-
Full NNLO QCD corrections to diphoton production
Authors:
Federico Coro
Abstract:
We consider the diphoton production in hadronic collisions at the next-to-next-to-leading order (NNLO) in perturbative QCD, taking into account for the first time the full top quark mass dependence. We present the computation of the two-loop form factors for diphoton production in the quark annihilation channel, that are relevant for the phenomenological studies of the full NNLO. The MIs are writt…
▽ More
We consider the diphoton production in hadronic collisions at the next-to-next-to-leading order (NNLO) in perturbative QCD, taking into account for the first time the full top quark mass dependence. We present the computation of the two-loop form factors for diphoton production in the quark annihilation channel, that are relevant for the phenomenological studies of the full NNLO. The MIs are written in the so-called canonical logarithmic form, except for the elliptic ones. We perform a study on the Maximal Cut in order to show the elliptic behaviour of the non-planar topology. The Master Integrals are evaluated by means of differential equations in a semy-analitical approach through the generalised power series technique. Finally we use this result with all the other contributions showing selected numerical distributions.
△ Less
Submitted 20 October, 2023; v1 submitted 16 October, 2023;
originally announced October 2023.
-
Two-loop form factors for diphoton production in quark annihilation channel with heavy quark mass dependence
Authors:
Matteo Becchetti,
Roberto Bonciani,
Leandro Cieri,
Federico Coro,
Federico Ripani
Abstract:
We present the computation of the two-loop form factors for diphoton production in the quark annihilation channel. These quantities are relevant for the NNLO QCD corrections to diphoton production at LHC recently presented in arXiv:2308.10885. The computation is performed retaining full dependence on the mass of the heavy quark in the loops. The master integrals are evaluated by means of different…
▽ More
We present the computation of the two-loop form factors for diphoton production in the quark annihilation channel. These quantities are relevant for the NNLO QCD corrections to diphoton production at LHC recently presented in arXiv:2308.10885. The computation is performed retaining full dependence on the mass of the heavy quark in the loops. The master integrals are evaluated by means of differential equations which are solved exploiting the generalised power series technique.
△ Less
Submitted 22 August, 2023;
originally announced August 2023.
-
Full top-quark mass dependence in diphoton production at NNLO in QCD
Authors:
Matteo Becchetti,
Roberto Bonciani,
Leandro Cieri,
Federico Coro,
Federico Ripani
Abstract:
In this paper we consider the diphoton production in hadronic collisions at the next-to-next-to-leading order (NNLO) in perturbative QCD, taking into account for the first time the full top quark mass dependence up to two loops (full NNLO). We show selected numerical distributions, highlighting the kinematic regions where the massive corrections are more significant. We make use of the recently co…
▽ More
In this paper we consider the diphoton production in hadronic collisions at the next-to-next-to-leading order (NNLO) in perturbative QCD, taking into account for the first time the full top quark mass dependence up to two loops (full NNLO). We show selected numerical distributions, highlighting the kinematic regions where the massive corrections are more significant. We make use of the recently computed two-loop massive amplitudes for diphoton production in the quark annihilation channel. The remaining massive contributions at NNLO are also considered, and we comment on the weight of the different types of contributions to the full and complete result.
△ Less
Submitted 30 November, 2023; v1 submitted 21 August, 2023;
originally announced August 2023.
-
Dispatching Point Selection for a Drone-Based Delivery System Operating in a Mixed Euclidean-Manhattan Grid
Authors:
Francesco Betti Sorbelli,
Federico Corò,
Sajal K. Das,
Cristina M. Pinotti,
Anil Shende
Abstract:
In this paper, we present a drone-based delivery system that assumes to deal with two different mixed-areas, i.e., rural and urban. In these mixed-areas, called EM-grids, the distances are measured with two different metrics, and the shortest path between two destinations concatenates the Euclidean and Manhattan metrics. Due to payload constraints, the drone serves a single customer at a time retu…
▽ More
In this paper, we present a drone-based delivery system that assumes to deal with two different mixed-areas, i.e., rural and urban. In these mixed-areas, called EM-grids, the distances are measured with two different metrics, and the shortest path between two destinations concatenates the Euclidean and Manhattan metrics. Due to payload constraints, the drone serves a single customer at a time returning back to the dispatching point (DP) after each delivery to load a new parcel for the next customer. In this paper, we present the 1-Median Euclidean-Manhattan grid Problem (MEMP) for EM-grids, whose goal is to determine the drone's DP position that minimizes the sum of the distances between all the locations to be served and the point itself. We study the MEMP on two different scenarios, i.e., one in which all the customers in the area need to be served (full-grid) and another one where only a subset of these must be served (partial-grid). For the full-grid scenario we devise optimal, approximation, and heuristic algorithms, while for the partial-grid scenario we devise optimal and heuristic algorithms. Eventually, we comprehensively evaluate our algorithms on generated synthetic and quasi-real data.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
A Novel Multi-Layer Framework for BVLoS Drone Operation: A Preliminary Study
Authors:
Francesco Betti Sorbelli,
Punyasha Chatterjee,
Federico Corò,
Lorenzo Palazzetti,
Cristina M. Pinotti
Abstract:
Drones have become increasingly popular in a variety of fields, including agriculture, emergency response, and package delivery. However, most drone operations are currently limited to within Visual Line of Sight (vlos) due to safety concerns. Flying drones Beyond Visual Line of Sight (bvlos) presents new challenges and opportunities, but also requires new technologies and regulatory frameworks, n…
▽ More
Drones have become increasingly popular in a variety of fields, including agriculture, emergency response, and package delivery. However, most drone operations are currently limited to within Visual Line of Sight (vlos) due to safety concerns. Flying drones Beyond Visual Line of Sight (bvlos) presents new challenges and opportunities, but also requires new technologies and regulatory frameworks, not yet implemented, to ensure that the drone is constantly under the control of a remote operator. In this preliminary study, we assume to remotely control the drone using the available ground cellular network infrastructure. We propose to plan bvlos drone operations using a novel multi-layer framework that includes many layers of constraints that closely resemble real-world scenarios and challenges. These layers include information such as the potential ground risk in the event of a drone failure, the available ground cellular network infrastructure, and the presence of ground obstacles. From the multi-layer framework, a graph is constructed whose edges are weighted with a dependability score that takes into account the information of the multi-layer framework. Then, the planning of bvlos drone missions is equivalent to solving the Maximum Path Dependability Problem on the constructed graph, which turns out to be solvable by applying Dijkstra's algorithm.
△ Less
Submitted 14 January, 2023;
originally announced January 2023.
-
Securing Federated Learning against Overwhelming Collusive Attackers
Authors:
Priyesh Ranjan,
Ashish Gupta,
Federico Corò,
Sajal K. Das
Abstract:
In the era of a data-driven society with the ubiquity of Internet of Things (IoT) devices storing large amounts of data localized at different places, distributed learning has gained a lot of traction, however, assuming independent and identically distributed data (iid) across the devices. While relaxing this assumption that anyway does not hold in reality due to the heterogeneous nature of device…
▽ More
In the era of a data-driven society with the ubiquity of Internet of Things (IoT) devices storing large amounts of data localized at different places, distributed learning has gained a lot of traction, however, assuming independent and identically distributed data (iid) across the devices. While relaxing this assumption that anyway does not hold in reality due to the heterogeneous nature of devices, federated learning (FL) has emerged as a privacy-preserving solution to train a collaborative model over non-iid data distributed across a massive number of devices. However, the appearance of malicious devices (attackers), who intend to corrupt the FL model, is inevitable due to unrestricted participation. In this work, we aim to identify such attackers and mitigate their impact on the model, essentially under a setting of bidirectional label flipping attacks with collusion. We propose two graph theoretic algorithms, based on Minimum Spanning Tree and k-Densest graph, by leveraging correlations between local models. Our FL model can nullify the influence of attackers even when they are up to 70% of all the clients whereas prior works could not afford more than 50% of clients as attackers. The effectiveness of our algorithms is ascertained through experiments on two benchmark datasets, namely MNIST and Fashion-MNIST, with overwhelming attackers. We establish the superiority of our algorithms over the existing ones using accuracy, attack success rate, and early detection round.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
(Eternal) Vertex Cover Number of Infinite and Finite Grid Graphs
Authors:
Tiziana Calamoneri,
Federico Corò
Abstract:
In the eternal vertex cover problem, mobile guards on the vertices of a graph are used to defend it against an infinite sequence of attacks on its edges by moving to neighbor vertices. The eternal vertex cover problem consists in determining the minimum number of necessary guards. Motivated by previous literature, in this paper, we study the vertex cover and eternal vertex cover problems on regula…
▽ More
In the eternal vertex cover problem, mobile guards on the vertices of a graph are used to defend it against an infinite sequence of attacks on its edges by moving to neighbor vertices. The eternal vertex cover problem consists in determining the minimum number of necessary guards. Motivated by previous literature, in this paper, we study the vertex cover and eternal vertex cover problems on regular grids, when passing from infinite to finite version of the same graphs, and we provide either coinciding or very tight lower and upper bounds on the number of necessary guards. To this aim, we generalize the notions of minimum vertex covers and minimum eternal vertex cover in order to be well defined for infinite grids.
△ Less
Submitted 12 September, 2022;
originally announced September 2022.
-
Multi-Depot Multi-Trip Vehicle Routing with Total Completion Time Minimization
Authors:
Tiziana Calamoneri,
Federico Corò,
Simona Mancini
Abstract:
Unmanned aerial vehicles (UAVs) are aircraft whose flights can be fully autonomous without any provision for human intervention. One of the most useful and promising domains where UAVs can be employed is natural disaster management.
In this paper, we focus on an emergency scenario and propose the use of a fleet of UAVs that help rescue teams to individuate people needing help inside an affected…
▽ More
Unmanned aerial vehicles (UAVs) are aircraft whose flights can be fully autonomous without any provision for human intervention. One of the most useful and promising domains where UAVs can be employed is natural disaster management.
In this paper, we focus on an emergency scenario and propose the use of a fleet of UAVs that help rescue teams to individuate people needing help inside an affected area. We model this situation as an original graph theoretical problem called Multi-Depot Multi-Trip Vehicle Routing Problem with Total Completion Times minimization (MDMT-VRP-TCT); we go through some problems already studied in the literature that appear somehow similar to it and highlight the differences, propose a mathematical formulation for our problem as a MILP, design a matheuristic framework to quickly solve large instances, and experimentally test its performance. Beyond the proposed application, our solution works in any case in which a multi-depot multi-trip vehicle routing problem must be solved.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Speeding up Routing Schedules on Aisle-Graphs with Single Access
Authors:
Francesco Betti Sorbelli,
Stefano Carpin,
Federico Coro,
Sajal K. Das,
Alfredo Navarra,
Cristina M. Pinotti
Abstract:
In this paper, we study the Orienteering Aisle-graphs Single-access Problem (OASP), a variant of the orienteering problem for a robot moving in a so-called single-access aisle-graph, i.e., a graph consisting of a set of rows that can be accessed from one side only. Aisle-graphs model, among others, vineyards or warehouses. Each aisle-graph vertex is associated with a reward that a robot obtains wh…
▽ More
In this paper, we study the Orienteering Aisle-graphs Single-access Problem (OASP), a variant of the orienteering problem for a robot moving in a so-called single-access aisle-graph, i.e., a graph consisting of a set of rows that can be accessed from one side only. Aisle-graphs model, among others, vineyards or warehouses. Each aisle-graph vertex is associated with a reward that a robot obtains when visits the vertex itself. As the robot's energy is limited, only a subset of vertices can be visited with a fully charged battery. The objective is to maximize the total reward collected by the robot with a battery charge. We first propose an optimal algorithm that solves OASP in O(m^2 n^2) time for aisle-graphs with a single access consisting of m rows, each with n vertices. With the goal of designing faster solutions, we propose four greedy sub-optimal algorithms that run in at most O(mn (m+n)) time. For two of them, we guarantee an approximation ratio of 1/2(1-1/e), where e is the base of the natural logarithm, on the total reward by exploiting the well-known submodularity property. Experimentally, we show that these algorithms collect more than 80% of the optimal reward.
△ Less
Submitted 10 February, 2021;
originally announced February 2021.
-
Energy-Constrained Delivery of Goods with Drones Under Varying Wind Conditions
Authors:
Francesco Betti Sorbelli,
Federico Corò,
Sajal K. Das,
Cristina M. Pinotti
Abstract:
In this paper, we study the feasibility of sending drones to deliver goods from a depot to a customer by solving what we call the Mission-Feasibility Problem (MFP). Due to payload constraints, the drone can serve only one customer at a time. To this end, we propose a novel framework based on time-dependent cost graphs to properly model the MFP and tackle the delivery dynamics. When the drone moves…
▽ More
In this paper, we study the feasibility of sending drones to deliver goods from a depot to a customer by solving what we call the Mission-Feasibility Problem (MFP). Due to payload constraints, the drone can serve only one customer at a time. To this end, we propose a novel framework based on time-dependent cost graphs to properly model the MFP and tackle the delivery dynamics. When the drone moves in the delivery area, the global wind may change thereby affecting the drone's energy consumption, which in turn can increase or decrease. This issue is addressed by designing three algorithms, namely: (i) compute the route of minimum energy once, at the beginning of the mission, (ii) dynamically reconsider the most convenient trip towards the destination, and (iii) dynamically select only the best local choice. We evaluate the performance of our algorithms on both synthetic and real-world data. The changes in the drone's energy consumption are reflected by changes in the cost of the edges of the graphs. The algorithms receive the new costs every time the drone flies over a new vertex, and they have no full knowledge in advance of the weights. We compare them in terms of the percentage of missions that are completed with success (the drone delivers the goods and comes back to the depot), with delivered (the drone delivers the goods but cannot come back to the depot), and with failure (the drone neither delivers the goods nor comes back to the depot).
△ Less
Submitted 16 December, 2020; v1 submitted 15 December, 2020;
originally announced December 2020.
-
Optimal Routing Schedules for Robots Operating in Aisle-Structures
Authors:
Francesco Betti Sorbelli,
Stefano Carpin,
Federico Corò,
Alfredo Navarra,
Cristina M. Pinotti
Abstract:
In this paper, we consider the Constant-cost Orienteering Problem (COP) where a robot, constrained by a limited travel budget, aims at selecting a path with the largest reward in an aisle-graph. The aisle-graph consists of a set of loosely connected rows where the robot can change lane only at either end, but not in the middle. Even when considering this special type of graphs, the orienteering pr…
▽ More
In this paper, we consider the Constant-cost Orienteering Problem (COP) where a robot, constrained by a limited travel budget, aims at selecting a path with the largest reward in an aisle-graph. The aisle-graph consists of a set of loosely connected rows where the robot can change lane only at either end, but not in the middle. Even when considering this special type of graphs, the orienteering problem is known to be NP-hard. We optimally solve in polynomial time two special cases, COP-FR where the robot can only traverse full rows, and COP-SC where the robot can access the rows only from one side. To solve the general COP, we then apply our special case algorithms as well as a new heuristic that suitably combines them. Despite its light computational complexity and being confined into a very limited class of paths, the optimal solutions for COP-FR turn out to be competitive even for COP in both real and synthetic scenarios. Furthermore, our new heuristic for the general case outperforms state-of-art algorithms, especially for input with highly unbalanced rewards.
△ Less
Submitted 15 September, 2019; v1 submitted 12 September, 2019;
originally announced September 2019.
-
Balancing spreads of influence in a social network
Authors:
Ruben Becker,
Federico Corò,
Gianlorenzo D'Angelo,
Hugo Gilbert
Abstract:
The personalization of our news consumption on social media has a tendency to reinforce our pre-existing beliefs instead of balancing our opinions. This finding is a concern for the health of our democracies which rely on an access to information providing diverse viewpoints. To tackle this issue from a computational perspective, Garimella et al. (NIPS'17) modeled the spread of these viewpoints, a…
▽ More
The personalization of our news consumption on social media has a tendency to reinforce our pre-existing beliefs instead of balancing our opinions. This finding is a concern for the health of our democracies which rely on an access to information providing diverse viewpoints. To tackle this issue from a computational perspective, Garimella et al. (NIPS'17) modeled the spread of these viewpoints, also called campaigns, using the well-known independent cascade model and studied an optimization problem that aims at balancing information exposure in a social network when two opposing campaigns propagate in the network. The objective in their $NP$-hard optimization problem is to maximize the number of people that are exposed to either both or none of the viewpoints. For two different settings, one corresponding to a model where campaigns spread in a correlated manner, and a second one, where the two campaigns spread in a heterogeneous manner, they provide constant ratio approximation algorithms. In this paper, we investigate a more general formulation of this problem. That is, we assume that $μ$ different campaigns propagate in a social network and we aim to maximize the number of people that are exposed to either $ν$ or none of the campaigns, where $μ\geν\ge2$. We provide dedicated approximation algorithms for both the correlated and heterogeneous settings. Interestingly, for the heterogeneous setting with $ν\ge 3$, we give a reduction leading to several approximation hardness results. Maybe most importantly, we obtain that the problem cannot be approximated within a factor of $n^{-g(n)}$ for any $g(n)=o(1)$ assuming Gap-ETH, denoting with $n$ the number of nodes in the social network. For $ν\ge 4$, there is no $n^{-ε}$-approximation algorithm if a certain class of one-way functions exists, where $ε> 0$ is a given constant which depends on $ν$.
△ Less
Submitted 31 May, 2019;
originally announced June 2019.
-
Election Control through Social Influence with Unknown Preferences
Authors:
Mohammad Abouei Mehrizi,
Federico Corò,
Emilio Cruciani,
Gianlorenzo D'Angelo
Abstract:
The election control problem through social influence asks to find a set of nodes in a social network of voters to be the starters of a political campaign aiming at supporting a given target candidate. Voters reached by the campaign change their opinions on the candidates. The goal is to shape the diffusion of the campaign in such a way that the chances of victory of the target candidate are maxim…
▽ More
The election control problem through social influence asks to find a set of nodes in a social network of voters to be the starters of a political campaign aiming at supporting a given target candidate. Voters reached by the campaign change their opinions on the candidates. The goal is to shape the diffusion of the campaign in such a way that the chances of victory of the target candidate are maximized. Previous work shows that the problem can be approximated within a constant factor in several models of information diffusion and voting systems, assuming that the controller, i.e., the external agent that starts the campaign, has full knowledge of the preferences of voters. However this information is not always available since some voters might not reveal it. Herein we relax this assumption by considering that each voter is associated with a probability distribution over the candidates. We propose two models in which, when an electoral campaign reaches a voter, this latter modifies its probability distribution according to the amount of influence it received from its neighbors in the network. We then study the election control problem through social influence on the new models: In the first model, under the Gap-ETH, election control cannot be approximated within a factor better than $1/n^{o(1)}$, where $n$ is the number of voters; in the second model, which is a slight relaxation of the first one, the problem admits a constant factor approximation algorithm.
△ Less
Submitted 13 July, 2020; v1 submitted 12 May, 2019;
originally announced May 2019.
-
On the fixed-parameter tractability of the maximum connectivity improvement problem
Authors:
Federico Corò,
Gianlorenzo D'Angelo,
Vahan Mkrtchyan
Abstract:
In the Maximum Connectivity Improvement (MCI) problem, we are given a directed graph $G=(V,E)$ and an integer $B$ and we are asked to find $B$ new edges to be added to $G$ in order to maximize the number of connected pairs of vertices in the resulting graph. The MCI problem has been studied from the approximation point of view. In this paper, we approach it from the parameterized complexity perspe…
▽ More
In the Maximum Connectivity Improvement (MCI) problem, we are given a directed graph $G=(V,E)$ and an integer $B$ and we are asked to find $B$ new edges to be added to $G$ in order to maximize the number of connected pairs of vertices in the resulting graph. The MCI problem has been studied from the approximation point of view. In this paper, we approach it from the parameterized complexity perspective in the case of directed acyclic graphs. We show several hardness and algorithmic results with respect to different natural parameters. Our main result is that the problem is $W[2]$-hard for parameter $B$ and it is FPT for parameters $|V| - B$ and $ν$, the matching number of $G$. We further characterize the MCI problem with respect to other complementary parameters.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
Exploiting Social Influence to Control Elections Based on Scoring Rules
Authors:
Federico Corò,
Emilio Cruciani,
Gianlorenzo D'Angelo,
Stefano Ponziani
Abstract:
Online social networks are used to diffuse opinions and ideas among users, enabling a faster communication and a wider audience. The way in which opinions are conditioned by social interactions is usually called social influence. Social influence is extensively used during political campaigns to advertise and support candidates. Herein we consider the problem of exploiting social influence in a ne…
▽ More
Online social networks are used to diffuse opinions and ideas among users, enabling a faster communication and a wider audience. The way in which opinions are conditioned by social interactions is usually called social influence. Social influence is extensively used during political campaigns to advertise and support candidates. Herein we consider the problem of exploiting social influence in a network of voters in order to change their opinion about a target candidate with the aim of increasing his chance to win/lose the election in a wide range of voting systems.
We introduce the Linear Threshold Ranking, a natural and powerful extension of the well-established Linear Threshold Model, which describes the change of opinions taking into account the amount of exercised influence. We are able to maximize the score of a target candidate up to a factor of $1-1/e$ by showing submodularity. We exploit such property to provide a $\frac{1}{3}(1-1/e)$-approximation algorithm for the constructive election control problem. Similarly, we get a $\frac{1}{2}(1-1/e)$-approximation ratio in the destructive scenario. The algorithm can be used in arbitrary scoring rule voting systems, including plurality rule and borda count. Finally, we perform an experimental study on real-world networks, measuring Probability of Victory (PoV) and Margin of Victory (MoV) of the target candidate, to validate the model and to test the capability of the algorithm.
△ Less
Submitted 2 July, 2019; v1 submitted 20 February, 2019;
originally announced February 2019.