text
stringlengths 137
2.43k
| field
stringclasses 2
values | label
int64 0
1
|
---|---|---|
Title: Free Brownian motion and free convolution semigroups: multiplicative case
Abstract: We consider a pair of probability measures $\mu,\nu$ on the unit circle such that $\Sigma_{\lambda}(\eta_{\nu}(z))=z/\eta_{\mu}(z)$. We prove that the same type of equation holds for any $t\geq 0$ when we replace $\nu$ by $\nu\boxtimes\lambda_t$ and $\mu$ by $\mathbb{M}_t(\mu)$, where $\lambda_t$ is the free multiplicative analogue of the normal distribution on the unit circle of $\mathbb{C}$ and $\mathbb{M}_t$ is the map defined by Arizmendi and Hasebe. These equations are a multiplicative analogue of equations studied by Belinschi and Nica. In order to achieve this result, we study infinite divisibility of the measures associated with subordination functions in multiplicative free Brownian motion and multiplicative free convolution semigroups. We use the modified $\mathcal{S}$-transform introduced by Raj Rao and Speicher to deal with the case that $\nu$ has mean zero. The same type of the result holds for convolutions on the positive real line. We also obtain some regularity properties for the free multiplicative analogue of the normal distributions. | math | 1 |
Title: Lossy Compression of Individual Sequences Revisited: Fundamental Limits of Finite-State Encoders
Abstract: We extend Ziv and Lempel's model of finite-state encoders to the realm of lossy compression of individual sequences. In particular, the model of the encoder includes a finite-state reconstruction codebook followed by an information lossless finite-state encoder that compresses the reconstruction codeword with no additional distortion. We first derive two different lower bounds to the compression ratio that depend on the number of states of the lossless encoder. Both bounds are asymptotically achievable by conceptually simple coding schemes. We then show that when the number of states of the lossless encoder is large enough in terms of the reconstruction block-length, the performance can be improved, sometimes significantly so. In particular, the improved performance is achievable using a random-coding ensemble that is universal, not only in terms of the source sequence, but also in terms of the distortion measure. | cs | 0 |
Title: Error Inhibiting Block One-Step Schemes for Ordinary Differential Equations
Abstract: The commonly used one step methods and linear multi-step methods all have a global error that is of the same order as the local truncation error (as defined in \cite{gustafsson1995time,quarteroni2010numerical,AllenIsaacson,IsaacsonKeller,Sewell}). In fact, this is true of the entire class of general linear methods. In practice, this means that the order of the method is typically defined solely by the order conditions which are derived by studying the local truncation error. In this work, we investigate the interplay between the local truncation error and the global error, and develop a methodology which defines the construction of explicit {\em error inhibiting} block one-step methods (alternatively written as explicit general linear methods \cite{butcher1993a}). These {\em error inhibiting schemes} are constructed so that the accumulation of the local truncation error over time is controlled, which results in a global error that is one order higher than the local truncation error. In this work, we delineate how to carefully choose the coefficient matrices so that the growth of the local truncation error is inhibited. We then use this theoretical understanding to construct several methods that have higher order global error than local truncation error, and demonstrate their enhanced order of accuracy on test cases. These methods demonstrate that the error inhibiting concept is realizable. Future work will further develop new error inhibiting methods and will analyze the computational efficiency and linear stability properties of these methods. | math | 1 |
Title: Local wellposedness for the quasilinear Schrödinger equations via the generalized energy method
Abstract: We study the global Cauchy problem of the quasilinear Schr\"odinger equations, for which KENIG et al. (Invent Math, 2004; Adv Math, 2006) obtained short time local wellposedness with large data by pseudo-differential techniques and viscosity methods, while MARZUOLA et al. (Adv Math, 2012; Kyoto J Math, 2014; Arch Ration Mech Anal, 2021) improved the results by dispersive arguments. In this paper, we introduce the generalized energy method that can close the bounds by combining momentum and energy estimates and derive the results by viscosity methods. The whole arguments basically only involve integration by parts and Sobolev embedding inequalities, just like the classical local existence theorem for semilinear Schr\"odinger equations. For quadratic interaction problem with small data, we derive low regularity local wellposedness in the same function spaces as in the works of Kenig et al. For cubic interaction problem, we obtain the same low regularity results as in Marzuola et al. (Kyoto J Math, 2014). | math | 0 |
Title: Characteristic Mode Decomposition Using the Scattering Dyadic in Arbitrary Full-Wave Solvers
Abstract: Characteristic modes are formulated using the scattering dyadic, which maps incident plane waves to scattered far fields generated by an object of arbitrary material composition. Numerical construction of the scattering dyadic using arbitrary full-wave electromagnetic solvers is demonstrated in examples involving a variety of dielectric and magnetic materials. Wrapper functions for computing characteristic modes in method-of-moments, finite-difference time domain, and finite element solvers are provided as supplementary material. | cs | 1 |
Title: A note about the invariance of the basic reproduction number for stochastically perturbed SIS models
Abstract: We try to justify rigorously, using a Wong-Zakai approximation argument, the susceptible-infected-susceptible (SIS) stochastic differential equation proposed in [2]. We discover that according to this approach the "right" stochastic model to be considered should be the Stratonovich version of the It\^o equation analyzed in [2]. Surprisingly, this alternative model presents the following feature: the threshold value characterizing the two different asymptotic regimes of the solution coincides with the one describing the classical SIS deterministic equation. | math | 1 |
Title: Multiclass Common Spatial Pattern for EEG based Brain Computer Interface with Adaptive Learning Classifier
Abstract: In Brain Computer Interface (BCI), data generated from Electroencephalogram (EEG) is non-stationary with low signal to noise ratio and contaminated with artifacts. Common Spatial Pattern (CSP) algorithm has been proved to be effective in BCI for extracting features in motor imagery tasks, but it is prone to overfitting. Many algorithms have been devised to regularize CSP for two class problem, however they have not been effective when applied to multiclass CSP. Outliers present in data affect extracted CSP features and reduces performance of the system. In addition to this non-stationarity present in the features extracted from the CSP present a challenge in classification. We propose a method to identify and remove artifact present in the data during pre-processing stage, this helps in calculating eigenvectors which in turn generates better CSP features. To handle the non-stationarity, Self-Regulated Interval Type-2 Neuro-Fuzzy Inference System (SRIT2NFIS) was proposed in the literature for two class EEG classification problem. This paper extends the SRIT2NFIS to multiclass using Joint Approximate Diagonalization (JAD). The results on standard data set from BCI competition IV shows significant increase in the accuracies from the current state of the art methods for multiclass classification. | cs | 1 |
Title: The Density Formula: One Lemma to Bound Them All
Abstract: We introduce the Density Formula for (topological) drawings of graphs in the plane or on the sphere, which relates the number of edges, vertices, crossings, and sizes of cells in the drawing. We demonstrate its capability by providing several applications: we prove tight upper bounds on the edge density of various beyond-planar graph classes, including so-called $k$-planar graphs with $k=1,2$, fan-crossing / fan-planar graphs, $k$-bend RAC-graphs with $k=0,1,2$, and quasiplanar graphs. In some cases ($1$-bend and $2$-bend RAC-graphs and fan-crossing / fan-planar graphs), we thereby obtain the first tight upper bounds on the edge density of the respective graph classes. In other cases, we give new streamlined and significantly shorter proofs for bounds that were already known in the literature. Thanks to the Density Formula, all of our proofs are mostly elementary counting and mostly circumvent the typical intricate case analysis found in earlier proofs. Further, in some cases (simple and non-homotopic quasiplanar graphs), our alternative proofs using the Density Formula lead to the first tight lower bound examples. | math | 0 |
Title: BPS algebras and generalised Kac-Moody algebras from 2-Calabi-Yau categories
Abstract: We determine the structure of the BPS algebra of $2$-Calabi-Yau Abelian categories whose stack of objects admits a good moduli space. We prove that this algebra is isomorphic to the positive part of the enveloping algebra of a generalised Kac-Moody Lie algebra generated by the intersection cohomology of certain connected components (corresponding to roots) of the good moduli space. Some major examples include the BPS algebras of (1) the category of semistable coherent sheaves of given slope on a K3 surface or, more generally, quasiprojective symplectic surface, (2) semistable Higgs bundles on smooth projective curves, (3) preprojective algebras of quivers, (4) multiplicative preprojective algebras and (5) fundamental groups of (quiver) Riemann surfaces. We define the BPS Lie algebras of $2$-Calabi-Yau categories and prove that they coincide with the ones obtained by dimensional reduction from the critical cohomological Hall algebra in the case in which the 2-Calabi-Yau category is the category of representations of a preprojective algebra. Consequences include (1) A proof in full generality of the Bozec-Schiffmann positivity conjecture for absolutely cuspidal polynomials, a strengthening of the Kac positivity conjecture (2) A proof of the cohomological integrality conjecture for the category of semistable coherent sheaves on local K3 surfaces (3) A description of the cohomology (in all degrees) of Nakajima quiver varieties as direct sums of irreducible lowest weight representations over the BPS Lie algebra. | math | 0 |
Title: Neural Additive Vector Autoregression Models for Causal Discovery in Time Series
Abstract: Causal structure discovery in complex dynamical systems is an important challenge for many scientific domains. Although data from (interventional) experiments is usually limited, large amounts of observational time series data sets are usually available. Current methods that learn causal structure from time series often assume linear relationships. Hence, they may fail in realistic settings that contain nonlinear relations between the variables. We propose Neural Additive Vector Autoregression (NAVAR) models, a neural approach to causal structure learning that can discover nonlinear relationships. We train deep neural networks that extract the (additive) Granger causal influences from the time evolution in multi-variate time series. The method achieves state-of-the-art results on various benchmark data sets for causal discovery, while providing clear interpretations of the mapped causal relations. | cs | 1 |
Title: Identifiability of Covariance Kernels in the Gaussian Process Regression Model
Abstract: Gaussian process regression (GPR) model is a popular nonparametric regression model. In GPR, features of the regression function such as varying degrees of smoothness and periodicities are modeled through combining various covarinace kernels, which are supposed to model certain effects. The covariance kernels have unknown parameters which are estimated by the EM-algorithm or Markov Chain Monte Carlo. The estimated parameters are keys to the inference of the features of the regression functions, but identifiability of these parameters has not been investigated. In this paper, we prove identifiability of covariance kernel parameters in two radial basis mixed kernel GPR and radial basis and periodic mixed kernel GPR. We also provide some examples about non-identifiable cases in such mixed kernel GPRs. | math | 1 |
Title: The Natural Selection of Conservative Science
Abstract: Social epistemologists have argued that high risk, high reward science has an important role to play in scientific communities. Recently, though, it has also been argued that various scientific fields seem to be trending towards conservatism -- the increasing production of what Kuhn (1970) would have called `normal science'. This paper will explore a possible explanation for this sort of trend: that the process by which scientific research groups form, grow, and dissolve might be inherently hostile to high risk science. In particular, I employ a paradigm developed by Smaldino and McElreath (2016) that treats a scientific community as a population undergoing selection. As will become clear, perhaps counter-intuitively this sort of process in some ways promotes high risk, high reward science. But, as I will point out, high risk high reward science is, in general, the sort of thing that is hard to repeat. While more conservative scientists will be able to train students capable of continuing their successful projects, and so create thriving lineages, successful risky science may not be the sort of thing one can easily pass on. In such cases, the structure of scientific communities selects against high risk, high rewards projects. More generally, this paper makes clear that there are at least two processes to consider in thinking about how incentives shape scientific communities -- the process by which individual scientists make choices about their careers and research, and the selective process governing the formation of new research groups. | cs | 1 |
Title: Set-valued propagation of chaos for controlled path-dependent McKean-Vlasov SPDEs
Abstract: We develop a limit theory for controlled path-dependent mean field stochastic partial differential equations (SPDEs) within the semigroup approach of Da Prato and Zabczyk. More precisely, we prove existence results for mean field limits and particle approximations, and we establish set-valued propagation of chaos in the sense that we show convergence of sets of empirical distributions to sets of mean field limits in the Hausdorff metric topology. Furthermore, we discuss consequences of our results to stochastic optimal control. As another application, we deduce a propagation of chaos result for Peng's $G$-Brownian motion with drift interaction. | math | 0 |
Title: Two Equivalent Families of Linear Fully Coupled Forward Backward Stochastic Differential Equations
Abstract: In this paper, we investigate two families of fully coupled linear Forward-Backward Stochastic Differential Equations (FBSDE). Within these families, one could get the same well-posedness of FBSDEs with totally different structures. The first family of FBSDEs are proved to be equivalent with respect to the Unified Approach. Thus one could get the well-posedness of the whole family if one member exists a unique solution. Another equivalent family of FBSDEs are investigated by introducing a linear transformation method. By reason of the fully coupling structure between the forward and backward equations, it leads to a highly interdependence in solutions. We are able to lower the coupling of FBSDEs, by virtue of the idea of transformation, without losing the well-posedness. Moreover, owing to the non-degeneracy of the transformation matrix, the solution to original FBSDE is totally determined by solutions of FBSDE after transformation. In addition, an example of optimal Linear Quadratic (LQ) problem is presented to illustrate. | math | 1 |
Title: Preference as Reward, Maximum Preference Optimization with Importance Sampling
Abstract: Preference learning is a key technology for aligning language models with human values. Reinforcement Learning from Human Feedback (RLHF) is a model based algorithm to optimize preference learning, which first fitting a reward model for preference score, and then optimizing generating policy with on-policy PPO algorithm to maximize the reward. The processing of RLHF is complex, time-consuming and unstable. Direct Preference Optimization (DPO) algorithm using off-policy algorithm to direct optimize generating policy and eliminating the need for reward model, which is data efficient and stable. DPO use Bradley-Terry model and log-loss which leads to over-fitting to the preference data at the expense of ignoring KL-regularization term when preference near deterministic. IPO uses a root-finding pairwise MSE loss to solve the ignoring KL-regularization problem, and learning an optimal policy. But IPO's pairwise loss still can't s make the KL-regularization to work. In this paper, we design a simple and intuitive off-policy preferences optimization algorithm from an importance sampling view, and add an off-policy KL-regularization term which makes KL-regularization truly effective. To simplify the learning process and save memory usage, we can generate regularization data in advance, which eliminate the needs for both reward model and reference policy in the stage of optimization. | cs | 0 |
Title: On Choosing Committees Based on Approval Votes in the Presence of Outliers
Abstract: We study the computational complexity of committee selection problem for several approval-based voting rules in the presence of outliers. Our first result shows that outlier consideration makes committee selection problem intractable for approval, net approval, and minisum approval voting rules. We then study parameterized complexity of this problem with five natural parameters, namely the target score, the size of the committee (and its dual parameter, the number of candidates outside the committee), the number of outliers (and its dual parameter, the number of non-outliers). For net approval and minisum approval voting rules, we provide a dichotomous result, resolving the parameterized complexity of this problem for all subsets of five natural parameters considered (by showing either FPT or W[1]-hardness for all subsets of parameters). For the approval voting rule, we resolve the parameterized complexity of this problem for all subsets of parameters except one. We also study approximation algorithms for this problem. We show that there does not exist any alpha(.) factor approximation algorithm for approval and net approval voting rules, for any computable function alpha(.), unless P=NP. For the minisum voting rule, we provide a pseudopolynomial (1+eps) factor approximation algorithm. | cs | 1 |
Title: Quantum ergodicity on the Bruhat-Tits building for $\text{PGL}(3, F)$ in the Benjamini-Schramm limit
Abstract: We study joint eigenfunctions of the spherical Hecke algebra acting on $L^2(\Gamma_n \backslash G / K)$ where $G = \text{PGL}(3, F)$ with $F$ a non-archimedean local field of arbitrary characteristic, $K = \text{PGL}(3, O)$ with $O$ the ring of integers of $F$, and $(\Gamma_n)$ is a sequence of torsion-free lattices. We prove a form of equidistribution on average for eigenfunctions whose spectral parameters lie in the tempered spectrum when the associated sequence of quotients of the Bruhat-Tits building Benjamini-Schramm converges to the building itself. This result is a higher rank non-archimedean analogue of existing results for graphs and locally symmetric spaces. A recurring theme in the proof is the reduction of many computations to computing the sum of an exponential function over lattice points in a polytope; such expressions can subsequently be simplified using Brion's formula. Along the way of proving our main result we prove several other results which may be of independent interest including a "degenerate" version of Brion's formula which "interpolates" between the usual Brion's formula and the Ehrhart polynomial, an effective rate of convergence for the distribution of spectral parameters to the Plancherel measure under Benjamini-Schramm convergence, and a classification of relative positions of triples of points in buildings of type $\tilde{A}_2$. | math | 0 |
Title: On irrationality measure of Thue-Morse constant
Abstract: We provide a non-trivial measure of irrationality for a class of Mahler numbers defined with infinite products which cover the Thue-Morse constant. | math | 1 |
Title: Filtrations for $\mathbb{wK4}$ and its relatives
Abstract: We study the finite model property of subframe logics with expressible transitive reflexive closure modality. For $m>0$, let $\mathrm{L}_m$ be the logic given by axiom $\lozenge^{m+1} p\to \lozenge p\vee p$. We construct filtrations for the logics $\mathrm{L}_m$. It follows that these logics and their tense counterparts have the finite model property. Then we show that every canonical subframe logic that contains $\mathrm{L}_m$ have the finite model property. | math | 0 |
Title: Examining the Challenges in Archiving Instagram
Abstract: To prevent the spread of disinformation on Instagram, we need to study the accounts and content of disinformation actors. However, due to their malicious nature, Instagram often bans accounts that are responsible for spreading disinformation, making these accounts inaccessible from the live web. The only way we can study the content of banned accounts is through public web archives such as the Internet Archive. However, there are many issues present with archiving Instagram pages. Specifically, we focused on the issue that many Wayback Machine Instagram mementos redirect to the Instagram login page. In this study, we determined that mementos of Instagram account pages on the Wayback Machine began redirecting to the Instagram login page in August 2019. We also found that Instagram mementos on Archive.today, Arquivo.pt, and Perma.cc are also not well archived in terms of quantity and quality. Moreover, we were unsuccessful in all our attempts to archive Katy Perry's Instagram account page on Archive.today, Arquivo.pt, and Conifer. Although in the minority, replayable Instagram mementos exist in public archives and contain valuable data for studying disinformation on Instagram. With that in mind, we developed a Python script to web scrape Instagram mementos. As of August 2023, the Python script can scrape Wayback Machine archives of Instagram account pages between November 7, 2012 and June 8, 2018. | cs | 0 |
Title: Effective Aspects of Bernoulli Randomness
Abstract: In this paper, we study Bernoulli random sequences, i.e., sequences that are Martin-L\"of random with respect to a Bernoulli measure $\mu_p$ for some $p\in[0,1]$, where we allow for the possibility that $p$ is noncomputable. We focus in particular on the case in which the underlying Bernoulli parameter $p$ is proper (that is, Martin-L\"of random with respect to some computable measure). We show for every Bernoulli parameter $p$, if there is a sequence that is both proper and Martin-L\"of random with respect to $\mu_p$, then $p$ itself must be proper, and explore further consequences of this result. We also study the Turing degrees of Bernoulli random sequences, showing, for instance, that the Turing degrees containing a Bernoulli random sequence do not coincide with the Turing degrees containing a Martin-L\"of random sequence. Lastly, we consider several possible approaches to characterizing blind Bernoulli randomness, where the corresponding Martin-L\"of tests do not have access to the Bernoulli parameter $p$, and show that these fail to characterize blind Bernoulli randomness. | math | 1 |
Title: Lifespan of Solution to MHD Boundary Layer Equations with Analytic Perturbation of General Shear Flow
Abstract: In this paper, we consider the lifespan of solution to the MHD boundary layer system as an analytic perturbation of general shear flow. By using the cancellation mechanism in the system observed in \cite{LXY1}, the lifespan of solution is shown to have a lower bound in the order of $\varepsilon^{-2+}$ if the strength of the perturbation is of the order of $\varepsilon$. Since there is no restriction on the strength of the shear flow and the lifespan estimate is larger than the one obtained for the classical Prandtl system in this setting, it reveals the stabilizing effect of the magnetic field on the electrically conducting fluid near the boundary. | math | 1 |
Title: The combinatorics of Farey words and their traces
Abstract: The set of Kleinian groups which are free on two parabolic generators is parameterised by the closed Riley slice of Schottky space. A Farey word is a word in such a group which represents a non-boundary-parallel geodesic that can be pinched down to a puncture; in the interior of the Riley slice such a word is loxodromic, and the pinching process corresponds to deforming the word to be parabolic. Keen and Series showed that the geometry of the Riley slice is detected by the real loci of the trace polynomials of these words. We study these trace polynomials from a combinatorial viewpoint, and give a recursion formula for them which enables efficient calculation of the polynomials without performing matrix multiplication; we also present some intriguing examples to show that there is much still to be learned about them. | math | 1 |
Title: The Zilber-Pink Conjecture and the Generalized Cosmetic Surgery Conjecture
Abstract: In this paper, we generalize the Cosmetic Surgery Conjecture to an $n$-cusped hyperbolic $3$-manifold and prove it under the assumption of another well-known conjecture in number theory, so called the Zilber-Pink Conjecture. For $n=1$ and $2$, we show them without the assumption. | math | 1 |
Title: On the lack of external response of a nonlinear medium in the second-harmonic generation process
Abstract: This paper concerns the scattering problem for a nonlinear medium of compact support, $D$, with second-harmonic generation. Such a medium, when probed with monochromatic light beams at frequency $\omega$, generates additional waves at frequency $2\omega$. The response of the medium is governed by a system of two coupled semilinear partial differential equations for the electric fields at frequency $\omega$ and $2\omega$. We investigate whether there are situations in which the generated $2\omega$ wave is localized inside $D$, that is, the nonlinear interaction of the medium with the probing wave is invisible to an outside observer. This leads to the analysis of a semilinear elliptic system formulated in $D$ with non-standard boundary conditions. The analysis presented here sets up a mathematical framework needed to investigate a multitude of questions related to nonlinear scattering with second-harmonic generation. | math | 0 |
Title: On the hierarchical Bayesian modelling of frequency response functions
Abstract: For situations that may benefit from information sharing among datasets, e.g., population-based SHM of similar structures, the hierarchical Bayesian approach provides a useful modelling structure. Hierarchical Bayesian models learn statistical distributions at the population (or parent) and the domain levels simultaneously, to bolster statistical strength among the parameters. As a result, variance is reduced among the parameter estimates, particularly when data are limited. In this paper, a combined probabilistic FRF model is developed for a small population of nominally-identical helicopter blades, using a hierarchical Bayesian structure, to support information transfer in the context of sparse data. The modelling approach is also demonstrated in a traditional SHM context, for a single helicopter blade exposed to varying temperatures, to show how the inclusion of physics-based knowledge can improve generalisation beyond the training data, in the context of scarce data. These models address critical challenges in SHM, by accommodating benign variations that present as differences in the underlying dynamics, while also considering (and utilising), the similarities among the domains. | cs | 0 |
Title: Extremal results for random discrete structures
Abstract: We study thresholds for extremal properties of random discrete structures. We determine the threshold for Szemer\'edi's theorem on arithmetic progressions in random subsets of the integers and its multidimensional extensions and we determine the threshold for Tur\'an-type problems for random graphs and hypergraphs. In particular, we verify a conjecture of Kohayakawa, \L uczak, and R\"odl for Tur\'an-type problems in random graphs. Similar results were obtained by Conlon and Gowers. | math | 1 |
Title: Mixing trichotomy for an Ehrenfest urn with impurities
Abstract: We consider a version of the classical Ehrenfest urn model with two urns and two types of balls: regular and heavy. Each ball is selected independently according to a Poisson process having rate $1$ for regular balls and rate $\alpha\in(0,1)$ for heavy balls, and once a ball it is selected is placed in a urn uniformly at random. We study the asymptotic behavior when the total number of balls, $N$, goes to infinity, and the number of heavy ball is set to $\lfloor N^\beta\rfloor$ for some $\beta\in[0,1]$. We focus on the observable given by the total number of balls in the left urn, which converges to a binomial distribution of parameter $1/2$, regardless of the choice of the two parameters, $\alpha$ and $\beta$. We study the speed of convergence and show that this can exhibit three different phenomenologies depending on the choice of the two parameters of the model. | math | 0 |
Title: On the Ideal Number of Groups for Isometric Gradient Propagation
Abstract: Recently, various normalization layers have been proposed to stabilize the training of deep neural networks. Among them, group normalization is a generalization of layer normalization and instance normalization by allowing a degree of freedom in the number of groups it uses. However, to determine the optimal number of groups, trial-and-error-based hyperparameter tuning is required, and such experiments are time-consuming. In this study, we discuss a reasonable method for setting the number of groups. First, we find that the number of groups influences the gradient behavior of the group normalization layer. Based on this observation, we derive the ideal number of groups, which calibrates the gradient scale to facilitate gradient descent optimization. Our proposed number of groups is theoretically grounded, architecture-aware, and can provide a proper value in a layer-wise manner for all layers. The proposed method exhibited improved performance over existing methods in numerous neural network architectures, tasks, and datasets. | cs | 1 |
Title: Weyl modules for the hyperspecial current algebra
Abstract: We develop the theory of global and local Weyl modules for the hyperspecial maximal parabolic subalgebra of type $A_{2n}^{(2)}$. We prove that the dimension of a local Weyl module depends only on its highest weight, thus establishing a freeness result for global Weyl modules. Furthermore, we show that the graded local Weyl modules are level one Demazure modules for the corresponding affine Lie algebra. In the last section we derive the same results for the special maximal parabolic subalgebras of the twisted affine Lie algebras not of type $A_{2n}^{(2)}$. | math | 1 |
Title: On sets of graded attribute implications with witnessed non-redundancy
Abstract: We study properties of particular non-redundant sets of if-then rules describing dependencies between graded attributes. We introduce notions of saturation and witnessed non-redundancy of sets of graded attribute implications are show that bases of graded attribute implications given by systems of pseudo-intents correspond to non-redundant sets of graded attribute implications with saturated consequents where the non-redundancy is witnessed by antecedents of the contained graded attribute implications. We introduce an algorithm which transforms any complete set of graded attribute implications parameterized by globalization into a base given by pseudo-intents. Experimental evaluation is provided to compare the method of obtaining bases for general parameterizations by hedges with earlier graph-based approaches. | cs | 1 |
Title: The limiting shape of a full mailbox
Abstract: We study a model for email communication due to Gabrielli and Caldarelli, where someone receives and answers emails at the times of independent Poisson processes with intensities $\lambda_{\rm in}>\lambda_{\rm out}$. The receiver assigns i.i.d. priorities to incoming emails according to some atomless law and always answers the email in the mailbox with the highest priority. Since the frequency of incoming emails is higher than the frequency of answering, below a critical priority, the mailbox fills up ad infinitum. We prove a theorem about the limiting shape of the mailbox just above the critical point, linking it to the convex hull of Brownian motion. We conjecture that this limiting shape is universal in a class of similar models, including a model for the evolution of an order book due to Stigler and Luckock. | math | 1 |
Title: A reduced order variational multiscale approach for turbulent flows
Abstract: The purpose of this work is to present a reduced order modeling framework for parametrized turbulent flows with moderately high Reynolds numbers within the variational multiscale (VMS) method. The Reduced Order Models (ROMs) presented in this manuscript are based on a POD-Galerkin approach with a VMS stabilization technique. Two different reduced order models are presented, which differ on the stabilization used during the Galerkin projection. In the first case the VMS stabilization method is used at both the full order and the reduced order level. In the second case, the VMS stabilization is used only at the full order level, while the projection of the standard Navier-Stokes equations is performed instead at the reduced order level. The former method is denoted as consistent ROM, while the latter is named non-consistent ROM, in order to underline the different choices made at the two levels. Particular attention is also devoted to the role of inf-sup stabilization by means of supremizers in ROMs based on a VMS formulation. Finally, the developed methods are tested on a numerical benchmark. | math | 1 |
Title: How Do Pedestrians' Perception Change toward Autonomous Vehicles during Unmarked Midblock Multilane Crossings: Role of AV Operation and Signal Indication
Abstract: One of the primary impediments hindering the widespread acceptance of autonomous vehicles (AVs) among pedestrians is their limited comprehension of AVs. This study employs virtual reality (VR) to provide pedestrians with an immersive environment for engaging with and comprehending AVs during unmarked midblock multilane crossings. Diverse AV driving behaviors were modeled to exhibit negotiation behavior with a yellow signal indication or non-yielding behavior with a blue signal indication. This paper aims to investigate the impact of various factors, such as AV behavior and signaling, pedestrian past behavior, etc., on pedestrians' perception change of AVs. Before and after the VR experiment, participants completed surveys assessing their perception of AVs, focusing on two main aspects: "Attitude" and "System Effectiveness." The Wilcoxon signed-rank test results demonstrated that both pedestrians' overall attitude score toward AVs and trust in the effectiveness of AV systems significantly increased following the VR experiment. Notably, individuals who exhibited a greater trust in the yellow signals were more inclined to display a higher attitude score toward AVs and to augment their trust in the effectiveness of AV systems. This indicates that the design of the yellow signal instills pedestrians with greater confidence in their interactions with AVs. Further, pedestrians who exhibit more aggressive crossing behavior are less likely to change their perception towards AVs as compared to those pedestrians with more positive crossing behaviors. It is concluded that integrating this paper's devised AV behavior and signaling within an immersive VR setting facilitated pedestrian engagement with AVs, thereby changing their perception of AVs. | cs | 0 |
Title: To Push or To Pull: On Reducing Communication and Synchronization in Graph Computations
Abstract: We reduce the cost of communication and synchronization in graph processing by analyzing the fastest way to process graphs: pushing the updates to a shared state or pulling the updates to a private state.We investigate the applicability of this push-pull dichotomy to various algorithms and its impact on complexity, performance, and the amount of used locks, atomics, and reads/writes. We consider 11 graph algorithms, 3 programming models, 2 graph abstractions, and various families of graphs. The conducted analysis illustrates surprising differences between push and pull variants of different algorithms in performance, speed of convergence, and code complexity; the insights are backed up by performance data from hardware counters.We use these findings to illustrate which variant is faster for each algorithm and to develop generic strategies that enable even higher speedups. Our insights can be used to accelerate graph processing engines or libraries on both massively-parallel shared-memory machines as well as distributed-memory systems. | cs | 1 |
Title: The correspondence between silting objects and $t$-structures for non-positive dg algebras
Abstract: We establish a bijective correspondence between isomorphism classes of basic silting objects of $\mathsf{per}(A)$ and algebraic $t$-structures of $\mathsf{D}_{\rm fd}(A)$ for locally finite non-positive dg algebra $A$ over a field $k$ (more generally, we work in the setting of ST-pair inside an algebraic triangulated category). For a non-positive (topologically) homologically smooth dg $k$-algebra $A$ whose zeroth cohomology is finite-dimensional, or for a non-positive proper dg $k$-algebra $A$, the one-to-one correspondence between isomorphism classes of basic silting objects of $\mathsf{per}(A)$ and algebraic $t$-structures on $\mathsf{D}_{\rm fd}(A)$ was already known. The main result of this paper generalizes the above two results to locally finite non-positive dg $k$-algebras. | math | 0 |
Title: Improving Sequential Query Recommendation with Immediate User Feedback
Abstract: We propose an algorithm for next query recommendation in interactive data exploration settings, like knowledge discovery for information gathering. The state-of-the-art query recommendation algorithms are based on sequence-to-sequence learning approaches that exploit historical interaction data. Due to the supervision involved in the learning process, such approaches fail to adapt to immediate user feedback. We propose to augment the transformer-based causal language models for query recommendations to adapt to the immediate user feedback using multi-armed bandit (MAB) framework. We conduct a large-scale experimental study using log files from a popular online literature discovery service and demonstrate that our algorithm improves the per-round regret substantially, with respect to the state-of-the-art transformer-based query recommendation models, which do not make use of immediate user feedback. Our data model and source code are available at https://github.com/shampp/exp3_ss | cs | 1 |
Title: Same Influenza, Different Responses: Social Media Can Sense a Regional Spectrum of Symptoms
Abstract: Influenza is an acute respiratory infection caused by a virus. It is highly contagious and rapidly mutative. However, its epidemiological characteristics are conventionally collected in terms of outpatient records. In fact, the subjective bias of the doctor emphasizes exterior signs, and the necessity of face-to-face inquiry results in an inaccurate and time-consuming manner of data collection and aggregation. Accordingly, the inferred spectrum of syndromes can be incomplete and lagged. With a massive number of users being sensors, online social media can indeed provide an alternative approach. Voluntary reports in Twitter and its variants can deliver not only exterior signs but also interior feelings such as emotions. These sophisticated signals can further be efficiently collected and aggregated in a real-time manner, and a comprehensive spectrum of syndromes could thus be inferred. Taking Weibo as an example, it is confirmed that a regional spectrum of symptoms can be credibly sensed. Aside from the differences in symptoms and treatment incentives between northern and southern China, it is also surprising that patients in the south are more optimistic, while those in the north demonstrate more intense emotions. The differences sensed from Weibo can even help improve the performance of regressions in monitoring influenza. Our results suggest that self-reports from social media can be profound supplements to the existing clinic-based systems for influenza surveillance. | cs | 1 |
Title: Product Formula of Artin Symbols in Non-abelian Extensions
Abstract: The product formula of Artin symbols (norm residue symbols) is an important equality that connects local and global class field theory. Usually, the product formula of Artin symbols is considered in abelian extensions of global fields. In this paper, however, the product is considered in non-abelian extensions such that each symbol is well-defined. As an application, some properties on fundamental units of real quadratic fields are obtained and will be presented here. | math | 0 |
Title: Unified Diffusion-Based Rigid and Non-Rigid Editing with Text and Image Guidance
Abstract: Existing text-to-image editing methods tend to excel either in rigid or non-rigid editing but encounter challenges when combining both, resulting in misaligned outputs with the provided text prompts. In addition, integrating reference images for control remains challenging. To address these issues, we present a versatile image editing framework capable of executing both rigid and non-rigid edits, guided by either textual prompts or reference images. We leverage a dual-path injection scheme to handle diverse editing scenarios and introduce an integrated self-attention mechanism for fusion of appearance and structural information. To mitigate potential visual artifacts, we further employ latent fusion techniques to adjust intermediate latents. Compared to previous work, our approach represents a significant advance in achieving precise and versatile image editing. Comprehensive experiments validate the efficacy of our method, showcasing competitive or superior results in text-based editing and appearance transfer tasks, encompassing both rigid and non-rigid settings. | cs | 0 |
Title: Cohomology for quantum groups via the geometry of the nullcone
Abstract: Let $\zeta$ be a complex $\ell$th root of unity for an odd integer $\ell>1$. For any complex simple Lie algebra $\mathfrak g$, let $u_\zeta=u_\zeta({\mathfrak g})$ be the associated "small" quantum enveloping algebra. In general, little is known about the representation theory of quantum groups (resp., algebraic groups) when $l$ (resp., $p$) is smaller than the Coxeter number $h$ of the underlying root system. For example, Lusztig's conjecture concerning the characters of the rational irreducible $G$-modules stipulates that $p \geq h$. The main result in this paper provides a surprisingly uniform answer for the cohomology algebra $\opH^\bullet(u_\zeta,{\mathbb C})$ of the small quantum group. When $\ell>h$, this cohomology algebra has been calculated by Ginzburg and Kumar \cite{GK}. Our result requires powerful tools from complex geometry and a detailed knowledge of the geometry of the nullcone of $\mathfrak g$. In this way, the methods point out difficulties present in obtaining similar results for the restricted enveloping algebra $u$ in small characteristics, though they do provide some clarification of known results there also. Finally, we establish that if $M$ is a finite dimensional $u_\zeta$-module, then $\opH^\bullet(u_\zeta,M)$ is a finitely generated $\opH^\bullet(u_\zeta,\mathbb C)$-module, and we obtain new results on the theory of support varieties for $u_\zeta$. | math | 1 |
Title: Bounds for the Quartic Weyl Sum
Abstract: We improve the standard Weyl estimate for quartic exponential sums in which the argument is a quadratic irrational. Specifically we show that \[\sum_{n\le N} e(\alpha n^4)\ll_{\ep,\alpha}N^{5/6+\ep}\] for any $\ep>0$ and any quadratic irrational $\alpha\in\R-\Q$. Classically one would have had the exponent $7/8+\ep$ for such $\alpha$. In contrast to the author's earlier work \cite{cubweyl} on cubic Weyl sums (which was conditional on the $abc$-conjecture), we show that the van der Corput $AB$-steps are sufficient for the quartic case, rather than the $BAAB$-process needed for the cubic sum. | math | 0 |
Title: R(3,10) <= 41
Abstract: We improve the upper bound on the Ramsey number R(3,10) from 42 to 41. Hence R(3,10) is equal to 40 or 41. | math | 0 |
Title: Transparent Contribution Evaluation for Secure Federated Learning on Blockchain
Abstract: Federated Learning is a promising machine learning paradigm when multiple parties collaborate to build a high-quality machine learning model. Nonetheless, these parties are only willing to participate when given enough incentives, such as a fair reward based on their contributions. Many studies explored Shapley value based methods to evaluate each party's contribution to the learned model. However, they commonly assume a semi-trusted server to train the model and evaluate the data owners' model contributions, which lacks transparency and may hinder the success of federated learning in practice. In this work, we propose a blockchain-based federated learning framework and a protocol to transparently evaluate each participant's contribution. Our framework protects all parties' privacy in the model building phase and transparently evaluates contributions based on the model updates. The experiment with the handwritten digits dataset demonstrates that the proposed method can effectively evaluate the contributions. | cs | 1 |
Title: Multiple Access Techniques for Intelligent and Multi-Functional 6G: Tutorial, Survey, and Outlook
Abstract: Multiple access (MA) is a crucial part of any wireless system and refers to techniques that make use of the resource dimensions to serve multiple users/devices/machines/services, ideally in the most efficient way. Given the needs of multi-functional wireless networks for integrated communications, sensing, localization, computing, coupled with the surge of machine learning / artificial intelligence (AI) in wireless networks, MA techniques are expected to experience a paradigm shift in 6G and beyond. In this paper, we provide a tutorial, survey and outlook of past, emerging and future MA techniques and pay a particular attention to how wireless network intelligence and multi-functionality will lead to a re-thinking of those techniques. The paper starts with an overview of orthogonal, physical layer multicasting, space domain, power domain, ratesplitting, code domain MAs, and other domains, and highlight the importance of researching universal multiple access to shrink instead of grow the knowledge tree of MA schemes by providing a unified understanding of MA schemes across all resource dimensions. It then jumps into rethinking MA schemes in the era of wireless network intelligence, covering AI for MA such as AI-empowered resource allocation, optimization, channel estimation, receiver designs, user behavior predictions, and MA for AI such as federated learning/edge intelligence and over the air computation. We then discuss MA for network multi-functionality and the interplay between MA and integrated sensing, localization, and communications. We finish with studying MA for emerging intelligent applications before presenting a roadmap toward 6G standardization. We also point out numerous directions that are promising for future research. | cs | 0 |
Title: Secure Multiparty Computation with Partial Fairness
Abstract: A protocol for computing a functionality is secure if an adversary in this protocol cannot cause more harm than in an ideal computation where parties give their inputs to a trusted party which returns the output of the functionality to all parties. In particular, in the ideal model such computation is fair -- all parties get the output. Cleve (STOC 1986) proved that, in general, fairness is not possible without an honest majority. To overcome this impossibility, Gordon and Katz (Eurocrypt 2010) suggested a relaxed definition -- 1/p-secure computation -- which guarantees partial fairness. For two parties, they construct 1/p-secure protocols for functionalities for which the size of either their domain or their range is polynomial (in the security parameter). Gordon and Katz ask whether their results can be extended to multiparty protocols. We study 1/p-secure protocols in the multiparty setting for general functionalities. Our main result is constructions of 1/p-secure protocols when the number of parties is constant provided that less than 2/3 of the parties are corrupt. Our protocols require that either (1) the functionality is deterministic and the size of the domain is polynomial (in the security parameter), or (2) the functionality can be randomized and the size of the range is polynomial. If the size of the domain is constant and the functionality is deterministic, then our protocol is efficient even when the number of parties is O(log log n) (where n is the security parameter). On the negative side, we show that when the number of parties is super-constant, 1/p-secure protocols are not possible when the size of the domain is polynomial. | cs | 1 |
Title: Neighbourhood Evaluation Criteria for Vertex Cover Problem
Abstract: Neighbourhood Evaluation Criteria is a heuristical approximate algorithm that attempts to solve the Minimum Vertex Cover. degree count is kept in check for each vertex and the highest count based vertex is included in our cover set. In the case of multiple equivalent vertices, the one with the lowest neighbourhood influence is selected. In the case of still existing multiple equivalent vertices, the one with the lowest remaining active vertex count (the highest Independent Set enabling count) is selected as a tie-breaker. | cs | 1 |
Title: On the boundary of the central quadratic hyperbolic component
Abstract: We give a concrete description for the boundary of the central quadratic hyperbolic component. The connectedness of the Julia sets of the boundary maps are also considered. | math | 0 |
Title: The dynamics of the heterochaos baker maps
Abstract: The heterochaos baker maps are piecewise affine maps of the unit square or cube introduced by Saiki et al. (2018), to provide a hands-on, elementary understanding of complicated phenomena in systems of large degrees of freedom. We review recent progress on a dynamical systems theory of the heterochaos baker maps, and present new results on properties of measures of maximal entropy and the underlying Lebesgue measure. We address several conjectures and questions that may illuminate new aspects of heterochaos and inspire future research. | math | 0 |
Title: A Decision Method for Elementary Stream Calculus
Abstract: The main result is a doubly exponential decision procedure for the first-order equality theory of streams with both arithmetic and control-oriented stream operations. This stream logic is expressive for elementary problems of stream calculus. | cs | 0 |
Title: Non-associative Frobenius algebras of type $E_7$
Abstract: Recently, Maurice Chayet and Skip Garibaldi introduced a class of commutative non-associative algebras. In previous work, we gave an explicit description of these algebras for groups of type $G_2,F_4$ and certain forms of $E_6$ in terms of octonion and Albert algebras. In this paper, we extend this further by dealing with $E_7$ in terms of generalised Freudenthal triple systems. | math | 0 |
Title: Scale invariant elliptic operators with singular coefficients
Abstract: We show that a realization of the operator $L=|x|^\alpha\Delta +c|x|^{\alpha-1}\frac{x}{|x|}\cdot\nabla -b|x|^{\alpha-2}$ generates a semigroup in $L^p(\mathbb {R}^N)$ if and only if $D_c=b+(N-2+c)^2/4 > 0$ and $s_1+\min\{0,2-\alpha\}<N/p<s_2+\max\{0,2-\alpha\}$, where $s_i$ are the roots of the equation $b+s(N-2+c-s)=0$, or $D_c=0$ and $s_0+\min\{0,2-\alpha\} \le N/p \le s_0+\max\{0,2-\alpha\}$, where $s_0$ is the unique root of the above equation. The domain of the generator is also characterized. | math | 1 |
Title: On Cayley graphs of algebraic structures
Abstract: We present simple graph-theoretic characterizations of Cayley graphs for left-cancellative monoids, groups, left-quasigroups and quasigroups. We show that these characterizations are effective for the end-regular graphs of finite degree. | cs | 1 |
Title: Deployment and configuration of MEC apps with Simu5G
Abstract: Multi-access Edge Computing (MEC) is expected to act as the enabler for the integration of 5G (and future 6G) communication technologies with cloud-computing-based capabilities at the edge of the network. This will enable low-latency and context-aware applications for users of such mobile networks. In this paper we describe the implementation of a MEC model for the Simu5G simulator and illustrate how to configure the environment to evaluate MEC applications in both simulation and real-time emulation modes. | cs | 1 |
Title: Hamilton--Jacobi equations for Wasserstein controlled gradient flows: existence of viscosity solutions
Abstract: This work is the third part of a program initiated in arXiv:2111.13258, arXiv:2302.06571 aiming at the development of an intrinsic geometric well-posedness theory for Hamilton-Jacobi equations related to controlled gradient flow problems in metric spaces. In this paper, we finish our analysis in the context of Wasserstein gradient flows with underlying energy functional satisfying McCann's condition. More prescisely, we establish that the value function for a linearly controlled gradient flow problem whose running cost is quadratic in the control variable and just continuous in the state variable yields a viscosity solution to the Hamilton-Jacobi equation in terms of two operators introduced in our former works, acting as rigorous upper and lower bounds for the formal Hamiltonian at hand. The definition of these operators is directly inspired by the Evolutional Variational Inequality formulation of gradient flows (EVI): one of the main innovations of this work is to introduce a controlled version of EVI, which turns out to be crucial in establishing regularity properties, energy and metric bounds along optimzing sequences in the controlled gradient flow problem that defines the candidate solution. | math | 0 |
Title: Propagation of chaos and Poisson Hypothesis for replica mean-field models of intensity-based neural networks
Abstract: Neural computations arising from myriads of interactions between spiking neurons can be modeled as network dynamics with punctuate interactions. However, most relevant dynamics do not allow for computational tractability. To circumvent this difficulty, the Poisson Hypothesis regime replaces interaction times between neurons by Poisson processes. We prove that the Poisson Hypothesis holds at the limit of an infinite number of replicas in the replica-mean-field model, which consists of randomly interacting copies of the network of interest. The proof is obtained through a novel application of the Chen-Stein method to the case of a random sum of Bernoulli random variables and a fixed point approach to prove a law of large numbers for exchangeable random variables. | math | 1 |
Title: Simplified Information Geometry Approach for Massive MIMO-OFDM Channel Estimation -- Part I: Algorithm and Fixed Point Analysis
Abstract: In this two-part paper, we investigate the channel estimation for massive multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems. In Part I, we revisit the information geometry approach (IGA) for massive MIMO-OFDM channel estimation. By using the constant magnitude property of the entries of the measurement matrix in the massive MIMO-OFDM channel estimation and the asymptotic analysis, we find that the second-order natural parameters of the distributions on all the auxiliary manifolds are equivalent to each other at each iteration of IGA, and the first-order natural parameters of the distributions on all the auxiliary manifolds are asymptotically equivalent to each other at the fixed point of IGA. Motivated by these results, we simplify the iterative process of IGA and propose a simplified IGA for massive MIMO-OFDM channel estimation. It is proved that at the fixed point, the a posteriori mean obtained by the simplified IGA is asymptotically optimal. The simplified IGA allows efficient implementation with fast Fourier transformation (FFT). Simulations confirm that the simplified IGA can achieve near the optimal performance with low complexity in a limited number of iterations. | cs | 0 |
Title: Integral Representations of Three Novel Multiple Zeta Functions for Barnes Type: A Probabilistic Approach
Abstract: Integral representation is one of the powerful tools for studying analytic continuation of the zeta functions. It is known that Hurwitz zeta function generalizes the famous Riemann zeta function which plays an important role in analytic number theory. They both have several multiple versions in the literature. In this paper, we introduce three novel multiple zeta functions for Barnes type and study their integral representations through hyperbolic probability distributions given by Pitman and Yor (2003, Canad. J. Math., 55, 292-330). The analytically continued properties of the three multiple zeta functions are also investigated. Surprisingly, two of them, unlike the previous results, can extend analytically to entire functions in the whole complex plane. | math | 0 |
Title: Effects of forward scattering on the onset of phototactic bioconvection in an algal suspension under diffuse flux without collimated flux
Abstract: Phototaxis refers to the directed swimming response influenced by the sensed light intensity in microorganisms. Positive phototaxis involves motion toward the light source, while negative phototaxis entails motion away from it. This study explores the phototactic bioconvection in a suspension of anisotropic scattering phototactic algae, illuminated by diffuse flux without direct collimated flux. The basic state is characterized by zero fluid flow, with the balance between upward and downward swimming due to positive and negative phototaxis, respectively, counteracted by microorganism diffusion. The paper conducts a thorough numerical analysis of linear stability, placing particular emphasis on the impact of forward scattering. The onset of bioconvection manifests either through a stationary mode or an oscillatory mode. The transition between these modes is observed with varying anisotropic coefficients for specific parameter values. | math | 0 |
Title: Behavior of Totally Positive Differential Systems Near a Periodic Solution
Abstract: A time-varying nonlinear dynamical system is called a totally positive differential system (TPDS) if its Jacobian admits a special sign pattern: it is tri-diagonal with positive entries on the super- and sub-diagonals. If the vector field of a TPDS is T-periodic then every bounded trajectory converges to a T-periodic solution. In particular, when the vector field is time-invariant every bounded trajectory of a TPDS converges to an equlbrium. Here, we use the spectral theory of oscillatory matrices to analyze the behavior near a periodic solution of a TPDS. This yields information on the perturbation directions that lead to the fastest and slowest convergence to or divergence from the periodic solution. We demonstrate the theoretical results using a model from systems biology called the ribosome flow model. | math | 1 |
Title: Hille's theorem for Bochner integrals of functions with values in locally convex spaces
Abstract: Hille's theorem is a powerful classical result in vector measure theory. It asserts that the application of a closed, unbounded linear operator commutes with strong/Bochner integration of functions taking values in a Banach space. This note shows that Hille's theorem also holds in the setting of complete locally convex spaces. | math | 0 |
Title: Spikformer V2: Join the High Accuracy Club on ImageNet with an SNN Ticket
Abstract: Spiking Neural Networks (SNNs), known for their biologically plausible architecture, face the challenge of limited performance. The self-attention mechanism, which is the cornerstone of the high-performance Transformer and also a biologically inspired structure, is absent in existing SNNs. To this end, we explore the potential of leveraging both self-attention capability and biological properties of SNNs, and propose a novel Spiking Self-Attention (SSA) and Spiking Transformer (Spikformer). The SSA mechanism eliminates the need for softmax and captures the sparse visual feature employing spike-based Query, Key, and Value. This sparse computation without multiplication makes SSA efficient and energy-saving. Further, we develop a Spiking Convolutional Stem (SCS) with supplementary convolutional layers to enhance the architecture of Spikformer. The Spikformer enhanced with the SCS is referred to as Spikformer V2. To train larger and deeper Spikformer V2, we introduce a pioneering exploration of Self-Supervised Learning (SSL) within the SNN. Specifically, we pre-train Spikformer V2 with masking and reconstruction style inspired by the mainstream self-supervised Transformer, and then finetune the Spikformer V2 on the image classification on ImageNet. Extensive experiments show that Spikformer V2 outperforms other previous surrogate training and ANN2SNN methods. An 8-layer Spikformer V2 achieves an accuracy of 80.38% using 4 time steps, and after SSL, a 172M 16-layer Spikformer V2 reaches an accuracy of 81.10% with just 1 time step. To the best of our knowledge, this is the first time that the SNN achieves 80+% accuracy on ImageNet. The code will be available at Spikformer V2. | cs | 0 |
Title: The model theory of the curve graph
Abstract: In this paper we develop a bridge between model theory, geometric topology, and geometric group theory. In particular, we investigate the Ivanov Metaconjecture from the point of view of model theory, and more broadly we seek to answer the general question: why does the curve graph of a surface play such a central role in the study of surfaces and mapping class groups? More specifically, we consider a surface $\Sigma$ of finite type and its curve graph $\mathcal C(\Sigma)$, and we investigate its first-order theory in the language of graph theory. Crucially, $\mathcal C(\Sigma)$ is bi-interpretable with a certain object called the augmented Cayley graph of the mapping class group of the surface. We use this bi-interpretation to prove that the theory of the curve graph is $\omega$--stable, to compute its Morley rank, and to show that it has quantifier elimination with respect to the class of $\forall\exists$--formulae. We also show that many of the complexes which are naturally associated to a surface are interpretable in $\mathcal C(\Sigma)$. This shows that these complexes are all $\omega$--stable and admit certain a priori bounds on their Morley ranks. We are able to use Morley ranks to prove that various complexes are not bi--interpretable with the curve graph. As a consequence of quantifier elimination, we show that algebraic intersection number is not definable in the first order theory of the curve graph. Finally, we prove that the curve graph of a surface enjoys a novel phenomenon that we call interpretation rigidity. That is, if surfaces $\Sigma_1$ and $\Sigma_2$ admits curve graphs that are mutually interpretable, then $\Sigma_1$ and $\Sigma_2$ are homeomorphic to each other. Along the way, numerous technical results are obtained. | math | 1 |
Title: Pointwise A posteriori error control of quadratic Discontinuous Galerkin Methods for the unilateral contact problem
Abstract: An a posteriori error bound for the pointwise error of the quadratic discontinuous Galerkin method for the unilateral contact problem on polygonal domain is presented. The pointwise a posteriori error analysis is based on the direct use of a priori estimates of the Green's matrix for the divergence type operators and the suitable construction of the discrete contact force density $\b{\sigma}_h$ and barrier functions for the continuous solution. Several numerical experiments (in two dimension) are presented to illustrate the reliability and efficiency properties of the proposed aposteriori error estimator. | math | 0 |
Title: Simpler Context-Dependent Logical Forms via Model Projections
Abstract: We consider the task of learning a context-dependent mapping from utterances to denotations. With only denotations at training time, we must search over a combinatorially large space of logical forms, which is even larger with context-dependent utterances. To cope with this challenge, we perform successive projections of the full model onto simpler models that operate over equivalence classes of logical forms. Though less expressive, we find that these simpler models are much faster and can be surprisingly effective. Moreover, they can be used to bootstrap the full model. Finally, we collected three new context-dependent semantic parsing datasets, and develop a new left-to-right parser. | cs | 1 |
Title: Optimizing Information Freshness in Uplink Multiuser MIMO Networks with Partial Observations
Abstract: This paper investigates a multiuser scheduling problem within an uplink multiple-input multi-output (MIMO) status update network, consisting of a multi-antenna base station (BS) and multiple single-antenna devices. The presence of multiple antennas at the BS introduces spatial degrees-of-freedom, enabling concurrent transmission of status updates from multiple devices in each time slot. Our objective is to optimize network-wide information freshness, quantified by the age of information (AoI) metric, by determining how the BS can best schedule device transmissions, while taking into account the random arrival of status updates at the device side.To address this decision-making problem, we model it as a partially observable Markov decision process (POMDP) and establish that the evolution of belief states for different devices is independent.We also prove that feasible belief states can be described by finite-dimensional vectors. Building on these observations, we develop a dynamic scheduling (DS) policy to solve the POMDP, and then derive an upper bound of its AoI performance, which is used to optimize the parameter configuration. To gain more design insights, we investigate a symmetric network, and put forth a fixed scheduling (FS) policy with lower computational complexity. An action space reduction strategy is applied to further reduce the computational complexity of both DS and FS policies. Our numerical results validate our analyses and indicate that the DS policy with the reduced action space performs almost identically to the original DS policy, and both outperform the baseline policies. | cs | 0 |
Title: Cyclotomic generating functions
Abstract: It is a remarkable fact that for many statistics on finite sets of combinatorial objects, the roots of the corresponding generating function are each either a complex root of unity or zero. We call such polynomials \textbf{cyclotomic generating functions} (CGF's). Previous work studied the support and asymptotic distribution of the coefficients of several families of CGF's arising from tableau and forest combinatorics. In this paper, we continue these explorations by studying general CGF's from algebraic, analytic, and asymptotic perspectives. We review some of the many known examples of CGF's; describe their coefficients, moments, cumulants, and characteristic functions; and give a variety of necessary and sufficient conditions for their existence arising from probability, commutative algebra, and invariant theory. We further show that CGF's are ``generically'' asymptotically normal, generalizing a result of Diaconis. We include several open problems concerning CGF's. | math | 0 |
Title: A Cybersecurity Risk Analysis Framework for Systems with Artificial Intelligence Components
Abstract: The introduction of the European Union Artificial Intelligence Act, the NIST Artificial Intelligence Risk Management Framework, and related norms demands a better understanding and implementation of novel risk analysis approaches to evaluate systems with Artificial Intelligence components. This paper provides a cybersecurity risk analysis framework that can help assessing such systems. We use an illustrative example concerning automated driving systems. | cs | 0 |
Title: Multi-stages attention Breast cancer classification based on nonlinear spiking neural P neurons with autapses
Abstract: Breast cancer(BC) is a prevalent type of malignant tumor in women. Early diagnosis and treatment are vital for enhancing the patients' survival rate. Downsampling in deep networks may lead to loss of information, so for compensating the detail and edge information and allowing convolutional neural networks to pay more attention to seek the lesion region, we propose a multi-stages attention architecture based on NSNP neurons with autapses. First, unlike the single-scale attention acquisition methods of existing methods, we set up spatial attention acquisition at each feature map scale of the convolutional network to obtain an fusion global information on attention guidance. Then we introduce a new type of NSNP variants called NSNP neurons with autapses. Specifically, NSNP systems are modularized as feature encoders, recoding the features extracted from convolutional neural network as well as the fusion of attention information and preserve the key characteristic elements in feature maps. This ensures the retention of valuable data while gradually transforming high-dimensional complicated info into low-dimensional ones. The proposed method is evaluated on the public dataset BreakHis at various magnifications and classification tasks. It achieves a classification accuracy of 96.32% at all magnification cases, outperforming state-of-the-art methods. Ablation studies are also performed, verifying the proposed model's efficacy. The source code is available at XhuBobYoung/Breast-cancer-Classification. | cs | 0 |
Title: Selling Data to a Competitor
Abstract: We study the costs and benefits of selling data to a competitor. Although selling all consumers' data may decrease total firm profits, there exist other selling mechanisms -- in which only some consumers' data is sold -- that render both firms better off. We identify the profit-maximizing mechanism, and show that the benefit to firms comes at a cost to consumers. We then construct Pareto-improving mechanisms, in which each consumers' welfare, as well as both firms' profits, increase. Finally, we show that consumer opt-in can serve as an instrument to induce firms to choose a Pareto-improving mechanism over a profit-maximizing one. | cs | 1 |
Title: Propagation Path Loss Models for 5G Urban Micro- and Macro-Cellular Scenarios
Abstract: This paper presents and compares two candidate large-scale propagation path loss models, the alpha-beta-gamma (ABG) model and the close-in (CI) free space reference distance model, for the design of fifth generation (5G) wireless communication systems in urban micro- and macro-cellular scenarios. Comparisons are made using the data obtained from 20 propagation measurement campaigns or ray-tracing studies from 2 GHz to 73.5 GHz over distances ranging from 5 m to 1429 m. The results show that the one-parameter CI model has a very similar goodness of fit (i.e., the shadow fading standard deviation) in both line-of-sight and non-line-of-sight environments, while offering substantial simplicity and more stable behavior across frequencies and distances, as compared to the three-parameter ABG model. Additionally, the CI model needs only one very subtle and simple modification to the existing 3GPP floating-intercept path loss model (replacing a constant with a close-in free space reference value) in order to provide greater simulation accuracy, more simplicity, better repeatability across experiments, and higher stability across a vast range of frequencies. | cs | 1 |
Title: Finiteness conjecture for 3-manifolds obtained from handlebodies by attaching 2-handles
Abstract: We study a generalized Witten's finiteness conjecture for the skein modules of oriented compact 3-manifolds with boundary. We formulate an equivalent version of the generalized finiteness conjecture using handlebodies and 2-handles, and prove the conjecture for some classes with the handlebodies of genus 2 and 3 using the equivalent version. | math | 0 |
Title: Jacobi polynomials and harmonic weight enumerators of the first-order Reed--Muller codes and the extended Hamming codes
Abstract: In the present paper, we give harmonic weight enumerators and Jacobi polynomials for the first-order Reed--Muller codes and the extended Hamming codes. As a corollary, we show the nonexistence of combinatorial $4$-designs in these codes. | math | 0 |
Title: Dimension-Minimality and Primality of Counter Nets
Abstract: A $k$-Counter Net ($k$-CN) is a finite-state automaton equipped with $k$ integer counters that are not allowed to become negative, but do not have explicit zero tests. This language-recognition model can be thought of as labelled vector addition systems with states, some of which are accepting. Certain decision problems for $k$-CNs become easier, or indeed decidable, when the dimension $k$ is small. Yet, little is known about the effect that the dimension $k$ has on the class of languages recognised by $k$-CNs. Specifically, it would be useful if we could simplify algorithmic reasoning by reducing the dimension of a given CN. To this end, we introduce the notion of dimension-primality for $k$-CN, whereby a $k$-CN is prime if it recognises a language that cannot be decomposed into a finite intersection of languages recognised by $d$-CNs, for some $d<k$. We show that primality is undecidable. We also study two related notions: dimension-minimality (where we seek a single language-equivalent $d$-CN of lower dimension) and language regularity. Additionally, we explore the trade-offs in expressiveness between dimension and non-determinism for CN. | cs | 0 |
Title: Finite central extensions of type I
Abstract: Let $\mathbb{G}$ be a Lie group with solvable connected component and finitely-generated component group and $\alpha\in H^2(\mathbb{G},\mathbb{S}^1)$ a cohomology class. We prove that if $(\mathbb{G},\alpha)$ is of type I then the same holds for the finite central extensions of $\mathbb{G}$. In particular, finite central extensions of type-I connected solvable Lie groups are again of type I. This is by contrast with the general case, whereby the type-I property does not survive under finite central extensions. We also show that ad-algebraic hulls of connected solvable Lie groups operate on these even when the latter are not simply connected, and give a group-theoretic characterization of the intersection of all Euclidean subgroups of a connected, simply-connected solvable group $\mathbb{G}$ containing a given central subgroup of $\mathbb{G}$. | math | 1 |
Title: The GDPR Enforcement Fines at Glance
Abstract: The General Data Protection Regulation (GDPR) came into force in 2018. After this enforcement, many fines have already been imposed by national data protection authorities in Europe. This paper examines the individual GDPR articles referenced in the enforcement decisions, as well as predicts the amount of enforcement fines with available meta-data and text mining features extracted from the enforcement decision documents. According to the results, three articles related to the general principles, lawfulness, and information security have been the most frequently referenced ones. Although the amount of fines imposed vary across the articles referenced, these three particular articles do not stand out. Furthermore, a better statistical evidence is available with other meta-data features, including information about the particular European countries in which the enforcements were made. Accurate predictions are attainable even with simple machine learning techniques for regression analysis. Basic text mining features outperform the meta-data features in this regard. In addition to these results, the paper reflects the GDPR's enforcement against public administration obstacles in the European Union (EU), as well as discusses the use of automatic decision-making systems in judiciary. | cs | 1 |
Title: Deep nets for local manifold learning
Abstract: The problem of extending a function $f$ defined on a training data $\mathcal{C}$ on an unknown manifold $\mathbb{X}$ to the entire manifold and a tubular neighborhood of this manifold is considered in this paper. For $\mathbb{X}$ embedded in a high dimensional ambient Euclidean space $\mathbb{R}^D$, a deep learning algorithm is developed for finding a local coordinate system for the manifold {\bf without eigen--decomposition}, which reduces the problem to the classical problem of function approximation on a low dimensional cube. Deep nets (or multilayered neural networks) are proposed to accomplish this approximation scheme by using the training data. Our methods do not involve such optimization techniques as back--propagation, while assuring optimal (a priori) error bounds on the output in terms of the number of derivatives of the target function. In addition, these methods are universal, in that they do not require a prior knowledge of the smoothness of the target function, but adjust the accuracy of approximation locally and automatically, depending only upon the local smoothness of the target function. Our ideas are easily extended to solve both the pre--image problem and the out--of--sample extension problem, with a priori bounds on the growth of the function thus extended. | cs | 1 |
Title: Knight's paths towards Catalan numbers
Abstract: We provide enumerating results for partial knight's paths of a given size. We prove algebraically that zigzag knight's paths of a given size ending on the $x$-axis are enumerated by the generalized Catalan numbers, and we give a constructive bijection with peakless Motzkin paths of a given length. After enumerating partial knight's paths of a given length, we prove that zigzag knight's paths of a given length ending on the $x$-axis are counted by the Catalan numbers. Finally, we give a constructive bijection with Dyck paths of a given length. | math | 1 |
Title: On in-plane drill rotations for Cosserat surfaces
Abstract: We show under some natural smoothness assumptions that pure in-plane drill rotations as deformation mappings of a $C^2$-smooth regular shell surface to another one parametrized over the same domain are impossible provided that the rotations are fixed at a portion of the boundary. Put otherwise, if the tangent vectors of the new surface are obtained locally by only rotating the given tangent vectors, and if these rotations have a rotation axis which coincides everywhere with the normal of the initial surface, then the two surfaces are equal provided they coincide at a portion of the boundary. In the language of differential geometry of surfaces we show that any isometry which leaves normals invariant and which coincides with the given surface at a portion of the boundary, is the identity mapping. | math | 1 |
Title: Signal Processing in the Retina: Interpretable Graph Classifier to Predict Ganglion Cell Responses
Abstract: It is a popular hypothesis in neuroscience that ganglion cells in the retina are activated by selectively detecting visual features in an observed scene. While ganglion cell firings can be predicted via data-trained deep neural nets, the networks remain indecipherable, thus providing little understanding of the cells' underlying operations. To extract knowledge from the cell firings, in this paper we learn an interpretable graph-based classifier from data to predict the firings of ganglion cells in response to visual stimuli. Specifically, we learn a positive semi-definite (PSD) metric matrix $\mathbf{M} \succeq 0$ that defines Mahalanobis distances between graph nodes (visual events) endowed with pre-computed feature vectors; the computed inter-node distances lead to edge weights and a combinatorial graph that is amenable to binary classification. Mathematically, we define the objective of metric matrix $\mathbf{M}$ optimization using a graph adaptation of large margin nearest neighbor (LMNN), which is rewritten as a semi-definite programming (SDP) problem. We solve it efficiently via a fast approximation called Gershgorin disc perfect alignment (GDPA) linearization. The learned metric matrix $\mathbf{M}$ provides interpretability: important features are identified along $\mathbf{M}$'s diagonal, and their mutual relationships are inferred from off-diagonal terms. Our fast metric learning framework can be applied to other biological systems with pre-chosen features that require interpretation. | cs | 0 |
Title: Pendant appearances and components in random graphs from structured classes
Abstract: We consider random graphs sampled uniformly from a structured class of graphs, such as the class of graphs embeddable in a given surface. We sharpen and extend earlier results on pendant appearances, concerning for example numbers of leaves; and obtain results on the asymptotic distribution of components other than the giant component, under quite general conditions. | math | 1 |
Title: The Equity Framework: Fairness Beyond Equalized Predictive Outcomes
Abstract: Machine Learning (ML) decision-making algorithms are now widely used in predictive decision-making, for example, to determine who to admit and give a loan. Their wide usage and consequential effects on individuals led the ML community to question and raise concerns on how the algorithms differently affect different people and communities. In this paper, we study fairness issues that arise when decision-makers use models (proxy models) that deviate from the models that depict the physical and social environment in which the decisions are situated (intended models). We also highlight the effect of obstacles on individual access and utilization of the models. To this end, we formulate an Equity Framework that considers equal access to the model, equal outcomes from the model, and equal utilization of the model, and consequentially achieves equity and higher social welfare than current fairness notions that aim for equality. We show how the three main aspects of the framework are connected and provide an equity scoring algorithm and questions to guide decision-makers towards equitable decision-making. We show how failure to consider access, outcome, and utilization would exacerbate proxy gaps leading to an infinite inequity loop that reinforces structural inequities through inaccurate and incomplete ground truth curation. We, therefore, recommend a more critical look at the model design and its effect on equity and a shift towards equity achieving predictive decision-making models. | cs | 1 |
Title: Mitigating Face Recognition Bias via Group Adaptive Classifier
Abstract: Face recognition is known to exhibit bias - subjects in a certain demographic group can be better recognized than other groups. This work aims to learn a fair face representation, where faces of every group could be more equally represented. Our proposed group adaptive classifier mitigates bias by using adaptive convolution kernels and attention mechanisms on faces based on their demographic attributes. The adaptive module comprises kernel masks and channel-wise attention maps for each demographic group so as to activate different facial regions for identification, leading to more discriminative features pertinent to their demographics. Our introduced automated adaptation strategy determines whether to apply adaptation to a certain layer by iteratively computing the dissimilarity among demographic-adaptive parameters. A new de-biasing loss function is proposed to mitigate the gap of average intra-class distance between demographic groups. Experiments on face benchmarks (RFW, LFW, IJB-A, and IJB-C) show that our work is able to mitigate face recognition bias across demographic groups while maintaining the competitive accuracy. | cs | 1 |
Title: Deformed Hamiltonian vector fields and Lagrangian fibrations
Abstract: Certain dissipative physical systems closely resemble Hamiltonian systems in $\mathbb{R}^{2n}$, but with the canonical equation for one of the variables in each conjugate pair rescaled by a real parameter. To generalise these dynamical systems to symplectic manifolds in this paper we introduce and study the properties of deformed Hamiltonian vector fields on Lagrangian fibrations. We describe why these objects have some interesting applications to symplectic geometry and discuss how their physical interpretation motivates new problems in mathematics. | math | 1 |
Title: The irregularity of cyclic multiple planes after Zariski
Abstract: A formula for the irregularity of a cyclic multiple plane associated to a branch curve that has arbitrary singularities and is transverse to the line at infinity is established. The irregularity is expressed as a sum of superabundances of linear systems associated to some multiplier ideals of the branch curve and the proof rests on the theory of standard cyclic coverings. Explicit computations of multiplier ideals are performed and some applications are presented. | math | 1 |
Title: A new version of Toom's proof
Abstract: There are several proofs now for the stability of Toom's example of a two-dimensional stable cellular automaton and its application to fault-tolerant computation. Simon and Berman simplified and strengthened Toom's original proof: the present report is a simplified exposition of their proof. | cs | 1 |
Title: Relative Entropy for Quantum Channels
Abstract: We introduce an quantum entropy for bimodule quantum channels on finite von Neumann algebras, generalizing the remarkable Pimsner-Popa entropy. The relative entropy for Fourier multipliers of bimodule quantum channels establishes an upper bound of the quantum entropy. Additionally, we present the Araki relative entropy for bimodule quantum channels, revealing its equivalence to the relative entropy for Fourier multipliers and demonstrating its left/right monotonicities and convexity. Notably, the quantum entropy attains its maximum if there is a downward Jones basic construction. By considering R\'{e}nyi entropy for Fourier multipliers, we find a continuous bridge between the logarithm of the Pimsner-Popa index and the Pimsner-Popa entropy. As a consequence, the R\'{e}nyi entropy at $1/2$ serves a criterion for the existence of a downward Jones basic construction. | math | 0 |
Title: Open Transactions on Shared Memory
Abstract: Transactional memory has arisen as a good way for solving many of the issues of lock-based programming. However, most implementations admit isolated transactions only, which are not adequate when we have to coordinate communicating processes. To this end, in this paper we present OCTM, an Haskell-like language with open transactions over shared transactional memory: processes can join transactions at runtime just by accessing to shared variables. Thus a transaction can co-operate with the environment through shared variables, but if it is rolled-back, also all its effects on the environment are retracted. For proving the expressive power of TCCS we give an implementation of TCCS, a CCS-like calculus with open transactions. | cs | 1 |
Title: Fast & Fair: Efficient Second-Order Robust Optimization for Fairness in Machine Learning
Abstract: This project explores adversarial training techniques to develop fairer Deep Neural Networks (DNNs) to mitigate the inherent bias they are known to exhibit. DNNs are susceptible to inheriting bias with respect to sensitive attributes such as race and gender, which can lead to life-altering outcomes (e.g., demographic bias in facial recognition software used to arrest a suspect). We propose a robust optimization problem, which we demonstrate can improve fairness in several datasets, both synthetic and real-world, using an affine linear model. Leveraging second order information, we are able to find a solution to our optimization problem more efficiently than a purely first order method. | cs | 0 |
Title: $F$-pure and $F$-injective singularities in equal characteristic zero
Abstract: Inspired by Schoutens' results, we introduce a variant of sharp $F$-purity and sharp $F$-injectivity in equal characteristic zero via ultraproducts. As an application, we show that if $R\to S$ is pure and $S$ is of dense $F$-pure type, then $R$ is of dense $F$-pure type. | math | 0 |
Title: Shift Graphs, Chromatic Number and Acyclic One-Path Orientations
Abstract: Shift graphs, which were introduced by Erd\H{o}s and Hajnal, have been used to answer various questions in extremal graph theory. In this paper, we prove two new results using shift graphs and their induced subgraphs. 1. Recently Girao [Combinatorica2023], showed that for every graph $F$ with at least one edge, there is a constant $c_F$ such that there are graphs of arbitrarily large chromatic number and the same clique number as $F$, in which every $F$-free induced subgraph has chromatic number at most $c_F$. We significantly improve the value of the constant $c_F$ for the special case where $F$ is the complete bipartite graph $K_{a,b}$. We show that any $K_{a,b}$-free induced subgraph of the triangle-free shift graph $G_{n,2}$ has chromatic number at most $a+b$. 2. An undirected simple graph $G$ is said to have the AOP Property if it can be acyclically oriented such that there is at most one directed path between any two vertices. We prove that the shift graph $G_{n,2}$ does not have the AOP property for all $n\geq 9$. We then construct induced subgraphs of shift graph $G_{n,2}$ with an arbitrarily high chromatic number and odd-girth which have the AOP property. To the best of our knowledge, this gives the first constructive proof of the existence of graphs with arbitrarily high chromatic number and odd-girth that have the AOP property. Furthermore, we construct graphs with arbitrarily high odd-girth that do not have the AOP Property and also prove the existence of graphs with girth equal to $5$ that do not have the AOP property. | math | 0 |
Title: The Log-Volume of Optimal Codes for Memoryless Channels, Asymptotically Within A Few Nats
Abstract: Shannon's analysis of the fundamental capacity limits for memoryless communication channels has been refined over time. In this paper, the maximum volume $M_\avg^*(n,\epsilon)$ of length-$n$ codes subject to an average decoding error probability $\epsilon$ is shown to satisfy the following tight asymptotic lower and upper bounds as $n \to \infty$: \[ \underline{A}_\epsilon + o(1) \le \log M_\avg^*(n,\epsilon) - [nC - \sqrt{nV_\epsilon} \,Q^{-1}(\epsilon) + \frac{1}{2} \log n] \le \overline{A}_\epsilon + o(1) \] where $C$ is the Shannon capacity, $V_\epsilon$ the $\epsilon$-channel dispersion, or second-order coding rate, $Q$ the tail probability of the normal distribution, and the constants $\underline{A}_\epsilon$ and $\overline{A}_\epsilon$ are explicitly identified. This expression holds under mild regularity assumptions on the channel, including nonsingularity. The gap $\overline{A}_\epsilon - \underline{A}_\epsilon$ is one nat for weakly symmetric channels in the Cover-Thomas sense, and typically a few nats for other symmetric channels, for the binary symmetric channel, and for the $Z$ channel. The derivation is based on strong large-deviations analysis and refined central limit asymptotics. A random coding scheme that achieves the lower bound is presented. The codewords are drawn from a capacity-achieving input distribution modified by an $O(1/\sqrt{n})$ correction term. | cs | 1 |
Title: Discrete Uniqueness Sets for Functions with Spectral Gaps
Abstract: It is well-known that entire functions whose spectrum belongs to a fixed bounded set $S$ admit real uniformly discrete uniqueness sets $\Lambda$. We show that the same is true for much wider spaces of continuous functions. In particular, Sobolev spaces have this property whenever $S$ is a set of infinite measure having "periodic gaps". The periodicity condition is crucial. For sets $S$ with randomly distributed gaps, we show that the uniformly discrete sets $\Lambda$ satisfy a strong non-uniqueness property: Every discrete function $c(\lambda)\in l^2(\Lambda)$ can be interpolated by an analytic $L^2$-function with spectrum in $S$. | math | 1 |
Title: Quasi-Lie bialgebroids, Dirac structures and deformations of Poisson quasi-Nijenhuis manifolds
Abstract: We show how to deform a Poisson quasi-Nijenhuis manifold by means of a closed 2-form. Then we interpret this procedure in the context of quasi-Lie bialgebroids, as a particular case of the so called twisting of a quasi-Lie bialgebroid. Finally, we frame our result in the setting of Courant algebroids and Dirac structures. | math | 0 |
Title: Parabolic Anderson model in bounded domains of recurrent metric measure spaces
Abstract: A metric measure space equipped with a Dirichlet form is called recurrent if its Hausdorff dimension is less than its walk dimension. In bounded domains of such spaces we study the parabolic Anderson models \[ \partial_{t} u(t,x) = \Delta u(t,x) + \beta u(t,x) \, \dot{W}_\alpha(t,x) \] where the noise $W_\alpha$ is white in time and colored in space when $\alpha >0$ while for $\alpha=0$ it is also white in space. Both Dirichlet and Neumann boundary conditions are considered. Besides proving existence and uniqueness in the It\^o sense we also get precise $L^p$ estimates for the moments and intermittency properties of the solution as a consequence. Our study reveals new exponents which are intrinsically associated to the geometry of the underlying space and the results for instance apply in metric graphs or fractals like the Sierpi\'nski gasket for which we prove scaling invariance properties of the models. | math | 0 |
Title: Buildings, spiders, and geometric Satake
Abstract: Let G be a simple algebraic group. Labelled trivalent graphs called webs can be used to product invariants in tensor products of minuscule representations. For each web, we construct a configuration space of points in the affine Grassmannian. Via the geometric Satake correspondence, we relate these configuration spaces to the invariant vectors coming from webs. In the case G = SL(3), non-elliptic webs yield a basis for the invariant spaces. The non-elliptic condition, which is equivalent to the condition that the dual diskoid of the web is CAT(0), is explained by the fact that affine buildings are CAT(0). | math | 1 |
Title: Competitive Searching over Terrains
Abstract: We study a variant of the searching problem where the environment consists of a known terrain and the goal is to obtain visibility of an unknown target point on the surface of the terrain. The searcher starts on the surface of the terrain and is allowed to fly above the terrain. The goal is to devise a searching strategy that minimizes the competitive ratio, that is, the worst-case ratio between the distance traveled by the searching strategy and the minimum travel distance needed to detect the target. For $1.5$D terrains we show that any searching strategy has a competitive ratio of at least $\sqrt{82}$ and we present a nearly-optimal searching strategy that achieves a competitive ratio of $3\sqrt{19/2} \approx \sqrt{82} + 0.19$. This strategy extends directly to the case where the searcher has no knowledge of the terrain beforehand. For $2.5$D terrains we show that the optimal competitive ratio depends on the maximum slope $\lambda$ of the terrain, and is hence unbounded in general. Specifically, we provide a lower bound on the competitive ratio of $\Omega(\sqrt{\lambda})$. Finally, we complement the lower bound with a searching strategy based on the maximum slope of the known terrain, which achieves a competitive ratio of $O(\sqrt{\lambda})$. | cs | 0 |
Title: Short note on the behavior of recurrent neural network for noisy dynamical system
Abstract: The behavior of recurrent neural network for the data-driven simulation of noisy dynamical systems is studied by training a set of Long Short-Term Memory Networks (LSTM) on the Mackey-Glass time series with a wide range of noise level. It is found that, as the training noise becomes larger, LSTM learns to depend more on its autonomous dynamics than the noisy input data. As a result, LSTM trained on noisy data becomes less susceptible to the perturbation in the data, but has a longer relaxation timescale. On the other hand, when trained on noiseless data, LSTM becomes extremely sensitive to a small perturbation, but is able to adjusts to the changes in the input data. | cs | 1 |
Title: The Optimal Paper Moebius Band
Abstract: In this paper we prove that a smooth embedded paper Moebius band must have aspect ratio greater than $\sqrt 3$. We also prove that any sequence of smooth embedded paper Moebius bands whose aspect ratio converges to $\sqrt 3$ must converge, up to isometry, to the famous triangular Moebius band. These results answer the minimum aspect ratio question discussed by W. Wunderlich in 1962 and prove the more specific conjecture of B Halpern and C. Weaver from 1977. | math | 0 |
Title: Nonlinear analysis with resurgent functions
Abstract: We provide estimates for the convolution product of an arbitrary number of "resurgent functions", that is holomorphic germs at the origin of $C$ that admit analytic continuation outside a closed discrete subset of $C$ which is stable under addition. Such estimates are then used to perform nonlinear operations like substitution in a convergent series, composition or functional inversion with resurgent functions, and to justify the rules of "alien calculus"; they also yield implicitly defined resurgent functions. The same nonlinear operations can be performed in the framework of Borel-Laplace summability. | math | 1 |