achieve non-trivial approximation to the optimal policy. We then provide a provably fair polynomial time algorithm under an approximate notion of fairness, thus establishing an exponential gap between exact and approximate fairness
△ Less
Submitted 5 August, 2017; v1 submitted 9 November, 2016;
originally announced November 2016.
-
Sharp magnetic structures from dynamos with density stratification
Authors:
Sarah Jabbari,
Axel Brandenburg,
Nathan Kleeorin,
Igor Rogachevskii
Abstract:
Recent direct numerical simulations (DNS) of large-scale turbulent dynamos in strongly stratified layers have resulted in surprisingly sharp bipolar structures at the surface. Here we present new DNS of helically and non-helically forced turbulence with and without rotation and compare with corresponding mean-field simulations (MFS) to show that these structures are a generic outcome of a broader…
▽ More
Recent direct numerical simulations (DNS) of large-scale turbulent dynamos in strongly stratified layers have resulted in surprisingly sharp bipolar structures at the surface. Here we present new DNS of helically and non-helically forced turbulence with and without rotation and compare with corresponding mean-field simulations (MFS) to show that these structures are a generic outcome of a broader class of dynamos in density-stratified layers. The MFS agree qualitatively with the DNS, but the period of oscillations tends to be longer in the DNS. In both DNS and MFS, the sharp structures are produced by converging flows at the surface and might be driven in nonlinear stage of evolution by the Lorentz force associated with the large-scale dynamo-driven magnetic field if the dynamo number is at least 2.5 times supercritical.
△ Less
Submitted 12 March, 2017; v1 submitted 29 July, 2016;
originally announced July 2016.
-
Turbulent reconnection of magnetic bipoles in stratified turbulence
Authors:
Sarah Jabbari,
Axel Brandenburg,
Dhrubaditya Mitra,
Nathan Kleeorin,
Igor Rogachevskii
Abstract:
We consider strongly stratified forced turbulence in a plane-parallel layer with helicity and corresponding large-scale dynamo action in the lower part and non-helical turbulence in the upper. The magnetic field is found to develop strongly concentrated bipolar structures near the surface. They form elongated bands with a sharp interface between opposite polarities. Unlike earlier experiments with…
▽ More
We consider strongly stratified forced turbulence in a plane-parallel layer with helicity and corresponding large-scale dynamo action in the lower part and non-helical turbulence in the upper. The magnetic field is found to develop strongly concentrated bipolar structures near the surface. They form elongated bands with a sharp interface between opposite polarities. Unlike earlier experiments with imposed magnetic field, the inclusion of rotation does not strongly suppress the formation of these structures. We perform a systematic numerical study of this phenomenon by varying magnetic Reynolds number, scale separation ratio, and Coriolis number. We focus on the formation of a current sheet between bipolar regions where reconnection of oppositely oriented field lines occurs. We determine the reconnection rate by measuring either the inflow velocity in the vicinity of the current sheet or by measuring the electric field in the reconnection region. We demonstrate that for large Lundquist numbers, S>10^3, the reconnection rate is nearly independent of S in agreement with results of recent numerical simulations performed by other groups in simpler settings.
△ Less
Submitted 18 March, 2016; v1 submitted 29 January, 2016;
originally announced January 2016.
-
Strategic Network Formation with Attack and Immunization
Authors:
Sanjeev Goyal,
Shahin Jabbari,
Michael Kearns,
Sanjeev Khanna,
Jamie Morgenstern
Abstract:
Strategic network formation arises where agents receive benefit from connections to other agents, but also incur costs for forming links. We consider a new network formation game that incorporates an adversarial attack, as well as immunization against attack. An agent's benefit is the expected size of her connected component post-attack, and agents may also choose to immunize themselves from attac…
▽ More
Strategic network formation arises where agents receive benefit from connections to other agents, but also incur costs for forming links. We consider a new network formation game that incorporates an adversarial attack, as well as immunization against attack. An agent's benefit is the expected size of her connected component post-attack, and agents may also choose to immunize themselves from attack at some additional cost. Our framework is a stylized model of settings where reachability rather than centrality is the primary concern and vertices vulnerable to attacks may reduce risk via costly measures.
In the reachability benefit model without attack or immunization, the set of equilibria is the empty graph and any tree. The introduction of attack and immunization changes the game dramatically; new equilibrium topologies emerge, some more sparse and some more dense than trees. We show that, under a mild assumption on the adversary, every equilibrium network with $n$ agents contains at most $2n-4$ edges for $n\geq 4$. So despite permitting topologies denser than trees, the amount of overbuilding is limited. We also show that attack and immunization don't significantly erode social welfare: every non-trivial equilibrium with respect to several adversaries has welfare at least as that of any equilibrium in the attack-free model.
We complement our theory with simulations demonstrating fast convergence of a new bounded rationality dynamic which generalizes linkstable best response but is considerably more powerful in our game. The simulations further elucidate the wide variety of asymmetric equilibria and demonstrate topological consequences of the dynamics e.g. heavy-tailed degree distributions. Finally, we report on a behavioral experiment on our game with over 100 participants, where despite the complexity of the game, the resulting network was surprisingly close to equilibrium.
△ Less
Submitted 9 November, 2016; v1 submitted 16 November, 2015;
originally announced November 2015.
-
Online Assignment of Heterogeneous Tasks in Crowdsourcing Markets
Authors:
Sepehr Assadi,
Justin Hsu,
Shahin Jabbari
Abstract:
We investigate the problem of heterogeneous task assignment in crowdsourcing markets from the point of view of the requester, who has a collection of tasks. Workers arrive online one by one, and each declare a set of feasible tasks they can solve, and desired payment for each feasible task. The requester must decide on the fly which task (if any) to assign to the worker, while assigning workers on…
▽ More
We investigate the problem of heterogeneous task assignment in crowdsourcing markets from the point of view of the requester, who has a collection of tasks. Workers arrive online one by one, and each declare a set of feasible tasks they can solve, and desired payment for each feasible task. The requester must decide on the fly which task (if any) to assign to the worker, while assigning workers only to feasible tasks. The goal is to maximize the number of assigned tasks with a fixed overall budget.
We provide an online algorithm for this problem and prove an upper bound on the competitive ratio of this algorithm against an arbitrary (possibly worst-case) sequence of workers who want small payments relative to the requester's total budget. We further show an almost matching lower bound on the competitive ratio of any algorithm in this setting. Finally, we propose a different algorithm that achieves an improved competitive ratio in the random permutation model, where the order of arrival of the workers is chosen uniformly at random. Apart from these strong theoretical guarantees, we carry out experiments on simulated data which demonstrates the practical applicability of our algorithms.
△ Less
Submitted 14 August, 2015;
originally announced August 2015.
-
Learning from Rational Behavior: Predicting Solutions to Unknown Linear Programs
Authors:
Shahin Jabbari,
Ryan Rogers,
Aaron Roth,
Zhiwei Steven Wu
Abstract:
We define and study the problem of predicting the solution to a linear program (LP) given only partial information about its objective and constraints. This generalizes the problem of learning to predict the purchasing behavior of a rational agent who has an unknown objective function, that has been studied under the name "Learning from Revealed Preferences". We give mistake bound learning algorit…
▽ More
We define and study the problem of predicting the solution to a linear program (LP) given only partial information about its objective and constraints. This generalizes the problem of learning to predict the purchasing behavior of a rational agent who has an unknown objective function, that has been studied under the name "Learning from Revealed Preferences". We give mistake bound learning algorithms in two settings: in the first, the objective of the LP is known to the learner but there is an arbitrary, fixed set of constraints which are unknown. Each example is defined by an additional known constraint and the goal of the learner is to predict the optimal solution of the LP given the union of the known and unknown constraints. This models the problem of predicting the behavior of a rational agent whose goals are known, but whose resources are unknown. In the second setting, the objective of the LP is unknown, and changing in a controlled way. The constraints of the LP may also change every day, but are known. An example is given by a set of constraints and partial information about the objective, and the task of the learner is again to predict the optimal solution of the partially known LP.
△ Less
Submitted 26 October, 2016; v1 submitted 6 June, 2015;
originally announced June 2015.
-
Bipolar magnetic spots from dynamos in stratified spherical shell turbulence
Authors:
Sarah Jabbari,
Axel Brandenburg,
Nathan Kleeorin,
Dhrubaditya Mitra,
Igor Rogachevskii
Abstract:
Recent work by Mitra et al. (2014) has shown that in strongly stratified forced two-layer turbulence with helicity and corresponding large-scale dynamo action in the lower layer, a magnetic field occurs in the upper layer in the form of sharply bounded bipolar magnetic spots. Here we extend this model to spherical wedge geometry covering the northern hemisphere up to 75° latitude and an azimuthal…
▽ More
Recent work by Mitra et al. (2014) has shown that in strongly stratified forced two-layer turbulence with helicity and corresponding large-scale dynamo action in the lower layer, a magnetic field occurs in the upper layer in the form of sharply bounded bipolar magnetic spots. Here we extend this model to spherical wedge geometry covering the northern hemisphere up to 75° latitude and an azimuthal extent of 180°. The kinetic helicity and therefore also the large-scale magnetic field are strongest at low latitudes. For moderately strong stratification, several bipolar spots form that fill eventually the full longitudinal extent. At early times, the polarity of spots reflects the orientation of the underlying azimuthal field, as expected from Ω-shaped flux loops. At late times their tilt changes such that there is a radial field of opposite orientation at different latitudes separated by about 10°. Our model demonstrates the spontaneous formation of spots of sizes much larger than the pressure scale height. Their tendency to produce filling factors close to unity is argued to be reminiscent of highly active stars. We confirm that strong stratification and strong scale separation are essential ingredients behind magnetic spot formation, which appears to be associated with downflows at larger depths.
△ Less
Submitted 2 June, 2015; v1 submitted 18 November, 2014;
originally announced November 2014.
-
Bacterial fitness shapes the population dynamics of antibiotic-resistant and -susceptible bacteria in a model of combined antibiotic and anti-virulence treatment
Authors:
Lucy Ternent,
Rosemary J. Dyson,
Anne-Marie Krachler,
Sara Jabbari
Abstract:
Bacterial resistance to antibiotic treatment is a huge concern: introduction of any new antibiotic is shortly followed by the emergence of resistant bacterial isolates in the clinic. This issue is compounded by a severe lack of new antibiotics reaching the market. The significant rise in clinical resistance to antibiotics is especially problematic in nosocomial infections, where already vulnerable…
▽ More
Bacterial resistance to antibiotic treatment is a huge concern: introduction of any new antibiotic is shortly followed by the emergence of resistant bacterial isolates in the clinic. This issue is compounded by a severe lack of new antibiotics reaching the market. The significant rise in clinical resistance to antibiotics is especially problematic in nosocomial infections, where already vulnerable patients may fail to respond to treatment, causing even greater health concern. A recent focus has been on the development of anti-virulence drugs as a second line of defence in the treatment of antibiotic-resistant infections. This treatment, which weakens bacteria by reducing their virulence rather than killing them, should allow infections to be cleared through the body's natural defence mechanisms. In this way there should be little to no selective pressure exerted on the organism and, as such, a predominantly resistant population would be unlikely to emerge. However, much controversy surrounds this approach with many believing it would not be powerful enough to clear existing infections, restricting its potential application to prophylaxis. We have developed a mathematical model that provides a theoretical framework to reveal the circumstances under which anti-virulence drugs may or may not be successful. We demonstrate that by harnessing and combining the advantages of antibiotics with those provided by anti-virulence drugs, given infection-specific parameters, it is possible to identify treatment strategies that would efficiently clear bacterial infections, while preventing the emergence of resistant subpopulations. Our findings strongly support the continuation of research into anti-virulence drugs and demonstrate that their applicability may reach beyond infection prevention.
△ Less
Submitted 15 September, 2014;
originally announced September 2014.
-
Magnetic flux concentrations from dynamo-generated fields
Authors:
Sarah Jabbari,
Axel Brandenburg,
Illa R. Losada,
Nathan Kleeorin,
Igor Rogachevskii
Abstract:
The mean-field theory of magnetized stellar convection gives rise to the two possibility of distinct instabilities: the large-scale dynamo instability, operating in the bulk of the convection zone, and a negative effective magnetic pressure instability (NEMPI) operating in the strongly stratified surface layers. The latter might be important in connection with magnetic spot formation, but the grow…
▽ More
The mean-field theory of magnetized stellar convection gives rise to the two possibility of distinct instabilities: the large-scale dynamo instability, operating in the bulk of the convection zone, and a negative effective magnetic pressure instability (NEMPI) operating in the strongly stratified surface layers. The latter might be important in connection with magnetic spot formation, but the growth rate of NEMPI is suppressed with increasing rotation rates, although recent direct numerical simulations (DNS) have shown a subsequent increase in the growth rate. We examine quantitatively whether this increase in the growth rate of NEMPI can be explained by an alpha squared mean-field dynamo, and whether both NEMPI and the dynamo instability can operate at the same time. We use both DNS and mean-field simulations (MFS) to solve the underlying equations numerically either with or without an imposed horizontal field. We use the test-field method to compute relevant dynamo coefficients. DNS show that magnetic flux concentrations are still possible up to rotation rates above which the large-scale dynamo effect produces mean magnetic fields. The resulting DNS growth rates are quantitatively well reproduced with MFS. As expected, for weak or vanishing rotation, the growth rate of NEMPI increases with increasing gravity, but there is a correction term for strong gravity and large turbulent magnetic diffusivity. Magnetic flux concentrations are still possible for rotation rates above which dynamo action takes over. For the solar rotation rate, the corresponding turbulent turnover time is about 5 hours, with dynamo action commencing in the layers beneath.
△ Less
Submitted 31 October, 2014; v1 submitted 23 January, 2014;
originally announced January 2014.
-
Mean-field and direct numerical simulations of magnetic flux concentrations from vertical field
Authors:
A. Brandenburg,
O. Gressel,
S. Jabbari,
N. Kleeorin,
I. Rogachevskii
Abstract:
Strongly stratified hydromagnetic turbulence has previously been found to produce magnetic flux concentrations if the domain is large enough compared with the size of turbulent eddies. Mean-field simulations (MFS) using parameterizations of the Reynolds and Maxwell stresses show a negative effective magnetic pressure instability and have been able to reproduce many aspects of direct numerical simu…
▽ More
Strongly stratified hydromagnetic turbulence has previously been found to produce magnetic flux concentrations if the domain is large enough compared with the size of turbulent eddies. Mean-field simulations (MFS) using parameterizations of the Reynolds and Maxwell stresses show a negative effective magnetic pressure instability and have been able to reproduce many aspects of direct numerical simulations (DNS) regarding the growth rate of this large-scale instability, shape of the resulting magnetic structures, and their height as a function of magnetic field strength. Unlike the case of an imposed horizontal field, for a vertical one, magnetic flux concentrations of equipartition strength with the turbulence can be reached. This results in magnetic spots that are reminiscent of sunspots. Here we want to find out under what conditions magnetic flux concentrations with vertical field occur and what their internal structure is. We use a combination of MFS, DNS, and implicit large-eddy simulations to characterize the resulting magnetic flux concentrations in forced isothermal turbulence with an imposed vertical magnetic field. We confirm earlier results that in the kinematic stage of the large-scale instability the horizontal wavelength of structures is about 10 times the density scale height. At later times, even larger structures are being produced in a fashion similar to inverse spectral transfer in helically driven turbulence. Using turbulence simulations, we find that magnetic flux concentrations occur for different values of the Mach number between 0.1 and 0.7. DNS and MFS show magnetic flux tubes with mean-field energies comparable to the turbulent kinetic energy. The resulting vertical magnetic flux tubes are being confined by downflows along the tubes and corresponding inflow from the sides, which keep the field concentrated.
△ Less
Submitted 14 January, 2014; v1 submitted 13 September, 2013;
originally announced September 2013.
-
Surface flux concentrations and spherical alpha-square dynamo
Authors:
Sarah Jabbari,
Axel Brandenburg,
Nathan Kleeorin,
Dhrubaditya Mitra,
Igor Rogachevskii
Abstract:
In the presence of strong density stratification, turbulence can lead to a large-scale instability of a horizontal magnetic field if its strength is in a suitable range (within a few percent of the turbulent equipartition value). This instability is related to a suppression of the turbulent pressure so that the turbulence contribution to the mean magnetic pressure becomes negative. This results in…
▽ More
In the presence of strong density stratification, turbulence can lead to a large-scale instability of a horizontal magnetic field if its strength is in a suitable range (within a few percent of the turbulent equipartition value). This instability is related to a suppression of the turbulent pressure so that the turbulence contribution to the mean magnetic pressure becomes negative. This results in the excitation of a negative effective magnetic pressure instability (NEMPI). This instability has so far only been studied for an imposed magnetic field. We want to know how NEMPI works when the mean magnetic field is generated self-consistently by an $α^2$ dynamo, whether it is affected by global spherical geometry, and whether it can influence the properties of the dynamo itself. We adopt the mean-field approach which has previously been shown to provide a realistic description of NEMPI in direct numerical simulations. We assume axisymmetry and solve the mean-field equations with the Pencil-Code for an adiabatic stratification at a total density contrast in the radial direction of approximately 4 orders of magnitude. NEMPI is found to work when the dynamo-generated field is about 4% of the equipartition value, which is achieved through strong $α$ quenching. This instability is excited in the top 5% of the outer radius provided the density contrast across this top layer is at least 10. NEMPI is found to occur at lower latitudes when the mean magnetic field is stronger. For weaker fields, NEMPI can make the dynamo oscillatory with poleward migration. NEMPI is a viable mechanism for producing magnetic flux concentrations in a strongly stratified spherical shell in which a magnetic field is generated by a strongly quenched $α$ effect dynamo.
△ Less
Submitted 25 April, 2014; v1 submitted 23 February, 2013;
originally announced February 2013.
-
Different D-brane Interactions
Authors:
H. Arfaei,
M. M. Sheikh Jabbari
Abstract:
We use rotation of one D-brane with respect to the other to reveal the hidden structure of D-branes in type-II theories. This is done by calculation of the interaction amplitude for two different parallel and angled branes. The analysis of strings with different boundary conditions at the ends is also given. The stable configuration for two similar branes occurs when they are anti-parallel. For…
▽ More
We use rotation of one D-brane with respect to the other to reveal the hidden structure of D-branes in type-II theories. This is done by calculation of the interaction amplitude for two different parallel and angled branes. The analysis of strings with different boundary conditions at the ends is also given. The stable configuration for two similar branes occurs when they are anti-parallel. For branes of different dimensions stability is attained for either parallel or anti-parallel configurations and when dimensions differ by four the amplitude vanishes at the stable point. The results serve as more evidence that D-branes are stringy descriptions of non-perturbative extended solutions of SUGRA theories, as low energy approximation of superstrings.
△ Less
Submitted 30 September, 1996; v1 submitted 25 August, 1996;
originally announced August 1996.
-
Expansion of Bubbles in Inflationary Universe
Authors:
M. Mohazzab,
M. M. Sheikh Jabbari,
H. Salehi
Abstract:
We show that particle production during the expansion of bubbles of true vacuum in the sea of false vacuum is possible and calculate the resulting rate. As a result the nucleated bubbles cannot expand due to the transfer of false vacuum energy to the created particles inside the bubbles. Therefore all the inflationary models dealing with the nucleation and expansion of the bubbles (including ext…
▽ More
We show that particle production during the expansion of bubbles of true vacuum in the sea of false vacuum is possible and calculate the resulting rate. As a result the nucleated bubbles cannot expand due to the transfer of false vacuum energy to the created particles inside the bubbles. Therefore all the inflationary models dealing with the nucleation and expansion of the bubbles (including extended inflation) may not be viable.
△ Less
Submitted 14 October, 1995;
originally announced October 1995.