https://arxiv.org/api/pPwIQO3rxum26DGLsjXLDjm0cv02026-04-09T08:19:39Z307410515http://arxiv.org/abs/2601.19982v1FORM Version 5.02026-01-27T19:00:02ZWe present FORM 5, a major release of the symbolic-manipulation system FORM. Version 5 introduces an integrated diagram generator, based on the GRACE graph-generator, to produce Feynman diagrams directly from FORM scripts. This release also adds support for arbitrary precision floating point coefficients, together with statements for the numerical evaluation of common mathematical functions as well as multiple zeta values and Euler sums. In addition, FORM 5 provides an interface to the FLINT library, offering substantially faster polynomial arithmetic. Various further functions and commands have been added alongside these major features, as well as performance improvements for TFORM and improved compression of FORM's temporary files. Compatibility with the previous release, FORM 4.3.1, is retained except where prior behaviour contradicted the manual or was experimental.2026-01-27T19:00:02Z22 pagesJ. DaviesT. KanekoC. MarinissenT. UedaJ. A. M. Vermaserenhttp://arxiv.org/abs/2507.13550v2GOFAI meets Generative AI: Development of Expert Systems by means of Large Language Models2026-01-27T07:35:24ZThe development of large language models (LLMs) has successfully transformed knowledge-based systems such as open domain question nswering, which can automatically produce vast amounts of seemingly coherent information. Yet, those models have several disadvantages like hallucinations or confident generation of incorrect or unverifiable facts. In this paper, we introduce a new approach to the development of expert systems using LLMs in a controlled and transparent way. By limiting the domain and employing a well-structured prompt-based extraction approach, we produce a symbolic representation of knowledge in Prolog, which can be validated and corrected by human experts. This approach also guarantees interpretability, scalability and reliability of the developed expert systems. Via quantitative and qualitative experiments with Claude Sonnet 3.7 and GPT-4.1, we show strong adherence to facts and semantic coherence on our generated knowledge bases. We present a transparent hybrid solution that combines the recall capacity of LLMs with the precision of symbolic systems, thereby laying the foundation for dependable AI applications in sensitive domains.2025-07-17T21:57:37ZEduardo C. Garrido-MerchánCristina Puentehttp://arxiv.org/abs/2510.10718v2HYPERDOA: Robust and Efficient DoA Estimation using Hyperdimensional Computing2026-01-27T04:31:31ZDirection of Arrival (DoA) estimation techniques face a critical trade-off, as classical methods often lack accuracy in challenging, low signal-to-noise ratio (SNR) conditions, while modern deep learning approaches are too energy-intensive and opaque for resource-constrained, safety-critical systems. We introduce HYPERDOA, a novel estimator leveraging Hyperdimensional Computing (HDC). The framework introduces two distinct feature extraction strategies -- Mean Spatial-Lag Autocorrelation and Spatial Smoothing -- for its HDC pipeline, and then reframes DoA estimation as a pattern recognition problem. This approach leverages HDC's inherent robustness to noise and its transparent algebraic operations to bypass the expensive matrix decompositions and "black-box" nature of classical and deep learning methods, respectively. Our evaluation demonstrates that HYPERDOA achieves ~35.39% higher accuracy than state-of-the-art methods in low-SNR, coherent-source scenarios. Crucially, it also consumes ~93% less energy than competing neural baselines on an embedded NVIDIA Jetson Xavier NX platform. This dual advantage in accuracy and efficiency establishes HYPERDOA as a robust and viable solution for mission-critical applications on edge devices.2025-10-12T17:42:01Z3 figures, 5 pages. Paper accepted at ICASSP 2026. Authors' version posted for personal use and not for redistributionRajat BhattacharjyaWoohyeok ParkArnab SarkarHyunwoo OhMohsen ImaniNikil Dutthttp://arxiv.org/abs/2408.00750v3Algebraic power series and their automatic complexity modulo prime powers2026-01-26T21:35:08ZChristol and, independently, Denef and Lipshitz showed that an algebraic sequence of $p$-adic integers (or integers) is $p$-automatic when reduced modulo $p^α$. Previously, the best known bound on the minimal automaton size for such a sequence was doubly exponential in $α$. Under mild conditions, we improve this bound to the order of $p^{α^3 h d}$, where $h$ and $d$ are the height and degree of the minimal annihilating polynomial modulo $p$. We achieve this bound by showing that all states in the automaton are naturally represented in a new numeration system. This significantly restricts the set of possible states. Since our approach embeds algebraic sequences as diagonals of rational functions, we also obtain bounds more generally for diagonals of multivariate rational functions.2024-08-01T17:52:24Z50 pages, 1 figure, 2 tables; includes new Section 10 on non-Furstenberg seriesEric RowlandReem Yassawihttp://arxiv.org/abs/2601.17422v1Faster modular composition using two relation matrices2026-01-24T11:44:19ZModular composition is the problem of computing the composition of two univariate polynomials modulo a third one. For a long time, the fastest algebraic algorithm for this problem was that of Brent and Kung (1978). Recently, we improved Brent and Kung's algorithm by computing and using a polynomial matrix that encodes a certain basis of algebraic relations between the polynomials. This is further improved here by making use of two polynomial matrices of smaller dimension. Under genericity assumptions on the input, this results in an algorithm using $\tilde{O}(n^{(ω+3)/4})$ arithmetic operations in the base field, where $ω$ is the exponent of matrix multiplication. With naive matrix multiplication, this is $\tilde{O}(n^{3/2})$, while with the best currently known exponent $ω$ this is $O(n^{1.343})$, improving upon the previously most efficient algorithms.2026-01-24T11:44:19Z10 pages (2 column format)Vincent NeigerBruno SalvyÉric SchostGilles Villardhttp://arxiv.org/abs/2412.11139v4ViSymRe: Vision Multimodal Symbolic Regression2026-01-23T14:32:51ZExtracting interpretable equations from observational datasets to describe complex natural phenomena is one of the core goals of artificial intelligence. This field is known as symbolic regression (SR). In recent years, Transformer-based paradigms have become a new trend in SR, addressing the well-known problem of inefficient search. However, the modal heterogeneity between datasets and equations often hinders the convergence and generalization of these models. In this paper, we propose ViSymRe, a Vision Symbolic Regression framework, to explore the positive role of visual modality in enhancing the performance of Transformer-based SR paradigms. To overcome the challenge where the visual SR model is untrainable in high-dimensional scenarios, we present Multi-View Random Slicing (MVRS). By projecting multivariate equations into 2-D space using random affine transformations, MVRS avoids common defects in high-dimensional visualization, such as variable degradation, non-linear interaction missing, and exponentially increasing sampling complexity, enabling ViSymRe to be trained with low computational costs. To support dataset-only deployment of ViSymRe, we design a dual-vision pipeline architecture based on generative techniques, which reconstructs visual features directly from the datasets via an auxiliary Visual Decoder and automatically suppresses the attention weights of reconstruction noise through a proposed Biased Cross-Attention feature fusion module, ensuring that subsequent processes are not affected by noisy modalities. Ablation studies demonstrate the positive contribution of visual modality to improving model convergence level and enhancing various SR metrics. Furthermore, evaluation results on mainstream benchmarks indicate that ViSymRe achieves competitive performance compared to baselines, particularly in low-complexity and rapid-inference scenarios.2024-12-15T10:05:31ZDa LiJunping YinJin XuXinxin LiJuan Zhanghttp://arxiv.org/abs/2601.16366v1Analyzing Neural Network Information Flow Using Differential Geometry2026-01-22T23:35:10ZThis paper provides a fresh view of the neural network (NN) data flow problem, i.e., identifying the NN connections that are most important for the performance of the full model, through the lens of graph theory. Understanding the NN data flow provides a tool for symbolic NN analysis, e.g.,~robustness analysis or model repair. Unlike the standard approach to NN data flow analysis, which is based on information theory, we employ the notion of graph curvature, specifically Ollivier-Ricci curvature (ORC). The ORC has been successfully used to identify important graph edges in various domains such as road traffic analysis, biological and social networks. In particular, edges with negative ORC are considered bottlenecks and as such are critical to the graph's overall connectivity, whereas positive-ORC edges are not essential. We use this intuition for the case of NNs as well: we 1)~construct a graph induced by the NN structure and introduce the notion of neural curvature (NC) based on the ORC; 2)~calculate curvatures based on activation patterns for a set of input examples; 3)~aim to demonstrate that NC can indeed be used to rank edges according to their importance for the overall NN functionality. We evaluate our method through pruning experiments and show that removing negative-ORC edges quickly degrades the overall NN performance, whereas positive-ORC edges have little impact. The proposed method is evaluated on a variety of models trained on three image datasets, namely MNIST, CIFAR-10 and CIFAR-100. The results indicate that our method can identify a larger number of unimportant edges as compared to state-of-the-art pruning methods.2026-01-22T23:35:10ZShuhang TanJayson SiaPaul BogdanRadoslav Ivanovhttp://arxiv.org/abs/2007.14729v4Formal Power Series on Algebraic Cryptanalysis2026-01-21T12:36:48ZIn the complexity estimation for an attack that reduces a cryptosystem to solving a system of polynomial equations, the degree of regularity and an upper bound of the first fall degree are often used in cryptanalysis. While the degree of regularity can be easily computed using a univariate formal power series under the semi-regularity assumption, determining an upper bound of the first fall degree requires investigating the concrete syzygies of an input system. In this paper, we investigate an upper bound of the first fall degree for a polynomial system over a sufficiently large field. In this case, we prove that the first fall degree of a non-semi-regular system is bounded above by the degree of regularity, and that the first fall degree of a multi-graded polynomial system is bounded above by a certain value determined from a multivariate formal power series. Moreover, we provide a theoretical assumption for computing the first fall degree of a polynomial system over a sufficiently large field.2020-07-29T10:36:20ZShuhei Nakamurahttp://arxiv.org/abs/2601.14920v1Diagonals and algebraicity modulo $p$: a sharper degree bound2026-01-21T12:09:26ZIn 1984, Deligne proved that for any prime number $p$, the reduction modulo $p$ of the diagonal of a multivariate algebraic power series with integer coefficients is algebraic over the field of rational functions with coefficients in $\mathbb F_p$. Moreover, he conjectured that the algebraic degrees $d_p$ of these functions should grow at most polynomially in $p$. In this article, we provide a new and elementary proof of Deligne's theorem, which yields the first general polynomial bound on $d_p$ with an explicit and reasonable degree.2026-01-21T12:09:26ZTo appear in the Annales scientifiques de l'{É}cole normale sup{é}rieure. A longer version of this work is available at arXiv:2306.02640Boris AdamczewskiUCBL, CIRM, CNRSAlin BostanPolSysXavier CarusoCNRS, IMBhttp://arxiv.org/abs/2306.12268v3A Finite Expression Method for Solving High-Dimensional Committor Problems2026-01-21T01:30:31ZTransition path theory (TPT) is a mathematical framework for quantifying rare transition events between a pair of selected metastable states $A$ and $B$. Central to TPT is the committor function, which describes the probability to hit the metastable state $B$ prior to $A$ from any given starting point of the phase space. Once the committor is computed, the transition channels and the transition rate can be readily found. The committor is the solution to the backward Kolmogorov equation with appropriate boundary conditions. However, solving it is a challenging task in high dimensions due to the need to mesh a whole region of the ambient space. In this work, we explore the finite expression method (FEX, Liang and Yang (2022)) as a tool for computing the committor. FEX approximates the committor by an algebraic expression involving a fixed finite number of nonlinear functions and binary arithmetic operations. The optimal nonlinear functions, the binary operations, and the numerical coefficients in the expression template are found via reinforcement learning. The FEX-based committor solver is tested on several high-dimensional benchmark problems. It gives comparable or better results than neural network-based solvers. Most importantly, FEX is capable of correctly identifying the algebraic structure of the solution which allows one to reduce the committor problem to a low-dimensional one and find the committor with any desired accuracy.2023-06-21T13:43:59ZZezheng SongMaria K. CameronHaizhao Yanghttp://arxiv.org/abs/2401.03092v3A Fast Algorithm for the Finite Expression Method in Learning Dynamics on Complex Networks2026-01-21T01:18:57ZComplex network data is prevalent in various real-world domains, including physical, technological, and biological systems. Despite this prevalence, predicting trends and understanding behavioral patterns in complex systems remain challenging due to poorly understood underlying mechanisms. While data-driven methods have advanced in uncovering governing equations from time series data, efforts to extract physical laws from network data are limited and often struggle with incomplete or noisy data. Additionally, they suffer from computational costs on network data, making it difficult to scale to real-world networks. To address these challenges, we introduce a novel approach called the Finite Expression Method (FEX) and its fast algorithm for learning dynamics on complex networks. FEX represents dynamics on complex networks using binary trees composed of finite mathematical operators. The nodes within these trees are trained through a combinatorial optimization process guided by reinforcement learning techniques. This unique configuration allows FEX to capture complex dynamics with minimal prior knowledge of the system and a small dictionary of mathematical operators. We also integrate a fast, stochastic algorithm into FEX, reducing the computational complexity from $O(N^2)$ to $O(N)$. Our extensive numerical experiments demonstrate that FEX excels in accurately identifying dynamics across diverse network topologies and dynamic behaviors.2024-01-05T23:47:37ZZezheng SongChunmei WangHaizhao Yanghttp://arxiv.org/abs/2601.14491v1Certified Real Eigenvalue Location2026-01-20T21:26:51ZThe location of real eigenvalues provides critical insights into the stability and resonance properties of physical systems. This paper presents a hybrid symbolic numeric approach for certified real eigenvalue localization. Our method combines Gershgorin disk analysis with Hermite matrix certification to compute certified intervals that enclose the real eigenvalues. These intervals can be further refined through bisectionlike procedures to achieve the desired precision. The proposed approach delivers reliable interval certifications while preserving computational efficiency. The effectiveness of the framework is demonstrated through a concise, fully worked computational example.2026-01-20T21:26:51ZBaran SolmazTulay Ayyildizhttp://arxiv.org/abs/2502.00503v4A Novel Approach to the Initial Value Problem with a complete validated algorithm2026-01-20T16:59:16ZWe consider the first order autonomous differential equation (ODE) ${\bf x}'={\bf f}({\bf x})$ where ${\bf f}: {\mathbb R}^n\to{\mathbb R}^n$ is locally Lipschitz. For ${\bf x}_0\in{\mathbb R}^n$ and $h>0$, the initial value problem (IVP) for $({\bf f},{\bf x}_0,h)$ is to determine if there is a unique solution, i.e., a function ${\bf x}:[0,h]\to{\mathbb R}^n$ that satisfies the ODE with ${\bf x}(0)={\bf x}_0$. Write ${\bf x} ={\tt IVP}_{\bf f}({\bf x}_0,h)$ for this unique solution.
We pose a corresponding computational problem, called the End Enclosure Problem: given $({\bf f},B_0,h,\varepsilon_0)$ where $B_0\subseteq{\mathbb R}^n$ is a box and $\varepsilon_0>0$, to compute a pair of non-empty boxes $(\underline{B}_0,B_1)$ such that $\underline{B}_0\subseteq B_0$, width of $B_1$ is $<\varepsilon_0$, and for all ${\bf x}_0\in \underline{B}_0$, ${\bf x}={\tt IVP}_{\bf f}({\bf x}_0,h)$ exists and ${\bf x}(h)\in B_1$. We provide a complete validated algorithm for this problem. Under the assumption (promise) that for all ${\bf x}_0\in B_0$, ${\tt IVP}_{\bf f}({\bf x}_0,h)$ exists, we prove the halting of our algorithm. This is the first halting algorithm for IVP problems in such a general setting.
We also introduce novel techniques for subroutines such as StepA and StepB, and a scaffold datastructure to support our End Enclosure algorithm. Among the techniques are new ways refine full- and end-enclosures based on a {\bf radical transform} combined with logarithm norms. Our preliminary implementation and experiments show considerable promise, and compare well with current validated algorithms.2025-02-01T17:50:07Z36 pages, 4 figuresBingwei ZhangChee Yaphttp://arxiv.org/abs/2601.13731v1Breaking the Data Barrier in Learning Symbolic Computation: A Case Study on Variable Ordering Suggestion for Cylindrical Algebraic Decomposition2026-01-20T08:40:35ZSymbolic computation, powered by modern computer algebra systems, has important applications in mathematical reasoning through exact deep computations. The efficiency of symbolic computation is largely constrained by such deep computations in high dimension. This creates a fundamental barrier on labelled data acquisition if leveraging supervised deep learning to accelerate symbolic computation. Cylindrical algebraic decomposition (CAD) is a pillar symbolic computation method for reasoning with first-order logic formulas over reals with many applications in formal verification and automatic theorem proving. Variable orderings have a huge impact on its efficiency. Impeded by the difficulty to acquire abundant labelled data, existing learning-based approaches are only competitive with the best expert-based heuristics. In this work, we address this problem by designing a series of intimately connected tasks for which a large amount of annotated data can be easily obtained. We pre-train a Transformer model with these data and then fine-tune it on the datasets for CAD ordering. Experiments on publicly available CAD ordering datasets show that on average the orderings predicted by the new model are significantly better than those suggested by the best heuristic methods.2026-01-20T08:40:35ZRui-Juan JingYuegang ZhaoChangbo Chenhttp://arxiv.org/abs/2601.08382v2A Qualitative Model to Reason about Object Rotations (QOR) applied to solve the Cube Comparison Test (CCT)2026-01-19T10:51:45ZThis paper presents a Qualitative model for Reasoning about Object Rotations (QOR) which is applied to solve the Cube Comparison Test (CCT) by Ekstrom et al. (1976). A conceptual neighborhood graph relating the Rotation movement to the Location change and the Orientation change (CNGRLO) of the features on the cube sides has been built and it produces composition tables to calculate inferences for reasoning about rotations.2026-01-13T09:43:43ZZoe Falomir