https://arxiv.org/api/eeaFy6yhy/Pa4kViRlvsbJYghus2026-04-13T06:57:49Z307551015http://arxiv.org/abs/2401.13447v2Symbolic Equation Solving via Reinforcement Learning2024-11-04T19:01:13ZMachine-learning methods are gradually being adopted in a wide variety of social, economic, and scientific contexts, yet they are notorious for struggling with exact mathematics. A typical example is computer algebra, which includes tasks like simplifying mathematical terms, calculating formal derivatives, or finding exact solutions of algebraic equations. Traditional software packages for these purposes are commonly based on a huge database of rules for how a specific operation (e.g., differentiation) transforms a certain term (e.g., sine function) into another one (e.g., cosine function). These rules have usually needed to be discovered and subsequently programmed by humans. Efforts to automate this process by machine-learning approaches are faced with challenges like the singular nature of solutions to mathematical problems, when approximations are unacceptable, as well as hallucination effects leading to flawed reasoning. We propose a novel deep-learning interface involving a reinforcement-learning agent that operates a symbolic stack calculator to explore mathematical relations. By construction, this system is capable of exact transformations and immune to hallucination. Using the paradigmatic example of solving linear equations in symbolic form, we demonstrate how our reinforcement-learning agent autonomously discovers elementary transformation rules and step-by-step solutions.2024-01-24T13:42:24Z15 pages, 5 figures + appendices 21 pages, 2 figures, 16 tablesNeurocomputing 613, 128732 (2024)Lennart DabelowMasahito Ueda10.1016/j.neucom.2024.128732http://arxiv.org/abs/2411.05820v1Guiding Genetic Programming with Graph Neural Networks2024-11-03T20:43:31ZIn evolutionary computation, it is commonly assumed that a search algorithm acquires knowledge about a problem instance by sampling solutions from the search space and evaluating them with a fitness function. This is necessarily inefficient because fitness reveals very little about solutions -- yet they contain more information that can be potentially exploited. To address this observation in genetic programming, we propose EvoNUDGE, which uses a graph neural network to elicit additional knowledge from symbolic regression problems. The network is queried on the problem before an evolutionary run to produce a library of subprograms, which is subsequently used to seed the initial population and bias the actions of search operators. In an extensive experiment on a large number of problem instances, EvoNUDGE is shown to significantly outperform multiple baselines, including the conventional tree-based genetic programming and the purely neural variant of the method.2024-11-03T20:43:31ZFull version of the same-titled paper accepted at GECCO 2024Piotr WyrwińskiKrzysztof Krawiec10.1145/3638530.3654277http://arxiv.org/abs/2411.00431v1Integrating Fuzzy Logic into Deep Symbolic Regression2024-11-01T07:55:17ZCredit card fraud detection is a critical concern for financial institutions, intensified by the rise of contactless payment technologies. While deep learning models offer high accuracy, their lack of explainability poses significant challenges in financial settings. This paper explores the integration of fuzzy logic into Deep Symbolic Regression (DSR) to enhance both performance and explainability in fraud detection. We investigate the effectiveness of different fuzzy logic implications, specifically Łukasiewicz, Gödel, and Product, in handling the complexity and uncertainty of fraud detection datasets. Our analysis suggest that the Łukasiewicz implication achieves the highest F1-score and overall accuracy, while the Product implication offers a favorable balance between performance and explainability. Despite having a performance lower than state-of-the-art (SOTA) models due to information loss in data transformation, our approach provides novelty and insights into into integrating fuzzy logic into DSR for fraud detection, providing a comprehensive comparison between different implications and methods.2024-11-01T07:55:17Z10 pages, 1 figure, published for XAI FIN 24 https://easychair.org/cfp/xaifin2024Wout GerdesErman Acarhttp://arxiv.org/abs/2412.16161v1Antiassociative algebra in R: introducing the evitaicossa package2024-10-31T16:31:26ZIn this short article I introduce the evitaicossa package which provides functionality for antiassociative algebras in the R programming language; it is available on CRAN at https://CRAN.R-project.org/package=evitaicossa.2024-10-31T16:31:26Z6 pagesRobin K. S. Hankinnhttp://arxiv.org/abs/2410.23948v1Transformers to Predict the Applicability of Symbolic Integration Routines2024-10-31T14:03:37ZSymbolic integration is a fundamental problem in mathematics: we consider how machine learning may be used to optimise this task in a Computer Algebra System (CAS). We train transformers that predict whether a particular integration method will be successful, and compare against the existing human-made heuristics (called guards) that perform this task in a leading CAS. We find the transformer can outperform these guards, gaining up to 30% accuracy and 70% precision. We further show that the inference time of the transformer is inconsequential which shows that it is well-suited to include as a guard in a CAS. Furthermore, we use Layer Integrated Gradients to interpret the decisions that the transformer is making. If guided by a subject-matter expert, the technique can explain some of the predictions based on the input tokens, which can lead to further optimisations.2024-10-31T14:03:37Z10 pages, 5 figures, to be published in NeurIPS 2024 MATH-AI WorkshopRashid BarketUzma ShafiqMatthew EnglandJuergen Gerhardhttp://arxiv.org/abs/2410.23763v1Tracer: A Tool for Race Detection in Software Defined Network Models2024-10-31T09:27:23ZSoftware Defined Networking (SDN) has become a new paradigm in computer networking, introducing a decoupled architecture that separates the network into the data plane and the control plane. The control plane acts as the centralized brain, managing configuration updates and network management tasks, while the data plane handles traffic based on the configurations provided by the control plane. Given its asynchronous distributed nature, SDN can experience data races due to message passing between the control and data planes. This paper presents Tracer, a tool designed to automatically detect and explain the occurrence of data races in DyNetKAT SDN models. DyNetKAT is a formal framework for modeling and analyzing SDN behaviors, with robust operational semantics and a complete axiomatization implemented in Maude. Built on NetKAT, a language leveraging Kleene Algebra with Tests to express data plane forwarding behavior, DyNetKAT extends these capabilities by adding primitives for communication between the control and data planes. Tracer exploits the DyNetKAT axiomatization and enables race detection in SDNs based on Lamport vector clocks. Tracer is a publicly available tool.2024-10-31T09:27:23ZIn Proceedings FROM 2024, arXiv:2410.23020EPTCS 410, 2024, pp. 84-98Georgiana CaltaisUniversity of TwenteMahboobeh ZangiabadyUniversity of TwenteErvin ZvirbulisUniversity of Twente10.4204/EPTCS.410.6http://arxiv.org/abs/2410.23762v1Efficient Performance Analysis of Modular Rewritable Petri Nets2024-10-31T09:27:08ZPetri Nets (PN) are extensively used as a robust formalism to model concurrent and distributed systems; however, they encounter difficulties in accurately modeling adaptive systems. To address this issue, we defined rewritable PT nets (RwPT) using Maude, a declarative language that ensures consistent rewriting logic semantics. Recently, we proposed a modular approach that employs algebraic operators to build extensive RwPT models. This methodology uses composite node labeling to maintain hierarchical organization through net rewrites and has been shown to be effective. Once stochastic parameters are integrated into the formalism, we introduce an automated procedure to derive a lumped CTMC from the quotient graph generated by a modular RwPT model. To demonstrate the effectiveness of our method, we present a fault-tolerant manufacturing system as a case study.2024-10-31T09:27:08ZIn Proceedings FROM 2024, arXiv:2410.23020EPTCS 410, 2024, pp. 69-83Lorenzo CapraUniversitá degli Studi di MilanoMarco GribaudoPolitecnico di Milano10.4204/EPTCS.410.5http://arxiv.org/abs/2410.21837v1Accelerated Relaxation Engines for Optimizing to Minimum Energy Path2024-10-29T08:05:02ZIn the last few decades, several novel algorithms have been designed for finding critical points on PES and the minimum energy paths connecting them. This has led to considerably improve our understanding of reaction mechanisms and kinetics of the underlying processes. These methods implicitly rely on computation of energy and forces on the PES, which are usually obtained by computationally demanding wave-function or density-function based ab initio methods. To mitigate the computational cost, efficient optimization algorithms are needed. Herein, we present two new optimization algorithms: adaptively accelerated relaxation engine (AARE), an enhanced molecular dynamics (MD) scheme, and accelerated conjugate-gradient method (Acc-CG), an improved version of the traditional conjugate gradient (CG) algorithm. We show the efficacy of these algorithms for unconstrained optimization on 2D and 4D test functions. Additionally, we also show the efficacy of these algorithms for optimizing an elastic band of images to the minimum energy path on two analytical potentials (LEPS-I and LEPS-II) and for HCN/CNH isomerization reaction. In all cases, we find that the new algorithms outperforms the standard and popular fast inertial relaxation engine (FIRE).2024-10-29T08:05:02ZSandra Liz SimonDepartment of Chemical Engineering, Indian Institute of Technology Kanpur, KanpurNitin KaisthaDepartment of Chemical Engineering, Indian Institute of Technology Kanpur, KanpurVishal AgarwalDepartment of Chemical Engineering, Indian Institute of Technology Kanpur, Kanpurhttp://arxiv.org/abs/2202.03469v7Random Alloy Codes and the Fundamental Limits of Coded Distributed Tensors2024-10-28T20:42:35ZTensors are a fundamental operation in distributed computing, \emph{e.g.,} machine learning, that are commonly distributed into multiple parallel tasks for large datasets. Stragglers and other failures can severely impact the overall completion time. Recent works in coded computing provide a novel strategy to mitigate stragglers with coded tasks, with an objective of minimizing the number of tasks needed to recover the overall result, known as the recovery threshold. However, we demonstrate that this strict combinatorial definition does not directly optimize the probability of failure.
In this paper, we focus on the most likely event and measure the optimality of a coding scheme more directly by its probability of decoding. Our probabilistic approach leads us to a practical construction of random codes for matrix multiplication, i.e., locally random alloy codes, which are optimal with respect to the measures. Furthermore, the probabilistic approach allows us to discover a surprising impossibility theorem about both random and deterministic coded distributed tensors.2022-02-07T19:20:00Z6 pages, preprintPedro Sotohttp://arxiv.org/abs/2401.05821v4Interpretable Concept Bottlenecks to Align Reinforcement Learning Agents2024-10-28T18:38:00ZGoal misalignment, reward sparsity and difficult credit assignment are only a few of the many issues that make it difficult for deep reinforcement learning (RL) agents to learn optimal policies. Unfortunately, the black-box nature of deep neural networks impedes the inclusion of domain experts for inspecting the model and revising suboptimal policies. To this end, we introduce *Successive Concept Bottleneck Agents* (SCoBots), that integrate consecutive concept bottleneck (CB) layers. In contrast to current CB models, SCoBots do not just represent concepts as properties of individual objects, but also as relations between objects which is crucial for many RL tasks. Our experimental results provide evidence of SCoBots' competitive performances, but also of their potential for domain experts to understand and regularize their behavior. Among other things, SCoBots enabled us to identify a previously unknown misalignment problem in the iconic video game, Pong, and resolve it. Overall, SCoBots thus result in more human-aligned RL agents. Our code is available at https://github.com/k4ntz/SCoBots .2024-01-11T10:38:22Z10 of main text, lots of appendicesQuentin DelfosseSebastian SztwiertniaMark RothermelWolfgang StammerKristian Kerstinghttp://arxiv.org/abs/2410.20274v1Library Learning Doesn't: The Curious Case of the Single-Use "Library"2024-10-26T21:05:08ZAdvances in Large Language Models (LLMs) have spurred a wave of LLM library learning systems for mathematical reasoning. These systems aim to learn a reusable library of tools, such as formal Isabelle lemmas or Python programs that are tailored to a family of tasks. Many of these systems are inspired by the human structuring of knowledge into reusable and extendable concepts, but do current methods actually learn reusable libraries of tools?
We study two library learning systems for mathematics which both reported increased accuracy: LEGO-Prover and TroVE. We find that function reuse is extremely infrequent on miniF2F and MATH. Our followup ablation experiments suggest that, rather than reuse, self-correction and self-consistency are the primary drivers of the observed performance gains. Our code and data are available at https://github.com/ikb-a/curious-case2024-10-26T21:05:08Z24 pages, 7 figures. Accepted to the 4th MATH-AI Workshop at NeurIPS'24Ian Berlot-AttwellFrank RudziczXujie Sihttp://arxiv.org/abs/2406.09949v2Neural Concept Binder2024-10-24T12:13:54ZThe challenge in object-based visual reasoning lies in generating concept representations that are both descriptive and distinct. Achieving this in an unsupervised manner requires human users to understand the model's learned concepts and, if necessary, revise incorrect ones. To address this challenge, we introduce the Neural Concept Binder (NCB), a novel framework for deriving both discrete and continuous concept representations, which we refer to as "concept-slot encodings". NCB employs two types of binding: "soft binding", which leverages the recent SysBinder mechanism to obtain object-factor encodings, and subsequent "hard binding", achieved through hierarchical clustering and retrieval-based inference. This enables obtaining expressive, discrete representations from unlabeled images. Moreover, the structured nature of NCB's concept representations allows for intuitive inspection and the straightforward integration of external knowledge, such as human input or insights from other AI models like GPT-4. Additionally, we demonstrate that incorporating the hard binding mechanism preserves model performance while enabling seamless integration into both neural and symbolic modules for complex reasoning tasks. We validate the effectiveness of NCB through evaluations on our newly introduced CLEVR-Sudoku dataset.2024-06-14T11:52:09ZWolfgang StammerAntonia WüstDavid SteinmannKristian Kerstinghttp://arxiv.org/abs/2410.17208v1On Recurrence Relations of Multi-dimensional Sequences2024-10-22T17:28:50ZIn this paper, we present a new algorithm for computing the linear recurrence relations of multi-dimensional sequences. Existing algorithms for computing these relations arise in computational algebra and include constructing structured matrices and computing their kernels. The challenging problem is to reduce the size of the corresponding matrices. In this paper, we show how to convert the problem of computing recurrence relations of multi-dimensional sequences into computing the orthogonal of certain ideals as subvector spaces of the dual module of polynomials. We propose an algorithm using efficient dual module computation algorithms. We present a complexity bound for this algorithm, carry on experiments using Maple implementation, and discuss the cases when using this algorithm is much faster than the existing approaches.2024-10-22T17:28:50ZHamid Rahkooyhttp://arxiv.org/abs/2410.15880v1Integer Polynomial Factorization by Recombination of Real Factors: Re-evaluating an Old Technique in Modern Era2024-10-21T11:01:12ZPolynomial factorization over $ZZ$ is of great historical and practical importance. Currently, the standard technique is to factor the polynomial over finite fields first and then to lift to integers. Factorization over finite fields can be done in polynomial time using Berlekamp or Cantor-Zassenhaus algorithms. Lifting from the finite field to $ZZ$ requires a combinatorial algorithm. The van Hoeij algorithm casts the combinatorial problem as a knapsack-equivalent problem, which is then solved using lattice-reduction (the LLL algorithm) in polynomial time, which is implemented in many computer algebra systems (CAS).
In this paper, we revisit the old idea of starting with factorization over $RR$ instead of a finite field, followed by recombination of the resulting linear and quadratic factors. We transform the problem into an integer subset sum problem, which is then solved using the Horowizt-Sinha algorithm. This algorithm can factor a random integer polynomial of degree $d$ in a time complexity of $O(2^(d slash 4))$.
While the resulting algorithm is exponential, consistent with the integer subset sum problem being in NP, it has a few advantages. First, it is simple and easy to implement. Second, it is almost embarrassingly parallelizable. We demonstrate this by implementing the algorithm in a Graphic Processing Unit (GPU). The resulting code can factor a degree 100 polynomial is a few tenths of a second, comparable to some standard CAS. This shows that it is possible to use current hardware, especially massively parallel systems like GPU, to the benefit of symbolic algebra.2024-10-21T11:01:12Z23 pages, 5 figuresShahriar Iravanianhttp://arxiv.org/abs/2402.10139v2Fast interpolation and multiplication of unbalanced polynomials2024-10-21T09:21:14ZWe consider the classical problems of interpolating a polynomial given a black box for evaluation, and of multiplying two polynomials, in the setting where the bit-lengths of the coefficients may vary widely, so-called unbalanced polynomials. Writing s for the total bit-length and D for the degree, our new algorithms have expected running time $\tilde{O}(s \log D)$, whereas previous methods for (resp.) dense or sparse arithmetic have at least $\tilde{O}(sD)$ or $\tilde{O}(s^2)$ bit complexity.2024-02-15T17:43:22ZISSAC '24: Proceedings of the 2024 International Symposium on Symbolic and Algebraic Computation, pp. 437--446Pascal GiorgiBruno GrenetArmelle Perret du CrayDaniel S. Roche10.1145/3666000.3669717