Add future work roadmap
Browse files
todo.md
ADDED
|
@@ -0,0 +1,48 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
# Future Work
|
| 2 |
+
|
| 3 |
+
## 1. Scale to 16-bit
|
| 4 |
+
|
| 5 |
+
Train a 16-bit parity network. Verification remains tractable (65,536 cases via `vm_compute`). This would reveal whether the architecture scales linearly or combinatorially with input size, and whether the pruning ratio holds at larger scales.
|
| 6 |
+
|
| 7 |
+
## 2. Different function
|
| 8 |
+
|
| 9 |
+
Apply the train→export→verify pipeline to problems beyond parity:
|
| 10 |
+
|
| 11 |
+
- **Majority vote**: output 1 if more than half of inputs are 1
|
| 12 |
+
- **Addition carry**: output the carry bit of two 4-bit numbers
|
| 13 |
+
- **Threshold-k**: output 1 if at least k inputs are 1
|
| 14 |
+
- **Simple classifiers**: functions where the optimal circuit structure is not obvious
|
| 15 |
+
|
| 16 |
+
These would test whether the methodology generalizes beyond symmetric Boolean functions.
|
| 17 |
+
|
| 18 |
+
## 3. Neuromorphic deployment
|
| 19 |
+
|
| 20 |
+
Deploy the network on actual neuromorphic hardware (Intel Loihi, IBM TrueNorth, BrainChip Akida) or a cycle-accurate simulator. Measure power consumption, latency, and resource utilization. Validate that the claimed use case—formally verified parity on hardware that cannot implement XOR gates—is practical.
|
| 21 |
+
|
| 22 |
+
## 4. Paper
|
| 23 |
+
|
| 24 |
+
Write up the methodology for publication. Key contributions:
|
| 25 |
+
|
| 26 |
+
- Evolutionary search for threshold networks on gradient-hostile loss landscapes
|
| 27 |
+
- Ternary weight quantization enabling exhaustive Coq verification
|
| 28 |
+
- Neuron ablation analysis and principled pruning
|
| 29 |
+
- End-to-end pipeline from training to formal proof
|
| 30 |
+
|
| 31 |
+
Target venues: CAV, ICML, NeurIPS, or a formal methods workshop.
|
| 32 |
+
|
| 33 |
+
## 5. Tooling
|
| 34 |
+
|
| 35 |
+
Package the pipeline into a unified CLI:
|
| 36 |
+
|
| 37 |
+
```
|
| 38 |
+
verified-nn --function parity --bits 8 --output model/
|
| 39 |
+
```
|
| 40 |
+
|
| 41 |
+
The tool would:
|
| 42 |
+
1. Train via evolutionary search until 100% accuracy
|
| 43 |
+
2. Export weights to Coq
|
| 44 |
+
3. Compile and verify proofs
|
| 45 |
+
4. Optionally run ablation and pruning
|
| 46 |
+
5. Output SafeTensors + verified Coq proofs
|
| 47 |
+
|
| 48 |
+
This would lower the barrier to creating new verified networks.
|