-
Concave Foliated Flag Structures and the $\text{SL}_3(\mathbb{R})$ Hitchin Component
Authors:
Alexander Nolte,
J. Maxwell Riestenberg
Abstract:
We give a geometric characterization of flag geometries associated to Hitchin representations in $\text{SL}_3(\mathbb{R})$. Our characterization is based on distinguished invariant foliations, similar to those studied by Guichard-Wienhard in $\text{PSL}_4(\mathbb{R})$.
We connect to the dynamics of Hitchin representations by constructing refraction flows for all positive roots in general…
▽ More
We give a geometric characterization of flag geometries associated to Hitchin representations in $\text{SL}_3(\mathbb{R})$. Our characterization is based on distinguished invariant foliations, similar to those studied by Guichard-Wienhard in $\text{PSL}_4(\mathbb{R})$.
We connect to the dynamics of Hitchin representations by constructing refraction flows for all positive roots in general $\mathfrak{sl}_n(\mathbb{R})$ in our setting. For $n = 3$, leaves of our one-dimensional foliations are flow-lines. One consequence is that the highest root flows are $C^{1+α}$.
△ Less
Submitted 8 July, 2024;
originally announced July 2024.
-
On Foliations in $\text{PSL}(4,\mathbb{R})$-Teichmüller Theory
Authors:
Alexander Nolte
Abstract:
We carry out a detailed study of the structure of domains of discontinuity $Ω_ρ$ in $\mathbb{RP}^3$ of $\text{PSL}_4(\mathbb{R})$-Hitchin representations $ρ$. We then prove the foliated component $Ω_ρ^1$ of $Ω_ρ$ has exactly two group-invariant foliations by properly embedded projective line segments and has a unique foliation by properly embedded convex domains in projective planes. This gives a…
▽ More
We carry out a detailed study of the structure of domains of discontinuity $Ω_ρ$ in $\mathbb{RP}^3$ of $\text{PSL}_4(\mathbb{R})$-Hitchin representations $ρ$. We then prove the foliated component $Ω_ρ^1$ of $Ω_ρ$ has exactly two group-invariant foliations by properly embedded projective line segments and has a unique foliation by properly embedded convex domains in projective planes. This gives a finiteness counterpart to work of Guichard and Wienhard. We also prove analogues for the non-foliated component $Ω_ρ^2$ and deduce a rigidity of projective equivalences of properly convex foliated projective structures on unit tangent bundles of surfaces.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
Metrics on Hitchin Components from Hölder Distortion
Authors:
Alexander Nolte
Abstract:
We observe Thurston's asymmetric metric on Teichmüller space may be expressed in terms of the Hölder regularity of boundary maps. We then associate $2$-dimensional stratified loci in $\mathbb{RP}^{n-1}$ to $\text{PSL}_n(\mathbb{R})$ Hitchin representations with $n > 3$. We prove that measuring the relative Hölder distortion of these loci gives asymmetric metrics on the Hitchin component…
▽ More
We observe Thurston's asymmetric metric on Teichmüller space may be expressed in terms of the Hölder regularity of boundary maps. We then associate $2$-dimensional stratified loci in $\mathbb{RP}^{n-1}$ to $\text{PSL}_n(\mathbb{R})$ Hitchin representations with $n > 3$. We prove that measuring the relative Hölder distortion of these loci gives asymmetric metrics on the Hitchin component $\text{Hit}_n(S)$ with complete and geometrically meaningful symmetrizations. These are the first known geometrically significant complete metrics on $\text{Hit}_n(S)$ for $n > 3$.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
An Exploratory Study on the Evidence of Hackathons' Role in Solving OSS Newcomers' Challenges
Authors:
Ahmed Samir Imam Mahmoud,
Alexander Nolte,
Dietmar Pfahl
Abstract:
Background: OSS projects face various challenges. One major challenge is to onboard and integrate newcomers to the project. Aim: We aim to understand and discuss the challenges newcomers face when joining an OSS project and present evidence on how hackathons can mitigate those challenges. Method: We conducted two searches on digital libraries to (1) explore challenges faced by newcomers to join OS…
▽ More
Background: OSS projects face various challenges. One major challenge is to onboard and integrate newcomers to the project. Aim: We aim to understand and discuss the challenges newcomers face when joining an OSS project and present evidence on how hackathons can mitigate those challenges. Method: We conducted two searches on digital libraries to (1) explore challenges faced by newcomers to join OSS projects, and (2) collect evidence on how hackathons were used to address them. We defined four evidence categories (positive, inconclusive, and no evidence) to classify evidence how hackathons address challenges. In addition, we investigated whether a hackathon event was related to an OSS project or not. Result: We identified a range of newcomer challenges that were successfully addressed using hackathons. However, not all of the solutions we identified were applied in the context of OSS. Conclusion: There seems to be potential in using hackathons to overcome newcomers' challenges in OSS projects and allow them to integrate faster into the project.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Leaves of Foliated Projective Structures
Authors:
Alexander Nolte
Abstract:
The $\text{PSL}(4,\mathbb{R})$ Hitchin component of a closed surface group $π_1(S)$ consists of holonomies of properly convex foliated projective structures on the unit tangent bundle of $S$. We prove that the leaves of the codimension-$1$ foliation of any such projective structure are all projectively equivalent if and only if its holonomy is Fuchsian. This implies constraints on the symmetries a…
▽ More
The $\text{PSL}(4,\mathbb{R})$ Hitchin component of a closed surface group $π_1(S)$ consists of holonomies of properly convex foliated projective structures on the unit tangent bundle of $S$. We prove that the leaves of the codimension-$1$ foliation of any such projective structure are all projectively equivalent if and only if its holonomy is Fuchsian. This implies constraints on the symmetries and shapes of these leaves.
We also give an application to the topology of the non-${\rm T}_0$ space $\mathfrak{C}(\mathbb{RP}^n)$ of projective classes of properly convex domains in $\mathbb{RP}^n$. Namely, Benzécri asked in 1960 if every closed subset of $\mathfrak{C}(\mathbb{RP}^n)$ that contains no proper nonempty closed subset is a point. Our results imply a negative resolution for $n \geq 2$.
△ Less
Submitted 3 October, 2023; v1 submitted 3 April, 2023;
originally announced April 2023.
-
The Future of Hackathon Research and Practice
Authors:
Jeanette Falk,
Alexander Nolte,
Daniela Huppenkothen,
Marion Weinzierl,
Kiev Gama,
Daniel Spikol,
Erik Tollerud,
Neil Chue Hong,
Ines Knäpper,
Linda Bailey Hayden
Abstract:
Hackathons are time-bounded collaborative events which have become a global phenomenon adopted by both researchers and practitioners in a plethora of contexts. Hackathon events are generally used to accelerate the development of, for example, scientific results and collaborations, communities, and innovative prototypes addressing urgent challenges. As hackathons have been adopted into many differe…
▽ More
Hackathons are time-bounded collaborative events which have become a global phenomenon adopted by both researchers and practitioners in a plethora of contexts. Hackathon events are generally used to accelerate the development of, for example, scientific results and collaborations, communities, and innovative prototypes addressing urgent challenges. As hackathons have been adopted into many different contexts, the events have also been adapted in numerous ways corresponding to the unique needs and situations of organizers, participants and other stakeholders. While these interdisciplinary adaptions, in general affords many advantages - such as tailoring the format to specific needs - they also entail certain challenges, specifically: 1) limited exchange of best practices, 2) limited exchange of research findings, and 3) larger overarching questions that require interdisciplinary collaboration are not discovered and remain unaddressed. We call for interdisciplinary collaborations to address these challenges. As a first initiative towards this, we performed an interdisciplinary collaborative analysis in the context of a workshop at the Lorentz Center, Leiden in December 2021. In this paper, we present the results of this analysis in terms of six important areas which we envision to contribute to maturing hackathon research and practice: 1) hackathons for different purposes, 2) socio-technical event design, 3) scaling up, 4) making hackathons equitable, 5) studying hackathons, and 6) hackathon goals and how to reach them. We present these areas in terms of the state of the art and research proposals and conclude the paper by suggesting next steps needed for advancing hackathon research and practice.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
Characterizing candidates for Cannon's Conjecture from Geometric Measure Theory
Authors:
Tamunonye Cheetham-West,
Alexander Nolte
Abstract:
We show that recent work of Song implies that torsion-free hyperbolic groups with Gromov boundary $S^2$ are realized as fundamental groups of closed 3-manifolds of constant negative curvature if and only if the solution to an associated spherical Plateau problem for group homology is isometric to such a 3-manifold, and suggest some related questions.
We show that recent work of Song implies that torsion-free hyperbolic groups with Gromov boundary $S^2$ are realized as fundamental groups of closed 3-manifolds of constant negative curvature if and only if the solution to an associated spherical Plateau problem for group homology is isometric to such a 3-manifold, and suggest some related questions.
△ Less
Submitted 24 February, 2023; v1 submitted 4 July, 2022;
originally announced July 2022.
-
One-off Events? An Empirical Study of Hackathon Code Creation and Reuse
Authors:
Ahmed Samir Imam Mahmoud,
Tapajit Dey,
Alexander Nolte,
Audris Mockus,
James D. Herbsleb
Abstract:
Background: Hackathons have become popular events for teams to collaborate on projects and develop software prototypes. Most existing research focuses on activities during an event with limited attention to the evolution of the hackathon code. Aim: We aim to understand the evolution of code used in and created during hackathon events, with a particular focus on the code blobs, specifically, how fr…
▽ More
Background: Hackathons have become popular events for teams to collaborate on projects and develop software prototypes. Most existing research focuses on activities during an event with limited attention to the evolution of the hackathon code. Aim: We aim to understand the evolution of code used in and created during hackathon events, with a particular focus on the code blobs, specifically, how frequently hackathon teams reuse pre-existing code, how much new code they develop, if that code gets reused afterward, and what factors affect reuse. Method: We collected information about 22,183 hackathon projects from DevPost and obtained related code blobs, authors, project characteristics, original author, code creation time, language, and size information from World of Code. We tracked the reuse of code blobs by identifying all commits containing blobs created during hackathons and identifying all projects that contain those commits. We also conducted a series of surveys in order to gain a deeper understanding of hackathon code evolution that we sent out to hackathon participants whose code was reused, whose code was not reused, and developers who reused some hackathon code. Result: 9.14% of the code blobs in hackathon repositories and 8% of the lines of code (LOC) are created during hackathons and around a third of the hackathon code gets reused in other projects by both blob count and LOC. The number of associated technologies and the number of participants in hackathons increase the reuse probability. Conclusion: The results of our study demonstrate hackathons are not always "one-off" events as common knowledge dictates and they can serve as a starting point for further studies in this area.
△ Less
Submitted 3 July, 2022;
originally announced July 2022.
-
Socio-technical constraints and affordances of virtual collaboration -- A study of four online hackathons
Authors:
Wendy Mendes,
Albert Richard,
Tähe-Kai Tillo,
Gustavo Pinto,
Kiev Gama,
Alexander Nolte
Abstract:
Hackathons and similar time-bounded events have become a popular form of collaboration. They are commonly organized as in-person events during which teams engage in intense collaboration over a short period of time to complete a project that is of interest to them. Most research to date has focused on studying how teams collaborate in a co-located setting, pointing towards the advantages of radica…
▽ More
Hackathons and similar time-bounded events have become a popular form of collaboration. They are commonly organized as in-person events during which teams engage in intense collaboration over a short period of time to complete a project that is of interest to them. Most research to date has focused on studying how teams collaborate in a co-located setting, pointing towards the advantages of radical co-location. The global pandemic of 2020, however, has led to many hackathons moving online, which challenges our current understanding of how they function. In this paper, we address this gap by presenting findings from a multiple-case study of 10 hackathon teams that participated in 4 hackathons across two continents. By analyzing the collected data, we found that teams merged synchronous and asynchronous means of communication to maintain a common understanding of work progress as well as to maintain awareness of each other's tasks. Task division was self-assigned based on individual skills or interests, while leaders emerged from different strategies (e.g., participant experience, the responsibility of registering the team in an event). Some of the affordances of in-person hackathons, such as the radical co-location of team members, could be partially reproduced in teams that kept synchronous communication channels while working (i.e., shared audio territories), in a sort of "radical virtual co-location". However, others, such as interactions with other teams, easy access to mentors, and networking with other participants, decreased. In addition, the technical constraints of the different communication tools and platforms brought technical problems and were overwhelming to participants. Our work contributes to understanding the virtual collaboration of small teams in the context of online hackathons and how technologies and event structures proposed by organizers imply this collaboration.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
Canonical Maps from Spaces of Higher Complex Structures to Hitchin Components
Authors:
Alexander Nolte
Abstract:
For $S$ a closed surface of genus $g\geq2$, we construct a canonical diffeomorphism from the degree $3$ Fock-Thomas space $\mathcal{T}^3(S)$ of higher complex structures to the $\text{SL}(3,\mathbb{R})$ Hitchin component. Our construction is equivariant with respect to natural actions of the mapping class group $\text{Mod}(S)$. For all $n \geq 3$, we show that the Fock-Thomas space…
▽ More
For $S$ a closed surface of genus $g\geq2$, we construct a canonical diffeomorphism from the degree $3$ Fock-Thomas space $\mathcal{T}^3(S)$ of higher complex structures to the $\text{SL}(3,\mathbb{R})$ Hitchin component. Our construction is equivariant with respect to natural actions of the mapping class group $\text{Mod}(S)$. For all $n \geq 3$, we show that the Fock-Thomas space $\mathcal{T}^n(S)$ has a canonical vector bundle structure over Teichmüller space. We then construct a $\text{Mod}(S)$-equivariant bundle isomorphism from $\mathcal{T}^n(S)$ to a sub-bundle of the restriction of the tangent bundle of the $\text{PSL}(n, \mathbb{R})$ Hitchin component to the Fuchsian locus. As consequences, we prove that the higher degree moduli space of complex structures is a bundle over the moduli space of Riemann surfaces and that the action of $\text{Mod}(S)$ on $\mathcal{T}^n(S)$ is a proper action by holomorphic automorphisms with respect to a canonical complex structure. The core of our approach is a careful analysis of higher degree diffeomorphism groups.
△ Less
Submitted 10 April, 2022;
originally announced April 2022.
-
The CAT Effect: Exploring the Impact of Casual Affective Triggers on Online Surveys' Response Rates
Authors:
Irene-Angelica Chounta,
Alexander Nolte
Abstract:
We explore the impact of Casual Affective Triggers (CAT) on response rates of online surveys. As CAT, we refer to objects that can be included in survey participation invitations and trigger participants' affect. The hypothesis is that participants who receive CAT-enriched invitations are more likely to respond to a survey. We conducted a study where the control condition received invitations with…
▽ More
We explore the impact of Casual Affective Triggers (CAT) on response rates of online surveys. As CAT, we refer to objects that can be included in survey participation invitations and trigger participants' affect. The hypothesis is that participants who receive CAT-enriched invitations are more likely to respond to a survey. We conducted a study where the control condition received invitations without affective triggers, and the experimental condition received CAT-enriched invitations. We differentiated the triggers within the experimental condition: one-third of the population received a personalized invitation, one-third received a picture of the surveyor's cat, and one-third received both. We followed up with a survey to validate our findings. Our results suggest that CATs have a positive impact on response rates. We did not find CATs to induce response bias.
△ Less
Submitted 8 March, 2022;
originally announced March 2022.
-
Enabling Reproducibility and Meta-learning Through a Lifelong Database of Experiments (LDE)
Authors:
Jason Tsay,
Andrea Bartezzaghi,
Aleke Nolte,
Cristiano Malossi
Abstract:
Artificial Intelligence (AI) development is inherently iterative and experimental. Over the course of normal development, especially with the advent of automated AI, hundreds or thousands of experiments are generated and are often lost or never examined again. There is a lost opportunity to document these experiments and learn from them at scale, but the complexity of tracking and reproducing thes…
▽ More
Artificial Intelligence (AI) development is inherently iterative and experimental. Over the course of normal development, especially with the advent of automated AI, hundreds or thousands of experiments are generated and are often lost or never examined again. There is a lost opportunity to document these experiments and learn from them at scale, but the complexity of tracking and reproducing these experiments is often prohibitive to data scientists. We present the Lifelong Database of Experiments (LDE) that automatically extracts and stores linked metadata from experiment artifacts and provides features to reproduce these artifacts and perform meta-learning across them. We store context from multiple stages of the AI development lifecycle including datasets, pipelines, how each is configured, and training runs with information about their runtime environment. The standardized nature of the stored metadata allows for querying and aggregation, especially in terms of ranking artifacts by performance metrics. We exhibit the capabilities of the LDE by reproducing an existing meta-learning study and storing the reproduced metadata in our system. Then, we perform two experiments on this metadata: 1) examining the reproducibility and variability of the performance metrics and 2) implementing a number of meta-learning algorithms on top of the data and examining how variability in experimental results impacts recommendation performance. The experimental results suggest significant variation in performance, especially depending on dataset configurations; this variation carries over when meta-learning is built on top of the results, with performance improving when using aggregated results. This suggests that a system that automatically collects and aggregates results such as the LDE not only assists in implementing meta-learning but may also improve its performance.
△ Less
Submitted 23 February, 2022; v1 submitted 22 February, 2022;
originally announced February 2022.
-
Explainable Predictive Process Monitoring: A User Evaluation
Authors:
Williams Rizzi,
Marco Comuzzi,
Chiara Di Francescomarino,
Chiara Ghidini,
Suhwan Lee,
Fabrizio Maria Maggi,
Alexander Nolte
Abstract:
Explainability is motivated by the lack of transparency of black-box Machine Learning approaches, which do not foster trust and acceptance of Machine Learning algorithms. This also happens in the Predictive Process Monitoring field, where predictions, obtained by applying Machine Learning techniques, need to be explained to users, so as to gain their trust and acceptance. In this work, we carry on…
▽ More
Explainability is motivated by the lack of transparency of black-box Machine Learning approaches, which do not foster trust and acceptance of Machine Learning algorithms. This also happens in the Predictive Process Monitoring field, where predictions, obtained by applying Machine Learning techniques, need to be explained to users, so as to gain their trust and acceptance. In this work, we carry on a user evaluation on explanation approaches for Predictive Process Monitoring aiming at investigating whether and how the explanations provided (i) are understandable; (ii) are useful in decision making tasks;(iii) can be further improved for process analysts, with different Machine Learning expertise levels. The results of the user evaluation show that, although explanation plots are overall understandable and useful for decision making tasks for Business Process Management users -- with and without experience in Machine Learning -- differences exist in the comprehension and usage of different plots, as well as in the way users with different Machine Learning expertise understand and use them.
△ Less
Submitted 15 February, 2022;
originally announced February 2022.
-
Integrating Hackathons into an Online Cybersecurity Course
Authors:
Abasi-amefon Obot Affia,
Alexander Nolte,
Raimundas Matulevičius
Abstract:
Cybersecurity educators have widely introduced hackathons to facilitate practical knowledge gaining in cybersecurity education. Introducing such events into cybersecurity courses can provide valuable learning experiences for students. The nature of the hackathon format encourages a learning-by-doing approach, and the hackathon outcomes can serve as evidence for students knowledge, capability and l…
▽ More
Cybersecurity educators have widely introduced hackathons to facilitate practical knowledge gaining in cybersecurity education. Introducing such events into cybersecurity courses can provide valuable learning experiences for students. The nature of the hackathon format encourages a learning-by-doing approach, and the hackathon outcomes can serve as evidence for students knowledge, capability and learning gains. Prior work on hackathons in education mainly focused on collocated hackathon events in the traditional classroom setting. These hackathon events often took place as a one-off event at the end of the course. However, one-off hackathon events at the end of a course might not be sufficient to improve learning. Instead, we focus on analyzing the integration of a series of online hackathon events into an online cybersecurity course and explore how this integration can address online education issues by encouraging collaboration and developing a practical understanding of the delivered course by solving real-world challenges. We evaluate interventions to foster learning and analyze its effect on collaboration and learning gains for students in the course. Our findings indicate that students attribute learning benefits to the introduced interventions that supported teamwork and collaboration, maintained student participation and interest in the course, and encouraged learning-by-doing.
△ Less
Submitted 12 February, 2022;
originally announced February 2022.
-
Prescriptive Process Monitoring: Quo Vadis?
Authors:
Kateryna Kubrak,
Fredrik Milani,
Alexander Nolte,
Marlon Dumas
Abstract:
Prescriptive process monitoring methods seek to optimize a business process by recommending interventions at runtime to prevent negative outcomes or poorly performing cases. In recent years, various prescriptive process monitoring methods have been proposed. This paper studies existing methods in this field via a Systematic Literature Review (SLR). In order to structure the field, the paper propos…
▽ More
Prescriptive process monitoring methods seek to optimize a business process by recommending interventions at runtime to prevent negative outcomes or poorly performing cases. In recent years, various prescriptive process monitoring methods have been proposed. This paper studies existing methods in this field via a Systematic Literature Review (SLR). In order to structure the field, the paper proposes a framework for characterizing prescriptive process monitoring methods according to their performance objective, performance metrics, intervention types, modeling techniques, data inputs, and intervention policies. The SLR provides insights into challenges and areas for future research that could enhance the usefulness and applicability of prescriptive process monitoring methods. The paper highlights the need to validate existing and new methods in real-world settings, to extend the types of interventions beyond those related to the temporal and cost perspectives, and to design policies that take into account causality and second-order effects.
△ Less
Submitted 3 December, 2021;
originally announced December 2021.
-
The Secret Life of Hackathon Code
Authors:
Ahmed Imam,
Tapajit Dey,
Alexander Nolte,
Audris Mockus,
James D. Herbsleb
Abstract:
Background: Hackathons have become popular events for teams to collaborate on projects and develop software prototypes. Most existing research focuses on activities during an event with limited attention to the evolution of the code brought to or created during a hackathon. Aim: We aim to understand the evolution of hackathon-related code, specifically, how much hackathon teams rely on pre-existin…
▽ More
Background: Hackathons have become popular events for teams to collaborate on projects and develop software prototypes. Most existing research focuses on activities during an event with limited attention to the evolution of the code brought to or created during a hackathon. Aim: We aim to understand the evolution of hackathon-related code, specifically, how much hackathon teams rely on pre-existing code or how much new code they develop during a hackathon. Moreover, we aim to understand if and where that code gets reused, and what factors affect reuse. Method: We collected information about 22,183 hackathon projects from DEVPOST -- a hackathon database -- and obtained related code (blobs), authors, and project characteristics from the World of Code. We investigated if code blobs in hackathon projects were created before, during, or after an event by identifying the original blob creation date and author, and also checked if the original author was a hackathon project member. We tracked code reuse by first identifying all commits containing blobs created during an event before determining all projects that contain those commits. Result: While only approximately 9.14% of the code blobs are created during hackathons, this amount is still significant considering the time and member constraints of such events. Approximately a third of these code blobs get reused in other projects. The number of associated technologies and the number of participants in a project increase reuse probability. Conclusion: Our study demonstrates to what extent pre-existing code is used and new code is created during a hackathon and how much of it is reused elsewhere afterwards. Our findings help to better understand code reuse as a phenomenon and the role of hackathons in this context and can serve as a starting point for further studies in this area.
△ Less
Submitted 18 March, 2021; v1 submitted 1 March, 2021;
originally announced March 2021.
-
How to organize a hackathon -- A planning kit
Authors:
Alexander Nolte,
Ei Pa Pa Pe-Than,
Abasi-amefon Obot Affia,
Chalalai Chaihirunkarn,
Anna Filippova,
Arun Kalyanasundaram,
Maria Angelica Medina Angarita,
Erik Trainer,
James D. Herbsleb
Abstract:
Hackathons and similar time-bounded events have become a global phenomenon. Their proliferation in various domains and their usefulness for a variety of goals has subsequently led to the emergence of different formats. While there are a multitude of guidelines available on how to prepare and run a hackathon, most of them focus on a particular format that was created for a specific purpose within a…
▽ More
Hackathons and similar time-bounded events have become a global phenomenon. Their proliferation in various domains and their usefulness for a variety of goals has subsequently led to the emergence of different formats. While there are a multitude of guidelines available on how to prepare and run a hackathon, most of them focus on a particular format that was created for a specific purpose within a domain for a certain type of participants. This makes it difficult in particular for novice organizers to decide how to run an event that fits their needs. To address this gap we developed a planning kit that is organized around 12 key decision that organizers need to make when preparing and running a hackathon, and the tradeoffs that drive decision-making. The main planning kit is available online while this report is meant as a downloadable and citable resource.
△ Less
Submitted 19 August, 2020; v1 submitted 18 August, 2020;
originally announced August 2020.
-
An Application of Abel's Method to the Inverse Radon Transform
Authors:
Shavkat Alimov,
Joseph David,
Alexander Nolte,
Julie Sherman
Abstract:
A method of approximating the inverse Radon transform on the plane by integrating against a smooth kernel is investigated. For piecewise smooth integrable functions, convergence theorems are proven and Gibbs phenomena are ruled out. Geometric properties of the kernel and their implications for computer implementation are discussed. Suggestions are made for applications and an example is presented.
A method of approximating the inverse Radon transform on the plane by integrating against a smooth kernel is investigated. For piecewise smooth integrable functions, convergence theorems are proven and Gibbs phenomena are ruled out. Geometric properties of the kernel and their implications for computer implementation are discussed. Suggestions are made for applications and an example is presented.
△ Less
Submitted 20 October, 2019;
originally announced October 2019.
-
Galaxy classification: A machine learning analysis of GAMA catalogue data
Authors:
Aleke Nolte,
Lingyu Wang,
Maciej Bilicki,
Benne Holwerda,
Michael Biehl
Abstract:
We present a machine learning analysis of five labelled galaxy catalogues from the Galaxy And Mass Assembly (GAMA): The SersicCatVIKING and SersicCatUKIDSS catalogues containing morphological features, the GaussFitSimple catalogue containing spectroscopic features, the MagPhys catalogue including physical parameters for galaxies, and the Lambdar catalogue, which contains photometric measurements.…
▽ More
We present a machine learning analysis of five labelled galaxy catalogues from the Galaxy And Mass Assembly (GAMA): The SersicCatVIKING and SersicCatUKIDSS catalogues containing morphological features, the GaussFitSimple catalogue containing spectroscopic features, the MagPhys catalogue including physical parameters for galaxies, and the Lambdar catalogue, which contains photometric measurements. Extending work previously presented at the ESANN 2018 conference - in an analysis based on Generalized Relevance Matrix Learning Vector Quantization and Random Forests - we find that neither the data from the individual catalogues nor a combined dataset based on all 5 catalogues fully supports the visual-inspection-based galaxy classification scheme employed to categorise the galaxies. In particular, only one class, the Little Blue Spheroids, is consistently separable from the other classes. To aid further insight into the nature of the employed visual-based classification scheme with respect to physical and morphological features, we present the galaxy parameters that are discriminative for the achieved class distinctions.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.
-
The 2nd Workshop on Hacking and Making at Time-Bounded Events
Authors:
Ei Pa Pa Pe-Than,
Alexander Nolte
Abstract:
In hackathons, small teams work together over a specified period of time to complete a project of interest. Such time-bounded hackathon-style events have become increasingly popular across different domains in recent years. Collegiate hackathons, just one of the many variants of hackathons, that are supported by the largest hackathon league (https://mlh.io/) alone attract over 65,000 participants…
▽ More
In hackathons, small teams work together over a specified period of time to complete a project of interest. Such time-bounded hackathon-style events have become increasingly popular across different domains in recent years. Collegiate hackathons, just one of the many variants of hackathons, that are supported by the largest hackathon league (https://mlh.io/) alone attract over 65,000 participants among more than 200 events each year. Variously known as data dives, codefests, hack-days, sprints, edit-a-thons, mapathons, and so on, such events vary depending on different audiences and with divergent aims: for example, whether teams know each other beforehand, whether the event is structured as a competition with prizes, whether the event is open or requires membership or invitations, and whether the desired outcome is primarily a product innovation, learning a new skill, forming a community around a cause, solving a technical problem that requires intensive focus by a group, or just having fun. Taken together, hackathons offer new opportunities and challenges for collaboration by affording explicit, predictable, time-bounded spaces for collaborative work and engaging with new audiences. With the goal of discussing opportunities and challenges surrounding hackathons of different kinds, this one-day workshop brought together researchers, experienced event organizers, and practitioners to share and discuss their practical experiences. Empirical insights from studying these events may help position the CHI community to better study, plan and design hackathon-style events as socio-technical systems that support new modes of production and collaboration.
△ Less
Submitted 3 January, 2019;
originally announced January 2019.
-
A Boundary-Value Problem for the 3-D Fractional Wave Equation with Singularity
Authors:
Joseph David,
Alexander Nolte,
Julie Sherman
Abstract:
In this paper, a boundary-value problem for the 3-D wave equation with Caputo and Bessel operators is investigated. Sufficient conditions on the initial data are established for the existence of a unique solution to the considered problem.
In this paper, a boundary-value problem for the 3-D wave equation with Caputo and Bessel operators is investigated. Sufficient conditions on the initial data are established for the existence of a unique solution to the considered problem.
△ Less
Submitted 3 October, 2018;
originally announced October 2018.
-
The Risk Profile Problem for Stock Portfolio Optimization
Authors:
Ming-Yang Kao,
Andreas Nolte,
Stephen R. Tate
Abstract:
This work initiates research into the problem of determining an optimal investment strategy for investors with different attitudes towards the trade-offs of risk and profit. The probability distribution of the return values of the stocks that are considered by the investor are assumed to be known, while the joint distribution is unknown. The problem is to find the best investment strategy in ord…
▽ More
This work initiates research into the problem of determining an optimal investment strategy for investors with different attitudes towards the trade-offs of risk and profit. The probability distribution of the return values of the stocks that are considered by the investor are assumed to be known, while the joint distribution is unknown. The problem is to find the best investment strategy in order to minimize the probability of losing a certain percentage of the invested capital based on different attitudes of the investors towards future outcomes of the stock market.
For portfolios made up of two stocks, this work shows how to exactly and quickly solve the problem of finding an optimal portfolio for aggressive or risk-averse investors, using an algorithm based on a fast greedy solution to a maximum flow problem. However, an investor looking for an average-case guarantee (so is neither aggressive or risk-averse) must deal with a more difficult problem. In particular, it is #P-complete to compute the distribution function associated with the average-case bound. On the positive side, approximate answers can be computed by using random sampling techniques similar to those for high-dimensional volume estimation. When k>2 stocks are considered, it is proved that a simple solution based on the same flow concepts as the 2-stock algorithm would imply that P = NP, so is highly unlikely. This work gives approximation algorithms for this case as well as exact algorithms for some important special cases.
△ Less
Submitted 3 July, 2001;
originally announced July 2001.