-
Evaluating the Performance of a D-Wave Quantum Annealing System for Feature Subset Selection in Software Defect Prediction
Authors:
Ashis Kumar Mandal,
Md Nadim,
Chanchal K. Roy,
Banani Roy,
Kevin A. Schneider
Abstract:
Predicting software defects early in the development process not only enhances the quality and reliability of the software but also decreases the cost of development. A wide range of machine learning techniques can be employed to create software defect prediction models, but the effectiveness and accuracy of these models are often influenced by the choice of appropriate feature subset. Since findi…
▽ More
Predicting software defects early in the development process not only enhances the quality and reliability of the software but also decreases the cost of development. A wide range of machine learning techniques can be employed to create software defect prediction models, but the effectiveness and accuracy of these models are often influenced by the choice of appropriate feature subset. Since finding the optimal feature subset is computationally intensive, heuristic and metaheuristic approaches are commonly employed to identify near-optimal solutions within a reasonable time frame. Recently, the quantum computing paradigm quantum annealing (QA) has been deployed to find solutions to complex optimization problems. This opens up the possibility of addressing the feature subset selection problem with a QA machine. Although several strategies have been proposed for feature subset selection using a QA machine, little exploration has been done regarding the viability of a QA machine for feature subset selection in software defect prediction. This study investigates the potential of D-Wave QA system for this task, where we formulate a mutual information (MI)-based filter approach as an optimization problem and utilize a D-Wave Quantum Processing Unit (QPU) solver as a QA solver for feature subset selection. We evaluate the performance of this approach using multiple software defect datasets from the AEEM, JIRA, and NASA projects. We also utilize a D-Wave classical solver for comparative analysis. Our experimental results demonstrate that QA-based feature subset selection can enhance software defect prediction. Although the D-Wave QPU solver exhibits competitive prediction performance with the classical solver in software defect prediction, it significantly reduces the time required to identify the best feature subset compared to its classical counterpart.
△ Less
Submitted 21 October, 2024;
originally announced October 2024.
-
Aligning AI Agents via Information-Directed Sampling
Authors:
Hong Jun Jeon,
Benjamin Van Roy
Abstract:
The staggering feats of AI systems have brought to attention the topic of AI Alignment: aligning a "superintelligent" AI agent's actions with humanity's interests. Many existing frameworks/algorithms in alignment study the problem on a myopic horizon or study learning from human feedback in isolation, relying on the contrived assumption that the agent has already perfectly identified the environme…
▽ More
The staggering feats of AI systems have brought to attention the topic of AI Alignment: aligning a "superintelligent" AI agent's actions with humanity's interests. Many existing frameworks/algorithms in alignment study the problem on a myopic horizon or study learning from human feedback in isolation, relying on the contrived assumption that the agent has already perfectly identified the environment. As a starting point to address these limitations, we define a class of bandit alignment problems as an extension of classic multi-armed bandit problems. A bandit alignment problem involves an agent tasked with maximizing long-run expected reward by interacting with an environment and a human, both involving details/preferences initially unknown to the agent. The reward of actions in the environment depends on both observed outcomes and human preferences. Furthermore, costs are associated with querying the human to learn preferences. Therefore, an effective agent ought to intelligently trade-off exploration (of the environment and human) and exploitation. We study these trade-offs theoretically and empirically in a toy bandit alignment problem which resembles the beta-Bernoulli bandit. We demonstrate while naive exploration algorithms which reflect current practices and even touted algorithms such as Thompson sampling both fail to provide acceptable solutions to this problem, information-directed sampling achieves favorable regret.
△ Less
Submitted 18 October, 2024;
originally announced October 2024.
-
Singularity Structure of the Four Point Celestial Leaf Amplitudes
Authors:
Raju Mandal,
Sagnik Misra,
Partha Paul,
Baishali Roy
Abstract:
In this paper, we study the four-point celestial leaf amplitudes of massless scalar and MHV gluon scattering. These leaf amplitudes are non-distributional decompositions of the celestial amplitudes associated with a hyperbolic foliation of the Klein spacetime. Bulk scale invariance imposes constraints on the total conformal weights of the massless scalars or gluons. Using this constraint we show t…
▽ More
In this paper, we study the four-point celestial leaf amplitudes of massless scalar and MHV gluon scattering. These leaf amplitudes are non-distributional decompositions of the celestial amplitudes associated with a hyperbolic foliation of the Klein spacetime. Bulk scale invariance imposes constraints on the total conformal weights of the massless scalars or gluons. Using this constraint we show that the four-point leaf amplitudes have a \textit {simple pole singularity at $ z = \bar z $}, where, $ z,\bar z $ are two real independent conformal cross ratios. The distributional nature of the four-point celestial amplitudes is recovered by adding the leaf amplitudes in the timelike and spacelike wedges of the spacetime. We also verify that the MHV gluon leaf amplitudes satisfy a set of differential equations previously obtained for celestial MHV gluon amplitudes by considering the soft gluon theorems and the subleading terms in the OPE expansion between two positive helicity gluons.
△ Less
Submitted 17 October, 2024;
originally announced October 2024.
-
Attosecond pulses from a solid driven by a synthesized two-color field at megahertz repetition rate
Authors:
Zhaopin Chen,
Mark Levit,
Yuval Kern,
Basabendra Roy,
Adi Goldner,
Michael Krüger
Abstract:
Probing coherent quantum dynamics in light-matter interactions at the microscopic level requires high-repetition-rate isolated attosecond pulses (IAPs) in pump-probe experiments. To date, the generation of IAPs has been mainly limited to the kilohertz regime. In this work, we experimentally achieve attosecond control of extreme-ultraviolet (XUV) high harmonics in the wide-bandgap dielectric MgO, d…
▽ More
Probing coherent quantum dynamics in light-matter interactions at the microscopic level requires high-repetition-rate isolated attosecond pulses (IAPs) in pump-probe experiments. To date, the generation of IAPs has been mainly limited to the kilohertz regime. In this work, we experimentally achieve attosecond control of extreme-ultraviolet (XUV) high harmonics in the wide-bandgap dielectric MgO, driven by a synthesized field of two femtosecond pulses at 800nm and 2000nm with relative phase stability. The resulting quasi-continuous harmonic plateau with ~ 9 eV spectral width centered around 16.5 eV photon energy can be tuned by the two-color phase and supports the generation of an IAP (~ 730 attoseconds), confirmed by numerical simulation based on three-band semiconductor Bloch equations. Leveraging the high-repetition-rate driver laser and the moderate intensity requirements of solid-state high-harmonic generation, we achieve IAP production at an unprecedented megahertz repetition rate, paving the way for all-solid compact XUV sources for IAP generation.
△ Less
Submitted 11 October, 2024;
originally announced October 2024.
-
Different Cybercrimes and their Solution for Common People
Authors:
S. Tamang,
G. S. Chandana,
B. K. Roy
Abstract:
In today's digital age, cyberspace has become integral to daily life, however it has also led to an increase in cybercriminal activities. This paper explores cybercrime trends and highlights the need for cybercrime awareness (cyberawareness) to mitigate vulnerabilities. The study also examines Indian statistics on cybercrime. We review the existing literature on cybercrime and cybersecurity, focus…
▽ More
In today's digital age, cyberspace has become integral to daily life, however it has also led to an increase in cybercriminal activities. This paper explores cybercrime trends and highlights the need for cybercrime awareness (cyberawareness) to mitigate vulnerabilities. The study also examines Indian statistics on cybercrime. We review the existing literature on cybercrime and cybersecurity, focusing on various types of cybercrimes and their impacts. We present a list of 31 technical as well as non-technical solutions considering that a "common man" may not be technologically aware. Common man solutions, considering that they are not technologically updated. Expanding the list of solutions and validating their effectiveness in cyber threats can be the future scope of the research.
△ Less
Submitted 8 October, 2024;
originally announced October 2024.
-
Optimizing TinyML: The Impact of Reduced Data Acquisition Rates for Time Series Classification on Microcontrollers
Authors:
Riya Samanta,
Bidyut Saha,
Soumya K. Ghosh,
Ram Babu Roy
Abstract:
Tiny Machine Learning (TinyML) enables efficient, lowcost, and privacy preserving machine learning inference directly on microcontroller units (MCUs) connected to sensors. Optimizing models for these constrained environments is crucial. This paper investigates how reducing data acquisition rates affects TinyML models for time series classification, focusing on resource-constrained, battery operate…
▽ More
Tiny Machine Learning (TinyML) enables efficient, lowcost, and privacy preserving machine learning inference directly on microcontroller units (MCUs) connected to sensors. Optimizing models for these constrained environments is crucial. This paper investigates how reducing data acquisition rates affects TinyML models for time series classification, focusing on resource-constrained, battery operated IoT devices. By lowering data sampling frequency, we aim to reduce computational demands RAM usage, energy consumption, latency, and MAC operations by approximately fourfold while maintaining similar classification accuracies. Our experiments with six benchmark datasets (UCIHAR, WISDM, PAMAP2, MHEALTH, MITBIH, and PTB) showed that reducing data acquisition rates significantly cut energy consumption and computational load, with minimal accuracy loss. For example, a 75\% reduction in acquisition rate for MITBIH and PTB datasets led to a 60\% decrease in RAM usage, 75\% reduction in MAC operations, 74\% decrease in latency, and 70\% reduction in energy consumption, without accuracy loss. These results offer valuable insights for deploying efficient TinyML models in constrained environments.
△ Less
Submitted 17 September, 2024;
originally announced September 2024.
-
Are Large Language Models a Threat to Programming Platforms? An Exploratory Study
Authors:
Md Mustakim Billah,
Palash Ranjan Roy,
Zadia Codabux,
Banani Roy
Abstract:
Competitive programming platforms like LeetCode, Codeforces, and HackerRank evaluate programming skills, often used by recruiters for screening. With the rise of advanced Large Language Models (LLMs) such as ChatGPT, Gemini, and Meta AI, their problem-solving ability on these platforms needs assessment. This study explores LLMs' ability to tackle diverse programming challenges across platforms wit…
▽ More
Competitive programming platforms like LeetCode, Codeforces, and HackerRank evaluate programming skills, often used by recruiters for screening. With the rise of advanced Large Language Models (LLMs) such as ChatGPT, Gemini, and Meta AI, their problem-solving ability on these platforms needs assessment. This study explores LLMs' ability to tackle diverse programming challenges across platforms with varying difficulty, offering insights into their real-time and offline performance and comparing them with human programmers.
We tested 98 problems from LeetCode, 126 from Codeforces, covering 15 categories. Nine online contests from Codeforces and LeetCode were conducted, along with two certification tests on HackerRank, to assess real-time performance. Prompts and feedback mechanisms were used to guide LLMs, and correlations were explored across different scenarios.
LLMs, like ChatGPT (71.43% success on LeetCode), excelled in LeetCode and HackerRank certifications but struggled in virtual contests, particularly on Codeforces. They performed better than users in LeetCode archives, excelling in time and memory efficiency but underperforming in harder Codeforces contests. While not immediately threatening, LLMs performance on these platforms is concerning, and future improvements will need addressing.
△ Less
Submitted 9 September, 2024;
originally announced September 2024.
-
Brick Wall in AdS-Schwarzschild Black Hole: Normal Modes and Emerging Thermality
Authors:
Suman Das,
Somnath Porey,
Baishali Roy
Abstract:
This paper investigates the normal modes of a probe scalar field in a five-dimensional AdS-Schwarzschild black hole with the brick wall boundary condition near the horizon. We employ various techniques to compute the spectrum and analyze its properties. Our results reveal a linear dependence of the spectrum on the principal quantum number while demonstrating a non-trivial dependence on the angular…
▽ More
This paper investigates the normal modes of a probe scalar field in a five-dimensional AdS-Schwarzschild black hole with the brick wall boundary condition near the horizon. We employ various techniques to compute the spectrum and analyze its properties. Our results reveal a linear dependence of the spectrum on the principal quantum number while demonstrating a non-trivial dependence on the angular momentum quantum number. We compute the Spectral Form Factor (SFF) and find a dip-ramp-plateau structure, with the slope of the ramp approaching unity as the brick wall nears the horizon. We also observe that as the brick wall approaches the horizon, the poles of the retarded Green's function condense on the real line, leading to an emergent thermal behavior in the boundary theory. This work extends previous studies on lower-dimensional black holes to higher dimensions, providing insights into the connection between black hole microstate models and boundary chaos. Our findings contribute to the ongoing discussions on the information paradox and the nature of black hole interiors in the context of AdS/CFT correspondence.
△ Less
Submitted 9 September, 2024;
originally announced September 2024.
-
EcoLife: Carbon-Aware Serverless Function Scheduling for Sustainable Computing
Authors:
Yankai Jiang,
Rohan Basu Roy,
Baolin Li,
Devesh Tiwari
Abstract:
This work introduces ECOLIFE, the first carbon-aware serverless function scheduler to co-optimize carbon footprint and performance. ECOLIFE builds on the key insight of intelligently exploiting multi-generation hardware to achieve high performance and lower carbon footprint. ECOLIFE designs multiple novel extensions to Particle Swarm Optimization (PSO) in the context of serverless execution enviro…
▽ More
This work introduces ECOLIFE, the first carbon-aware serverless function scheduler to co-optimize carbon footprint and performance. ECOLIFE builds on the key insight of intelligently exploiting multi-generation hardware to achieve high performance and lower carbon footprint. ECOLIFE designs multiple novel extensions to Particle Swarm Optimization (PSO) in the context of serverless execution environment to achieve high performance while effectively reducing the carbon footprint.
△ Less
Submitted 16 October, 2024; v1 submitted 3 September, 2024;
originally announced September 2024.
-
Towards Sustainable Personalized On-Device Human Activity Recognition with TinyML and Cloud-Enabled Auto Deployment
Authors:
Bidyut Saha,
Riya Samanta,
Soumya K Ghosh,
Ram Babu Roy
Abstract:
Human activity recognition (HAR) holds immense potential for transforming health and fitness monitoring, yet challenges persist in achieving personalized outcomes and sustainability for on-device continuous inferences. This work introduces a wrist-worn smart band designed to address these challenges through a novel combination of on-device TinyML-driven computing and cloud-enabled auto-deployment.…
▽ More
Human activity recognition (HAR) holds immense potential for transforming health and fitness monitoring, yet challenges persist in achieving personalized outcomes and sustainability for on-device continuous inferences. This work introduces a wrist-worn smart band designed to address these challenges through a novel combination of on-device TinyML-driven computing and cloud-enabled auto-deployment. Leveraging inertial measurement unit (IMU) sensors and a customized 1D Convolutional Neural Network (CNN) for personalized HAR, users can tailor activity classes to their unique movement styles with minimal calibration. By utilising TinyML for local computations, the smart band reduces the necessity for constant data transmission and radio communication, which in turn lowers power consumption and reduces carbon footprint. This method also enhances the privacy and security of user data by limiting its transmission. Through transfer learning and fine-tuning on user-specific data, the system achieves a 37\% increase in accuracy over generalized models in personalized settings. Evaluation using three benchmark datasets, WISDM, PAMAP2, and the BandX demonstrates its effectiveness across various activity domains. Additionally, this work presents a cloud-supported framework for the automatic deployment of TinyML models to remote wearables, enabling seamless customization and on-device inference, even with limited target data. By combining personalized HAR with sustainable strategies for on-device continuous inferences, this system represents a promising step towards fostering healthier and more sustainable societies worldwide.
△ Less
Submitted 26 August, 2024;
originally announced September 2024.
-
TinyTNAS: GPU-Free, Time-Bound, Hardware-Aware Neural Architecture Search for TinyML Time Series Classification
Authors:
Bidyut Saha,
Riya Samanta,
Soumya K. Ghosh,
Ram Babu Roy
Abstract:
In this work, we present TinyTNAS, a novel hardware-aware multi-objective Neural Architecture Search (NAS) tool specifically designed for TinyML time series classification. Unlike traditional NAS methods that rely on GPU capabilities, TinyTNAS operates efficiently on CPUs, making it accessible for a broader range of applications. Users can define constraints on RAM, FLASH, and MAC operations to di…
▽ More
In this work, we present TinyTNAS, a novel hardware-aware multi-objective Neural Architecture Search (NAS) tool specifically designed for TinyML time series classification. Unlike traditional NAS methods that rely on GPU capabilities, TinyTNAS operates efficiently on CPUs, making it accessible for a broader range of applications. Users can define constraints on RAM, FLASH, and MAC operations to discover optimal neural network architectures within these parameters. Additionally, the tool allows for time-bound searches, ensuring the best possible model is found within a user-specified duration. By experimenting with benchmark dataset UCI HAR, PAMAP2, WISDM, MIT BIH, and PTB Diagnostic ECG Databas TinyTNAS demonstrates state-of-the-art accuracy with significant reductions in RAM, FLASH, MAC usage, and latency. For example, on the UCI HAR dataset, TinyTNAS achieves a 12x reduction in RAM usage, a 144x reduction in MAC operations, and a 78x reduction in FLASH memory while maintaining superior accuracy and reducing latency by 149x. Similarly, on the PAMAP2 and WISDM datasets, it achieves a 6x reduction in RAM usage, a 40x reduction in MAC operations, an 83x reduction in FLASH, and a 67x reduction in latency, all while maintaining superior accuracy. Notably, the search process completes within 10 minutes in a CPU environment. These results highlight TinyTNAS's capability to optimize neural network architectures effectively for resource-constrained TinyML applications, ensuring both efficiency and high performance. The code for TinyTNAS is available at the GitHub repository and can be accessed at https://github.com/BidyutSaha/TinyTNAS.git.
△ Less
Submitted 29 August, 2024;
originally announced August 2024.
-
AUTOGENICS: Automated Generation of Context-Aware Inline Comments for Code Snippets on Programming Q&A Sites Using LLM
Authors:
Suborno Deb Bappon,
Saikat Mondal,
Banani Roy
Abstract:
Inline comments in the source code facilitate easy comprehension, reusability, and enhanced readability. However, code snippets in answers on Q&A sites like Stack Overflow (SO) often lack comments because answerers volunteer their time and often skip comments or explanations due to time constraints. Existing studies show that these online code examples are difficult to read and understand, making…
▽ More
Inline comments in the source code facilitate easy comprehension, reusability, and enhanced readability. However, code snippets in answers on Q&A sites like Stack Overflow (SO) often lack comments because answerers volunteer their time and often skip comments or explanations due to time constraints. Existing studies show that these online code examples are difficult to read and understand, making it difficult for developers (especially novices) to use them correctly and leading to misuse. Given these challenges, we introduced AUTOGENICS, a tool designed to integrate with SO to generate effective inline comments for code snippets in SO answers exploiting large language models (LLMs). Our contributions are threefold. First, we randomly select 400 answer code snippets from SO and generate inline comments for them using LLMs. We then manually evaluate these comments' effectiveness using four key metrics: accuracy, adequacy, conciseness, and usefulness. Overall, LLMs demonstrate promising effectiveness in generating inline comments for SO answer code snippets. Second, we surveyed 14 active SO users to perceive the effectiveness of these inline comments. The survey results are consistent with our previous manual evaluation. However, according to our evaluation, LLMs-generated comments are less effective for shorter code snippets and sometimes produce noisy comments. Third, to address the gaps, we introduced AUTOGENICS, which extracts additional context from question texts and generates context-aware inline comments. It also optimizes comments by removing noise (e.g., comments in import statements and variable declarations). We evaluate the effectiveness of AUTOGENICS-generated comments using the same four metrics that outperform those of standard LLMs. AUTOGENICS might (a) enhance code comprehension, (b) save time, and improve developers' ability to learn and reuse code more accurately.
△ Less
Submitted 27 August, 2024;
originally announced August 2024.
-
The Need for a Big World Simulator: A Scientific Challenge for Continual Learning
Authors:
Saurabh Kumar,
Hong Jun Jeon,
Alex Lewandowski,
Benjamin Van Roy
Abstract:
The "small agent, big world" frame offers a conceptual view that motivates the need for continual learning. The idea is that a small agent operating in a much bigger world cannot store all information that the world has to offer. To perform well, the agent must be carefully designed to ingest, retain, and eject the right information. To enable the development of performant continual learning agent…
▽ More
The "small agent, big world" frame offers a conceptual view that motivates the need for continual learning. The idea is that a small agent operating in a much bigger world cannot store all information that the world has to offer. To perform well, the agent must be carefully designed to ingest, retain, and eject the right information. To enable the development of performant continual learning agents, a number of synthetic environments have been proposed. However, these benchmarks suffer from limitations, including unnatural distribution shifts and a lack of fidelity to the "small agent, big world" framing. This paper aims to formalize two desiderata for the design of future simulated environments. These two criteria aim to reflect the objectives and complexity of continual learning in practical settings while enabling rapid prototyping of algorithms on a smaller scale.
△ Less
Submitted 5 August, 2024;
originally announced August 2024.
-
Quantized electrical, thermal, and spin transports of non-Hermitian clean and dirty two-dimensional topological insulators and superconductors
Authors:
Sanjib Kumar Das,
Bitan Roy
Abstract:
From lattice-regularized models, devoid of any non-Hermitian (NH) skin effects, here we compute the electrical ($σ_{xy}$), thermal ($κ_{xy}$), and spin ($σ^{sp}_{xy}$) Hall, and the electrical ($G_{xx}$) and thermal ($G^{th}_{xx}$) longitudinal conductivities for appropriate NH planar topological insulators and superconductors related to all five non-trivial Altland-Zirbauer symmetry classes in th…
▽ More
From lattice-regularized models, devoid of any non-Hermitian (NH) skin effects, here we compute the electrical ($σ_{xy}$), thermal ($κ_{xy}$), and spin ($σ^{sp}_{xy}$) Hall, and the electrical ($G_{xx}$) and thermal ($G^{th}_{xx}$) longitudinal conductivities for appropriate NH planar topological insulators and superconductors related to all five non-trivial Altland-Zirbauer symmetry classes in the Hermitian limits. These models feature real eigenvalues over an extended NH parameter regime, only where the associated topological invariants remain quantized. In this regime, the NH quantum anomalous and spin Hall insulators show quantized $σ_{xy}$ and $G_{xx}$, respectively, the NH $p+ip$ ($p \pm ip$) pairing shows half-quantized $κ_{xy}$ ($G^{th}_{xx}$), while the NH $d+id$ pairing shows quantized $κ_{xy}$ and $σ^{sp}_{xy}$ in the clean and weak disorder (due to random pointlike charge impurities) regimes. We compute these quantities in experimentally realizable suitable six-terminal setups using the Kwant software package. But, in the strong disorder regime, all these topological responses vanish and with the increasing non-Hermiticity in the system this generic phenomenon occurs at weaker disorder.
△ Less
Submitted 1 August, 2024;
originally announced August 2024.
-
Yukawa-Lorentz symmetry of interacting non-Hermitian birefringent Dirac fermions
Authors:
Sk Asrap Murshed,
Bitan Roy
Abstract:
The energy spectra of linearly dispersing gapless spin-3/2 Dirac fermions display birefringence, featuring two effective Fermi velocities, thus breaking the space-time Lorentz symmetry. Here, we consider a non-Hermitian (NH) generalization of this scenario by introducing a masslike anti-Hermitian birefringent Dirac operator to its Hermitian counterpart. The resulting NH operator shows real eigenva…
▽ More
The energy spectra of linearly dispersing gapless spin-3/2 Dirac fermions display birefringence, featuring two effective Fermi velocities, thus breaking the space-time Lorentz symmetry. Here, we consider a non-Hermitian (NH) generalization of this scenario by introducing a masslike anti-Hermitian birefringent Dirac operator to its Hermitian counterpart. The resulting NH operator shows real eigenvalue spectra over an extended NH parameter regime, and a combination of non-spatial and discrete rotational symmetries protects the gapless nature of such quasiparticles. However, at the brink of dynamic mass generation, triggered by Hubbardlike local interactions, the birefringent parameter always vanishes under coarse grain due to Yukawa-type interactions with scalar bosonic order-parameter fluctuations. The resulting quantum critical state is, therefore, described by two decoupled copies of spin-1/2 Dirac fermions with a unique terminal Fermi velocity, which is equal to the bosonic order-parameter velocity, thereby fostering an emergent space-time Lorentz symmetry. Furthermore, depending on the internal algebra between the anti-Hermitian birefringent Dirac operator and the candidate mass order, the system achieves the emergent Yukawa-Lorentz symmetry either by maintaining its non-Hermiticity or by recovering a full Hermiticity. We discuss the resulting quantum critical phenomena and possible microscopic realizations of the proposed scenarios.
△ Less
Submitted 25 July, 2024;
originally announced July 2024.
-
Topological insulators on fractal lattices: A general principle of construction
Authors:
Daniel J. Salib,
Bitan Roy
Abstract:
Fractal lattices, featuring the self-similarity symmetry, are often geometric descents of parent crystals, possessing all their discrete symmetries (such as rotations and reflections) except the translational ones. Here, we formulate three different general approaches to construct real space Hamiltonian on a fractal lattice starting from the Bloch Hamiltonian on the parent crystal, fostering for e…
▽ More
Fractal lattices, featuring the self-similarity symmetry, are often geometric descents of parent crystals, possessing all their discrete symmetries (such as rotations and reflections) except the translational ones. Here, we formulate three different general approaches to construct real space Hamiltonian on a fractal lattice starting from the Bloch Hamiltonian on the parent crystal, fostering for example strong and crystalline topological insulators resulting from the interplay between the nontrivial geometry of the underlying electronic wavefunctions and the crystal symmetries. As a demonstrative example, we consider a generalized square lattice Chern insulator model, and within the framework of all three methods we successfully showcase incarnations of strong and crystalline Chern insulators on the Sierpiński carpet fractal lattices. The proposed theoretical framework thus lays a generic foundation to build a tower of topological phases on the landscape of fractal lattices.
△ Less
Submitted 18 July, 2024;
originally announced July 2024.
-
Room temperature Mott transistor based on resistive switching in disordered V2O3 films grown on Si
Authors:
Binoy Krishna De,
V. G. Sathe,
Divya,
Pragati Sharma,
Shubham Kumar Parate,
Hemant Singh Kunwar,
Pavan Nukala,
S. B. Roy
Abstract:
Electric field-induced giant resistive switching triggered by insulator-to-metal transition (IMT) is one of the promising approaches for developing a new class of electronics often referred to as Mottronics. Achieving this resistive switching by minimal external field at room temperature is of paramount research and technological interest. Mott-IMT is often associated with structural modification,…
▽ More
Electric field-induced giant resistive switching triggered by insulator-to-metal transition (IMT) is one of the promising approaches for developing a new class of electronics often referred to as Mottronics. Achieving this resistive switching by minimal external field at room temperature is of paramount research and technological interest. Mott-IMT is often associated with structural modification, which is very important for optoelectronic and actuator applications. Here, we report a giant resistive switching of about 900 % at room temperature in disordered polycrystalline V2O3-Si thin film stabilized at the IMT phase boundary and associated structural transformation under a small electric field. The increase of electron population in the a1g band under the field is responsible for the Mott gap collapse that drives the structural transition. Furthermore, we also fabricated a room temperature Mott-FET with a channel ON/OFF resistive ratio of about 15. This study provides a fundamental mechanism of the Mott-IMT in V2O3 as well as its device applications.
△ Less
Submitted 17 July, 2024;
originally announced July 2024.
-
Information-Theoretic Foundations for Machine Learning
Authors:
Hong Jun Jeon,
Benjamin Van Roy
Abstract:
The staggering progress of machine learning in the past decade has been a sight to behold. In retrospect, it is both remarkable and unsettling that these milestones were achievable with little to no rigorous theory to guide experimentation. Despite this fact, practitioners have been able to guide their future experimentation via observations from previous large-scale empirical investigations. Howe…
▽ More
The staggering progress of machine learning in the past decade has been a sight to behold. In retrospect, it is both remarkable and unsettling that these milestones were achievable with little to no rigorous theory to guide experimentation. Despite this fact, practitioners have been able to guide their future experimentation via observations from previous large-scale empirical investigations. However, alluding to Plato's Allegory of the cave, it is likely that the observations which form the field's notion of reality are but shadows representing fragments of that reality. In this work, we propose a theoretical framework which attempts to answer what exists outside of the cave. To the theorist, we provide a framework which is mathematically rigorous and leaves open many interesting ideas for future exploration. To the practitioner, we provide a framework whose results are very intuitive, general, and which will help form principles to guide future investigations. Concretely, we provide a theoretical framework rooted in Bayesian statistics and Shannon's information theory which is general enough to unify the analysis of many phenomena in machine learning. Our framework characterizes the performance of an optimal Bayesian learner, which considers the fundamental limits of information. Throughout this work, we derive very general theoretical results and apply them to derive insights specific to settings ranging from data which is independently and identically distributed under an unknown distribution, to data which is sequential, to data which exhibits hierarchical structure amenable to meta-learning. We conclude with a section dedicated to characterizing the performance of misspecified algorithms. These results are exciting and particularly relevant as we strive to overcome increasingly difficult machine learning challenges in this endlessly complex world.
△ Less
Submitted 20 August, 2024; v1 submitted 16 July, 2024;
originally announced July 2024.
-
Satisficing Exploration for Deep Reinforcement Learning
Authors:
Dilip Arumugam,
Saurabh Kumar,
Ramki Gummadi,
Benjamin Van Roy
Abstract:
A default assumption in the design of reinforcement-learning algorithms is that a decision-making agent always explores to learn optimal behavior. In sufficiently complex environments that approach the vastness and scale of the real world, however, attaining optimal performance may in fact be an entirely intractable endeavor and an agent may seldom find itself in a position to complete the requisi…
▽ More
A default assumption in the design of reinforcement-learning algorithms is that a decision-making agent always explores to learn optimal behavior. In sufficiently complex environments that approach the vastness and scale of the real world, however, attaining optimal performance may in fact be an entirely intractable endeavor and an agent may seldom find itself in a position to complete the requisite exploration for identifying an optimal policy. Recent work has leveraged tools from information theory to design agents that deliberately forgo optimal solutions in favor of sufficiently-satisfying or satisficing solutions, obtained through lossy compression. Notably, such agents may employ fundamentally different exploratory decisions to learn satisficing behaviors more efficiently than optimal ones that are more data intensive. While supported by a rigorous corroborating theory, the underlying algorithm relies on model-based planning, drastically limiting the compatibility of these ideas with function approximation and high-dimensional observations. In this work, we remedy this issue by extending an agent that directly represents uncertainty over the optimal value function allowing it to both bypass the need for model-based planning and to learn satisficing policies. We provide simple yet illustrative experiments that demonstrate how our algorithm enables deep reinforcement-learning agents to achieve satisficing behaviors. In keeping with previous work on this setting for multi-armed bandits, we additionally find that our algorithm is capable of synthesizing optimal behaviors, when feasible, more efficiently than its non-information-theoretic counterpart.
△ Less
Submitted 16 July, 2024;
originally announced July 2024.
-
Exploration Unbound
Authors:
Dilip Arumugam,
Wanqiao Xu,
Benjamin Van Roy
Abstract:
A sequential decision-making agent balances between exploring to gain new knowledge about an environment and exploiting current knowledge to maximize immediate reward. For environments studied in the traditional literature, optimal decisions gravitate over time toward exploitation as the agent accumulates sufficient knowledge and the benefits of further exploration vanish. What if, however, the en…
▽ More
A sequential decision-making agent balances between exploring to gain new knowledge about an environment and exploiting current knowledge to maximize immediate reward. For environments studied in the traditional literature, optimal decisions gravitate over time toward exploitation as the agent accumulates sufficient knowledge and the benefits of further exploration vanish. What if, however, the environment offers an unlimited amount of useful knowledge and there is large benefit to further exploration no matter how much the agent has learned? We offer a simple, quintessential example of such a complex environment. In this environment, rewards are unbounded and an agent can always increase the rate at which rewards accumulate by exploring to learn more. Consequently, an optimal agent forever maintains a propensity to explore.
△ Less
Submitted 16 July, 2024;
originally announced July 2024.
-
Reproducibility of Issues Reported in Stack Overflow Questions: Challenges, Impact & Estimation
Authors:
Saikat Mondal,
Banani Roy
Abstract:
Software developers often submit questions to technical Q&A sites like Stack Overflow (SO) to resolve code-level problems. In practice, they include example code snippets with questions to explain the programming issues. Existing research suggests that users attempt to reproduce the reported issues using given code snippets when answering questions. Unfortunately, such code snippets could not alwa…
▽ More
Software developers often submit questions to technical Q&A sites like Stack Overflow (SO) to resolve code-level problems. In practice, they include example code snippets with questions to explain the programming issues. Existing research suggests that users attempt to reproduce the reported issues using given code snippets when answering questions. Unfortunately, such code snippets could not always reproduce the issues due to several unmet challenges that prevent questions from receiving appropriate and prompt solutions. One previous study investigated reproducibility challenges and produced a catalog. However, how the practitioners perceive this challenge catalog is unknown. Practitioners' perspectives are inevitable in validating these challenges and estimating their severity. This study first surveyed 53 practitioners to understand their perspectives on reproducibility challenges. We attempt to (a) see whether they agree with these challenges, (b) determine the impact of each challenge on answering questions, and (c) identify the need for tools to promote reproducibility. Survey results show that - (a) about 90% of the participants agree with the challenges, (b) "missing an important part of code" most severely hurt reproducibility, and (c) participants strongly recommend introducing automated tool support to promote reproducibility. Second, we extract \emph{nine} code-based features (e.g., LOC, compilability) and build five Machine Learning (ML) models to predict issue reproducibility. Early detection might help users improve code snippets and their reproducibility. Our models achieve 84.5% precision, 83.0% recall, 82.8% F1-score, and 82.8% overall accuracy, which are highly promising. Third, we systematically interpret the ML model and explain how code snippets with reproducible issues differ from those with irreproducible issues.
△ Less
Submitted 13 July, 2024;
originally announced July 2024.
-
Superconductivity in three-dimensional interacting doped topological insulators
Authors:
Andras L. Szabo,
Bitan Roy
Abstract:
Three-dimensional doped Dirac insulators foster simply connected (in both topological and trivial regimes) and annular (deep inside the topological regime) Fermi surfaces (FSs) in the normal state, and allow on-site repulsions among fermions with opposite spin ($U_1$) and parity ($U_2$) eigenvalues. From an unbiased leading-order (one-loop) renormalization group analysis, controlled by a suitable…
▽ More
Three-dimensional doped Dirac insulators foster simply connected (in both topological and trivial regimes) and annular (deep inside the topological regime) Fermi surfaces (FSs) in the normal state, and allow on-site repulsions among fermions with opposite spin ($U_1$) and parity ($U_2$) eigenvalues. From an unbiased leading-order (one-loop) renormalization group analysis, controlled by a suitable $ε$ expansion, we show that this system develops strong propensity toward the nucleation of scalar $s$-wave and odd-parity pseudoscalar $p$-wave pairings, favored by repulsive $U_1$ and $U_2$ interactions, respectively, irrespective of the underlying FS topology. Our results can be pertinent for the observed superconductivity in various doped narrow gap semiconductors, and the theoretical foundation can readily be applied to investigate similar phenomenon in various doped topological materials.
△ Less
Submitted 11 July, 2024;
originally announced July 2024.
-
Minsum Problem for Discrete and Weighted Set Flow on Dynamic Path Network
Authors:
Bubai Manna,
Bodhayan Roy,
Vorapong Suppakitpaisarn
Abstract:
In this research, we examine the minsum flow problem in dynamic path networks where flows are represented as discrete and weighted sets. The minsum flow problem has been widely studied for its relevance in finding evacuation routes during emergencies such as earthquakes. However, previous approaches often assume that individuals are separable and identical, which does not adequately account for th…
▽ More
In this research, we examine the minsum flow problem in dynamic path networks where flows are represented as discrete and weighted sets. The minsum flow problem has been widely studied for its relevance in finding evacuation routes during emergencies such as earthquakes. However, previous approaches often assume that individuals are separable and identical, which does not adequately account for the fact that some groups of people, such as families, need to move together and that some groups may be more important than others. To address these limitations, we modify the minsum flow problem to support flows represented as discrete and weighted sets. We also propose a 2-approximation pseudo-polynomial time algorithm to solve this modified problem for path networks with uniform capacity.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Information-Theoretic Foundations for Neural Scaling Laws
Authors:
Hong Jun Jeon,
Benjamin Van Roy
Abstract:
Neural scaling laws aim to characterize how out-of-sample error behaves as a function of model and training dataset size. Such scaling laws guide allocation of a computational resources between model and data processing to minimize error. However, existing theoretical support for neural scaling laws lacks rigor and clarity, entangling the roles of information and optimization. In this work, we dev…
▽ More
Neural scaling laws aim to characterize how out-of-sample error behaves as a function of model and training dataset size. Such scaling laws guide allocation of a computational resources between model and data processing to minimize error. However, existing theoretical support for neural scaling laws lacks rigor and clarity, entangling the roles of information and optimization. In this work, we develop rigorous information-theoretic foundations for neural scaling laws. This allows us to characterize scaling laws for data generated by a two-layer neural network of infinite width. We observe that the optimal relation between data and model size is linear, up to logarithmic factors, corroborating large-scale empirical investigations. Concise yet general results of the kind we establish may bring clarity to this topic and inform future investigations.
△ Less
Submitted 27 June, 2024;
originally announced July 2024.
-
Covering Simple Orthogonal Polygons with Rectangles
Authors:
Aniket Basu Roy
Abstract:
We study the problem of Covering Orthogonal Polygons with Rectangles. For polynomial-time algorithms, the best-known approximation factor is $O(\sqrt{\log n})$ when the input polygon may have holes [Kumar and Ramesh, STOC '99, SICOMP '03], and there is a $2$-factor approximation algorithm known when the polygon is hole-free [Franzblau, SIDMA '89]. Arguably, an easier problem is the Boundary Cover…
▽ More
We study the problem of Covering Orthogonal Polygons with Rectangles. For polynomial-time algorithms, the best-known approximation factor is $O(\sqrt{\log n})$ when the input polygon may have holes [Kumar and Ramesh, STOC '99, SICOMP '03], and there is a $2$-factor approximation algorithm known when the polygon is hole-free [Franzblau, SIDMA '89]. Arguably, an easier problem is the Boundary Cover problem where we are interested in covering only the boundary of the polygon in contrast to the original problem where we are interested in covering the interior of the polygon, hence it is also referred as the Interior Cover problem. For the Boundary Cover problem, a $4$-factor approximation algorithm is known to exist and it is APX-hard when the polygon has holes [Berman and DasGupta, Algorithmica '94].
In this work, we investigate how effective is local search algorithm for the above covering problems on simple polygons. We prove that a simple local search algorithm yields a PTAS for the Boundary Cover problem when the polygon is simple. Our proof relies on the existence of planar supports on appropriate hypergraphs defined on the Boundary Cover problem instance. On the other hand, we construct instances where support graphs for the Interior Cover problem have arbitrarily large bicliques, thus implying that the same local search technique cannot yield a PTAS for this problem. We also show large locality gap for its dual problem, namely the Maximum Antirectangle problem.
△ Less
Submitted 23 June, 2024;
originally announced June 2024.
-
Notes on heating phase dynamics in Floquet CFTs and Modular quantization
Authors:
Suchetan Das,
Bobby Ezhuthachan,
Somnath Porey,
Baishali Roy
Abstract:
In this article, we explore the connection between the heating phase of periodically driven CFTs and the Modular Hamiltonian of a subregion in the vacuum state. We show that the heating phase Hamiltonian corresponds to the Modular Hamiltonian, with the fixed points mapping to the endpoints of the subregion. In the bulk dual, we find that these fixed points correspond to the Ryu-Takayanagi surface…
▽ More
In this article, we explore the connection between the heating phase of periodically driven CFTs and the Modular Hamiltonian of a subregion in the vacuum state. We show that the heating phase Hamiltonian corresponds to the Modular Hamiltonian, with the fixed points mapping to the endpoints of the subregion. In the bulk dual, we find that these fixed points correspond to the Ryu-Takayanagi surface of the AdS-Rindler wedge. Consequently, the entanglement entropy associated to the boundary interval within two fixed points exactly matches with the Rindler entropy of AdS-Rindler. We observe the emergent Virasoro algebra in the boundary quantization of the Modular Hamiltonian has a striking similarity with the emergent near Horizon Virasoro algebra. This is a consequence of the fact that while obtaining the boundary Virasoro algebra, a cut-off with conformal boundary condition around the fixed point is introduced, which in the bulk is related to a stretched horizon, with an emergent two-dimensional conformal symmetry. We also argue that as one tunes the parameter space of Floquet Hamiltonians to transition from the non-heating to the heating phase the operator algebra type changes from Von Neumann type $I$ to $III_1$ factor, providing a non-equilibrium analogue of the Hawking-Page transition.
△ Less
Submitted 11 July, 2024; v1 submitted 16 June, 2024;
originally announced June 2024.
-
Attention-Based Learning for Fluid State Interpolation and Editing in a Time-Continuous Framework
Authors:
Bruno Roy
Abstract:
In this work, we introduce FluidsFormer: a transformer-based approach for fluid interpolation within a continuous-time framework. By combining the capabilities of PITT and a residual neural network (RNN), we analytically predict the physical properties of the fluid state. This enables us to interpolate substep frames between simulated keyframes, enhancing the temporal smoothness and sharpness of a…
▽ More
In this work, we introduce FluidsFormer: a transformer-based approach for fluid interpolation within a continuous-time framework. By combining the capabilities of PITT and a residual neural network (RNN), we analytically predict the physical properties of the fluid state. This enables us to interpolate substep frames between simulated keyframes, enhancing the temporal smoothness and sharpness of animations. We demonstrate promising results for smoke interpolation and conduct initial experiments on liquids.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Moving Mirrors, OTOCs and Scrambling
Authors:
Parthajit Biswas,
Bobby Ezhuthachan,
Arnab Kundu,
Baishali Roy
Abstract:
We explore the physics of scrambling in the moving mirror models, in which a two-dimensional CFT is subjected to a time-dependent boundary condition. It is well-known that by choosing an appropriate mirror profile, one can model quantum aspects of black holes in two-dimensions, ranging from Hawking radiation in an eternal black hole (for an "escaping mirror") to the recent realization of Page curv…
▽ More
We explore the physics of scrambling in the moving mirror models, in which a two-dimensional CFT is subjected to a time-dependent boundary condition. It is well-known that by choosing an appropriate mirror profile, one can model quantum aspects of black holes in two-dimensions, ranging from Hawking radiation in an eternal black hole (for an "escaping mirror") to the recent realization of Page curve in evaporating black holes (for a "kink mirror"). We explore a class of OTOCs in the presence of such a boundary and explicitly demonstrate the following primary aspects: First, we show that the dynamical CFT data directly affect an OTOC and maximally chaotic scrambling occurs for the escaping mirror for a large-$c$ CFT with identity block dominance. We further show that the exponential growth of OTOC associated with the physics of scrambling yields a power-law growth in the model for evaporating black holes which demonstrates a unitary dynamics in terms of a Page curve. We also demonstrate that, by tuning a parameter, one can naturally interpolate between an exponential growth associated to scrambling and a power-law growth in unitary dynamics. Our work explicitly exhibits the role of higher-point functions in CFT dynamics as well as the distinction between scrambling and Page curve. We also discuss several future possibilities based on this class of models.
△ Less
Submitted 9 June, 2024;
originally announced June 2024.
-
On Approximating the Dynamic and Discrete Network Flow Problem
Authors:
Bubai Manna,
Bodhayan Roy,
Vorapong Suppakitpaisarn
Abstract:
We examine the dynamic network flow problem under the assumption that the flow consists of discrete units. The dynamic network flow problem is commonly addressed in the context of developing evacuation plans, where the flow is typically treated as a continuous quantity. However, real-world scenarios often involve moving groups, such as families, as single units. We demonstrate that solving the dyn…
▽ More
We examine the dynamic network flow problem under the assumption that the flow consists of discrete units. The dynamic network flow problem is commonly addressed in the context of developing evacuation plans, where the flow is typically treated as a continuous quantity. However, real-world scenarios often involve moving groups, such as families, as single units. We demonstrate that solving the dynamic flow problem with this consideration is APX-hard. Conversely, we present a PTAS for instances where the base graph is a path with a constant number of nodes. We introduce a `ready time' constraint to the minsum bin packing problem, meaning certain items cannot be placed in specific bins, develop a PTAS for this modified problem, and apply our algorithms to the discrete and dynamic flow problem.
△ Less
Submitted 25 April, 2024;
originally announced April 2024.
-
Minimum Consistent Subset in Trees and Interval Graphs
Authors:
Aritra Banik,
Sayani Das,
Anil Maheshwari,
Bubai Manna,
Subhas C Nandy,
Krishna Priya K M,
Bodhayan Roy,
Sasanka Roy,
Abhishek Sahu
Abstract:
In the Minimum Consistent Subset (MCS) problem, we are presented with a connected simple undirected graph $G=(V,E)$, consisting of a vertex set $V$ of size $n$ and an edge set $E$. Each vertex in $V$ is assigned a color from the set $\{1,2,\ldots, c\}$. The objective is to determine a subset $V' \subseteq V$ with minimum possible cardinality, such that for every vertex $v \in V$, at least one of i…
▽ More
In the Minimum Consistent Subset (MCS) problem, we are presented with a connected simple undirected graph $G=(V,E)$, consisting of a vertex set $V$ of size $n$ and an edge set $E$. Each vertex in $V$ is assigned a color from the set $\{1,2,\ldots, c\}$. The objective is to determine a subset $V' \subseteq V$ with minimum possible cardinality, such that for every vertex $v \in V$, at least one of its nearest neighbors in $V'$ (measured in terms of the hop distance) shares the same color as $v$. The decision problem, indicating whether there exists a subset $V'$ of cardinality at most $l$ for some positive integer $l$, is known to be NP-complete even for planar graphs.
In this paper, we establish that the MCS problem for trees, when the number of colors $c$ is considered an input parameter, is NP-complete. We propose a fixed-parameter tractable (FPT) algorithm for MCS on trees running in $O(2^{6c}n^6)$ time, significantly improving the currently best-known algorithm whose running time is $O(2^{4c}n^{2c+3})$.
In an effort to comprehensively understand the computational complexity of the MCS problem across different graph classes, we extend our investigation to interval graphs. We show that it remains NP-complete for interval graphs, thus enriching graph classes where MCS remains intractable.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
OffRAMPS: An FPGA-based Intermediary for Analysis and Modification of Additive Manufacturing Control Systems
Authors:
Jason Blocklove,
Md Raz,
Prithwish Basu Roy,
Hammond Pearce,
Prashanth Krishnamurthy,
Farshad Khorrami,
Ramesh Karri
Abstract:
Cybersecurity threats in Additive Manufacturing (AM) are an increasing concern as AM adoption continues to grow. AM is now being used for parts in the aerospace, transportation, and medical domains. Threat vectors which allow for part compromise are particularly concerning, as any failure in these domains would have life-threatening consequences. A major challenge to investigation of AM part-compr…
▽ More
Cybersecurity threats in Additive Manufacturing (AM) are an increasing concern as AM adoption continues to grow. AM is now being used for parts in the aerospace, transportation, and medical domains. Threat vectors which allow for part compromise are particularly concerning, as any failure in these domains would have life-threatening consequences. A major challenge to investigation of AM part-compromises comes from the difficulty in evaluating and benchmarking both identified threat vectors as well as methods for detecting adversarial actions. In this work, we introduce a generalized platform for systematic analysis of attacks against and defenses for 3D printers. Our "OFFRAMPS" platform is based on the open-source 3D printer control board "RAMPS." OFFRAMPS allows analysis, recording, and modification of all control signals and I/O for a 3D printer. We show the efficacy of OFFRAMPS by presenting a series of case studies based on several Trojans, including ones identified in the literature, and show that OFFRAMPS can both emulate and detect these attacks, i.e., it can both change and detect arbitrary changes to the g-code print commands.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
$\mathbb{A}^1$-homotopy type of $\mathbb{A}^2 \setminus \left\{(0,0) \right\}$
Authors:
Utsav Choudhury,
Biman Roy
Abstract:
In this article we prove that any $\mathbb{A}^1$-connected smooth $k$-variety is $\mathbb{A}^1$-uniruled for any algebraically closed field $k$. We establish that if a non empty open subscheme $X$ of a smooth affine $k$-scheme is $\mathbb{A}^1$-weakly equivalent to $\mathbb{A}^2_{k} \setminus \left\{(0,0) \right\}$, then $X \cong \mathbb{A}^2_{k} \setminus \left\{(0,0) \right\}$ as $k$-varieties f…
▽ More
In this article we prove that any $\mathbb{A}^1$-connected smooth $k$-variety is $\mathbb{A}^1$-uniruled for any algebraically closed field $k$. We establish that if a non empty open subscheme $X$ of a smooth affine $k$-scheme is $\mathbb{A}^1$-weakly equivalent to $\mathbb{A}^2_{k} \setminus \left\{(0,0) \right\}$, then $X \cong \mathbb{A}^2_{k} \setminus \left\{(0,0) \right\}$ as $k$-varieties for any field $k$ of characteristic $0$.
△ Less
Submitted 1 April, 2024;
originally announced April 2024.
-
From Local Spin Nematicity to Altermagnets: Footprints of Band Topology
Authors:
Sanjib Kumar Das,
Bitan Roy
Abstract:
Altermagnets are crystallographic rotational symmetry breaking spin-ordered states, possessing a net zero magnetization despite manifesting Kramers non-degenerate bands. Here, we show that momentum-independent local spin nematic orders in monolayer, Bernal bilayer and rhombohedral trilayer graphene give rise to $p$-wave, $d$-wave and $f$-wave altermagnets, respectively, thereby inheriting topology…
▽ More
Altermagnets are crystallographic rotational symmetry breaking spin-ordered states, possessing a net zero magnetization despite manifesting Kramers non-degenerate bands. Here, we show that momentum-independent local spin nematic orders in monolayer, Bernal bilayer and rhombohedral trilayer graphene give rise to $p$-wave, $d$-wave and $f$-wave altermagnets, respectively, thereby inheriting topology of linear, quadratic and cubic free fermion band dispersions that are also described in terms of angular momentum $\ell=1,\; 2$ and $3$ harmonics in the reciprocal space. The same conclusions also hold inside a spin-triplet nematic superconductor, featuring Majorana altermagnets. Altogether, these findings highlight the importance of electronic band structure in identifying such exotic magnetic orders in quantum materials. We depict the effects of in-plane magnetic fields on altermagnets, and propose novel spin-disordered alter-valleymagnets in these systems.
△ Less
Submitted 8 April, 2024; v1 submitted 21 March, 2024;
originally announced March 2024.
-
Stabilizing topological superconductivity in disordered spin-orbit coupled semiconductor-superconductor heterostructures
Authors:
Binayyak B. Roy,
Rimika Jaiswal,
Tudor D. Stanescu,
Sumanta Tewari
Abstract:
We investigate theoretically a one-dimensional semiconductor-superconductor (SM-SC) heterostructure with Rashba spin-orbit coupling and parallel Zeeman field in the presence of disorder generated by random charged impurities and identify the optimal regimes for realizing topological superconductivity and Majorana zero modes. Using a Green's function approach, we show that upon increasing the disor…
▽ More
We investigate theoretically a one-dimensional semiconductor-superconductor (SM-SC) heterostructure with Rashba spin-orbit coupling and parallel Zeeman field in the presence of disorder generated by random charged impurities and identify the optimal regimes for realizing topological superconductivity and Majorana zero modes. Using a Green's function approach, we show that upon increasing the disorder strength the stable topological superconducting phase characterized by robust end-to-end Majorana correlations "migrates" toward larger values of the Zeeman field and can be stabilized by increasing the effective SM-SC coupling. Based on these findings, we propose a strategy for accessing a regime characterized by well-separated Majorana zero modes that is based on (a) enhancing the strength of the effective SM-SC coupling (e.g., through interface engineering) and (b) expanding the range of accessible Zeeman fields (e.g., by enhancing the gyromagnetic ratio or optimizing the parent superconductor, to enable the application of larger magnetic fields). While this strategy may still require some reduction of the disorder strength, this requirement is significantly less strict than the corresponding requirement in a strategy that focuses exclusively on disorder reduction.
△ Less
Submitted 29 February, 2024; v1 submitted 28 February, 2024;
originally announced February 2024.
-
Krylov Complexity in $2d$ CFTs with SL$(2,\mathbb{R})$ deformed Hamiltonians
Authors:
Vinay Malvimat,
Somnath Porey,
Baishali Roy
Abstract:
In this study, we analyze Krylov Complexity in two-dimensional conformal field theories subjected to deformed SL$(2,\mathbb{R})$ Hamiltonians. In the vacuum state, we find that the K-complexity exhibits a universal phase structure. The phase structure involves the K-complexity exhibiting an oscillatory behaviour in the non-heating phase, which contrasts with the exponential growth observed in the…
▽ More
In this study, we analyze Krylov Complexity in two-dimensional conformal field theories subjected to deformed SL$(2,\mathbb{R})$ Hamiltonians. In the vacuum state, we find that the K-complexity exhibits a universal phase structure. The phase structure involves the K-complexity exhibiting an oscillatory behaviour in the non-heating phase, which contrasts with the exponential growth observed in the heating phase, while it displays polynomial growth at the phase boundary. Furthermore, we extend our analysis to compute the K-complexity of a light operator in excited states, considering both large-c CFT and free field theory. In the free field theory, we find a state-independent phase structure of K-complexity. However, in the large-c CFT, the behavior varies, with the K-Complexity once again displaying exponential growth in the heating phase and polynomial growth at the phase boundary. Notably, the precise exponent governing this growth depends on the heaviness of the state under examination. In the non-heating phase, we observe a transition in K-complexity behavior from oscillatory to exponential growth, akin to findings in [1], as it represents a special case within the non-heating phase.
△ Less
Submitted 24 February, 2024;
originally announced February 2024.
-
Efficient Exploration for LLMs
Authors:
Vikranth Dwaracherla,
Seyed Mohammad Asghari,
Botao Hao,
Benjamin Van Roy
Abstract:
We present evidence of substantial benefit from efficient exploration in gathering human feedback to improve large language models. In our experiments, an agent sequentially generates queries while fitting a reward model to the feedback received. Our best-performing agent generates queries using double Thompson sampling, with uncertainty represented by an epistemic neural network. Our results demo…
▽ More
We present evidence of substantial benefit from efficient exploration in gathering human feedback to improve large language models. In our experiments, an agent sequentially generates queries while fitting a reward model to the feedback received. Our best-performing agent generates queries using double Thompson sampling, with uncertainty represented by an epistemic neural network. Our results demonstrate that efficient exploration enables high levels of performance with far fewer queries. Further, both uncertainty estimation and the choice of exploration scheme play critical roles.
△ Less
Submitted 4 June, 2024; v1 submitted 1 February, 2024;
originally announced February 2024.
-
An Information-Theoretic Analysis of In-Context Learning
Authors:
Hong Jun Jeon,
Jason D. Lee,
Qi Lei,
Benjamin Van Roy
Abstract:
Previous theoretical results pertaining to meta-learning on sequences build on contrived assumptions and are somewhat convoluted. We introduce new information-theoretic tools that lead to an elegant and very general decomposition of error into three components: irreducible error, meta-learning error, and intra-task error. These tools unify analyses across many meta-learning challenges. To illustra…
▽ More
Previous theoretical results pertaining to meta-learning on sequences build on contrived assumptions and are somewhat convoluted. We introduce new information-theoretic tools that lead to an elegant and very general decomposition of error into three components: irreducible error, meta-learning error, and intra-task error. These tools unify analyses across many meta-learning challenges. To illustrate, we apply them to establish new results about in-context learning with transformers. Our theoretical results characterizes how error decays in both the number of training sequences and sequence lengths. Our results are very general; for example, they avoid contrived mixing time assumptions made by all prior results that establish decay of error with sequence length.
△ Less
Submitted 27 January, 2024;
originally announced January 2024.
-
Adaptive Crowdsourcing Via Self-Supervised Learning
Authors:
Anmol Kagrecha,
Henrik Marklund,
Benjamin Van Roy,
Hong Jun Jeon,
Richard Zeckhauser
Abstract:
Common crowdsourcing systems average estimates of a latent quantity of interest provided by many crowdworkers to produce a group estimate. We develop a new approach -- predict-each-worker -- that leverages self-supervised learning and a novel aggregation scheme. This approach adapts weights assigned to crowdworkers based on estimates they provided for previous quantities. When skills vary across c…
▽ More
Common crowdsourcing systems average estimates of a latent quantity of interest provided by many crowdworkers to produce a group estimate. We develop a new approach -- predict-each-worker -- that leverages self-supervised learning and a novel aggregation scheme. This approach adapts weights assigned to crowdworkers based on estimates they provided for previous quantities. When skills vary across crowdworkers or their estimates correlate, the weighted sum offers a more accurate group estimate than the average. Existing algorithms such as expectation maximization can, at least in principle, produce similarly accurate group estimates. However, their computational requirements become onerous when complex models, such as neural networks, are required to express relationships among crowdworkers. Predict-each-worker accommodates such complexity as well as many other practical challenges. We analyze the efficacy of predict-each-worker through theoretical and computational studies. Among other things, we establish asymptotic optimality as the number of engagements per crowdworker grows.
△ Less
Submitted 1 February, 2024; v1 submitted 24 January, 2024;
originally announced January 2024.
-
Fusion of $^{7}$Li with $^{205}$Tl at near barrier energies
Authors:
V. V. Parkar,
Prasanna M.,
Ruchi Rathod,
V. Jha,
S. K. Pandit,
A. Shrivastava,
K. Mahata,
K. Ramachandran,
R. Palit,
Md. S. R. Laskar,
B. J. Roy,
Bhushan Kanagalekar,
B. G. Hegde
Abstract:
The complete and incomplete fusion cross sections for the $^{7}$Li+$^{205}$Tl reaction were measured at near barrier energies by online characteristic $γ$ ray detection technique. The complete fusion (CF) cross sections at energies above the Coulomb barrier were found to be suppressed by $\sim$ 26 \% compared to the coupled channel calculations. Reduced fusion cross sections for the present system…
▽ More
The complete and incomplete fusion cross sections for the $^{7}$Li+$^{205}$Tl reaction were measured at near barrier energies by online characteristic $γ$ ray detection technique. The complete fusion (CF) cross sections at energies above the Coulomb barrier were found to be suppressed by $\sim$ 26 \% compared to the coupled channel calculations. Reduced fusion cross sections for the present system at energies normalised to the Coulomb barrier were also found to be systematically lower than those with strongly bound projectiles forming a similar compound nucleus. The suppression observed in CF cross sections is found to be commensurate with the measured total incomplete fusion (ICF) cross sections. In the ICF cross sections, t capture is found to be dominant than $α$ capture at all the measured energies. The systematic study of available CF, ICF and total fusion (TF) data with $^7$Li projectile is performed.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
Contiguous Allocation of Indivisible Items on a Path
Authors:
Yasushi Kawase,
Bodhayan Roy,
Mohammad Azharuddin Sanpui
Abstract:
We study the problem of allocating indivisible items on a path among agents. The objective is to find a fair and efficient allocation in which each agent's bundle forms a contiguous block on the line. We demonstrate that, even when the valuations are binary additive, deciding whether every item can be allocated to an agent who wants it is NP-complete. Consequently, we provide two fixed-parameter t…
▽ More
We study the problem of allocating indivisible items on a path among agents. The objective is to find a fair and efficient allocation in which each agent's bundle forms a contiguous block on the line. We demonstrate that, even when the valuations are binary additive, deciding whether every item can be allocated to an agent who wants it is NP-complete. Consequently, we provide two fixed-parameter tractable (FPT) algorithms for maximizing utilitarian social welfare, with respect to the number of agents and the number of items. Additionally, we present a 2-approximation algorithm for the special case when the valuations are binary additive and the maximum utility is equal to the number of items. Furthermore, we establish that deciding whether the maximum egalitarian social welfare is at least 2 or at most 1 is NP-complete, even when the valuations are binary additive. We also explore the case where the order of the blocks of items allocated to the agents is predetermined. In this case, we show that both maximum utilitarian social welfare and egalitarian social welfare can be computed in polynomial time. However, we determine that checking the existence of an EF1 allocation is NP-complete, even when the valuations are binary additive.
△ Less
Submitted 8 January, 2024;
originally announced January 2024.
-
Dynamical stability and phase space analysis of an Emergent Universe with non-interacting and interacting fluids
Authors:
Bikash Chandra Roy,
Anirban Chanda,
Bikash Chandra Paul
Abstract:
We investigate the evolution of a flat Emergent Universe obtained with a non-linear equation of state (nEoS) in Einstein's general theory of Relativity. The nEoS is equivalent to three different types of barotropic cosmic fluids, which are found from the nEoS parameter. The EU began expanding initially with no interaction among the cosmic fluids. Assuming an interaction that sets in at a time…
▽ More
We investigate the evolution of a flat Emergent Universe obtained with a non-linear equation of state (nEoS) in Einstein's general theory of Relativity. The nEoS is equivalent to three different types of barotropic cosmic fluids, which are found from the nEoS parameter. The EU began expanding initially with no interaction among the cosmic fluids. Assuming an interaction that sets in at a time $t \geq t_i$ in the fluid components, we study the evolution of the EU that leads to the present observed universe. We adopt a dynamical system analysis method to obtain the critical points of the autonomous system for studying the evolution of an EU with or without interaction in fluid components. We also study the stability of critical points and draw the phase portraits. The density parameters and the corresponding cosmological parameters are obtained for both the non-interacting and interacting phases of the evolution dynamics.
△ Less
Submitted 5 January, 2024; v1 submitted 1 January, 2024;
originally announced January 2024.
-
RLHF and IIA: Perverse Incentives
Authors:
Wanqiao Xu,
Shi Dong,
Xiuyuan Lu,
Grace Lam,
Zheng Wen,
Benjamin Van Roy
Abstract:
Existing algorithms for reinforcement learning from human feedback (RLHF) can incentivize responses at odds with preferences because they are based on models that assume independence of irrelevant alternatives (IIA). The perverse incentives induced by IIA hinder innovations on query formats and learning algorithms.
Existing algorithms for reinforcement learning from human feedback (RLHF) can incentivize responses at odds with preferences because they are based on models that assume independence of irrelevant alternatives (IIA). The perverse incentives induced by IIA hinder innovations on query formats and learning algorithms.
△ Less
Submitted 1 February, 2024; v1 submitted 2 December, 2023;
originally announced December 2023.
-
Geometric Tracking Control of a Multi-rotor UAV for Partially Known Trajectories
Authors:
Yogesh Kumar,
S. B. Roy,
P. B. Sujit
Abstract:
This paper presents a trajectory-tracking controller for multi-rotor unmanned aerial vehicles (UAVs) in scenarios where only the desired position and heading are known without the higher-order derivatives. The proposed solution modifies the state-of-the-art geometric controller, effectively addressing challenges related to the non-existence of the desired attitude and ensuring positive total thrus…
▽ More
This paper presents a trajectory-tracking controller for multi-rotor unmanned aerial vehicles (UAVs) in scenarios where only the desired position and heading are known without the higher-order derivatives. The proposed solution modifies the state-of-the-art geometric controller, effectively addressing challenges related to the non-existence of the desired attitude and ensuring positive total thrust input for all time. We tackle the additional challenge of the non-availability of the higher derivatives of the trajectory by introducing novel nonlinear filter structures. We formalize theoretically the effect of these filter structures on the system error dynamics. Subsequently, through a rigorous theoretical analysis, we demonstrate that the proposed controller leads to uniformly ultimately bounded system error dynamics.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
KiD: A Hardware Design Framework Targeting Unified NTT Multiplication for CRYSTALS-Kyber and CRYSTALS-Dilithium on FPGA
Authors:
Suraj Mandal,
Debapriya Basu Roy
Abstract:
Large-degree polynomial multiplication is an integral component of post-quantum secure lattice-based cryptographic algorithms like CRYSTALS-Kyber and Dilithium. The computational complexity of large-degree polynomial multiplication can be reduced significantly through Number Theoretic Transformation (NTT). In this paper, we aim to develop a unified and shared NTT architecture that can support poly…
▽ More
Large-degree polynomial multiplication is an integral component of post-quantum secure lattice-based cryptographic algorithms like CRYSTALS-Kyber and Dilithium. The computational complexity of large-degree polynomial multiplication can be reduced significantly through Number Theoretic Transformation (NTT). In this paper, we aim to develop a unified and shared NTT architecture that can support polynomial multiplication for both CRYSTALS-Kyber and Dilithium. More specifically, in this paper, we have proposed three different unified architectures for NTT multiplication in CRYSTALS-Kyber and Dilithium with varying numbers of configurable radix-2 butterfly units. Additionally, the developed implementation is coupled with a conflict-free memory mapping scheme that allows the architecture to be fully pipelined. We have validated our implementation on Artix-7, Zynq-7000 and Zynq Ultrascale+ FPGAs. Our standalone implementations for NTT multiplication for CRYSTALS-Kyber and Dilithium perform better than the existing works, and our unified architecture shows excellent area and timing performance compared to both standalone and existing unified implementations. This architecture can potentially be used for compact and efficient implementation for CRYSTALS-Kyber and Dilithium.
△ Less
Submitted 8 November, 2023;
originally announced November 2023.
-
Non-Stationary Contextual Bandit Learning via Neural Predictive Ensemble Sampling
Authors:
Zheqing Zhu,
Yueyang Liu,
Xu Kuang,
Benjamin Van Roy
Abstract:
Real-world applications of contextual bandits often exhibit non-stationarity due to seasonality, serendipity, and evolving social trends. While a number of non-stationary contextual bandit learning algorithms have been proposed in the literature, they excessively explore due to a lack of prioritization for information of enduring value, or are designed in ways that do not scale in modern applicati…
▽ More
Real-world applications of contextual bandits often exhibit non-stationarity due to seasonality, serendipity, and evolving social trends. While a number of non-stationary contextual bandit learning algorithms have been proposed in the literature, they excessively explore due to a lack of prioritization for information of enduring value, or are designed in ways that do not scale in modern applications with high-dimensional user-specific features and large action set, or both. In this paper, we introduce a novel non-stationary contextual bandit algorithm that addresses these concerns. It combines a scalable, deep-neural-network-based architecture with a carefully designed exploration mechanism that strategically prioritizes collecting information with the most lasting value in a non-stationary environment. Through empirical evaluations on two real-world recommendation datasets, which exhibit pronounced non-stationarity, we demonstrate that our approach significantly outperforms the state-of-the-art baselines.
△ Less
Submitted 14 October, 2023; v1 submitted 11 October, 2023;
originally announced October 2023.
-
Model non-Hermitian topological operators without skin effect
Authors:
Daniel J. Salib,
Sanjib Kumar Das,
Bitan Roy
Abstract:
We propose a general principle of constructing non-Hermitian (NH) operators for insulating and gapless topological phases in any dimension ($d$) that over an extended NH parameter regime feature real eigenvalues and zero-energy topological boundary modes, when in particular their Hermitian cousins are also topological. However, the topological zero modes disappear when the NH operators accommodate…
▽ More
We propose a general principle of constructing non-Hermitian (NH) operators for insulating and gapless topological phases in any dimension ($d$) that over an extended NH parameter regime feature real eigenvalues and zero-energy topological boundary modes, when in particular their Hermitian cousins are also topological. However, the topological zero modes disappear when the NH operators accommodate complex eigenvalues. These systems are always devoid of NH skin effects, thereby extending the realm of the bulk-boundary correspondence to NH systems in terms of solely the left or right zero-energy boundary localized eigenmodes. We showcase these general and robust outcomes for NH topological insulators in $d=1,2$ and $3$, encompassing their higher-order incarnations, as well as for NH topological Dirac, Weyl and nodal-loop semimetals. Possible realizations of proposed NH topological phases in designer materials, optical lattices and classical metamaterials are highlighted.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
Observational constraints on the Emergent Universe with interacting non-linear fluids and its stability analysis
Authors:
Anirban Chanda,
Bikash Chandra Roy,
Kazuharu Bamba,
Bikash Chandra Paul
Abstract:
We investigate a flat Emergent Universe (EU) with a nonlinear equation of state which is equivalent to three different compositions of fluids. In the EU, initially, the evolution of the universe began with no interaction, but as time evolves, an interaction sets in among the three fluids leading to the observed universe. The characteristic of an EU is that it is a singularity-free universe that ev…
▽ More
We investigate a flat Emergent Universe (EU) with a nonlinear equation of state which is equivalent to three different compositions of fluids. In the EU, initially, the evolution of the universe began with no interaction, but as time evolves, an interaction sets in among the three fluids leading to the observed universe. The characteristic of an EU is that it is a singularity-free universe that evolves with all the basic features of the early evolution. A given nonlinear equation of state parameter permits a universe with three different fluids. We get a universe with dark energy, cosmic string, and radiation domination to begin with, which at a later epoch transits into a universe with three different fluids with matter domination, dark matter, and dark energy for a given interaction strength among the cosmic fluids. Later the model parameters are constrained using the observed Hubble data and Type Ia Supernova (SnIa) data from the Pantheon data set. The classical stability analysis of the model is performed using the square speed of sound. It is found that a theoretically stable cosmological model can be obtained in this case, however, the model becomes classically unstable at the present epoch when the observational bounds on the model parameters are taken into account.
△ Less
Submitted 17 September, 2023;
originally announced September 2023.
-
Quantum Electrodynamics of Non-Hermitian Dirac Fermions
Authors:
Sk Asrap Murshed,
Bitan Roy
Abstract:
We develop an effective quantum electrodynamics for non-Hermitian (NH) Dirac materials interacting with photons. These systems are described by nonspatial symmetry protected Lorentz invariant NH Dirac operators, featuring two velocity parameters $v_{_{\rm H}}$ and $v_{_{\rm NH}}$ associated with the standard Hermitian and a masslike anti-Hermitian Dirac operators, respectively. They display linear…
▽ More
We develop an effective quantum electrodynamics for non-Hermitian (NH) Dirac materials interacting with photons. These systems are described by nonspatial symmetry protected Lorentz invariant NH Dirac operators, featuring two velocity parameters $v_{_{\rm H}}$ and $v_{_{\rm NH}}$ associated with the standard Hermitian and a masslike anti-Hermitian Dirac operators, respectively. They display linear energy-momentum relation, however, in terms of an effective Fermi velocity $v_{_{\rm F}}=\sqrt{v^2_{_{\rm H}}-v^2_{_{\rm NH}}}$ of NH Dirac fermions. Interaction with the fluctuating electromagnetic radiation then gives birth to an emergent Lorentz symmetry in this family of NH Dirac materials in the deep infrared regime, where the system possesses a unique terminal velocity $v_{_{\rm F}}=c$, with $c$ being the speed of light. While in two dimensions such a terminal velocity is set by the speed of light in the free space, dynamic screening in three spatial dimensions permits its nonuniversal values. Manifestations of such an emergent spacetime symmetry on the scale dependence of various physical observables in correlated NH Dirac materials are discussed.
△ Less
Submitted 25 January, 2024; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Reusability Challenges of Scientific Workflows: A Case Study for Galaxy
Authors:
Khairul Alam,
Banani Roy,
Alexander Serebrenik
Abstract:
Scientific workflow has become essential in software engineering because it provides a structured approach to designing, executing, and analyzing scientific experiments. Software developers and researchers have developed hundreds of scientific workflow management systems so scientists in various domains can benefit from them by automating repetitive tasks, enhancing collaboration, and ensuring the…
▽ More
Scientific workflow has become essential in software engineering because it provides a structured approach to designing, executing, and analyzing scientific experiments. Software developers and researchers have developed hundreds of scientific workflow management systems so scientists in various domains can benefit from them by automating repetitive tasks, enhancing collaboration, and ensuring the reproducibility of their results. However, even for expert users, workflow creation is a complex task due to the dramatic growth of tools and data heterogeneity. Thus, scientists attempt to reuse existing workflows shared in workflow repositories. Unfortunately, several challenges prevent scientists from reusing those workflows. In this study, we thus first attempted to identify those reusability challenges. We also offered an action list and evidence-based guidelines to promote the reusability of scientific workflows. Our intensive manual investigation examined the reusability of existing workflows and exposed several challenges. The challenges preventing reusability include tool upgrading, tool support unavailability, design flaws, incomplete workflows, failure to load a workflow, etc. Such challenges and our action list offered guidelines to future workflow composers to create better workflows with enhanced reusability. In the future, we plan to develop a recommender system using reusable workflows that can assist scientists in creating effective and error-free workflows.
△ Less
Submitted 13 September, 2023;
originally announced September 2023.
-
Unveiling the potential of large language models in generating semantic and cross-language clones
Authors:
Palash R. Roy,
Ajmain I. Alam,
Farouq Al-omari,
Banani Roy,
Chanchal K. Roy,
Kevin A. Schneider
Abstract:
Semantic and Cross-language code clone generation may be useful for code reuse, code comprehension, refactoring and benchmarking. OpenAI's GPT model has potential in such clone generation as GPT is used for text generation. When developers copy/paste codes from Stack Overflow (SO) or within a system, there might be inconsistent changes leading to unexpected behaviours. Similarly, if someone posses…
▽ More
Semantic and Cross-language code clone generation may be useful for code reuse, code comprehension, refactoring and benchmarking. OpenAI's GPT model has potential in such clone generation as GPT is used for text generation. When developers copy/paste codes from Stack Overflow (SO) or within a system, there might be inconsistent changes leading to unexpected behaviours. Similarly, if someone possesses a code snippet in a particular programming language but seeks equivalent functionality in a different language, a semantic cross-language code clone generation approach could provide valuable assistance. In this study, using SemanticCloneBench as a vehicle, we evaluated how well the GPT-3 model could help generate semantic and cross-language clone variants for a given fragment.We have comprised a diverse set of code fragments and assessed GPT-3s performance in generating code variants.Through extensive experimentation and analysis, where 9 judges spent 158 hours to validate, we investigate the model's ability to produce accurate and semantically correct variants. Our findings shed light on GPT-3's strengths in code generation, offering insights into the potential applications and challenges of using advanced language models in software development. Our quantitative analysis yields compelling results. In the realm of semantic clones, GPT-3 attains an impressive accuracy of 62.14% and 0.55 BLEU score, achieved through few-shot prompt engineering. Furthermore, the model shines in transcending linguistic confines, boasting an exceptional 91.25% accuracy in generating cross-language clones
△ Less
Submitted 12 September, 2023;
originally announced September 2023.