University of Primorska
The 'keyword method' is an effective technique for learning vocabulary of a foreign language. It involves creating a memorable visual link between what a word means and what its pronunciation in a foreign language sounds like in the learner's native language. However, these memorable visual links remain implicit in the people's mind and are not easy to remember for a large set of words. To enhance the memorisation and recall of the vocabulary, we developed an application that combines the keyword method with text-to-image generators to externalise the memorable visual links into visuals. These visuals represent additional stimuli during the memorisation process. To explore the effectiveness of this approach we first run a pilot study to investigate how difficult it is to externalise the descriptions of mental visualisations of memorable links, by asking participants to write them down. We used these descriptions as prompts for text-to-image generator (DALL-E2) to convert them into images and asked participants to select their favourites. Next, we compared different text-to-image generators (DALL-E2, Midjourney, Stable and Latent Diffusion) to evaluate the perceived quality of the generated images by each. Despite heterogeneous results, participants mostly preferred images generated by DALL-E2, which was used also for the final study. In this study, we investigated whether providing such images enhances the retention of vocabulary being learned, compared to the keyword method only. Our results indicate that people did not encounter difficulties describing their visualisations of memorable links and that providing corresponding images significantly improves memory retention.
An odd independent set SS in a graph G=(V,E)G=(V,E) is an independent set of vertices such that, for every vertex vVSv \in V \setminus S, either N(v)S=N(v) \cap S = \emptyset or N(v)S1|N(v) \cap S| \equiv 1 (mod 2), where N(v)N(v) stands for the open neighborhood of vv. The largest cardinality of odd independent sets of a graph GG, denoted αod(G)\alpha_{od}(G), is called the odd independence number of GG. This new parameter is a natural companion to the recently introduced strong odd chromatic number. A proper vertex coloring of a graph GG is a strong odd coloring if, for every vertex vV(G)v \in V(G), each color used in the neighborhood of vv appears an odd number of times in N(v)N(v). The minimum number of colors in a strong odd coloring of GG is denoted by χso(G)\chi_{so}(G). A simple relation involving these two parameters and the order G|G| of GG is αod(G)χso(G)G\alpha_{od}(G)\cdot \chi_{so}(G) \geq |G|, parallel to the same on chromatic number and independence number. We develop several basic inequalities concerning αod(G)\alpha_{od}(G), and use already existing results on strong odd coloring, to derive lower bounds for odd independence in many families of graphs. We prove that αod(G)=α(G2)\alpha_{od}(G) = \alpha(G^2) holds for all claw-free graphs GG, and present many results, using various techniques, concerning the odd independence number of cycles, paths, Moore graphs, Kneser graphs, the complete subdivision S(Kn)S(K_n) of KnK_n, the half graphs Hn,nH_{n,n}, and KpKqK_p \Box K_q. Further, we consider the odd independence number of the hypercube QdQ_d and also of the complements of triangle-free graphs. Many open problems for future research are stated.
Large language models are often adapted through parameter efficient fine tuning, but current release practices provide weak assurances about what data were used and how updates were computed. We present Verifiable Fine Tuning, a protocol and system that produces succinct zero knowledge proofs that a released model was obtained from a public initialization under a declared training program and an auditable dataset commitment. The approach combines five elements. First, commitments that bind data sources, preprocessing, licenses, and per epoch quota counters to a manifest. Second, a verifiable sampler that supports public replayable and private index hiding batch selection. Third, update circuits restricted to parameter efficient fine tuning that enforce AdamW style optimizer semantics and proof friendly approximations with explicit error budgets. Fourth, recursive aggregation that folds per step proofs into per epoch and end to end certificates with millisecond verification. Fifth, provenance binding and optional trusted execution property cards that attest code identity and constants. On English and bilingual instruction mixtures, the method maintains utility within tight budgets while achieving practical proof performance. Policy quotas are enforced with zero violations, and private sampling windows show no measurable index leakage. Federated experiments demonstrate that the system composes with probabilistic audits and bandwidth constraints. These results indicate that end to end verifiable fine tuning is feasible today for real parameter efficient pipelines, closing a critical trust gap for regulated and decentralized deployments.
This paper presents an annotated dataset of brain MRI images designed to advance the field of brain symmetry study. Magnetic resonance imaging (MRI) has gained interest in analyzing brain symmetry in neonatal infants, and challenges remain due to the vast size differences between fetal and adult brains. Classification methods for brain structural MRI use scales and visual cues to assess hemisphere symmetry, which can help diagnose neonatal patients by comparing hemispheres and anatomical regions of interest in the brain. Using the Developing Human Connectome Project dataset, this work presents a dataset comprising cerebral images extracted as slices across selected portions of interest for clinical evaluation . All the extracted images are annotated with the brain's midline. All the extracted images are annotated with the brain's midline. From the assumption that a decrease in symmetry is directly related to possible clinical pathologies, the dataset can contribute to a more precise diagnosis because it can be used to train deep learning model application in neonatal cerebral MRI anomaly detection from postnatal infant scans thanks to computer vision. Such models learn to identify and classify anomalies by identifying potential asymmetrical patterns in medical MRI images. Furthermore, this dataset can contribute to the research and development of methods using the relative symmetry of the two brain hemispheres for crucial diagnosis and treatment planning.
We prove that if Cay(G;S) is a connected Cayley graph with n vertices, and the prime factorization of n is very small, then Cay(G;S) has a hamiltonian cycle. More precisely, if p, q, and r are distinct primes, then n can be of the form kp with k < 32 and k not equal to 24, or of the form kpq with k < 6, or of the form pqr, or of the form kp^2 with k < 5, or of the form kp^3 with k < 3.
Let GG denote a finite abelian group with identity 1 and let SS denote an inverse-closed subset of G1G \setminus {1}, which generates GG and for which there exists sSs \in S, such that \laS{s,s1}\raG\la S \setminus \{s,s^{-1}\} \ra \ne G. In this paper we obtain the complete classification of distance-regular Cayley graphs \cay(G;S)\cay(G;S) for such pairs of GG and SS.
A connected graph \G\G is said to be {\it distance-balanced} whenever for any pair of adjacent vertices u,vu,v of \G\G the number of vertices closer to uu than to vv is equal to the number of vertices closer to vv than to uu. In [Bipartite graphs with balanced (a,b)(a,b)-partitions, {\em Ars Combin.} {\bf 51} (1999), 113-119] Handa asked whether every bipartite distance-balanced graph, that is not a cycle, is 3-connected. In this paper the Handa question is answered in the negative. Moreover, we show that a minimal bipartite distance-balanced graph, that is not a cycle and is not 3-connected, has 18 vertices and is unique. In addition, we give a complete classification of non-3-connected bipartite distance-balanced graphs for which the minimal distance between two vertices in a 2-cut is three. All such graphs are regular and for each k3k \geq 3 there exists an infinite family of such graphs which are kk-regular. Furthermore, we determine a number of structural properties that a bipartite distance-balanced graph, which is not 3-connected, must have. As an application, we give a positive answer to the Handa question for the subfamily of bipartite strongly distance-balanced graphs.
The HH-Induced Minor Containment problem (HH-IMC) consists in deciding if a fixed graph HH is an induced minor of a graph GG given as input, that is, whether HH can be obtained from GG by deleting vertices and contracting edges. Equivalently, the problem asks if there exists an induced minor model of HH in GG, that is, a collection of disjoint subsets of vertices of GG, each inducing a connected subgraph, such that contracting each subgraph into a single vertex results in HH. It is known that HH-IMC is NP-complete for several graphs HH, even when HH is a tree. In this work, we investigate which properties of HH guarantee the existence of an induced minor model whose structure can be leveraged to solve the problem in polynomial time. This allows us to identify four infinite families of graphs HH that enjoy such properties. Moreover, we show that if the input graph GG excludes long induced paths, then HH-IMC is polynomial-time solvable for any fixed graph HH. As a byproduct of our results, this implies that HH-IMC is polynomial-time solvable for all graphs HH with at most 55 vertices, except for three open cases.
Eye gaze is considered an important indicator for understanding and predicting user behaviour, as well as directing their attention across various domains including advertisement design, human-computer interaction and film viewing. In this paper, we present a novel method to enhance the analysis of user behaviour and attention by (i) augmenting video streams with automatically annotating and labelling areas of interest (AOIs), and (ii) integrating AOIs with collected eye gaze and fixation data. The tool provides key features such as time to first fixation, dwell time, and frequency of AOI revisits. By incorporating the YOLOv8 object tracking algorithm, the tool supports over 600 different object classes, providing a comprehensive set for a variety of video streams. This tool will be made available as open-source software, thereby contributing to broader research and development efforts in the field.
In this work, the notion of spacetime of maximal proper acceleration is motivated as a weak form to implement general covariance and a generalized form of Einstein's equivalence principle from a physical point of view and the fundamental geometric and kinematic properties of such spaces are discussed. Thereafter the Unruh temperature formula is generalized to the case of hyperbolic observers in spacetimes of maximal proper acceleration. Such a generalization implies the existence of a maximal value for the Unruh temperature. We discuss this result for an electrodynamic model of point charged particles in a spacetime of maximal proper acceleration. It is shown that according to the model, the maximal Unruh temperature must be of order 4.81010/N4.8\cdot 10^{10}/N K for current high acceleration electron laser-plasma acceleration systems, where NN is the population of the typical bunch.
The transmission of a vertex in a connected graph is the sum of distances from that vertex to all the other vertices. A connected graph is transmission irregular if any two distinct vertices have different transmissions. We present an efficient algorithm that generates all the transmission irregular trees up to a given order, up to isomorphism.
Large language models are often adapted through parameter efficient fine tuning, but current release practices provide weak assurances about what data were used and how updates were computed. We present Verifiable Fine Tuning, a protocol and system that produces succinct zero knowledge proofs that a released model was obtained from a public initialization under a declared training program and an auditable dataset commitment. The approach combines five elements. First, commitments that bind data sources, preprocessing, licenses, and per epoch quota counters to a manifest. Second, a verifiable sampler that supports public replayable and private index hiding batch selection. Third, update circuits restricted to parameter efficient fine tuning that enforce AdamW style optimizer semantics and proof friendly approximations with explicit error budgets. Fourth, recursive aggregation that folds per step proofs into per epoch and end to end certificates with millisecond verification. Fifth, provenance binding and optional trusted execution property cards that attest code identity and constants. On English and bilingual instruction mixtures, the method maintains utility within tight budgets while achieving practical proof performance. Policy quotas are enforced with zero violations, and private sampling windows show no measurable index leakage. Federated experiments demonstrate that the system composes with probabilistic audits and bandwidth constraints. These results indicate that end to end verifiable fine tuning is feasible today for real parameter efficient pipelines, closing a critical trust gap for regulated and decentralized deployments.
The independence number of a tree decomposition is the maximum of the independence numbers of the subgraphs induced by its bags. The tree-independence number of a graph is the minimum independence number of a tree decomposition of it. Several NP-hard graph problems, like maximum weight independent set, can be solved in time n^{O(k)} if the input n-vertex graph is given together with a tree decomposition of independence number k. Yolov, in [SODA 2018], gave an algorithm that, given an n-vertex graph G and an integer k, in time n^{O(k^3)} either constructs a tree decomposition of G whose independence number is O(k^3) or correctly reports that the tree-independence number of G is larger than k. In this paper, we first give an algorithm for computing the tree-independence number with a better approximation ratio and running time and then prove that our algorithm is, in some sense, the best one can hope for. More precisely, our algorithm runs in time 2^{O(k^2)} n^{O(k)} and either outputs a tree decomposition of G with independence number at most 8k8k, or determines that the tree-independence number of G is larger than k. This implies 2^{O(k^2)} n^{O(k)}-time algorithms for various problems, like maximum weight independent set, parameterized by the tree-independence number k without needing the decomposition as an input. Assuming Gap-ETH, an n^{\Omega(k)} factor in the running time is unavoidable for any approximation algorithm for the tree-independence number. Our second result is that the exact computation of the tree-independence number is para-NP-hard: We show that for every constant k \ge 4 it is NP-hard to decide if a given graph has the tree-independence number at most k.
08 Dec 2023
We discuss avoidance of sure loss and coherence results for semicopulas and standardized functions, i.e., for grounded, 1-increasing functions with value 11 at (1,1,,1)(1,1,\ldots, 1). We characterize the existence of a kk-increasing nn-variate function CC fulfilling ACBA\leq C\leq B for standardized nn-variate functions A,BA,B and discuss the method for constructing this function. Our proofs also include procedures for extending functions on some countably infinite mesh to functions on the unit box. We provide a characterization when AA respectively BB coincides with the pointwise infimum respectively supremum of the set of all kk-increasing nn-variate functions CC fulfilling ACBA\leq C\leq B.
Providing suitable recommendations is of vital importance to improve the user satisfaction of music recommender systems. Here, users often listen to the same track repeatedly and appreciate recommendations of the same song multiple times. Thus, accounting for users' relistening behavior is critical for music recommender systems. In this paper, we describe a psychology-informed approach to model and predict music relistening behavior that is inspired by studies in music psychology, which relate music preferences to human memory. We adopt a well-established psychological theory of human cognition that models the operations of human memory, i.e., Adaptive Control of Thought-Rational (ACT-R). In contrast to prior work, which uses only the base-level component of ACT-R, we utilize five components of ACT-R, i.e., base-level, spreading, partial matching, valuation, and noise, to investigate the effect of five factors on music relistening behavior: (i) recency and frequency of prior exposure to tracks, (ii) co-occurrence of tracks, (iii) the similarity between tracks, (iv) familiarity with tracks, and (v) randomness in behavior. On a dataset of 1.7 million listening events from this http URL, we evaluate the performance of our approach by sequentially predicting the next track(s) in user sessions. We find that recency and frequency of prior exposure to tracks is an effective predictor of relistening behavior. Besides, considering the co-occurrence of tracks and familiarity with tracks further improves performance in terms of R-precision. We hope that our work inspires future research on the merits of considering cognitive aspects of memory retrieval to model and predict complex user behavior.
In the mm-dimensional affine space AG(m,q)AG(m,q) over the finite field Fq\mathbb{F}_q of odd order qq, the analogous of the Euclidean distance gives rise to a graph Gm,q\mathfrak{G}_{m,q} where vertices are the points of AG(m,q)AG(m,q) and two vertices are adjacent if their (formal) squared Euclidean distance is a square in Fq\mathbb{F}_q (including the zero). In 2009, Kurz and Meyer made the conjecture that if mm is even then Gm,q\mathfrak{G}_{m,q} is a strongly regular graph. In this paper we prove their conjecture.
Given a positive integer kk, a kk-dominating set in a graph GG is a set of vertices such that every vertex not in the set has at least kk neighbors in the set. A total kk-dominating set, also known as a kk-tuple total dominating set, is a set of vertices such that every vertex of the graph has at least kk neighbors in the set. The problems of finding the minimum size of a kk-dominating, respectively total kk-dominating set, in a given graph, are referred to as kk-domination, respectively total kk-domination. These generalizations of the classical domination and total domination problems are known to be NP-hard in the class of chordal graphs, and, more specifically, even in the classes of split graphs (both problems) and undirected path graphs (in the case of total kk-domination). On the other hand, it follows from recent work of Kang et al.~(2017) that these two families of problems are solvable in time O(V(G)6k+4)\mathcal{O}(|V(G)|^{6k+4}) in the class of interval graphs. We develop faster algorithms for kk-domination and total kk-domination in the class of proper interval graphs, by means of reduction to a single shortest path computation in a derived directed acyclic graph with O(V(G)2k)\mathcal{O}(|V(G)|^{2k}) nodes and O(V(G)4k)\mathcal{O}(|V(G)|^{4k}) arcs. We show that a suitable implementation, which avoids constructing all arcs of the digraph, leads to a running time of O(V(G)3k)\mathcal{O}(|V(G)|^{3k}). The algorithms are also applicable to the weighted case.
An efficient dominating set (or perfect code) in a graph is a set of vertices the closed neighborhoods of which partition the vertex set of the graph. The minimum weight efficient domination problem is the problem of finding an efficient dominating set of minimum weight in a given vertex-weighted graph; the maximum weight efficient domination problem is defined similarly. We develop a framework for solving the weighted efficient domination problems based on a reduction to the maximum weight independent set problem in the square of the input graph. Using this approach, we improve on several previous results from the literature by deriving polynomial-time algorithms for the weighted efficient domination problems in the classes of dually chordal and AT-free graphs. In particular, this answers a question by Lu and Tang regarding the complexity of the minimum weight efficient domination problem in strongly chordal graphs.
We consider the task of allocating indivisible items to agents, when the agents' preferences over the items are identical. The preferences are captured by means of a directed acyclic graph, with vertices representing items and an edge (a,b)(a,b), meaning that each of the agents prefers item aa over item bb. The dissatisfaction of an agent is measured by the number of items that the agent does not receive and for which it also does not receive any more preferred item. The aim is to allocate the items to the agents in a fair way, i.e., to minimize the maximum dissatisfaction among the agents. We study the status of computational complexity of that problem and establish the following dichotomy: the problem is NP-hard for the case of at least three agents, even on fairly restricted graphs, but polynomially solvable for two agents. We also provide several polynomial-time results with respect to different underlying graph structures, such as graphs of width at most two and tree-like structures such as stars and matchings. These findings are complemented with fixed parameter tractability results related to path modules and independent set modules. Techniques employed in the paper include bottleneck assignment problem, greedy algorithm, dynamic programming, maximum network flow, and integer linear programming.
Let Γ\Gamma denote an undirected, connected, regular graph with vertex set XX, adjacency matrix AA, and d+1{d+1} distinct eigenvalues. Let A=A(Γ){\mathcal A}={\mathcal A}(\Gamma) denote the subalgebra of MatX(C)_X({\mathbb C}) generated by AA. We refer to A{\mathcal A} as the {\it adjacency algebra} of Γ\Gamma. In this paper we investigate algebraic and combinatorial structure of Γ\Gamma for which the adjacency algebra A{\mathcal A} is closed under Hadamard multiplication. In particular, under this simple assumption, we show the following: (i) A{\mathcal A} has a standard basis {I,F1,,Fd}\{I,F_1,\ldots,F_d\}; (ii) for every vertex there exists identical distance-faithful intersection diagram of Γ\Gamma with d+1d+1 cells; (iii) the graph Γ\Gamma is quotient-polynomial; and (iv) if we pick F{I,F1,,Fd}F\in \{I,F_1,\ldots,F_d\} then FF has d+1d+1 distinct eigenvalues if and only if span{I,F1,,Fd}=\{I,F_1,\ldots,F_d\}=span{I,F,,Fd}\{I,F,\ldots,F^d\}. We describe the combinatorial structure of quotient-polynomial graphs with diameter 22 and 44 distinct eigenvalues. As a consequence of the technique from the paper we give an algorithm which computes the number of distinct eigenvalues of any Hermitian matrix using only elementary operations. When such a matrix is the adjacency matrix of a graph Γ\Gamma, a simple variation of the algorithm allow us to decide wheter Γ\Gamma is distance-regular or not. In this context, we also propose an algorithm to find which distance-ii matrices are polynomial in AA, giving also these polynomials.
There are no more papers matching your filters at the moment.