“Flowery” language, global English, and scholarly communication

I really love language, but my desire to be idiomatic often runs athwart to the goals of scholarly communication. Especially when motivating a paper, I enjoy writing sentences such as this:

In the data-rich setting, at first blush it appears that learning algorithms can enjoy both low privacy risk and high utility.

(Yes, I know it’s passive). However, consider the poor graduate student for whom English is a second (or third) language – this sentence is needlessly confusing for them. If we are really honest, this is the dominant group of people who will actually read the paper, so if I am writing with my “target audience” in mind, I should eschew idioms, literary allusions, and the like. Technical papers should be written in a technical and global English (as opposed to a specific canonized World English).

Nevertheless, I want to write papers in a “writerly” way; I want to use the fact that my chosen career is one of constant writing as an opportunity to improve my communication skills, but I also want to play, to exploit the richness of English, and even to slip in the occasional pun. Am I a linguistic chauvinist? Unlike mathematicians, I never had to learn to read scholarly works in another language, so I have the luxury of lazily indulging my fantasies of being an Author.

When I review papers I often have many comments about grammatical issues, but perhaps in a global English of scholarly communication it doesn’t matter as long as the argument is intelligible. Do we need so many articles? Is consistent tense really that important? I think so, but I don’t have a philosophically consistent argument for what may appear, in situ, to be a prescriptivist attitude.

The cynical side of me says that nobody reads papers anyway, so there is no point in worrying about these issues or even spending time on the literary aspects of technical papers. Cynicism has never been very nourishing for me, though, so I am hoping for an alternative…

Readings

The Wizard of The Crow [N’gugi wa Thiong’o] — This is an epic political farce about an African dictatorship. It’s a bit slow getting into it, but once I was about 70 pages in I was hooked. It’s absolutely hilarious and tragic at the same time. I’ve not read a book like this in a while. Ngugi’s imagination is broad and open, so the absurd situations just keep escalating and mutating. One of the effects is that if you looked at the situation midway through the book, you would ordinarily have no idea how things came to such a state, but thanks to the storytelling you can see the absurd (yet stepwise somewhat reasonable) sequence of events that led there. From now on I will always have the phrase “queueing mania” in my head. Highly recommended.

Proofs and Refutations [Imre Lakatos] — “Why did I not read this book years ago?” I asked myself about a third of the way through this book. Lakatos breaks down the process of mathematical reasoning by example, showing how arguments (and statements) are refined through an alternating process of proof-strategies and counterexamples. It’s a bit of a dry read but it made me more excited about trying to take on some new and meatier theoretical problems. It also made me want to read some Feyerabend, which I am doing now…

The Crown of Embers [Rae Carson] — a continuation of Carson’s YA series set in a sort of pseudo Spanish colonialist fantasy land. It’s hard to parse out the politics of it, but I’m willing to see where the series goes before deciding if it is really subverts the typical racial essentialization that’s typical of fantasy. The colonial aspect of it makes it most problematic.

The Wee Free Men [Terry Pratchett] — a YA Discworld novel. Feels fresher than the other later Pratchett Discworld books.

Equal Rites [Terry Pratchett] — an early Discworld novel. Feels a little thinner than some of the others, but it had some cute moments.

The Republic of Wine [Mo Yan] — Another political farce, this time set in China. This has to be one of the more grotesque and crass novels I have read… maybe ever. The title might be better translated (and Americanized) as “Boozelandia.” The novel is part correspondence between an author (named Mo Yan) and an aspiring writer from the state of “Liquorland,” partly short stories by said aspiring writer, and partly a story about an investigator sent to ascertain whether state officials are raising children to be eaten at fancy dinners. It’s got a kind of gonzo style that will definitely appeal to some. I liked it in the end but I was also totally unaware of what I was getting into when I opened it.

Postdoc opening at UCSB

There’s an opening in Professor Madhow’s group at UC Santa Barbara:

We are looking for a postdoctoral researcher with a strong background in communications/signal processing/controls who is interested in applying these skills to a varied set of problems arising from a number of projects. These include hardware-adapted signal processing for communications and radar, neuro-inspired signal processing architectures, and inference in online social networks. In particular, familiarity with Bayesian inference is highly desirable, even if that is not the primary research area for his/her PhD. There are also opportunities to work on problems in next generation communication systems, including millimeter wave networking and distributed communication. While the researcher will be affiliated with Prof. Madhow’s group in the ECE Department at UCSB, depending on the problem(s) chosen, he/she may need to interact with faculty collaborators in other disciplines such as circuits, controls, computer science and neuroscience, as well as with colleagues with expertise in signal processing and communications. Thus, in addition to technical depth and talent, a flexible attitude and openness to interdisciplinary collaboration is essential.

Interested candidates should send a brief statement of research experience and interests and a CV (including the names and contact info for at least three references) to Prof. Upamanyu Madhow.

Linkage

The English version of the Japanese cooking site Cookpad was launched recently. The launch means more lunch for me!

In case you wanted to listen to old African vinyl albums, you’re in luck.

I have a burning-hot hatred of payday loan places, so this Pro Publica piece just stoked the fire.

Talking robots… in spaaaaaaaaace!

A tumblr on how we make progress in research.

My friend Amrys worked on the Serendip-o-matic, a tool that may be more useful for those in the humanities than us engineer types, but is pretty darn cool.

Obama nominates Córdova as new NSF director

Via Inside Higher Ed I saw that Obama has nominated France Anne Córdova as the new head of the NSF. Córdova may be most famous as NASA’s Chief Scientist, but after leaving NASA she had a series of administrative positions, most recently as President of Purdue.

Do any of the readers of the blog have an opinion about this choice? Also, given the GOP’s oft-expressed dislike of the NSF, will she ever get an actual Senate confirmation?

ISIT Blogging, part 3

I’ll round out the end of my ISIT blogging with very brief takes on a few more papers. I took it pretty casually this year in terms of note taking, and while I attended many more talks, my notes for most of them consist of a title and a star next to the ones where I want to look at the paper more closely. That’s probably closer to how most people attend conferences, only they probably use the proceedings book. I actually ended up shredding the large book of abstracts to use as bedding for my vermicompost (I figured they might appreciate eating a little Turkish paper for a change of diet).

On Connectivity Thresholds in Superposition of Random Key Graphs on Random Geometric Graphs
B Santhana Krishnan (Indian Institute of Technology, Bombay, India); Ayalvadi Ganesh (University of Bristol, United Kingdom); D. Manjunath (IIT Bombay, India)
This looked at a model where you have a random geometric graph (RGG) together with a uniformly chosen random subset S_i of \{ 1, 2, \ldots, P_n\} of size K_n at each node. The subset is the set of keys available at each node; two nodes can talk (securely) if they share a key in common. We keep the edge in the RGG is if the link can be secured. The question is whether the secure-link graph is connected. It turns out that the important scaling is in terms of r_n^2 K_n^2/P_n, where r_n is the connectivity radius of the RGG. This sort of makes sense, as the threshold is more or less \Theta(\log n/n), so the keys provide a kind of discount factor on effective radius needed for connectivity — if the number of keys per node is small then you need a larger radius to compensate.

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost
Nihar B Shah (University of California at Berkeley, USA); K. v. Rashmi (University of California at Berkeley, USA); Kannan Ramchandran (University of California at Berkeley, USA)
This paper was on secret sharing — a dealer wants to distribute n shares of a secret such that any k of them can be used to reconstruct the secret but k-1 or fewer cannot. The idea here is that the dealer has to distribute these shares over the network, which means that if a receiver is not connected directly to the dealer then the share will be passed insecurely through another node. Existing approaches based on pairwise agreement protocols are communication intensive. The idea here is use ideas from network coding to share masked versions of shares so that intermediate nodes will not get valid shares from others. To do this the graph needs to satisfy a particular condition (k-propagating), which is defined in the paper. A neat take on the problem, and worth looking at if you’re interested in that sort of thing.

Conditional Equivalence of Random Systems and Indistinguishability Proofs
Ueli Maurer (ETH Zurich, Switzerland)
This was scheduled to be in the same session as my paper with Vinod, but was moved to an earlier session. Maurer’s “programme” as it were, is to think about security via three kinds of systems — real systems with real protocols and pseudorandomness, idealized systems with real protocols but real randomness, and perfect systems which just exist on paper. The first two are trivially indistinguishable from a computational perspective, and the goal is to show that the last two are information-theoretically indistinguishable. This conceptual framework is actually useful for me to separate out the CS and IT sides of the security design question. This paper tried to set up a framework in which there is a distinguisher D which tries to make queries to two systems and based on the answers has to decide if they are different or not. I think if you’re interested in sort of a systems-theoretic take on security you should take a look at this.

Tight Bounds for Universal Compression of Large Alphabets
Jayadev Acharya (University of California, San Diego, USA); Hirakendu Das (University of California San Diego, USA); Ashkan Jafarpour (UCSD, USA); Alon Orlitsky (University of California, San Diego, USA); Ananda Theertha Suresh (University of California, San Diego, USA)
The main contribution of this paper was to derive bounds on compression of patterns of sequences over unknown/large alphabets. The main result is that the worst case pattern redundancy for i.i.d. distributions is basically n^{1/3} where n is the blocklength. The main result is a new upper bound which uses some tricks like sampling a random number of points, where the number of samples is Poisson distributed, and a partition of the set of distributions induced by Poisson sampling.

To Surprise and Inform
Lav R. Varshney (IBM Thomas J. Watson Research Center, USA)
Lav talked about communication over a channel where the goal is to communicate subject to a constraint on the Bayesian surprise s(x) = D( p(Y|x) \| P(Y) ) where X and Y are the input and output of the channel. He gets a single-letter expression for the capacity under a bound on the max surprise and gives an example for which the same distribuion maximizes mutual information and achieves the minimax surprise. The flip side is to ask for capacity when each output should be surprising (or “attention seeking”). He gets a single letter capacity here as well, but the structure of the solution seems to be a bit more complicated.

ISIT Blogging, part 2

Logarithmic Sobolev inequalities and strong data processing theorems for discrete channels
Maxim Raginsky (University of Illinois at Urbana-Champaign, USA)
Max talked about how the strong data processing inequality (DPI) is basically a log-Sobolev inequality (LSI) that is used in measure concentration. The strong DPI says that
D(QW \| PW) \le \alpha D(Q \| P)
for some \alpha < 1, so the idea is to get bounds on
\delta^*(P,W) = \sup_{Q} \frac{D(QW \| PW)}{D(Q \| P)}.
What he does is construct a hierarchy of LSIs in which the strong DPI fits and then gets bounds on this ratio in terms of best constants for LSIs. The details are a bit hairy, and besides, Max has his own blog so he can write more about it if he wants…

Building Consensus via Iterative Voting
Farzad Farnoud (University of Illinois, Urbana-Champaign, USA); Eitan Yaakobi (Caltech, USA); Behrouz Touri (University of Illinois Urbana-Champaign, USA); Olgica Milenkovic (University of Illinois, USA); Jehoshua Bruck (California Institute of Technology, USA)
This paper was about rank aggregation, or how to take a bunch of votes expressed as permutations/rankings of options to produce a final option. The model is one in which people iteratively change their ranking based on the current ranking. For example, one could construct the pairwise comparison graph (a la Condorcet) and then have people change their rankings when they disagree with the majority on an edge. They show conditions under which this process converges (the graph should not have a cycle) and show that if there is a Condorcet winner, then after this process everyone will rank the Condorcet winner first. They also look at a Borda count version of this problem but to my eye that just looked like an average consensus method, but it was at the end of the talk so I might have missed something.

Information-Theoretic Study of Voting Systems
Eitan Yaakobi (Caltech, USA); Michael Langberg (Open University of Israel, Israel); Jehoshua Bruck (California Institute of Technology, USA)
Eitan gave this talk and the preceding talk. This one was about looking at voting through the lens of coding theory. The main issue is this — what sets of votes or distribution of vote profiles will lead to a Condorcet winner? Given a set of votes, one could look at the fraction of candidates who rank candidate j in the i-th position and then try to compute entropies of the resulting distributions. The idea is somehow to characterize the existence or lack of a Condorcet winner in terms of distances (Kendall tau) and these entropy measures. This is different than looking at probability distributions on permutations and asking about the probability of there existing a Condorcet cycle.

Brute force searching, the typical set and Guesswork
Mark Chirstiansen (National University of Ireland Maynooth, Ireland); Ken R Duffy (National University of Ireland Maynooth, Ireland); Flávio du Pin Calmon (Massachusetts Institute of Technology, USA); Muriel Médard (MIT, USA)
Suppose an item X is chosen \sim P from a list and we want to guess the choice that is made. We’re only allowed to ask questions of the form “is the item Y?” Suppose now that the list is a list of codewords of blocklength k drawn i.i.d. according to Q. This paper looks at the number of guesses one needs if P is uniform on the typical set according to Q versus when P is distributed according the distribution Q^k conditioned on X being in the typical set. The non-uniformity of the latter turns out to make the guessing problem a lot easier.

Rumor Source Detection under Probabilistic Sampling
Nikhil Karamchandani (University of California Los Angeles, USA); Massimo Franceschetti (University of California at San Diego, USA)
This paper looked at an SI model of infection on a graph — nodes are either Susceptible (S) or Infected (I), and there is a probability of transitioning from S to I based on your neighbors’ states. There in exponential waiting time \tau_{ij} for the i to infect j if i is infected. The idea is that the rumor starts somewhere and infects a bunch of people and then you get to observe/measure the network. You want to find the source. This was studied by Zaman and Shah under the assumption of perfect observation of all nodes. This work looked at the case where nodes randomly report their infection state, so you only get an incomplete picture of the infection state. They characterize the effect of the reporting probability on the excess error and show that for certain tree graphs, incomplete reporting is as good as full reporting.

UCI Repository Citation Change

When making an editing pass over a bibliography today, I noticed that the citation for the UC Irvine Machine Learning Repository has changed. It used to be

@misc{Bache+Lichman:2013 ,
author = "A. Asuncion and D.H. Newman",
year = "2007",
title = "{UCI} Machine Learning Repository",
url = "http://archive.ics.uci.edu/ml",
institution = "University of California, Irvine, School of Information and Computer Sciences" }

But now it’s this:

@misc{Bache+Lichman:2013 ,
author = "K. Bache and M. Lichman",
year = "2013",
title = "{UCI} Machine Learning Repository",
url = "http://archive.ics.uci.edu/ml",
institution = "University of California, Irvine, School of Information and Computer Sciences" }

Also, the KDD repository has been merged in with the main repository, so the above is now the citation for both.

Update your BibTeX accordingly! (You too Kunal, but I bet you don’t cite this repo that much).