SlideShare a Scribd company logo
Progresses in the analysis of Stochastic
        2D cellular automata:
Asynchronous 2D Minority
         Nicolas SCHABANEL, CNRS CMM

                    Joint work with
      Damien REGNAULT & Éric THIERRY
     CMM, Univ. de Chile - IXXI - ÉNS LYON, France
Asynchronous Systems
Most of the real systems are asynchronous



•   Networks, physical particles, biological cells...
•   How does randomness introduced by
    asynchonicity affect the global behavior of
    these systems?
Example
                     A ring network
•   where each node has two states:
           “has a token” or “does not have a token”
•   running an algorithm that redistributes the tokens
    according to some rules/constraints:
      “I get a token if none of my neighbors have one” or
          “I get a token if my right neighbor has one”,...
•   Example of question
    How long does it take to reach a “stable configuration”?
Nature is an other
         example




Patterns are governed by rule 30 as the shell grows
2D Cellular automata
2D Cellular automata




At each time step, each cell updates its states
   according to the state of its neighbors
2D Cellular automata




At each time step, each cell updates its states
   according to the state of its neighbors
2D Cellular automata




 Extensively used in physics, biology,...
 What happens in asynchronism regims?
Cellular automata, here
• 0/1 state (0 = white & 1 = black)
• Full asynchronism
  A deamon chooses a random cell uniformly at
  random and updates it
• α-asynchronism
  Each cell is independently updated with
  probability 0 < α < 1
               Full synchronism: α = 1
        Full asynchronism: “limit” for α → 0
Cellular automata, here
• 0/1 state (0 = white & 1 = black)
• Full asynchronism
  A deamon chooses a random cell uniformly at
  random and updates it
• α-asynchronism
  Each cell is independently updated with
  probability 0 < α < 1
               Full synchronism: α = 1
        Full asynchronism: “limit” for α → 0
o
   m
  e
D
Historic
Ergodicity of deterministic CA with random noise
•   Toom - Gasc - Gray - Park - Louis (1974-)
Indecidability of independance to update history
•   Gacs (2002)
Empiral studies of asynchronism
•   Buvel, Ingerson - Bersini, Detour - Schönfish, de Roos (1995-)
Study of particular automata or classes of automata
•   Fuks (2004 -)
•   Fatès, Morvan, Regnault, S., Thierry (2005-)
•   Chassaing, Gerin (2007)
Historic: 1D automata
        6 types of relaxation times
                        [FMST 2005, FRST 2006, CG 2007]




(a) LOGARITHMIC (232)           (b) LINEAR (130)          (c) QUADRATIC (170)




(c’) QUADRATIC (146)         (d) EXPONENTIAL (210)        (e) DIVERGING (150)
Behavior         ACE (#)    Rule    01   10   010   101   Convergence
                                                                        0
                                              •    •
           Identity        204 (1)                       •     •
                                              •    •
                           200 (2)     E                       •
                                                        ✔
                                                                    Θ(n ln n)
       Coupon collector
232
                                              •    •
                           232 (1)    DE                ✔     ✔

                                              ←    •
                           206 (4)     B                 •     •

                                              ←    →
                           222 (2)    BC                 •     •

                                              ←    •
                           234 (4)    BDE               ✔     ✔

                                              ←    →
                           250 (2)   BCDE               ✔     ✔
          Monotone
                                              ←    •
                           202 (4)     BE                      •
                                                        ✔
                                                                      Θ(n2)
130
                                              →    •
                           192 (4)     EF                      •
                                                        ✔

                                              ←    →
                           218 (2)    BCE                      •
                                                        ✔

                                              →    ←
                           128 (2)    EFG                      •
                                                        ✔

                                              ←→   →
                           242 (4)   BCDEF              ✔     ✔
        Biased random
            walks
                                              ←→   ←
                           130 (4)    BEFG                     •
                                                        ✔

                                              ←→   •
                           226 (2)    BDEF              ✔     ✔

                                              ←    ←
                           170 (2)   BDEG               ✔     ✔
170
                                              ←→   ←→
                           178 (1)   BCDEFG             ✔     ✔
                                                                      Θ(n3)
        Random walks
                                              ←→   •
                           194 (4)    BEF                      •
                                                        ✔

                                              ←    ←
                           138 (4)    BEG                      •
                                                        ✔

                                              ←→   ←→
                           146 (2)   BCEFG                     •
                                                        ✔
210
                                              ←→   →                 Θ(n2n)
      Biased random walk   210 (4)    BCEF                     •
                                                        ✔

                                              ←→   •
                           198 (2)     BF                •     •

                                              ←    ←
                           142 (2)    BG                 •     •
                                                                     Diverging
          Diverging
150
                                              ←→   →
                           214 (4)    BCF                •     •

                                              ←→   ←→
                           150 (1)    BCFG               •     •
Fully asynchronous
        2D Minority
• 0/1 states
• n x m toric configurations
• A daemon selects uniformly at random a cell
  and the cell updates to the minority state
  among its 4 neighbors and itself.
Energy function
Potential. vij = #{neighbors in the same state as (i,j)}

Cell (i,j) is active if vij ≥ 2.

Energy of configuration c:
             Energy(c) = ∑(i,j) vij

Fact. The expected energy of a random configuration is
               2 N, where N = n m
Observed phase transition
  90%

  72%
                                                                          Energy at t = 25N
  54%

  36%                                                                     Energy at t = 100N
  18%

       0%
               0%    20%          40%      60%      80%         100%
                                                          αC ≈ 0.83
  α             0   0.20   0.50     0.80   0.82   0.83     0.84   0.85   0.90   0.95    1.00
t=100N t=25N
Observed phase transition
  90%

  72%
                    System does not                                       Energy at t = 25N
  54%
                      retain energy                          System
  36%                                                                     Energy at t = 100N
                                                             retains
  18%
                                                             energy
       0%
               0%    20%          40%      60%      80%         100%
                                                          αC ≈ 0.83
  α             0   0.20   0.50     0.80   0.82   0.83     0.84   0.85   0.90   0.95    1.00
t=100N t=25N
Observed phase transition
  90%
                    Fully asynchronous regime
  72%
                                                                             Energy at t = 25N
  54%

  36%                                                                        Energy at t = 100N
  18%

       0%
               0%       20%          40%      60%      80%         100%
                                                             αC ≈ 0.83
  α             0      0.20   0.50     0.80   0.82   0.83     0.84   0.85   0.90   0.95    1.00
t=100N t=25N
Energy is non-increasing
 when fully asynchronous
Theorem. The energy of a configuration is a non-
increasing function of time in fully asynchronous
dynamic.
Energy decreases by at least 4 each time a cell with
potential at least 3 is updated.

proof. ∆Energy = 8 - 4 vij, when (i,j) is updated.
Initial energy drop

Theorem. The energy of any configuration of
size N is at most N+2N/3 after O(N2) updates
on expectation.

proof. Any such configuration contains a
neighborhood in which a finite sequence of
updates decreases the energy by at least 1.
Borders
Borders
There is a red border between two neighboring cells in
the same state.
Borders
There is a red border between two neighboring cells in
the same state.
Borders
There is a red border between two neighboring cells in
the same state.




Fact. The borders are the boundaries of the covering
homogeneous checkerboards regions
Dual configurations
            (from now on, n and m are even)
dual configuration = configuration XOR checkerboard
Dual configurations
            (from now on, n and m are even)
dual configuration = configuration XOR checkerboard
Dual configurations
            (from now on, n and m are even)
dual configuration = configuration XOR checkerboard
Stable configurations
Stable configurations are made of cells with
potential ≤ 1, i.e. in contact with at most one border:



Fact. Stable configurations are made of an even number
of bands of width ≥ 2 tiled by alternating checkerboards.




                       of higher energy   of highest energy
    of lowest energy
Stable configurations
Stable configurations are made of cells with
potential ≤ 1, i.e. in contact with at most one border:



Fact. Stable configurations are made of an even number
of bands of width ≥ 2 tiled by alternating checkerboards.




                       of higher energy   of highest energy
    of lowest energy
Energy of configurations
       0                       N 5N/3 2N                          4N
               Stable &                    non-fixed point
           non-stable config.                configurations



 Lowest energy   Stable   Highest energy     Random High energy All black
Dual
Energy of configurations
         0                          N 5N/3 2N                          4N
                    Stable &                    non-fixed point
                non-stable config.                configurations

       Checker
        -board
 Lowest energy        Stable   Highest energy     Random High energy All black

         All
Dual




        white
Typical asynchronous
              2D minority


 t=0         t=N        t = 5N    t = 20N    t = 50N




t = 75N     t = 150N   t = 300N   t = 350N   t = 381N
Convergence is
            almost sure
Definition. The dynamics converges from an initial
configuration c0 if T = min{t : ct is stable} is almost
surely finite.
Theorem. For all c0, E(T) ≤ 2N•N2N.
Proof. The following is a sequence of at most 2N
updates that stabilizes any configuration:
  1. As long as there is an active black cell, flip it;
  2. As long as there is an active white cell, flip it.
This sequence is followed with probability 1/N2N.
Convergence is
           almost sure
Definition. The dynamics converges from an initial
configuration c0 if T = min{t : ct is stable} is almost
surely finite.
Theorem. For all c0, E(T) ≤ 2N•N2N.
Conjecture. If one of n or m is odd, the
convergence time can indeed be exponential.

      2n+1

                           2n3
Typical asynchronous
              2D minority


 t=0         t=N        t = 5N    t = 20N    t = 50N




t = 75N     t = 150N   t = 300N   t = 350N   t = 381N
Typical asynchronous
              2D minority configuration
                            Bounded




 t=0          t=N        t = 5N    t = 20N    t = 50N




t = 75N      t = 150N   t = 300N   t = 350N   t = 381N
Polynomial convergence
      (conjecture. It is true as soon as n and m are even)

We study bounded configuration, which are surrounded
by a checkerboard of width ≥ 2:
Polynomial convergence
      (conjecture. It is true as soon as n and m are even)

We study bounded configuration, which are surrounded
by a checkerboard of width ≥ 2:


                                                        The
                                                   surrounding
                                                  checkerboard
                                                     is stable
Typical evolution of a
   bounded configuration


 t=N      t = 5N    t = 10N   t = 15N




t = 20N   t = 25N   t = 30N   t = 35N
Dual evolution:
       Automaton OT976


 t=N       t = 5N    t = 10N   t = 15N




t = 20N    t = 25N   t = 30N   t = 35N
Rules of the primal and
             dual dynamics
 Primal
(Minority)

                    Active                 Active
                 Irreversible             Reversible               Inactive
              ∆E = -8 ∆E = -4              ∆E = 0

 Dual
Automaton
 OT976)
                                                              Border Surrounded
              Isolated   Peninsula    Corner       Bridge
             neighborhoods are considered with white/black symetries & rotations
Coupling with the
           HV-convex hull


 t=N         t = 5N    t = 10N   t = 15N




t = 20N      t = 25N   t = 30N   t = 35N
Coupling with the
           HV-convex hull


 t=N         t = 5N    t = 10N   t = 15N




t = 20N      t = 25N   t = 30N   t = 35N
Rules of the hull dynamic
 Primal
(Minority)

                                                                Inactive
                   Active                Active
                Irreversible            Reversible                         Black
             ∆E = -8 ∆E = -4             ∆E = 0
  Hull                                                                     Bridge
 (OT976
modified to
 preserve
   black                                           White
                                                               Border Surrounded
             Isolated Peninsula Corner
convexity)                                         Bridge
             neighborhoods are considered with white/black symetries & rotations
                   (with exception of the bridge for the white/black symetry)
Convergence
       Let ƒ = #black dual hull cells + Energy/4.
Lemma. For any island of the dual hull, E[∆ƒ] ≤ -3/N.




                             An island of the convex hull
Convergence
        Let ƒ = #black dual cells + Energy/4.
Lemma. For any island, E[∆ƒ] ≤ -3/N.
Proposition. For all bounded configuration,
   E[∆ƒ] ≤ (2 #island contacts - 3 #islands)/N
         ≤ -#islands/N.                 a
Theorem. Every bounded configuration converges
to the checkerboard configuration in finite time a.s..
The expected convergence time is:
                O(N • Initial area).
Conclusion
• An exponential upper bound on the
  convergence time.
• Polynomial convergence time for bounded
  configurations
  (can be extended to configuration with a
  checkerboard band of width ≥ 2)
• An useful energy function that defines proper
  statistical physics
• Similar results for the Moore-Neighborhood
Conjectures
• Phase transition at α ≈ 0.83.
                         c
              √
        3


•α=
         46 + 6969            16       2
                      −              +
                                 √
    c
             6          3 · 46 + 6969 3
                             3




• Some ideas to prove polynomial convergence
  time to checkerboard for α < 1/3 but...

• Strongly depends on the underlying network
  (a lot of differences on trees...)

• Generalization to the class of threshold automata
Thank you

More Related Content

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Progresses in the analysis of Stochastic 2D cellular automata: Asynchronous 2D Minority

  • 1. Progresses in the analysis of Stochastic 2D cellular automata: Asynchronous 2D Minority Nicolas SCHABANEL, CNRS CMM Joint work with Damien REGNAULT & Éric THIERRY CMM, Univ. de Chile - IXXI - ÉNS LYON, France
  • 2. Asynchronous Systems Most of the real systems are asynchronous • Networks, physical particles, biological cells... • How does randomness introduced by asynchonicity affect the global behavior of these systems?
  • 3. Example A ring network • where each node has two states: “has a token” or “does not have a token” • running an algorithm that redistributes the tokens according to some rules/constraints: “I get a token if none of my neighbors have one” or “I get a token if my right neighbor has one”,... • Example of question How long does it take to reach a “stable configuration”?
  • 4. Nature is an other example Patterns are governed by rule 30 as the shell grows
  • 6. 2D Cellular automata At each time step, each cell updates its states according to the state of its neighbors
  • 7. 2D Cellular automata At each time step, each cell updates its states according to the state of its neighbors
  • 8. 2D Cellular automata Extensively used in physics, biology,... What happens in asynchronism regims?
  • 9. Cellular automata, here • 0/1 state (0 = white & 1 = black) • Full asynchronism A deamon chooses a random cell uniformly at random and updates it • α-asynchronism Each cell is independently updated with probability 0 < α < 1 Full synchronism: α = 1 Full asynchronism: “limit” for α → 0
  • 10. Cellular automata, here • 0/1 state (0 = white & 1 = black) • Full asynchronism A deamon chooses a random cell uniformly at random and updates it • α-asynchronism Each cell is independently updated with probability 0 < α < 1 Full synchronism: α = 1 Full asynchronism: “limit” for α → 0
  • 11. o m e D
  • 12. Historic Ergodicity of deterministic CA with random noise • Toom - Gasc - Gray - Park - Louis (1974-) Indecidability of independance to update history • Gacs (2002) Empiral studies of asynchronism • Buvel, Ingerson - Bersini, Detour - Schönfish, de Roos (1995-) Study of particular automata or classes of automata • Fuks (2004 -) • Fatès, Morvan, Regnault, S., Thierry (2005-) • Chassaing, Gerin (2007)
  • 13. Historic: 1D automata 6 types of relaxation times [FMST 2005, FRST 2006, CG 2007] (a) LOGARITHMIC (232) (b) LINEAR (130) (c) QUADRATIC (170) (c’) QUADRATIC (146) (d) EXPONENTIAL (210) (e) DIVERGING (150)
  • 14. Behavior ACE (#) Rule 01 10 010 101 Convergence 0 • • Identity 204 (1) • • • • 200 (2) E • ✔ Θ(n ln n) Coupon collector 232 • • 232 (1) DE ✔ ✔ ← • 206 (4) B • • ← → 222 (2) BC • • ← • 234 (4) BDE ✔ ✔ ← → 250 (2) BCDE ✔ ✔ Monotone ← • 202 (4) BE • ✔ Θ(n2) 130 → • 192 (4) EF • ✔ ← → 218 (2) BCE • ✔ → ← 128 (2) EFG • ✔ ←→ → 242 (4) BCDEF ✔ ✔ Biased random walks ←→ ← 130 (4) BEFG • ✔ ←→ • 226 (2) BDEF ✔ ✔ ← ← 170 (2) BDEG ✔ ✔ 170 ←→ ←→ 178 (1) BCDEFG ✔ ✔ Θ(n3) Random walks ←→ • 194 (4) BEF • ✔ ← ← 138 (4) BEG • ✔ ←→ ←→ 146 (2) BCEFG • ✔ 210 ←→ → Θ(n2n) Biased random walk 210 (4) BCEF • ✔ ←→ • 198 (2) BF • • ← ← 142 (2) BG • • Diverging Diverging 150 ←→ → 214 (4) BCF • • ←→ ←→ 150 (1) BCFG • •
  • 15. Fully asynchronous 2D Minority • 0/1 states • n x m toric configurations • A daemon selects uniformly at random a cell and the cell updates to the minority state among its 4 neighbors and itself.
  • 16. Energy function Potential. vij = #{neighbors in the same state as (i,j)} Cell (i,j) is active if vij ≥ 2. Energy of configuration c: Energy(c) = ∑(i,j) vij Fact. The expected energy of a random configuration is 2 N, where N = n m
  • 17. Observed phase transition 90% 72% Energy at t = 25N 54% 36% Energy at t = 100N 18% 0% 0% 20% 40% 60% 80% 100% αC ≈ 0.83 α 0 0.20 0.50 0.80 0.82 0.83 0.84 0.85 0.90 0.95 1.00 t=100N t=25N
  • 18. Observed phase transition 90% 72% System does not Energy at t = 25N 54% retain energy System 36% Energy at t = 100N retains 18% energy 0% 0% 20% 40% 60% 80% 100% αC ≈ 0.83 α 0 0.20 0.50 0.80 0.82 0.83 0.84 0.85 0.90 0.95 1.00 t=100N t=25N
  • 19. Observed phase transition 90% Fully asynchronous regime 72% Energy at t = 25N 54% 36% Energy at t = 100N 18% 0% 0% 20% 40% 60% 80% 100% αC ≈ 0.83 α 0 0.20 0.50 0.80 0.82 0.83 0.84 0.85 0.90 0.95 1.00 t=100N t=25N
  • 20. Energy is non-increasing when fully asynchronous Theorem. The energy of a configuration is a non- increasing function of time in fully asynchronous dynamic. Energy decreases by at least 4 each time a cell with potential at least 3 is updated. proof. ∆Energy = 8 - 4 vij, when (i,j) is updated.
  • 21. Initial energy drop Theorem. The energy of any configuration of size N is at most N+2N/3 after O(N2) updates on expectation. proof. Any such configuration contains a neighborhood in which a finite sequence of updates decreases the energy by at least 1.
  • 23. Borders There is a red border between two neighboring cells in the same state.
  • 24. Borders There is a red border between two neighboring cells in the same state.
  • 25. Borders There is a red border between two neighboring cells in the same state. Fact. The borders are the boundaries of the covering homogeneous checkerboards regions
  • 26. Dual configurations (from now on, n and m are even) dual configuration = configuration XOR checkerboard
  • 27. Dual configurations (from now on, n and m are even) dual configuration = configuration XOR checkerboard
  • 28. Dual configurations (from now on, n and m are even) dual configuration = configuration XOR checkerboard
  • 29. Stable configurations Stable configurations are made of cells with potential ≤ 1, i.e. in contact with at most one border: Fact. Stable configurations are made of an even number of bands of width ≥ 2 tiled by alternating checkerboards. of higher energy of highest energy of lowest energy
  • 30. Stable configurations Stable configurations are made of cells with potential ≤ 1, i.e. in contact with at most one border: Fact. Stable configurations are made of an even number of bands of width ≥ 2 tiled by alternating checkerboards. of higher energy of highest energy of lowest energy
  • 31. Energy of configurations 0 N 5N/3 2N 4N Stable & non-fixed point non-stable config. configurations Lowest energy Stable Highest energy Random High energy All black Dual
  • 32. Energy of configurations 0 N 5N/3 2N 4N Stable & non-fixed point non-stable config. configurations Checker -board Lowest energy Stable Highest energy Random High energy All black All Dual white
  • 33. Typical asynchronous 2D minority t=0 t=N t = 5N t = 20N t = 50N t = 75N t = 150N t = 300N t = 350N t = 381N
  • 34. Convergence is almost sure Definition. The dynamics converges from an initial configuration c0 if T = min{t : ct is stable} is almost surely finite. Theorem. For all c0, E(T) ≤ 2N•N2N. Proof. The following is a sequence of at most 2N updates that stabilizes any configuration: 1. As long as there is an active black cell, flip it; 2. As long as there is an active white cell, flip it. This sequence is followed with probability 1/N2N.
  • 35. Convergence is almost sure Definition. The dynamics converges from an initial configuration c0 if T = min{t : ct is stable} is almost surely finite. Theorem. For all c0, E(T) ≤ 2N•N2N. Conjecture. If one of n or m is odd, the convergence time can indeed be exponential. 2n+1 2n3
  • 36. Typical asynchronous 2D minority t=0 t=N t = 5N t = 20N t = 50N t = 75N t = 150N t = 300N t = 350N t = 381N
  • 37. Typical asynchronous 2D minority configuration Bounded t=0 t=N t = 5N t = 20N t = 50N t = 75N t = 150N t = 300N t = 350N t = 381N
  • 38. Polynomial convergence (conjecture. It is true as soon as n and m are even) We study bounded configuration, which are surrounded by a checkerboard of width ≥ 2:
  • 39. Polynomial convergence (conjecture. It is true as soon as n and m are even) We study bounded configuration, which are surrounded by a checkerboard of width ≥ 2: The surrounding checkerboard is stable
  • 40. Typical evolution of a bounded configuration t=N t = 5N t = 10N t = 15N t = 20N t = 25N t = 30N t = 35N
  • 41. Dual evolution: Automaton OT976 t=N t = 5N t = 10N t = 15N t = 20N t = 25N t = 30N t = 35N
  • 42. Rules of the primal and dual dynamics Primal (Minority) Active Active Irreversible Reversible Inactive ∆E = -8 ∆E = -4 ∆E = 0 Dual Automaton OT976) Border Surrounded Isolated Peninsula Corner Bridge neighborhoods are considered with white/black symetries & rotations
  • 43. Coupling with the HV-convex hull t=N t = 5N t = 10N t = 15N t = 20N t = 25N t = 30N t = 35N
  • 44. Coupling with the HV-convex hull t=N t = 5N t = 10N t = 15N t = 20N t = 25N t = 30N t = 35N
  • 45. Rules of the hull dynamic Primal (Minority) Inactive Active Active Irreversible Reversible Black ∆E = -8 ∆E = -4 ∆E = 0 Hull Bridge (OT976 modified to preserve black White Border Surrounded Isolated Peninsula Corner convexity) Bridge neighborhoods are considered with white/black symetries & rotations (with exception of the bridge for the white/black symetry)
  • 46. Convergence Let ƒ = #black dual hull cells + Energy/4. Lemma. For any island of the dual hull, E[∆ƒ] ≤ -3/N. An island of the convex hull
  • 47. Convergence Let ƒ = #black dual cells + Energy/4. Lemma. For any island, E[∆ƒ] ≤ -3/N. Proposition. For all bounded configuration, E[∆ƒ] ≤ (2 #island contacts - 3 #islands)/N ≤ -#islands/N. a Theorem. Every bounded configuration converges to the checkerboard configuration in finite time a.s.. The expected convergence time is: O(N • Initial area).
  • 48. Conclusion • An exponential upper bound on the convergence time. • Polynomial convergence time for bounded configurations (can be extended to configuration with a checkerboard band of width ≥ 2) • An useful energy function that defines proper statistical physics • Similar results for the Moore-Neighborhood
  • 49. Conjectures • Phase transition at α ≈ 0.83. c √ 3 •α= 46 + 6969 16 2 − + √ c 6 3 · 46 + 6969 3 3 • Some ideas to prove polynomial convergence time to checkerboard for α < 1/3 but... • Strongly depends on the underlying network (a lot of differences on trees...) • Generalization to the class of threshold automata