https://arxiv.org/api/gbcBA6Do8pCGBim6SBn5yalq98M2026-04-12T23:05:32Z307443515http://arxiv.org/abs/2401.12618v2Computation of classical and $v$-adic $L$-series of $t$-motives2025-02-24T09:56:55ZWe design an algorithm for computing the $L$-series associated to an Anderson $t$-motives, exhibiting quasilinear complexity with respect to the target precision. Based on experiments, we conjecture that the order of vanishing at $T=1$ of the $v$-adic $L$-series of a given Anderson $t$-motive with good reduction does not depend on the finite place $v$.2024-01-23T10:16:47ZResearch in Number Theory, 2025.Xavier CarusoIMB, CANARIQuentin GazdaCMLS10.1007/s40993-024-00588-5http://arxiv.org/abs/2404.13042v2Reduction systems and degree bounds for integration2025-02-18T18:10:26ZIn symbolic integration, the Risch--Norman algorithm aims to find closed forms of elementary integrals over differential fields by an ansatz for the integral, which usually is based on heuristic degree bounds. Norman presented an approach that avoids degree bounds and only relies on the completion of reduction systems. We give a formalization of his approach and we develop a refined completion process, which terminates in more instances. In some situations when the completion process does not terminate, one can detect patterns allowing to still describe infinite reduction systems that are complete. We present such infinite systems for the fields generated by Airy functions and complete elliptic integrals, respectively. Moreover, we show how complete reduction systems can be used to find rigorous degree bounds. In particular, we give a general formula for weighted degree bounds and we apply it to find tight bounds in the above examples.2024-04-19T17:54:58Z45 pages; accepted manuscriptJournal of Symbolic Computation 130 (2025), Article 102432Hao DuClemens G. Raab10.1016/j.jsc.2025.102432http://arxiv.org/abs/2502.11606v1Modular Algorithms For Computing Gröbner Bases in Free Algebras2025-02-17T09:47:23ZIn this work, we extend modular techniques for computing Gröbner bases involving rational coefficients to (two-sided) ideals in free algebras. We show that the infinite nature of Gröbner bases in this setting renders the classical approach infeasible. Therefore, we propose a new method that relies on signature-based algorithms. Using the data of signatures, we can overcome the limitations of the classical approach and obtain a practical modular algorithm. Moreover, the final verification test in this setting is both more general and more efficient than the classical one. We provide a first implementation of our modular algorithm in SageMath. Initial experiments show that the new algorithm can yield significant speedups over the non-modular approach.2025-02-17T09:47:23Z27 pages, including 3 pages appendixClemens HofstadlerViktor Levandovskyyhttp://arxiv.org/abs/2502.11269v1Unlocking the Potential of Generative AI through Neuro-Symbolic Architectures: Benefits and Limitations2025-02-16T21:06:33ZNeuro-symbolic artificial intelligence (NSAI) represents a transformative approach in artificial intelligence (AI) by combining deep learning's ability to handle large-scale and unstructured data with the structured reasoning of symbolic methods. By leveraging their complementary strengths, NSAI enhances generalization, reasoning, and scalability while addressing key challenges such as transparency and data efficiency. This paper systematically studies diverse NSAI architectures, highlighting their unique approaches to integrating neural and symbolic components. It examines the alignment of contemporary AI techniques such as retrieval-augmented generation, graph neural networks, reinforcement learning, and multi-agent systems with NSAI paradigms. This study then evaluates these architectures against comprehensive set of criteria, including generalization, reasoning capabilities, transferability, and interpretability, therefore providing a comparative analysis of their respective strengths and limitations. Notably, the Neuro > Symbolic < Neuro model consistently outperforms its counterparts across all evaluation metrics. This result aligns with state-of-the-art research that highlight the efficacy of such architectures in harnessing advanced technologies like multi-agent systems.2025-02-16T21:06:33Z54 pages, 7 figuresOualid BougzimeSamir JabbarChristophe CruzFrédéric Demolyhttp://arxiv.org/abs/2502.10005v1Discovering Polynomial and Quadratic Structure in Nonlinear Ordinary Differential Equations2025-02-14T08:39:30ZDynamical systems with quadratic or polynomial drift exhibit complex dynamics, yet compared to nonlinear systems in general form, are often easier to analyze, simulate, control, and learn. Results going back over a century have shown that the majority of nonpolynomial nonlinear systems can be recast in polynomial form, and their degree can be reduced further to quadratic. This process of polynomialization/quadratization reveals new variables (in most cases, additional variables have to be added to achieve this) in which the system dynamics adhere to that specific form, which leads us to discover new structures of a model. This chapter summarizes the state of the art for the discovery of polynomial and quadratic representations of finite-dimensional dynamical systems. We review known existence results, discuss the two prevalent algorithms for automating the discovery process, and give examples in form of a single-layer neural network and a phenomenological model of cell signaling.2025-02-14T08:39:30ZSurvey paperBoris KramerGleb Pogudinhttp://arxiv.org/abs/2502.09217v1Modular Stochastic Rewritable Petri Nets2025-02-13T11:49:33ZPetri Nets (PN) are widely used for modeling concurrent and distributed systems, but face challenges in modeling adaptive systems. To address this, we have formalized "rewritable" PT nets (RwPT) using Maude, a declarative language with sound rewriting logic semantics. Recently, we introduced a modular approach that utilizes algebraic operators to construct large RwPT models. This technique employs composite node labeling to outline symmetries in hierarchical organization, preserved through net rewrites. Once stochastic parameters are added to the formalism, we present an automated process to derive a lumped CTMC from the quotient graph generated by an RwPT.2025-02-13T11:49:33ZIn Proceedings ICLP 2024, arXiv:2502.08453EPTCS 416, 2025, pp. 128-134Lorenzo Capra10.4204/EPTCS.416.11http://arxiv.org/abs/2502.09206v1Efficient OWL2QL Meta-reasoning Using ASP-based Hybrid Knowledge Bases2025-02-13T11:46:10ZMetamodeling refers to scenarios in ontologies in which classes and roles can be members of classes or occur in roles. This is a desirable modelling feature in several applications, but allowing it without restrictions is problematic for several reasons, mainly because it causes undecidability. Therefore, practical languages either forbid metamodeling explicitly or treat occurrences of classes as instances to be semantically different from other occurrences, thereby not allowing metamodeling semantically. Several extensions have been proposed to provide metamodeling to some extent. Building on earlier work that reduces metamodeling query answering to Datalog query answering, recently reductions to query answering over hybrid knowledge bases were proposed with the aim of using the Datalog transformation only where necessary. Preliminary work showed that the approach works, but the hoped-for performance improvements were not observed yet. In this work we expand on this body of work by improving the theoretical basis of the reductions and by using alternative tools that show competitive performance.2025-02-13T11:46:10ZIn Proceedings ICLP 2024, arXiv:2502.08453EPTCS 416, 2025, pp. 188-200Haya Majid QureshiUniversity of KlagenfurtWolfgang FaberUniversity of Klagenfurt10.4204/EPTCS.416.17http://arxiv.org/abs/2502.08210v1A new method for reducing algebraic programs to polynomial programs2025-02-12T08:40:26ZWe consider a generalization of polynomial programs: algebraic programs, which are optimization or feasibility problems with algebraic objectives or constraints. Algebraic functions are defined as zeros of multivariate polynomials. They are a rich set of functions that includes polynomials themselves, but also ratios and radicals, and finite compositions thereof. When an algebraic program is given in terms of radical expressions, a straightforward way of reformulating into a polynomial program is to introduce a new variable for each distinct radical that appears. Hence, the rich theory and algorithms for polynomial programs, including satisfiability via cylindrical algebraic decomposition, infeasibility certificates via Positivstellensatz theorems, and optimization with sum-of-squares programming directly apply to algebraic programs. We propose a different reformulation, that in many cases introduces significantly fewer new variables, and thus produces polynomial programs that are easier to solve. First, we exhibit an algorithm that finds a defining polynomial of an algebraic function given as a radical expression. As a polynomial does not in general define a unique algebraic function, additional constraints need to be added that isolate the algebraic function from others defined by the same polynomial. Using results from real algebraic geometry, we develop an algorithm that generates polynomial inequalities that isolate an algebraic function. This allows us to reformulate an algebraic program into a polynomial one, by introducing only a single new variable for each algebraic function. On modified versions of classic optimization benchmarks with added algebraic terms, our formulation achieves speedups of up to 50x compared to the straightforward reformulation.2025-02-12T08:40:26Z18 pages, 2 figures, 2 tablesMuhammad MaazAdam W. Strzebońskihttp://arxiv.org/abs/2502.02917v2Interactive Symbolic Regression through Offline Reinforcement Learning: A Co-Design Framework2025-02-11T00:20:37ZSymbolic Regression (SR) holds great potential for uncovering underlying mathematical and physical relationships from observed data. However, the vast combinatorial space of possible expressions poses significant challenges for both online search methods and pre-trained transformer models. Additionally, current state-of-the-art approaches typically do not consider the integration of domain experts' prior knowledge and do not support iterative interactions with the model during the equation discovery process. To address these challenges, we propose the Symbolic Q-network (Sym-Q), an advanced interactive framework for large-scale symbolic regression. Unlike previous large-scale transformer-based SR approaches, Sym-Q leverages reinforcement learning without relying on a transformer-based decoder. This formulation allows the agent to learn through offline reinforcement learning using any type of tree encoder, enabling more efficient training and inference. Furthermore, we propose a co-design mechanism, where the reinforcement learning-based Sym-Q facilitates effective interaction with domain experts at any stage of the equation discovery process. Users can dynamically modify generated nodes of the expression, collaborating with the agent to tailor the mathematical expression to best fit the problem and align with the assumed physical laws, particularly when there is prior partial knowledge of the expected behavior. Our experiments demonstrate that the pre-trained Sym-Q surpasses existing SR algorithms on the challenging SSDNC benchmark. Moreover, we experimentally show on real-world cases that its performance can be further enhanced by the interactive co-design mechanism, with Sym-Q achieving greater performance gains than other state-of-the-art models. Our reproducible code is available at https://github.com/EPFL-IMOS/Sym-Q.2025-02-05T06:26:49ZThis work should not be a new submission but instead should be an update to my existing article, arXiv:2402.05306Yuan TianWenqi ZhouMichele ViscioneHao DongDavid KammerOlga Finkhttp://arxiv.org/abs/2412.14390v2Using SimTeEx to simplify polynomial expressions with tensors2025-02-10T18:34:34ZComputations with tensors are ubiquitous in fundamental physics, and so is the usage of Einstein's dummy index convention for the contraction of indices. For instance, $T_{ia}U_{aj}$ is readily recognized as the same as $T_{ib}U_{bj}$, but a computer does not know that T[i,a]U[a,j] is equal to T[i,b]U[b,j]. Furthermore, tensors may have symmetries which can be used to simply expressions: if $U_{ij}$ is antisymmetric, then $αT_{ia}U_{aj}+βT_{ib}U_{jb}=\left(α-β\right)T_{ia}U_{aj}$. The fact that tensors can have elaborate symmetries, together with the problem of dummy indices, makes it complicated to simplify polynomial expressions with tensors. In this work I will present an algorithm for doing so, which was implemented in the Mathematica package SimTeEx (Simplify Tensor Expressions). It can handle any kind of tensor symmetry.2024-12-18T22:49:22ZCorrected the symmetry of the kappa tensor mentioned on page 2. 27 pagesRenato M. Fonsecahttp://arxiv.org/abs/2502.06264v1Flip Graphs for Polynomial Multiplication2025-02-10T08:58:11ZFlip graphs were recently introduced in order to discover new matrix multiplication methods for matrix sizes. The technique applies to other tensors as well. In this paper, we explore how it performs for polynomial multiplication.2025-02-10T08:58:11ZShaoshi ChenManuel Kauershttp://arxiv.org/abs/2502.06893v1A New Hybrid Intelligent Approach for Multimodal Detection of Suspected Disinformation on TikTok2025-02-09T12:37:48ZIn the context of the rapid dissemination of multimedia content, identifying disinformation on social media platforms such as TikTok represents a significant challenge. This study introduces a hybrid framework that combines the computational power of deep learning with the interpretability of fuzzy logic to detect suspected disinformation in TikTok videos. The methodology is comprised of two core components: a multimodal feature analyser that extracts and evaluates data from text, audio, and video; and a multimodal disinformation detector based on fuzzy logic. These systems operate in conjunction to evaluate the suspicion of spreading disinformation, drawing on human behavioural cues such as body language, speech patterns, and text coherence. Two experiments were conducted: one focusing on context-specific disinformation and the other on the scalability of the model across broader topics. For each video evaluated, high-quality, comprehensive, well-structured reports are generated, providing a detailed view of the disinformation behaviours.2025-02-09T12:37:48ZMultimedia Tools and Applications 85 (2026) 37Jared D. T. Guerrero-SosaAndres Montoro-MontarrosoFrancisco P. RomeroJesus Serrano-GuerreroJose A. Olivas10.1007/s11042-026-21304-8http://arxiv.org/abs/2502.04914v1On the Number of Real Types of Univariate Polynomials2025-02-07T13:31:50ZThe real type of a finite family of univariate polynomials characterizes the combined sign behavior of the polynomials over the real line. We derive an explicit formula for the number of real types subject to given degree bounds. For the special case of a single polynomial we present a closed-form expression involving Fibonacci numbers. This allows us to precisely describe the asymptotic growth of the number of real types as the degree increases, in terms of the golden ratio.2025-02-07T13:31:50ZNicolas FaroßThomas Sturmhttp://arxiv.org/abs/2502.04736v1Explorations on the number of realizations of minimally rigid graphs2025-02-07T08:08:10ZRigid graphs have only finitely many realizations. In the recent years significant progress was made in computing the number of such realizations. With this progress it was also possible for the first time to do computations on large sets of graphs. In this paper we show what we can conclude from the data we got from these computations. This includes new lower bounds on the maximal realization count for a given number of vertices, upper bounds for the minimal realization count in higher dimensions and effects of rigidity preserving construction rules on the realization number. In all cases we give certificate graphs which prove the respective results.2025-02-07T08:08:10ZGeorg Graseggerhttp://arxiv.org/abs/2502.01503v2Sea-cret Agents: Maritime Abduction for Region Generation to Expose Dark Vessel Trajectories2025-02-06T23:01:55ZBad actors in the maritime industry engage in illegal behaviors after disabling their vessel's automatic identification system (AIS) - which makes finding such vessels difficult for analysts. Machine learning approaches only succeed in identifying the locations of these ``dark vessels'' in the immediate future. This work leverages ideas from the literature on abductive inference applied to locating adversarial agents to solve the problem. Specifically, we combine concepts from abduction, logic programming, and rule learning to create an efficient method that approaches full recall of dark vessels while requiring less search area than machine learning methods. We provide a logic-based paradigm for reasoning about maritime vessels, an abductive inference query method, an automatically extracted rule-based behavior model methodology, and a thorough suite of experiments.2025-02-03T16:36:26ZAccepted to 24th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2025)Divyagna BavikadiNathaniel LeePaulo ShakarianChad Parvis