id
stringlengths 5
16
| query
stringlengths 1
382
| pos
stringlengths 7
5.09k
| neg
stringlengths 23
5.09k
| qp
float64 0.4
1
| qn
float64 0.34
0.91
| margin
float64 0.02
0.3
|
---|---|---|---|---|---|---|
1801.03195 | The Hypotheses on Expansions of Iterated Stratonovich Stochastic
Integrals of Arbitrary Multiplicity | In this review article we collected more than ten theorems on expansions of
iterated Ito and Stratonovich stochastic integrals, which have been formulated
and proved by the author. These theorems open a new direction for study of
iterated Ito and Stratonovich stochastic integrals. The expansions based on
multiple and repeated Fourier-Legendre series as well as on multiple and
repeated trigonomectic Fourier series, converging in the mean and pointwise are
presented in the article. Some of these theorems connected with iterated
stochastic integrals of multiplicities 1 to 5. Also we consider two theorems on
expansions of iterated Ito stochastic integrals of arbitrary multiplicity $k$,
based on generalized multiple Fourier series converging in the space $L_2([t,
T]^k)$ as well as two theorems on expansions of iterated Stratonovich
stochastic integrals of arbitrary multiplicity $k$, based on generalized
repeated Fourier series converging pointwise. On the base of the presented
theorems we formulate 3 hypotheses on expansions of iterated Stratonovich
stochastic integrals of arbitrary multiplicity $k$, based on generalized
multiple Fourier series converging in $L_2([t, T]^k).$ These iterated
Stratonovich stochastic integrals are part of the Taylor-Stratonovich
expansion. Moreover, the considered expansions contain only one operation of
the limit transition and substantially simpler than their analogues for
iterated Ito stochastic integrals. Therefore the results of the article can be
useful for solution of the problem of numerical integration of Ito stochastic
differential equations.
| With the use of tensor product of Hilbert space, and a diagonalization
procedure from operator theory, we derive an approximation formula for a
general class of stochastic integrals. Further we establish a generalized
Fourier expansion for these stochastic integrals. In our extension, we
circumvent some of the limitations of the more widely used stochastic integral
due to Wiener and Ito, i.e., stochastic integration with respect to Brownian
motion. Finally we discuss the connection between the two approaches, as well
as a priori estimates and applications.
| 0.927155 | 0.841348 | 0.085807 |
1801.05856 | Active Community Detection: A Maximum Likelihood Approach | We propose novel semi-supervised and active learning algorithms for the
problem of community detection on networks. The algorithms are based on
optimizing the likelihood function of the community assignments given a graph
and an estimate of the statistical model that generated it. The optimization
framework is inspired by prior work on the unsupervised community detection
problem in Stochastic Block Models (SBM) using Semi-Definite Programming (SDP).
In this paper we provide the next steps in the evolution of learning
communities in this context which involves a constrained semi-definite
programming algorithm, and a newly presented active learning algorithm. The
active learner intelligently queries nodes that are expected to maximize the
change in the model likelihood. Experimental results show that this active
learning algorithm outperforms the random-selection semi-supervised version of
the same algorithm as well as other state-of-the-art active learning
algorithms. Our algorithms significantly improved performance is demonstrated
on both real-world and SBM-generated networks even when the SBM has a signal to
noise ratio (SNR) below the known unsupervised detectability threshold.
| Critical analysis of the state of the art is a necessary task when
identifying new research lines worthwhile to pursue. To such an end, all the
available work related to the field of interest must be taken into account. The
key point is how to organize, analyze, and make sense of the huge amount of
scientific literature available today on any topic. To tackle this problem, we
present here a bibliometric approach to Systematic Mapping Studies (SMS). Thus,
a modify SMS protocol is used relying on the scientific references metadata to
extract, process and interpret the wealth of information contained in nowadays
research literature. As a test case, the procedure is applied to determine the
current state and perspectives of community detection in complex networks. Our
results show that community detection is a still active, far from exhausted, in
development, field. In addition, we find that, by far, the most exploited
methods are those related to determining hierarchical community structures. On
the other hand, the results show that fuzzy clustering techniques, despite
their interest, are underdeveloped as well as the adaptation of existing
algorithms to parallel or, more specifically, distributed, computational
systems.
| 0.869565 | 0.757111 | 0.112454 |
1801.06488 | Biproducts without zero morphisms | We show how to define biproducts up to isomorphism in an arbitrary category
without assuming any enrichment. This generalizes the usual definitions, and we
characterize when a category has all binary biproducts in terms of an
ambidextrous adjunction. Finally, we give some new examples of biproducts that
our definition recognizes.
| Let X be a Q-factorial Gorenstein Fano variety. Suppose that the
singularities of X are canonical and that the locus where they are non-terminal
has dimension zero. Let D be a prime divisor of X. We show that rho_X - rho_D <
9 (where rho is the Picard number). Moreover, if rho_X - rho_D > 3, there
exists a finite morphism from X to S x Y, where S is a surface with rho_S at
most 9. As an application we prove that, if X has dimension 3, then rho_X is at
most 10.
| 0.88514 | 0.674988 | 0.210152 |
1801.06501 | Expansion of Iterated Stochastic Integrals with Respect to Martingale
Poisson Measures and with Respect to Martingales, Based on Generalized
Multiple Fourier Series | In the article we consider some versions and generalizations of the approach
to expansion of iterated Ito stochastic integrals of arbitrary multiplicity,
based on generalized multiple Fourier series. The expansions of iterated
stochastic integrals with respect to martingale Poisson measures and with
respect to martingales were obtained. For the iterated stochastic integrals
with respect to martingales we have proven two theorems. The first theorem is
the generalization of expansion of iterated Ito stochastic integrals of
arbitrary multiplicity, based on generalized multiple Fourier series. The
second one is the modification of the first theorem for the case of complete
orthonormal with weight $r(x)\ge 0$ systems of functions in the space $L_2([t,
T])$ (in the first theorem $r(x)\equiv 1$). Mean-square convergence of the
considered expansions is proven. The example of expantion of iterated (double)
stochastic integrals with respect to martingales with using the system of
Bessel functions is considered.
| We present a construction of the basic operators of stochastic analysis
(gradient and divergence) for a class of discrete-time normal martingales
called obtuse random walks. The approach is based on the chaos representation
property and discrete multiple stochastic integrals. We show that these
operators satisfy similar identities as in the case of the Bernoulli randoms
walks. We prove a Clark-Ocone-type predictable representation formula, obtain
two covariance identities and derive a deviation inequality. We close the
exposition by an application to option hedging in discrete time.
| 0.960666 | 0.813078 | 0.147587 |
1801.06727 | A Second Order Cumulant Spectrum Based Test for Strict Stationarity | This article develops a statistical test for the null hypothesis of strict
stationarity of a discrete time stochastic process. When the null hypothesis is
true, the second order cumulant spectrum is zero at all the discrete Fourier
frequency pairs present in the principal domain of the cumulant spectrum. The
test uses a frame (window) averaged sample estimate of the second order
cumulant spectrum to build a test statistic that has an asymptotic complex
standard normal distribution. We derive the test statistic, study the size and
power properties of the test, and demonstrate its implementation with intraday
stock market return data. The test has conservative size properties and good
power to detect varying variance and unit root in the presence of varying
variance.
| The purpose of this paper is to prove a weak convergence result for empirical
processes indexed in general classes of functions and with an underlying
$\alpha$-mixing sequence of random variables. In particular the uniformly
boundedness assumption on the function class, which is required in most of the
existing literature, is spared. Furthermore under strict stationarity a weak
convergence result for the sequential empirical process indexed in function
classes is obtained, as a direct consequence. Two examples in mathematical
statistics, that cannot be treated with existing results, are given as possible
applications.
| 0.851322 | 0.709489 | 0.141833 |
1801.07173 | Abelian principalization of ray class groups | Buiding on Bosca's method, we extend to tame ray class groups the results on
principalization of ideals of a number field by composition with abelian
extensions of a subfield first studied by Gras. More precisely, for any
extension of number fields K/k, completly split at at least one infinite place,
and any squarefree divisor m of K, we prove that there exist infinitely many
abelian extensions F/k such as the ray classes mod m of K principalize in KF.
As a consequence we generalize to tame ray class groups the results of Kurihara
on triviality of class groups for maximal abelian pro-extensions of totally
real number fields.
| Birman-Lubotzky-McCarthy proved that any abelian subgroup of the mapping
class groups for orientable surfaces is finitely generated. We apply
Birman-Lubotzky-McCarthy's arguments to the mapping class groups for
non-orientable surfaces. We especially find a finitely generated group
isomorphic to a given torsion-free subgroup of the mapping class groups.
| 0.882886 | 0.797895 | 0.084991 |
1801.07311 | Learning Class-specific Word Representations for Early Detection of
Hoaxes in Social Media | As people increasingly use social media as a source for news consumption, its
unmoderated nature enables the diffusion of hoaxes, which in turn jeopardises
the credibility of information gathered from social media platforms. To
mitigate this problem, we study the development of a hoax detection system that
can distinguish true and false reports early on. We introduce a semi-automated
approach that leverages the Wikidata knowledge base to build large-scale
datasets for veracity classification, which enables us to create a dataset with
4,007 reports including over 13 million tweets, 15% of which are fake. We
describe a method for learning class-specific word representations using word
embeddings, which we call multiw2v. Our approach achieves competitive results
with F1 scores over 72% within 10 minutes of the first tweet being posted,
outperforming other baselines. Our dataset represents a realistic scenario with
a real distribution of true and false stories, which we release for further use
as a benchmark in future research.
| Social media platforms provide active communication channels during mass
convergence and emergency events such as disasters caused by natural hazards.
As a result, first responders, decision makers, and the public can use this
information to gain insight into the situation as it unfolds. In particular,
many social media messages communicated during emergencies convey timely,
actionable information. Processing social media messages to obtain such
information, however, involves solving multiple challenges including: handling
information overload, filtering credible information, and prioritizing
different classes of messages. These challenges can be mapped to classical
information processing operations such as filtering, classifying, ranking,
aggregating, extracting, and summarizing. We survey the state of the art
regarding computational methods to process social media messages, focusing on
their application in emergency response scenarios. We examine the
particularities of this setting, and then methodically examine a series of key
sub-problems ranging from the detection of events to the creation of actionable
and useful summaries.
| 0.892103 | 0.76647 | 0.125634 |
1801.07565 | Evaluations of infinite series involving reciprocal quadratic hyperbolic
functions | This paper presents a approach of summation of infinite series of hyperbolic
functions. The approach is based on simple contour integral representions and
residue computations with the help of some well known results of Eisenstein
series given by Ramanujan and Berndt et al. Several series involving quadratic
hyperbolic functions are evaluated, which can be expressed in terms of
$z={}_2F_1(1/2,1/2;1;x)$ and $z'=dz/dx$. When a certain parameter in these
series equal to $\pi$ the series are summable in terms of $\Gamma$ functions.
Moreover, some interesting new consequences and illustrative examples are
considered.
| The evaluation of integral transforms of special functions is required in
different research and practical areas. Analyzing the $\kappa$-$\mu$ fading
distribution also khown as the generalized Rician distribution, we find out
that the assessment of a few different performance metrics, such as the
probability of energy detection of unknown signals and outage probability under
co-channel interference, involves the evaluation of an infinite-range integral,
which has the form of Laplace transform of product of Marcum Q, Bessel I, and
power functions. We evaluate this integral in a closed-form and present
numerical estimates.
| 0.895816 | 0.749318 | 0.146498 |
1801.10207 | A-Tree: A Bounded Approximate Index Structure | Index structures are one of the most important tools that DBAs leverage in
order to improve the performance of analytics and transactional workloads.
However, with the explosion of data that is constantly being generated in a
wide variety of domains including autonomous vehicles, Internet of Things (IoT)
devices, and E-commerce sites, building several indexes can often become
prohibitive and consume valuable system resources. In fact, a recent study has
shown that indexes created as part of the TPC-C benchmark can account for 55%
of the total memory available in a state-of-the-art in-memory DBMS. This
overhead consumes valuable and expensive main memory, and limits the amount of
space that a database has available to store new data or process existing data.
In this paper, we present a novel approximate index structure called A-Tree.
At the core of our index is a tunable error parameter that allows a DBA to
balance lookup performance and space consumption. To navigate this tradeoff, we
provide a cost model that helps the DBA choose an appropriate error parameter
given either (1) a lookup latency requirement (e.g., 500ns) or (2) a storage
budget (e.g., 100MB). Using a variety of real-world datasets, we show that our
index structure is able to provide performance that is comparable to full index
structures while reducing the storage footprint by orders of magnitude.
| We construct a class of minimal trees and use these trees to establish a
number of coloring theorems on general trees. Among the applications of these
trees and coloring theorems are quantification of the Bourgain $\ell_p$ and
$c_0$ indices, dualization of the Bourgain $c_0$ index, establishing sharp
positive and negative results for constant reduction, and estimating the
Bourgain $\ell_p$ index of an arbitrary Banach space $X$ in terms of a subspace
$Y$ and the quotient $X/Y$.
| 0.808785 | 0.765281 | 0.043504 |
1802.00342 | Mobility-aware, adaptive algorithms for wireless power transfer in ad
hoc networks | In this work, we investigate the interesting impact of mobility on the
problem of efficient wireless power transfer in ad hoc networks. We consider a
set of mobile agents (consuming energy to perform certain sensing and
communication tasks), and a single static charger (with finite energy) which
can recharge the agents when they get in its range. In particular, we focus on
the problem of efficiently computing the appropriate range of the charger with
the goal of prolonging the network lifetime. We first demonstrate (under the
realistic assumption of fixed energy supplies) the limitations of any fixed
charging range and, therefore, the need for (and power of) a dynamic selection
of the charging range, by adapting to the behavior of the mobile agents which
is revealed in an online manner. We investigate the complexity of optimizing
the selection of such an adaptive charging range, by showing that two
simplified offline optimization problems (closely related to the online one)
are NP-hard. To effectively address the involved performance trade-offs, we
finally present a variety of adaptive heuristics, assuming different levels of
agent information regarding their mobility and energy.
| Many emerging applications in mobile adhoc networks involve group-oriented
communication. Multicast is an efficient way of supporting group oriented
applications, mainly in mobile environment with limited bandwidth and limited
power. For using such applications in an adversarial environment as military,
it is necessary to provide secure multicast communication. Key management is
the fundamental challenge in designing secure multicast communications. In many
multicast interactions, new member can join and current members can leave at
any time and existing members must communicate securely using multicast key
distribution within constrained energy for mobile adhoc networks. This has to
overcome the challenging element of "1 affects n" problem which is due to high
dynamicity of groups. Thus this paper shows the specific challenges towards
multicast key management protocols for securing multicast key distribution in
mobile ad hoc networks, and present relevant multicast key management protocols
in mobile ad hoc networks. A comparison is done against some pertinent
performance criteria.
| 0.879368 | 0.662188 | 0.21718 |
1802.04344 | An infinite family of congruences for 1-shell totally symmetric plane
partitions | Let $s(n)$ denote the number of 1-shell totally symmetric plane partitions of
$n$. In this paper, we prove an infinite family of congruences modulo powers of
$5$ for $s(n)$. Namely, $$s\left(2\cdot
5^{2\alpha-1}n+5^{2\alpha-1}\right)\equiv 0 \pmod{5^{\alpha}}.$$
| A two-parameter family of exchangeable partitions with a simple updating rule
is introduced. The partition is identified with a randomized version of a
standard symmetric Dirichlet species-sampling model with finitely many types. A
power-like distribution for the number of types is derived.
| 0.926883 | 0.763592 | 0.163291 |
1802.10182 | Elicitation of FANO resonances and confinement well using pattern
recognition over UV-Vis spectra of gold nano spheres | Here, we have employed Principal Component Analysis (PCA) and Linear
Discriminant Analysis (LDA) to analyze a database consisting of Mie calculated
UV-Vis spectra of gold nanospheres (GNS). PCA and LDA extract the hidden
structures of the database by the corresponding vectors and coordinates. 3D
representation of coordinates of PCA of spectral database results in a beam of
surface plasmon polaritons (SPP) following a parabolic trajectory. The eigen
spectra of PCA exhibit the Fano type resonances of SPP, and quantum confinement
effects are observed by 3d representation of LDA coordinates obtained from the
database. In addition, standing wave patterns resulting from oscillations of
ions and electrons are illustrated through the eigen spectra of LDA. Such
results confirm that GNPs have high potential for high energy density physics
applications. Furthermore, the coordinates of PCA of spectral database are used
for the training of Machine Learning (ML) algorithms for the estimation of the
diameters of GNS. As a result, experimental spectra of diameters of GNS are
tested, and the outputs of ML algorithms and Dynamic Light Scattering (DLS)
measurements are compared for reliability of calculations. PCA based artificial
neural network (ANN) were found to estimate the diameters with a high accuracy.
Moreover, our results show that application of PCA and LDA on spectra could
efficiently investigate the light-nanoparticles interactions for applications
like rapid size determination.
| In this work, we propose to detect the iris and periocular regions
simultaneously using coarse annotations and two well-known object detectors:
YOLOv2 and Faster R-CNN. We believe coarse annotations can be used in
recognition systems based on the iris and periocular regions, given the much
smaller engineering effort required to manually annotate the training images.
We manually made coarse annotations of the iris and periocular regions (122K
images from the visible (VIS) spectrum and 38K images from the near-infrared
(NIR) spectrum). The iris annotations in the NIR databases were generated
semi-automatically by first applying an iris segmentation CNN and then
performing a manual inspection. These annotations were made for 11 well-known
public databases (3 NIR and 8 VIS) designed for the iris-based recognition
problem and are publicly available to the research community. Experimenting our
proposal on these databases, we highlight two results. First, the Faster R-CNN
+ Feature Pyramid Network (FPN) model reported an Intersection over Union (IoU)
higher than YOLOv2 (91.86% vs 85.30%). Second, the detection of the iris and
periocular regions being performed simultaneously is as accurate as performed
separately, but with a lower computational cost, i.e., two tasks were carried
out at the cost of one.
| 0.812468 | 0.604777 | 0.207691 |
1803.00875 | Hopf bifurcation in a mean field quantum laser equation | We study the dynamics of a non-linear Gorini-Kossakowski-Sudarshan-Lindblad
equation with mean-field Hamiltonian that describe a simple laser under the
mean field approximation. The open quantum system is formed by a single mode
optical cavity and a set of two level atoms, each coupled to a reservoir. We
prove that the mean field quantum master equation has a unique regular
stationary solution. In case a relevant parameter $C_\mathfrak{b} $, i.e., the
cavity cooperative parameter, is less than $1$, we prove that any regular
solution converges exponentially fast to the equilibrium, and so the regular
stationary state is a globally asymptotically stable equilibrium solution. We
obtain that a locally exponential stable family of periodic solutions is born
at the regular stationary state as $C_\mathfrak{b} $ passes through the
critical value $1$. Then, the mean-field laser equation has a Hopf bifurcation
at $C_\mathfrak{b} =1 $ of supercritical-like type. Thus, we establish the
mechanism by which the full quantum dynamics yields the bifurcation scenario at
$C_\mathfrak{b} =1 $ of the Maxwell-Bloch equations describing the laser, under
consideration, in the semiclassical laser theory. Moreover, applying our main
results we find the long-time behavior of the von Neumann entropy, the
photon-number statistics, and the quantum variance of the quadratures. We
develop a new technique for proving the exponential convergence in open quantum
systems based on a new variation of constant formula.
| Convection in an infinite fluid layer is often modelled by considering a
finite box with periodic boundary conditions in the two horizontal directions.
The translational invariance of the problem implies that any solution can be
translated horizontally by an arbitrary amount. Some solutions travel, but
those solutions that are invariant under reflections in both horizontal
directions cannot travel, since motion in any horizontal direction is balanced
by an equal and opposite motion elsewhere. Equivariant bifurcation theory
allows us to understand the steady and time-dependent ways in which a pattern
can travel when a mirror symmetry of the pattern is broken in a bifurcation.
Here we study symmetry-breaking instabilities of convection with a square
planform. A pitchfork bifurcation leads to squares that travel uniformly, while
a Hopf bifurcation leads to a new class of oscillations in which squares drift
to and fro but with no net motion of the pattern. Two types of travelling
squares are possible after a pitchfork bifurcation, and three or more
oscillatory solutions are created in a Hopf bifurcation. One of the three
oscillations, alternating pulsating waves, has been observed in recent
numerical simulations of convection in the presence of a magnetic field. We
also present a low-order model of three-dimensional compressible convection
that contains these symmetry-breaking instabilities. Our analysis clarifies the
relationship between several types of time-dependent patterns that have been
observed in numerical simulations of convection.
| 0.875264 | 0.731083 | 0.144181 |
1803.03469 | Monotone Matrix Estimation via Robust Deconvolution | The goal of deconvolution is in estimating the distribution of a random
variable based on its noisy observations. The goal of matrix estimation is in
estimating the entries of a large matrix from observed entries, which are noisy
versions of entries in a small fraction of the entire matrix. We study the rate
of convergence for estimation of matrices with a certain monotonicity property.
It turns out to be equivalent to solving a robust version of the deconvolution
problem. As the main result of this paper, we provide a simple, intuitive
algorithm for matrix estimation which extends the works by Fan (1991) and
Delaigle et al. (2008). We show that our computationally efficient method
achieves near optimal minimax rate for the matrix estimation as well as robust
deconvolution. This rate is within a constant factor to the rate achieved by
the kernel deconvolution estimator in the classical setup.
| In this work we construct an optimal shrinkage estimator for the precision
matrix in high dimensions. We consider the general asymptotics when the number
of variables $p\rightarrow\infty$ and the sample size $n\rightarrow\infty$ so
that $p/n\rightarrow c\in (0, +\infty)$. The precision matrix is estimated
directly, without inverting the corresponding estimator for the covariance
matrix. The recent results from the random matrix theory allow us to find the
asymptotic deterministic equivalents of the optimal shrinkage intensities and
estimate them consistently. The resulting distribution-free estimator has
almost surely the minimum Frobenius loss. Additionally, we prove that the
Frobenius norms of the inverse and of the pseudo-inverse sample covariance
matrices tend almost surely to deterministic quantities and estimate them
consistently. At the end, a simulation is provided where the suggested
estimator is compared with the estimators for the precision matrix proposed in
the literature. The optimal shrinkage estimator shows significant improvement
and robustness even for non-normally distributed data.
| 0.86606 | 0.752627 | 0.113433 |
1803.04817 | Characterizations of Gelfand rings, specially clean rings and their dual
rings | In this paper, new criteria for zero dimensional rings, Gelfand rings, clean
rings and mp-rings are given. The equivalency of some of the classical criteria
are also proved by new and simple methods. A new and interesting class of rings
is introduced and studied, we call them purified rings. Specially, non-trivial
characterizations for reduced purified rings are given. Purified rings are
actually the dual of clean rings. The pure ideals of reduced Gelfand rings and
mp-rings are characterized. It is also proved that if the topology of a scheme
is Hausdorff then the affine opens of that scheme is stable under taking finite
unions (and nonempty finite intersections). In particular, every compact scheme
is an affine scheme.
| The K-ring of symmetric vector bundles over a scheme X, the so-called
Grothendieck-Witt ring of X, can be endowed with the structure of a (special)
$\lambda$-ring. The associated $\gamma$-filtration generalizes the fundamental
filtration on the (Grothendieck-)Witt ring of a field and is closely related to
the "classical" filtration by the kernels of the first two Stiefel-Whitney
classes.
| 0.868188 | 0.773594 | 0.094594 |
1803.05392 | Constructing Imperfect Recall Abstractions to Solve Large Extensive-Form
Games | Extensive-form games are an important model of finite sequential interaction
between players. The size of the extensive-form representation is, however,
often prohibitive and it is the most common cause preventing deployment of
game-theoretic solution concepts to real-world scenarios. The state-of-the-art
approach to solve this issue is the information abstraction methodology. The
majority of existing information abstraction approaches create abstracted games
where players remember all their actions and all the information they obtained
in the abstracted game -- a property denoted as a perfect recall. Remembering
all the actions, however, causes the number of decision points of the player
(and hence also the size of his strategy) to grow exponentially with the number
of actions taken in the past. On the other hand, relaxing the perfect recall
requirement (resulting in so-called imperfect recall abstractions) can
significantly increase the computational complexity of solving the resulting
abstracted game. In this work, we introduce two domain-independent algorithms
FPIRA and CFR+IRA which are able to start with an arbitrary imperfect recall
abstraction of the solved two-player zero-sum perfect recall extensive-form
game. The algorithms simultaneously solve the abstracted game, detect the
missing information causing problems and return it to the players. This process
is repeated until provable convergence to the desired approximation of the Nash
equilibrium of the original game. We experimentally demonstrate that even when
the algorithms start with trivial coarse imperfect recall abstraction, they are
capable of approximating Nash equilibrium of large games using abstraction with
as little as 0.9% of information sets of the original game.
| Quantitative extensions of parity games have recently attracted significant
interest. These extensions include parity games with energy and payoff
conditions as well as finitary parity games and their generalization to parity
games with costs. Finitary parity games enjoy a special status among these
extensions, as they offer a native combination of the qualitative and
quantitative aspects in infinite games: The quantitative aspect of finitary
parity games is a quality measure for the qualitative aspect, as it measures
the limit superior of the time it takes to answer an odd color by a larger even
one. Finitary parity games have been extended to parity games with costs, where
each transition is labeled with a nonnegative weight that reflects the costs
incurred by taking it. We lift this restriction and consider parity games with
costs with arbitrary integer weights.
We show that solving such games is in NP $\cap$ coNP, the signature
complexity for games of this type. We also show that the protagonist has
finite-state winning strategies, and provide tight pseudo-polynomial bounds for
the memory he needs to win the game. Naturally, the antagonist may need
infinite memory to win. Moreover, we present tight bounds on the quality of
winning strategies for the protagonist.
Furthermore, we investigate the problem of determining, for a given threshold
$b$, whether the protagonist has a strategy of quality at most $b$ and show
this problem to be EXPTIME-complete. The protagonist inherits the necessity of
exponential memory for implementing such strategies from the special case of
finitary parity games.
| 0.905121 | 0.775706 | 0.129415 |
1803.0636 | Geometry of probability simplex via optimal transport | We study the Riemannian structures of the probability simplex on a weighted
graph introduced by $L^2$-Wasserstein metric. The main idea is to embed the
probability simplex as a submanifold of the positive orthant. From this
embedding, we establish the geometry formulas of the probability simplex in
Euclidean coordinates. The geometry computations on discrete simplex guide us
to introduce the ones in the Fr{\'e}chet manifold of densities supported on a
finite dimensional base manifold. Following the steps of Nelson,
Bakery-{\'E}mery, Lott-Villani-Strum and the geometry of density manifold, we
demonstrate an identity that connects the Bakery-{\'E}mery $\Gamma_2$ operator
(carr{\'e} du champ it{\'e}r{\'e}) and Yano's formula on the base manifold.
Several examples of differential equations in probability simplex are
demonstrated.
| On the space of probability densities, we extend the Wasserstein geodesics to
the case of higher-order interpolation such as cubic spline interpolation.
After presenting the natural extension of cubic splines to the Wasserstein
space, we propose a simpler approach based on the relaxation of the variational
problem on the path space. We explore two different numerical approaches, one
based on multi-marginal optimal transport and entropic regularization and the
other based on semi-discrete optimal transport.
| 0.844259 | 0.789197 | 0.055062 |
1803.06763 | Differentially Private Release and Analysis of Youth Voter Registration
Data via Statistical Election to Partition Sequentially | Voter data is important in political science research and applications such
as improving youth voter turnout. Privacy protection is imperative in voter
data since it often contains sensitive individual information. Differential
Privacy (DP) formalizes privacy in probabilistic terms and provides a robust
concept for privacy protection. DIfferentially Private Data Synthesis (DIPS)
techniques produce synthetic data in the DP setting. However, statistical
efficiency of the synthetic data via DIPS can be low due to the potentially
large amount of noise injected to satisfy DP, especially in high-dimensional
data, which is often the case in voter data. We propose a new DIPS approach
STatistical Election to Partition Sequentially (STEPS) that sequentially
partitions data by attributes per their contribution in explaining the data
variability. Additionally, we develop a metric to effectively assess the
similarity of synthetic data to the actual data. The application of the STEPS
procedure on the 2000-2012 Current Population Survey youth voter data suggests
STEPS is easy to implement and preserves the original information better than
some DIPS approaches including the Laplace mechanism on the full
cross-tabulation of the data and the hierarchical histograms generated via
random partitioning.
| Recently, an ingenious protocol called Algorand has been proposed to overcome
these limitations. Algorand uses an innovative process - called cryptographic
sortition - to securely and unpredictably elect a set of voters from the
network periodically. These voters are responsible for reaching consensus
through a Byzantine Agreement (BA) protocol on one block per time, guaranteeing
an overwhelming probability of linearity of the blockchain.
In this paper, we present a security analysis of Algorand. To the best of our
knowledge, it is the first security analysis as well as the first formal study
on Algorand. We designed an attack scenario in which a group of malicious users
tries to break the protocol, or at least limiting it to a reduced partition of
network users, by exploiting a possible security flaw in the messages
validation process of the BA. Since the source code or an official simulator
for Algorand was not available at the time of our study, we created a simulator
(which is available on request) to implement the protocol and assess the
feasibility of our attack scenario. Our attack requires the attacker to have a
trivial capability of establishing multiple connections with targeted nodes and
costs practically nothing to the attacker. Our results show that it is possible
to slow down the message validation process on honest nodes, which eventually
forces them to choose default values on the consensus; leaving the targeted
nodes behind in the chain as compared to the non-attacked nodes. Even though
our results are subject to the real implementation assumption, the core concept
of our attack remains valid.
| 0.912324 | 0.647696 | 0.264628 |
1803.07733 | Bach flow on homogeneous products | Qualitative behavior of Bach flow is established on compact four-dimensional
locally homogeneous product manifolds. This is achieved by lifting to the
homogeneous universal cover and, in most cases, capitalizing on the resultant
group structure. The resulting system of ordinary differential equations is
carefully analyzed on a case-by-case basis, with explicit solutions found in
some cases. Limiting behavior of the metric and the curvature are determined in
all cases. The behavior on quotients of $\mathbb{R} \times \mathbb{S}^3$ proves
to be the most challenging and interesting.
| In this paper, periodic homogenization of a steady fluid flow in fissured
porous solids with imperfect interfacial contact is performed via two-scale
asymptotic method.
| 0.862799 | 0.727424 | 0.135375 |
1803.08336 | Smart TWAP trading in continuous-time equilibria | This paper presents a continuous-time equilibrium model of TWAP trading and
liquidity provision in a market with multiple strategic investors with
heterogeneous intraday trading targets. We solve the model in closed-form and
show there are infinitely many equilibria. We compare the competitive
equilibrium with different non-price-taking equilibria. In addition, we show
intraday TWAP benchmarking reduces market liquidity relative to just terminal
trading targets alone. The model is computationally tractable, and we provide a
number of numerical illustrations. An extension to stochastic VWAP targets is
also provided.
| Time and Sales of corn futures traded electronically on the CME Group Globex
are studied. Theories of continuous prices turn upside down reality of
intra-day trading. Prices and their increments are discrete and obey lattice
probability distributions. A function for systematic evolution of futures
trading volume is proposed. Dependence between sample skewness and kurtosis of
waiting times does not support hypothesis of Weibull distribution. Kumaraswamy
distribution is more suitable for waiting times. Relationships between trading
volume and maximum profit strategies are presented. Frequencies of absolute
b-increments are approximated by a Hurwitz Zeta distribution. Relative
b-increments are non-Gaussian too. Dependence between b- and a-increments
allows to interpret the sample variances of b-increments as a stochastic
process. Mean sample variance of b-increments vs. a-increments is presented.
The L1 distance and Log-likelihood statistics for independence between a- and
b-increments are controversial. Corn price jumps remind of chain branching
reactions. Bi-logarithmic plots of the empirical frequencies of extreme
b-increments vs. ranks are presented. Corresponding distributions resemble
snakes forked tongues. The maximum profit strategy is discussed as a measure of
non-equilibrium.
| 0.883204 | 0.762594 | 0.12061 |
1804.00049 | Assessing inter-modal and inter-regional dependencies in prodromal
Alzheimer's disease using multimodal MRI/PET and Gaussian graphical models | A sequence of pathological changes takes place in Alzheimer's disease, which
can be assessed in vivo using various brain imaging methods. Currently, there
is no appropriate statistical model available that can easily integrate
multiple imaging modalities, being able to utilize the additional information
provided from the combined data. We applied Gaussian graphical models (GGMs)
for analyzing the conditional dependency networks of multimodal neuroimaging
data and assessed alterations of the network structure in mild cognitive
impairment (MCI) and Alzheimer's dementia (AD) compared to cognitively healthy
controls.
Data from N=667 subjects were obtained from the Alzheimer's Disease
Neuroimaging Initiative. Mean amyloid load (AV45-PET), glucose metabolism
(FDG-PET), and gray matter volume (MRI) was calculated for each brain region.
Separate GGMs were estimated using a Bayesian framework for the combined
multimodal data for each diagnostic category. Graph-theoretical statistics were
calculated to determine network alterations associated with disease severity.
Network measures clustering coefficient, path length and small-world
coefficient were significantly altered across diagnostic groups, with a
biphasic u-shape trajectory, i.e. increased small-world coefficient in early
MCI, intermediate values in late MCI, and decreased values in AD patients
compared to controls. In contrast, no group differences were found for
clustering coefficient and small-world coefficient when estimating conditional
dependency networks on single imaging modalities.
GGMs provide a useful methodology to analyze the conditional dependency
networks of multimodal neuroimaging data.
| The evaluation of white matter lesion progression is an important biomarker
in the follow-up of MS patients and plays a crucial role when deciding the
course of treatment. Current automated lesion segmentation algorithms are
susceptible to variability in image characteristics related to MRI scanner or
protocol differences. We propose a model that improves the consistency of MS
lesion segmentations in inter-scanner studies. First, we train a CNN base model
to approximate the performance of icobrain, an FDA-approved clinically
available lesion segmentation software. A discriminator model is then trained
to predict if two lesion segmentations are based on scans acquired using the
same scanner type or not, achieving a 78% accuracy in this task. Finally, the
base model and the discriminator are trained adversarially on multi-scanner
longitudinal data to improve the inter-scanner consistency of the base model.
The performance of the models is evaluated on an unseen dataset containing
manual delineations. The inter-scanner variability is evaluated on test-retest
data, where the adversarial network produces improved results over the base
model and the FDA-approved solution.
| 0.892239 | 0.751341 | 0.140898 |
1804.021 | Restless Bandits in Action: Resource Allocation, Competition and
Reservation | We study a resource allocation problem with varying requests, and with
resources of limited capacity shared by multiple requests. It is modeled as a
set of heterogeneous Restless Multi-Armed Bandit Problems (RMABPs) connected by
constraints imposed by resource capacity. Following Whittle's relaxation idea
and Weber and Weiss' asymptotic optimality proof, we propose a simple policy
and prove it to be asymptotically optimal in a regime where both arrival rates
and capacities increase. We provide a simple sufficient condition for
asymptotic optimality of the policy, and in complete generality propose a
method that generates a set of candidate policies for which asymptotic
optimality can be checked. The effectiveness of these results is demonstrated
by numerical experiments. To the best of our knowledge, this is the first work
providing asymptotic optimality results for such a resource allocation problem
and such a combination of multiple RMABPs.
| We consider a finite-armed structured bandit problem in which mean rewards of
different arms are functions of a common hidden parameter $\theta^*$. This
problem setting subsumes several previously studied frameworks that assume
linear or invertible reward functions. Our approach exploits the structure in
the problem gradually and pulls only some of the sub-optimal arms O(log T)
times, while other sub-optimal arms, termed as non-competitive, are pulled only
O(1) times. Put differently, the set of non-competitive arms, which depend on
the hidden parameter $\theta^*$, are stopped being pulled after some finite
time. We show how this approach can be transformed into a general algorithm
that can be coupled with any classic bandit strategy (UCB, Thompson Sampling,
KL-UCB etc.), allowing them to be used in the structured bandit setting with
substantial reductions in regret. In particular, we get bounded regret in
several cases of practical interest where all sub-optimal arms are
non-competitive. We also demonstrate the superiority of our algorithms over
existing methods (including UCB-S) via experiments on the Movielens dataset.
| 0.876785 | 0.80442 | 0.072365 |
1804.02421 | Geometry underlies the mechanical stiffening and softening of thin
sheets | A basic paradigm underlying the Hookean mechanics of amorphous, isotropic
solids is that small deformations are proportional to the magnitude of external
forces. However, slender bodies may undergo large deformations even under
minute forces, leading to nonlinear responses rooted in purely geometric
effects. Here we identify stiffening and softening as two prominent motifs of
such a material-independent, geometrically-nonlinear response of thin sheets,
and we show how both effects emanate from nontrivial yet generic features of
the stress and displacement fields. Our insights are borne out of studying the
indentation of a polymer film on a liquid bath, using experiments, simulations,
and theory. We find that stiffening is due to growing anisotropy of the stress
field whereas softening is due to changes in shape. We discuss similarities
with the mechanics of fiber networks, suggesting that our results are relevant
to a wide range of two- and three-dimensional materials.
| Fibrous networks are ideal functional materials since they provide mechanical
rigidity at low weight. Such structures are omnipresent in natural biomaterials
from cells to tissues, as well as in man-made materials from polymeric
composites to paper and textiles. Here, we demonstrate that fibrous networks of
the blood clotting protein fibrin undergo a strong and irreversible increase in
their mechanical rigidity in response to compression. This rigidification can
be precisely predetermined from the level of applied compressive strain,
providing a means to program the network rigidity without having to change its
composition. To identify the mechanism underlying this programmable
rigidification, we measure single fiber-fiber interactions using optical
tweezers. We further develop a minimal computational model of adhesive fiber
networks that shows that load-induced bond formation can explain the adaptation
of the fibrin networks to compressive loading. The model predicts that the
network stiffness after compressive programming obeys a universal power-law
dependence on the prestress built in by new bond formation, which we confirm
experimentally. The generality of this functional stiffening mechanism together
with our ability to quantitatively predict it provides a new powerful approach
to program the stiffness of fibrous materials and dynamically adapt them to
different loading conditions.
| 0.882769 | 0.739887 | 0.142883 |
1804.02744 | Unsupervised Learning of Mixture Models with a Uniform Background
Component | Gaussian Mixture Models are one of the most studied and mature models in
unsupervised learning. However, outliers are often present in the data and
could influence the cluster estimation. In this paper, we study a new model
that assumes that data comes from a mixture of a number of Gaussians as well as
a uniform "background" component assumed to contain outliers and other
non-interesting observations. We develop a novel method based on robust loss
minimization that performs well in clustering such GMM with a uniform
background. We give theoretical guarantees for our clustering algorithm to
obtain best clustering results with high probability. Besides, we show that the
result of our algorithm does not depend on initialization or local optima, and
the parameter tuning is an easy task. By numeric simulations, we demonstrate
that our algorithm enjoys high accuracy and achieves the best clustering
results given a large enough sample size. Finally, experimental comparisons
with typical clustering methods on real datasets witness the potential of our
algorithm in real applications.
| Independent Component Analysis (ICA) is a technique for unsupervised
exploration of multi-channel data that is widely used in observational
sciences. In its classic form, ICA relies on modeling the data as linear
mixtures of non-Gaussian independent sources. The maximization of the
corresponding likelihood is a challenging problem if it has to be completed
quickly and accurately on large sets of real data. We introduce the
Preconditioned ICA for Real Data (Picard) algorithm, which is a relative L-BFGS
algorithm preconditioned with sparse Hessian approximations. Extensive
numerical comparisons to several algorithms of the same class demonstrate the
superior performance of the proposed technique, especially on real data, for
which the ICA model does not necessarily hold.
| 0.816451 | 0.74477 | 0.071681 |
1804.08178 | Towards Practical Constrained Monotone Submodular Maximization | We design new algorithms for maximizing a monotone non-negative submodular
function under various constraints, which improve the state-of-the-art in time
complexity and/or performance guarantee. We first investigate the cardinality
constrained submodular maximization problem that has been widely studied for
about four decades. We design an $(1-\frac{1}{e}-\varepsilon)$-approximation
algorithm that makes $O(n\cdot \max \{\varepsilon^{-1},\log\log k \})$ queries.
To the best of our knowledge, this is the fastest known algorithm. We further
answer the open problem on finding a lower bound on the number of queries. We
show that, no (randomized) algorithm can achieve a ratio better than
$(\frac{1}{2}+\Theta(1))$ with $o(\frac{n}{\log n})$ queries. The acceleration
above is achieved by our \emph{Adaptive Decreasing Threshold} (ADT) algorithm.
Based on ADT, we study the $p$-system and $d$ knapsack constrained maximization
problem. We show that an $(1/(p+\frac{7}{4}d+1)-\varepsilon)$-approximate
solution can be computed via $O(\frac{n}{\varepsilon}\log
\frac{n}{\varepsilon}\max\{\log \frac{1}{\varepsilon},\log\log n\})$ queries.
Note that it improves the state of the art in both time complexity and
approximation ratio. We also show how to improve the ratio for a single
knapsack constraint via $O(n\cdot \max \{\varepsilon^{-1},\log\log k \})$
queries. For maximizing a submodular function with curvature $\kappa$ under
matroid constraint, we show an $(1-\frac{\kappa}{e}-\varepsilon)$-approximate
algorithm that uses $\tilde{O}(nk)$ value oracle queries. Our ADT could be
utilized to obtain faster algorithms in other problems. To prove our results,
we introduce a general characterization between randomized complexity and
deterministic complexity of approximation algorithms that could be used in
other problems and may be interesting in its own right.
| Social media has brought a revolution on how people are consuming news.
Beyond the undoubtedly large number of advantages brought by social-media
platforms, a point of criticism has been the creation of echo chambers and
filter bubbles, caused by social homophily and algorithmic personalization.
In this paper we address the problem of balancing the information exposure in
a social network. We assume that two opposing campaigns (or viewpoints) are
present in the network, and that network nodes have different preferences
towards these campaigns. Our goal is to find two sets of nodes to employ in the
respective campaigns, so that the overall information exposure for the two
campaigns is balanced. We formally define the problem, characterize its
hardness, develop approximation algorithms, and present experimental evaluation
results.
Our model is inspired by the literature on influence maximization, but we
offer significant novelties. First, balance of information exposure is modeled
by a symmetric difference function, which is neither monotone nor submodular,
and thus, not amenable to existing approaches. Second, while previous papers
consider a setting with selfish agents and provide bounds on best response
strategies (i.e., move of the last player), we consider a setting with a
centralized agent and provide bounds for a global objective function.
| 0.855066 | 0.689329 | 0.165737 |
1804.11135 | A Non-parametric Multi-stage Learning Framework for Cognitive Spectrum
Access in IoT Networks | Given the increasing number of devices that is going to get connected to
wireless networks with the advent of Internet of Things, spectrum scarcity will
present a major challenge. Application of opportunistic spectrum access
mechanisms to IoT networks will become increasingly important to solve this. In
this paper, we present a cognitive radio network architecture which uses
multi-stage online learning techniques for spectrum assignment to devices, with
the aim of improving the throughput and energy efficiency of the IoT devices.
In the first stage, we use an AI technique to learn the quality of a
user-channel pairing. The next stage utilizes a non-parametric Bayesian
learning algorithm to estimate the Primary User OFF time in each channel. The
third stage augments the Bayesian learner with implicit exploration to
accelerate the learning procedure. The proposed method leads to significant
improvement in throughput and energy efficiency of the IoT devices while
keeping the interference to the primary users minimal. We provide comprehensive
empirical validation of the method with other learning based approaches.
| Next-generation wireless networks (NGWN) have a substantial potential in
terms of supporting a broad range of complex compelling applications both in
military and civilian fields, where the users are able to enjoy high-rate,
low-latency, low-cost and reliable information services. Achieving this
ambitious goal requires new radio techniques for adaptive learning and
intelligent decision making because of the complex heterogeneous nature of the
network structures and wireless services. Machine learning algorithms have
great success in supporting big data analytics, efficient parameter estimation
and interactive decision making. Hence, in this article, we review the
thirty-year history of machine learning by elaborating on supervised learning,
unsupervised learning, reinforcement learning and deep learning, respectively.
Furthermore, we investigate their employment in the compelling applications of
NGWNs, including heterogeneous networks (HetNets), cognitive radios (CR),
Internet of things (IoT), machine to machine networks (M2M), and so on. This
article aims for assisting the readers in clarifying the motivation and
methodology of the various machine learning algorithms, so as to invoke them
for hitherto unexplored services as well as scenarios of future wireless
networks.
| 0.893151 | 0.76411 | 0.129041 |
1805.00224 | Multi-Objective Path Planning of an Autonomous Mobile Robot in Static
and Dynamic Environments using a Hybrid PSO-MFB Optimisation Algorithm | The main aim of this paper is to solve a path planning problem for an
autonomous mobile robot in static and dynamic environments by determining the
collision-free path that satisfies the chosen criteria for shortest distance
and path smoothness. The algorithm mimics the real world by adding the actual
size of the mobile robot to that of the obstacles and formulating the problem
as a moving point in the free-space. The proposed path planning algorithm
consists of three modules: in the first module, the path planning algorithm
forms an optimised path by conducting a hybridized Particle Swarm
Optimization-Modified Frequency Bat (PSO-MFB) algorithm that minimises distance
and follows path smoothness criteria; in the second module, any infeasible
points generated by the proposed PSO-MFB Algorithm are detected by a novel
Local Search (LS) algorithm and integrated with the PSO-MFB algorithm to be
converted into feasible solutions; the third module features obstacle detection
and avoidance (ODA), which is triggered when the mobile robot detects obstacles
within its sensing region, allowing it to avoid collision with obstacles.
Simulations have been carried out that indicated that this method generates a
feasible path even in complex dynamic environments and thus overcomes the
shortcomings of conventional approaches such as grid methods. Comparisons with
previous examples in the literature are also included in the results.
| Autonomous drones (also known as unmanned aerial vehicles) are increasingly
popular for diverse applications of light-weight delivery and as substitutions
of manned operations in remote locations. The computing systems for drones are
becoming a new venue for research in cyber-physical systems. Autonomous drones
require integrated intelligent decision systems to control and manage their
flight missions in the absence of human operators. One of the most crucial
aspects of drone mission control and management is related to the optimization
of battery lifetime. Typical drones are powered by on-board batteries, with
limited capacity. But drones are expected to carry out long missions. Thus, a
fully automated management system that can optimize the operations of
battery-operated autonomous drones to extend their operation time is highly
desirable. This paper presents several contributions to automated management
systems for battery-operated drones: (1) We conduct empirical studies to model
the battery performance of drones, considering various flight scenarios. (2) We
study a joint problem of flight mission planning and recharging optimization
for drones with an objective to complete a tour mission for a set of sites of
interest in the shortest time. This problem captures diverse applications of
delivery and remote operations by drones. (3) We present algorithms for solving
the problem of flight mission planning and recharging optimization. We
implemented our algorithms in a drone management system, which supports
real-time flight path tracking and re-computation in dynamic environments. We
evaluated the results of our algorithms using data from empirical studies. (4)
To allow fully autonomous recharging of drones, we also develop a robotic
charging system prototype that can recharge drones autonomously by our drone
management system.
| 0.906328 | 0.711701 | 0.194627 |
1805.02115 | A geometric approach to study p-summability in multilinear mappings | We prove that the equivalences between the local definition, the Pietsch's
Domination theorem and the Pietsch's factorization theorem of absolutely
$p$-summing linear operators between Banach spaces, admit a generalization to
multilinear and homogenoeus polynomial mappings. This gives rise, in a natural
way, to a notion of p-summability which is the one we study.
| The main purpose of this paper is to introduce the concepts of Wijsman
$C_{\lambda}$ statistical convergence, Wijsman $C_{\lambda}$ summability and
Wijsman $\mathcal{I}$-$C_{\lambda}$ summability for sequence of sets by using
submethod. Also, we establish some relations among the Wijsman $C_{\lambda}$
summability, Wijsman $D_{\lambda}$ summability and Wijsman $C_{1}$ summability.
Finally, we have given some equivalence results for these concepts.
| 0.843005 | 0.760602 | 0.082402 |
1805.02319 | Single-Anchor Two-Way Localization Bounds for 5G mmWave Systems: Two
Protocols | Recently, mmWave 5G localization has been shown to be a promising technology
to achieve centimetre-level accuracy. This generates more opportunities for
location-aware communication applications. One assumption usually made in the
investigation of localization methods is that the user equipment (UE) and the
base station (BS) are synchronized. However, in reality, communications systems
are not finely synchronized to a level useful for localization. Therefore, in
this paper, we investigate two-way localization protocols that avoid the
prerequisite of tight time synchronization. Namely, we consider a distributed
localization protocol (DLP), whereby the BS and UE exchange signals in two
rounds of transmission and then localization is achieved using the signal
received in the second round. On the other hand, we also consider a centralized
localization protocol (CLP), whereby localization is achieved using the signals
received in the two rounds. We derive the position (PEB) and orientation error
bounds (OEB) applying beamforming at both ends and compare them to the
traditional one-way localization. Our results obtained using realistic system
parameters show that mmWave localization is mainly limited by angular rather
than temporal estimation and that CLP significantly outperforms DLP. Our
simulations also show that it is more beneficial to have more antennas at the
BS than at the UE.
| We consider the secret key capacity of the thermal loss channel, which is
modeled by a beam splitter mixing an input signal mode with an environmental
thermal mode. This capacity is the maximum value of secret bits that two remote
parties can generate by means of the most general adaptive protocols assisted
by unlimited and two-way classical communication. To date, only upper and lower
bounds are known. The present work improves the lower bound by resorting to
Gaussian protocols based on suitable trusted-noise detectors.
| 0.906333 | 0.710904 | 0.195429 |
1805.02546 | Programmable projective measurement with linear optics | We present a scheme for a universal device which can be programmed by quantum
states to perform a chosen projective measurement, and its implementation in
linear optics. In particular, our scheme takes a single input system (the input
register), and M-1 systems all in a state psi (the program registers), whose
role is to encode the measurement direction, and approximates the projective
measurement with respect to the state psi on the input system. Importantly the
scheme is entirely independent of the measurement basis choice psi. This is
done optimally in M, if we demand the input state psi always returns the
appropriate outcome, and limits to the ideal projective measurement with M. The
size of the linear optical circuit we propose scales as M log M , and requires
O(M log M) classical side processing. Our scheme can be viewed as an extension
of the swap test to the instance where one state is supplied many times.
| Time-bin encoding is a robust form of optical quantum information, especially
for transmission in optical fibers. To read out the information, the separation
of the time bins must be larger than the detector time resolution, typically on
the order of nanoseconds for photon counters. In the present work, we
demonstrate a technique using a nonlinear interaction between chirped entangled
time-bin photons and shaped laser pulses to perform projective measurements on
arbitrary time-bin states with picosecond-scale separations. We demonstrate a
tomographically-complete set of time-bin qubit projective measurements and show
the fidelity of operations is sufficiently high to violate the CHSH-Bell
inequality by more than 6 standard deviations.
| 0.817687 | 0.702288 | 0.115399 |
1805.02726 | Sobolev-type inequalities on Cartan-Hadamard manifolds under curvature
bounds | We investigate the validity, as well as the failure, of Sobolev-type
inequalities on Cartan-Hadamard manifolds under suitable bounds on the
sectional and the Ricci curvatures. More specifically, we prove that if the
sectional curvatures are bounded from above by a negative power of the distance
from a fixed pole (times a negative constant), then all the $ L^p $
inequalities that interpolate between Poincar\'e and Sobolev hold in the radial
setting provided such power lies in the interval $ (-2,0) $, except the
Poincar\'e inequality. The latter was established in a famous paper by H.P.
McKean, under a constant negative bound from above on the sectional curvatures.
If the power is equal to $ -2 $ then $ p $ must necessarily be strictly larger
(in a quantitative way) than $ 2 $. Upon assuming similar bounds from below on
the Ricci curvature, we show that the nonradial version of such inequalities
fails, except for the Sobolev one. Finally, we discuss applications of the
here-established Sobolev-type inequalities to optimal smoothing effects for
radial porous medium equations.
| We prove some isoperimetric type inequalities in warped product manifolds, or
more generally, multiply warped product manifolds. We then relate them to
inequalities involving the higher order mean-curvature integrals. We also apply
our results to obtain sharp eigenvalue estimates and some sharp geometric
inequalities in space forms.
| 0.924874 | 0.861231 | 0.063643 |
1805.03514 | Terahertz quantum cryptography | A well-known empirical rule for the demand of wireless communication systems
is that of Edholm's law of bandwidth. It states that the demand for bandwidth
in wireless short-range communications doubles every 18 months. With the
growing demand for bandwidth and the decreasing cell size of wireless systems,
terahertz (THz) communication systems are expected to become increasingly
important in modern day applications. With this expectation comes the need for
protecting users' privacy and security in the best way possible. With that in
mind, we show that quantum key distribution can operate in the THz regime and
we derive the relevant secret key rates against realistic collective attacks.
In the extended THz range (from 0.1 to 50 THz), we find that below 1 THz, the
main detrimental factor is thermal noise, while at higher frequencies it is
atmospheric absorption. Our results show that high-rate THz quantum
cryptography is possible over distances varying from a few meters using direct
reconciliation, to about 220m via reverse reconciliation. We also give a
specific example of the physical hardware and architecture that could be used
to realize our THz quantum key distribution scheme.
| The paper aims to do a survey along with a comparative analysis of the
various cryptography libraries that are applicable in the field of Internet of
Things (IoT). The first half of the paper briefly introduces the various
cryptography libraries available in the field of cryptography along with a list
of all the algorithms contained within the libraries. The second half of the
paper deals with cryptography libraries specifically aimed for application in
the field of Internet of Things. The various libraries and their performance
analysis listed down in this paper are consolidated from various sources with
the aim of providing a single comprehensive repository for reference to the
various cryptography libraries and the comparative analysis of their features
in IoT.
| 0.885207 | 0.670622 | 0.214585 |
1805.03778 | Threshold functions for patterns in random subsets of finite vector
spaces | We study the existence of certain "patterns" in random subsets of vector
spaces over finite fields. The patterns we consider are three-term arithmetic
progressions, right triangles, parallelograms and affine planes. We give a
threshold function for the property that a random subset of vectors contains a
pattern from a given family, and show that the number of patterns contained in
the random subset is asymptotically Poisson at the threshold scale.
| We give a full classification of vertex-transitive zonotopes.
We prove that a vertex-transitive zonotope is a $\Gamma$-permutahedron for
some finite reflection group $\Gamma\subset\mathrm{O}(\mathbb R^d)$. The same
holds true for zonotopes in which all vertices are on a common sphere, and all
edges are of the same length (which we call homogeneous zonotopes). The
classification of these then follows from the classification of finite
reflection groups.
We proof that root systems can be characterized as those centrally symmetric
sets of vectors, for which all intersections with half-spaces, that contain
exactly half the vectors, are congruent. We provide a further sufficient
condition for a centrally symmetric set being a root system.
| 0.898293 | 0.652022 | 0.246271 |
1805.04687 | BDD100K: A Diverse Driving Video Database with Scalable Annotation
Tooling | Datasets drive vision progress and autonomous driving is a critical vision
application, yet existing driving datasets are impoverished in terms of visual
content. Driving imagery is becoming plentiful, but annotation is slow and
expensive, as annotation tools have not kept pace with the flood of data. Our
first contribution is the design and implementation of a scalable annotation
system that can provide a comprehensive set of image labels for large-scale
driving datasets. Our second contribution is a new driving dataset, facilitated
by our tooling, which is an order of magnitude larger than previous efforts,
and is comprised of over 100K videos with diverse kinds of annotations
including image level tagging, object bounding boxes, drivable areas, lane
markings, and full-frame instance segmentation. The dataset possesses
geographic, environmental, and weather diversity, which is useful for training
models so that they are less likely to be surprised by new conditions. The
dataset can be requested at http://bdd-data.berkeley.edu.
| Video summarization has been extensively studied in the past decades.
However, user-generated video summarization is much less explored since there
lack large-scale video datasets within which human-generated video summaries
are unambiguously defined and annotated. Toward this end, we propose a
user-generated video summarization dataset - UGSum52 - that consists of 52
videos (207 minutes). In constructing the dataset, because of the subjectivity
of user-generated video summarization, we manually annotate 25 summaries for
each video, which are in total 1300 summaries. To the best of our knowledge, it
is currently the largest dataset for user-generated video summarization.
Based on this dataset, we present FrameRank, an unsupervised video
summarization method that employs a frame-to-frame level affinity graph to
identify coherent and informative frames to summarize a video. We use the
Kullback-Leibler(KL)-divergence-based graph to rank temporal segments according
to the amount of semantic information contained in their frames. We illustrate
the effectiveness of our method by applying it to three datasets SumMe, TVSum
and UGSum52 and show it achieves state-of-the-art results.
| 0.807651 | 0.764656 | 0.042995 |
1805.05021 | A One-Class Decision Tree Based on Kernel Density Estimation | One-class Classification (OCC) is an area of machine learning which addresses
prediction based on unbalanced datasets. Basically, OCC algorithms achieve
training by means of a single class sample, with potentially some additional
counter-examples. The current OCC models give satisfaction in terms of
performance, but there is an increasing need for the development of
interpretable models. In the present work, we propose a one-class model which
addresses concerns of both performance and interpretability. Our hybrid OCC
method relies on density estimation as part of a tree-based learning algorithm,
called One-Class decision Tree (OC-Tree). Within a greedy and recursive
approach, our proposal rests on kernel density estimation to split a data
subset on the basis of one or several intervals of interest. Thus, the OC-Tree
encloses data within hyper-rectangles of interest which can be described by a
set of rules. Against state-of-the-art methods such as Cluster Support Vector
Data Description (ClusterSVDD), One-Class Support Vector Machine (OCSVM) and
isolation Forest (iForest), the OC-Tree performs favorably on a range of
benchmark datasets. Furthermore, we propose a real medical application for
which the OC-Tree has demonstrated its effectiveness, through the ability to
tackle interpretable diagnosis aid based on unbalanced datasets.
| Multivariate density estimation is a popular technique in statistics with
wide applications including regression models allowing for heteroskedasticity
in conditional variances. The estimation problems become more challenging when
observations are missing in one or more variables of the multivariate vector. A
flexible class of mixture of tensor products of kernel densities is proposed
which allows for easy implementation of imputation methods using Gibbs sampling
and shown to have superior performance compared to some of the exisiting
imputation methods currently available in literature. Numerical illustrations
are provided using several simulated data scenarios and applications to couple
of case studies are also presented.
| 0.834974 | 0.718475 | 0.116499 |
1805.06084 | A Hierarchical Max-infinitely Divisible Process for Extreme Areal
Precipitation Over Watersheds | Understanding the spatial extent of extreme precipitation is necessary for
determining flood risk and adequately designing infrastructure (e.g.,
stormwater pipes) to withstand such hazards. While environmental phenomena
typically exhibit weakening spatial dependence at increasingly extreme levels,
limiting max-stable process models for block maxima have a rigid dependence
structure that does not capture this type of behavior. We propose a flexible
Bayesian model from a broader family of (conditionally) max-infinitely
divisible processes that allows for weakening spatial dependence at
increasingly extreme levels, and due to a hierarchical representation of the
likelihood in terms of random effects, our inference approach scales to large
datasets. The proposed model is constructed using flexible random basis
functions that are estimated from the data, allowing for straightforward
inspection of the predominant spatial patterns of extremes. In addition, the
described process possesses (conditional) max-stability as a special case,
making inference on the tail dependence class possible. We apply our model to
extreme precipitation in eastern North America, and show that the proposed
model adequately captures the extremal behavior of the data.
| Statistical modeling of multivariate and spatial extreme events has attracted
broad attention in various areas of science. Max-stable distributions and
processes are the natural class of models for this purpose, and many parametric
families have been developed and successfully applied. Due to complicated
likelihoods, the efficient statistical inference is still an active area of
research, and usually composite likelihood methods based on bivariate densities
only are used. Thibaud et al. (2016, Ann. Appl. Stat., to appear) use a
Bayesian approach to fit a Brown--Resnick process to extreme temperatures. In
this paper, we extend this idea to a methodology that is applicable to general
max-stable distributions and that uses full likelihoods. We further provide
simple conditions for the asymptotic normality of the median of the posterior
distribution and verify them for the commonly used models in multivariate and
spatial extreme value statistics. A simulation study shows that this point
estimator is considerably more efficient than the composite likelihood
estimator in a frequentist framework. From a Bayesian perspective, our approach
opens the way for new techniques such as Bayesian model comparison in
multivariate and spatial extremes.
| 0.842095 | 0.767159 | 0.074937 |
1805.06431 | ChoiceNet: Robust Learning by Revealing Output Correlations | In this paper, we focus on the supervised learning problem with corrupted
training data. We assume that the training dataset is generated from a mixture
of a target distribution and other unknown distributions. We estimate the
quality of each data by revealing the correlation between the generated
distribution and the target distribution. To this end, we present a novel
framework referred to here as ChoiceNet that can robustly infer the target
distribution in the presence of inconsistent data. We demonstrate that the
proposed framework is applicable to both classification and regression tasks.
ChoiceNet is evaluated in comprehensive experiments, where we show that it
constantly outperforms existing baseline methods in the handling of noisy data.
Particularly, ChoiceNet is successfully applied to autonomous driving tasks
where it learns a safe driving policy from a dataset with mixed qualities. In
the classification task, we apply the proposed method to the MNIST and CIFAR-10
datasets and it shows superior performances in terms of robustness to noisy
labels.
| Understanding cell function requires an accurate description of how noise is
transmitted through biochemical networks. We present an analytical result for
the power spectrum of the output signal of a biochemical network that takes
into account the correlations between the noise in the input signal (the
extrinsic noise) and the noise in the reactions that constitute the network
(the intrinsic noise). These correlations arise from the fact that the
reactions by which biochemical signals are detected necessarily affect the
signaling molecules and the detection components of the network simultaneously.
We show that anti-correlation between the extrinsic and intrinsic noise
enhances the robustness of zero-order ultrasensitive networks to biochemical
noise. We discuss the consequences of the correlation between extrinsic and
intrinsic noise for a modular description of noise transmission through large
biochemical networks in the context of the mitogen-activated protein kinase
cascade.
| 0.843911 | 0.660425 | 0.183487 |
1805.0838 | Wasserstein natural gradient in statistical manifolds with continuous
sample space | We study the Wasserstein natural gradient in parametric statistical models
with continuous sample spaces. Our approach is to pull back the
$L^2$-Wasserstein metric tensor in the probability density space to a parameter
space, equipping the latter with a positive definite metric tensor, under which
it becomes a Riemannian manifold, named the Wasserstein statistical manifold.
In general, it is not a totally geodesic sub-manifold of the density space, and
therefore its geodesics will differ from the Wasserstein geodesics, except for
the well-known Gaussian distribution case, a fact which can also be validated
under our framework. We use the sub-manifold geometry to derive a gradient flow
and natural gradient descent method in the parameter space. When parametrized
densities lie in $\bR$, the induced metric tensor establishes an explicit
formula. In optimization problems, we observe that the natural gradient descent
outperforms the standard gradient descent when the Wasserstein distance is the
objective function. In such a case, we prove that the resulting algorithm
behaves similarly to the Newton method in the asymptotic regime. The proof
calculates the exact Hessian formula for the Wasserstein distance, which
further motivates another preconditioner for the optimization process. To the
end, we present examples to illustrate the effectiveness of the natural
gradient in several parametric statistical models, including the Gaussian
measure, Gaussian mixture, Gamma distribution, and Laplace distribution.
| This work presents a reformulation of the recently proposed Wasserstein
autoencoder framework on a non-Euclidean manifold, the Poincar\'e ball model of
the hyperbolic space. By assuming the latent space to be hyperbolic, we can use
its intrinsic hierarchy to impose structure on the learned latent space
representations. We demonstrate the model in the visual domain to analyze some
of its properties and show competitive results on a graph link prediction task.
| 0.915652 | 0.818589 | 0.097063 |
1805.08755 | Peer-to-Peer Energy-Aware Tree Network Formation | We study the fundamental problem of distributed energy-aware network
formation with mobile agents of limited computational power that have the
capability to wirelessly transmit and receive energy in a peer-to-peer manner.
Specifically, we design simple distributed protocols consisting of a small
number of states and interaction rules for the construction of both arbitrary
and binary trees. Further, we theoretically and experimentally evaluate a
plethora of energy redistribution protocols that exploit different levels of
knowledge in order to achieve desired energy distributions which require, for
instance, that every agent has twice the energy of the agents of higher depth
(according to the tree network). Our study shows that without using any
knowledge about the network structure, such energy distributions cannot be
achieved in a timely manner, which means that there might be high energy loss
during the redistribution process. On the other hand, only a few extra bits of
information seem to be enough to guarantee quick convergence to energy
distributions that satisfy particular properties, yielding low energy loss.
| We collected mobility traces of 84,208 avatars spanning 22 regions over two
months in Second Life, a popular networked virtual environment. We analyzed the
traces to characterize the dynamics of the avatars mobility and behavior, both
temporally and spatially. We discuss the implications of the our findings to
the design of peer-to-peer networked virtual environments, interest management,
mobility modeling of avatars, server load balancing and zone partitioning,
client-side caching, and prefetching.
| 0.865376 | 0.681388 | 0.183988 |
1805.09411 | A Generalized Active Learning Approach for Unsupervised Anomaly
Detection | This work formalizes the new framework for anomaly detection, called active
anomaly detection. This framework has, in practice, the same cost of
unsupervised anomaly detection but with the possibility of much better results.
We show that unsupervised anomaly detection is an undecidable problem and that
a prior needs to be assumed for the anomalies probability distribution in order
to have performance guarantees. Finally, we also present a new layer that can
be attached to any deep learning model designed for unsupervised anomaly
detection to transform it into an active anomaly detection method, presenting
results on both synthetic and real anomaly detection datasets.
| A major goal of unsupervised learning is to discover data representations
that are useful for subsequent tasks, without access to supervised labels
during training. Typically, this involves minimizing a surrogate objective,
such as the negative log likelihood of a generative model, with the hope that
representations useful for subsequent tasks will arise as a side effect. In
this work, we propose instead to directly target later desired tasks by
meta-learning an unsupervised learning rule which leads to representations
useful for those tasks. Specifically, we target semi-supervised classification
performance, and we meta-learn an algorithm -- an unsupervised weight update
rule -- that produces representations useful for this task. Additionally, we
constrain our unsupervised update rule to a be a biologically-motivated,
neuron-local function, which enables it to generalize to different neural
network architectures, datasets, and data modalities. We show that the
meta-learned update rule produces useful features and sometimes outperforms
existing unsupervised learning techniques. We further show that the
meta-learned unsupervised update rule generalizes to train networks with
different widths, depths, and nonlinearities. It also generalizes to train on
data with randomly permuted input dimensions and even generalizes from image
datasets to a text task.
| 0.908505 | 0.675301 | 0.233203 |
1805.09646 | An extension of valid syllogisms to valid categorical arguments | One presents the Set Theory Model (STM) of the valid categorical arguments
(VCAs). The STM was initially developed by George Boole and Lewis Carroll, who
worked with a universe of discourse, U, which contains the pairwise
complementary sets, or categorical terms,S,non-S,P,non-P,M,non-M, and is thus
partitioned into eight subsets. In STM both the positive terms, S,P,M, and the
negative terms, non-S, non-P, non-M, are allowed to appear in the pairs of
categorical premises (PCPs) and their entailed logical consequences (LCs). One
thus counts 64 distinct PCPs, out of which only 32 PCPs generate VCAs, and 32
PCPs do not entail any LC. By comparison, Classic Categorical Syllogistic (CCS)
admits PCPs worded only via the positive terms S,P,M, and accepts as LCs of the
valid syllogisms (VS) only the statements E(S,P), I(S,P), A(S,P), or O(S,P). It
is easier to see on the VCA set, than on its VS proper subset, that there are
only three distinct types of VCAs, (and of VS), and that all the VCAs of the
same type are equivalent. Besides the VCAs and their LCs, one discusses VCA
sorites, VCA distribution conservation, empty set constraints (ESC), and VCA
generalized versions of the Rules of Valid Syllogisms (RofVS).
| We discuss a general method of constructing the products of composite
operators using the exact renormalization group formalism. Considering mainly
the Wilson action at a generic fixed point of the renormalization group, we
give an argument for the validity of short distance expansions of operator
products. We show how to compute the expansion coefficients by solving
differential equations, and test our method with some simple examples.
| 0.839665 | 0.583329 | 0.256336 |
1805.12042 | New Progress in Univariate Polynomial Root-finding | Univariate polynomial root-finding has been studied for four millennia and is
still the subject of intensive research. Hundreds of efficient algorithms for
this task have been proposed. Two of them are nearly optimal. The first one was
proposed in 1995; it relies on recursive factorization of a polynomial, is
quite involved, and has never been implemented. The second one was proposed in
2016, relies on subdivision iterations, was implemented in 2018, and promises
to be practically competitive, although user's current choice for univariate
polynomial root-finding is the package MPSolve, proposed in 2000, revised in
2014, and based on Ehrlich's functional iterations. By incorporating some old
and new techniques we significantly accelerate subdivision and Ehrlich's
iterations; as by-product we also accelerate path-following Newton's iterations
for root-finding.. Moreover our acceleration of the known subdivision
root-finders is dramatic in the case of sparse input polynomials. Some of our
techniques promise to be valuable for the design and analysis of other
polynomial root-finders as well.
| We collect here elementary properties of differentiation matrices for
univariate polynomials expressed in various bases, including orthogonal
polynomial bases and non-degree-graded bases such as Bernstein bases and
Lagrange \& Hermite interpolational bases.
| 0.912231 | 0.79543 | 0.116801 |
1805.12491 | Structure from noise: Mental errors yield abstract representations of
events | Humans are adept at uncovering abstract associations in the world around
them, yet the underlying mechanisms remain poorly understood. Intuitively,
learning the higher-order structure of statistical relationships should involve
complex mental processes. Here we propose an alternative perspective: that
higher-order associations instead arise from natural errors in learning and
memory. Combining ideas from information theory and reinforcement learning, we
derive a maximum entropy (or minimum complexity) model of people's internal
representations of the transitions between stimuli. Importantly, our model (i)
affords a concise analytic form, (ii) qualitatively explains the effects of
transition network structure on human expectations, and (iii) quantitatively
predicts human reaction times in probabilistic sequential motor tasks.
Together, these results suggest that mental errors influence our abstract
representations of the world in significant and predictable ways, with direct
implications for the study and design of optimally learnable information
sources.
| We introduce the bilingual dual-coding theory as a model for bilingual mental
representation. Based on this model, lexical selection neural networks are
implemented for a connectionist transfer project in machine translation. This
lexical selection approach has two advantages. First, it is learnable. Little
human effort on knowledge engineering is required. Secondly, it is
psycholinguistically well-founded.
| 0.842746 | 0.702202 | 0.140544 |
1806.00033 | Minimal pseudo-Anosov stretch factors on nonorientable surfaces | We determine the smallest pseudo-Anosov stretch factor (restricting to
pseudo-Anosov maps with an orientable invariant foliation) on the closed
nonorientable surfaces of genus 4, 5, 6, 7, 8, 10, 12, 14, 16, 18 and 20. We
also determine the smallest stretch factor of an orientation-reversing
pseudo-Anosov map (again restricting to orientable invariant foliations) on the
closed orientable surfaces of genus 1, 3, 5, 7, 9 and 11.
| A 2-cell embedding of a graph $G$ into a closed (orientable or nonorientable)
surface is called regular if its automorphism group acts regularly on the flags
- mutually incident vertex-edge-face triples. In this paper, we classify the
regular embeddings of complete bipartite graphs $K_{n,n}$ into nonorientable
surfaces. Such regular embedding of $K_{n,n}$ exists only when $n =
2p_1^{a_1}p_2^{a_2}... p_k^{a_k}$ (a prime decomposition of $n$) and all $p_i
\equiv \pm 1 (\mod 8)$. In this case, the number of those regular embeddings of
$K_{n,n}$ up to isomorphism is $2^k$.
| 0.87385 | 0.662245 | 0.211606 |
1806.00696 | NLP-assisted software testing: a systematic review | To reduce manual effort of extracting test cases from natural-language
requirements, many approaches based on Natural Language Processing (NLP) have
been proposed in the literature. Given the large amount of approaches in this
area, and since many practitioners are eager to utilize such techniques, it is
important to synthesize and provide an overview of the state-of-the-art in this
area. Our objective is to summarize the state-of-the-art in NLP-assisted
software testing which could benefit practitioners to potentially utilize those
NLP-based techniques. Moreover, this can benefit researchers in providing an
overview of the research landscape. To address the above need, we conducted a
survey in the form of a systematic literature mapping (classification) and
systematic literature review (SLR). After compiling an initial pool of 95
papers, we conducted a systematic voting, and our final pool included 67
technical papers. This review paper provides an overview of the contribution
types presented in the papers, types of NLP approaches used to assist software
testing, types of required input requirements, and a review of tool support in
this area. Some key results we have detected are: (1) only four of the 38 tools
(11%) presented in the papers are available for download; (2) a larger ratio of
the papers (30 of 67) provided a shallow exposure to the NLP aspects (almost no
details). Conclusion: This paper would benefit both practitioners and
researchers by serving as an "index" to the body of knowledge in this area. The
results could help practitioners utilizing the existing NLP-based techniques;
this, in turn, reduces the cost of test-case design and decreases the amount of
human resources spent on test activities. After sharing this review with some
of our industrial collaborators, initial insights show that this review can
indeed be useful and beneficial to practitioners.
| Twitter social network contains a large amount of information generated by
its users. That information is composed of opinions and comments that may
reflect trends in social behavior. There is talk of trend when it is possible
to identify opinions and comments geared towards the same shared by a lot of
people direction. To determine if two or more written opinions share the same
address, techniques Natural Language Processing (NLP) are used. This paper
proposes a methodology for predicting reflected in Twitter from the use of
sentiment analysis functions NLP based on social behaviors. The case study was
selected the 2015 Presidential in Argentina, and a software architecture Big
Data composed Vertica data base with the component called Pulse was used.
Through the analysis it was possible to detect trends in voting intentions with
regard to the presidential candidates, achieving greater accuracy in predicting
that achieved with traditional systems surveys.
| 0.92266 | 0.654133 | 0.268527 |
1806.00972 | New geometric and field theoretic aspects of a radiation dominated
universe II. Fundamental Cosmological Observers (FCOs) | We further extend our work [S. K. Modak, Phys. Rev. D97 (2018) no.10, 105016]
to give more insights on the radiation dominated stage of the early universe
within the context of the quantum field theory in curved spacetime.
Specifically, we focus on the fundamental cosmological observers (FCOs) who
have a special status in the new spacetime metric introduced in [S. K. Modak,
Phys. Rev. D97 (2018) no.10, 105016]. These observers are the only observers
who are accelerating radially and do not see an event horizon due to a
coordinate singularity. Closer analysis, using the new coordinates, leads us to
the definition of a new vacuum state and a compulsory gravitational particle
creation for the fundamental cosmological observers. We further calculate the
renormalized energy momentum tensors, both in FCO's and comoving observer's
frame, and discuss their importance. Finally, we make a side by side comparison
of this particle creation phenomena with the well known Unruh effect.
| The main aim of this paper is to provide a qualitative introduction to the
cosmic inflation and its relationship with current cosmological observations.
The inflationary model solves many of the fundamental problems that challenge
the Standard Big Bang cosmology i.e. Flatness, Horizon and Monopole problem,
and additionally provides an explanation for the initial conditions observed
throughout the Large-Scale Structure of the Universe, such as galaxies. In this
review we describe the general solutions carry out by a single scalar field.
Then with the use of current surveys, we show the constraints imposed on the
inflationary parameters $(n_{\rm s},r)$ which allow us to make the connection
between theoretical and observational cosmology. In this way, with the latest
results, it is possible to choose or at least to constrain the right
inflationary model, parameterised by a single scalar field potential $V(\phi)$.
| 0.869901 | 0.739913 | 0.129987 |
1806.01029 | Component response rate variation underlies the stability of complex
systems | The stability of a complex system generally decreases with increasing system
size and interconnectivity, a counterintuitive result of widespread importance
across the physical, life, and social sciences. Despite recent interest in the
relationship between system properties and stability, the effect of variation
in the response rate of individual system components remains unconsidered. Here
I vary the component response rates ($\boldsymbol{\gamma}$) of randomly
generated complex systems. I show that when component response rates vary, the
potential for system stability is markedly increased. Variation in
$\boldsymbol{\gamma}$ is especially important for stability in highly complex
systems, in which the probability of stability would otherwise be negligible.
At such extremes of simulated system complexity, the largest stable complex
systems would be unstable if not for $\boldsymbol{Var(\gamma)}$. My results
therefore reveal a previously unconsidered aspect of system stability that is
likely to be pervasive across all realistic complex systems.
| It is demonstrated through Monte Carlo simulations that the one component
lattice Coulomb gas model in two dimensions under certain conditions display
features of an anomalous dynamic response. We suggest that pinning, which can
either be due to the underlying discrete lattice or induced by disorder, is an
essential ingredient behind this anomalous behavior. The results are discussed
in relation to other situations where this response type appears, in particular
the two components neutral Coulomb gas below the Kosterlitz-Thouless
transition, as well as in relation to other findings from theory, simulations,
and experiments on superconductors.
| 0.9227 | 0.67337 | 0.24933 |
1806.01993 | Semiparametric Classification of Forest Graphical Models | We propose a new semiparametric approach to binary classification that
exploits the modeling flexibility of sparse graphical models. Specifically, we
assume that each class can be represented by a forest-structured graphical
model. Under this assumption, the optimal classifier is linear in the log of
the one- and two-dimensional marginal densities. Our proposed procedure
non-parametrically estimates the univariate and bivariate marginal densities,
maps each sample to the logarithm of these estimated densities and constructs a
linear SVM in the transformed space. We prove convergence of the resulting
classifier to an oracle SVM classifier and give finite sample bounds on its
excess risk. Experiments with simulated and real data indicate that the
resulting classifier is competitive with several popular methods across a range
of applications.
| We propose a general index model for survival data, which generalizes many
commonly used semiparametric survival models and belongs to the framework of
dimension reduction. Using a combination of geometric approach in
semiparametrics and martingale treatment in survival data analysis, we devise
estimation procedures that are feasible and do not require
covariate-independent censoring as assumed in many dimension reduction methods
for censored survival data. We establish the root-$n$ consistency and
asymptotic normality of the proposed estimators and derive the most efficient
estimator in this class for the general index model. Numerical experiments are
carried out to demonstrate the empirical performance of the proposed estimators
and an application to an AIDS data further illustrates the usefulness of the
work.
| 0.842189 | 0.67311 | 0.169079 |
1806.02976 | Artificial neural networks for Cu surface diffusion studies | Kinetic Monte Carlo (KMC) is a powerful method for simulation of diffusion
processes in various systems. The accuracy of the method, however, relies on
extent of details used for the parameterization of the model. Migration
barriers are often used to describe diffusion on atomic scale, but the full set
of these barriers may become easily unmanageable in materials with increased
chemical complexity or a large number of defects. In this work, we apply a
machine learning approach for Cu surface diffusion. We train an artificial
neural network on a subset of the large set of $2^{26}$ barriers needed to
describe correctly the surface diffusion in Cu. Our KMC simulations using the
obtained barrier predictor shows sufficient accuracy in modelling {100} and
{111} surfaces. The {110} surface could be modelled by overriding a limited set
of barriers given by the network.
| Monte Carlo (MC) simulations are essential computational approaches with
widespread use throughout all areas of science. We present a method for
accelerating lattice MC simulations using fully connected and convolutional
artificial neural networks that are trained to perform local and global moves
in configuration space, respectively. Both networks take local spacetime MC
configurations as input features and can, therefore, be trained using samples
generated by conventional MC runs on smaller lattices before being utilized for
simulations on larger systems. This new approach is benchmarked for the case of
determinant quantum Monte Carlo (DQMC) studies of the two-dimensional Holstein
model. We find that both artificial neural networks are capable of learning an
unspecified effective model that accurately reproduces the MC configuration
weights of the original Hamiltonian and achieve an order of magnitude speedup
over the conventional DQMC algorithm. Our approach is broadly applicable to
many classical and quantum lattice MC algorithms.
| 0.888272 | 0.73582 | 0.152451 |
1806.03048 | 'Running' with tight constraints in pionless EFT | We present the 'running' contact couplings of pionless EFT in uncoupled
channels, namely, $^1S_0$ and $P$ channels, truncated at the order
$\mathcal{O}(Q^4)$ through exploiting the tight constraints imposed by the
closed-form $T$-matrices. Some unexpected relations are found and exploited in
the pursuit of nonperturbative 'running' solutions of contact couplings. The
utility of such 'running' behaviors inherent in the closed-form $T$-matrices of
pionless EFT is remarked and a number of important issues related to EFT
constructed with various truncations are interpreted or discussed from the
underlying theory perspective.
| The effective field theory (EFT) of dark energy relies on three functions of
time to describe the background dynamics. The viability of these functions is
investigated here by means of a thorough dynamical analysis. While the system
is underdetermined, and one can always find a set of functions reproducing any
expansion history, we are able to determine general compatibility conditions
for these functions by requiring a viable background cosmology. In particular,
we identify a set of variables that allows us to transform the non-autonomous
system of equations into an infinite-dimensional one characterized by a
significant recursive structure. We then analyze several autonomous
sub-systems, obtained truncating the original one at increasingly higher
dimension, that correspond to increasingly general models of dark energy and
modified gravity. Furthermore, we exploit the recursive nature of the system to
draw some general conclusions on the different cosmologies that can be
recovered within the EFT formalism and the corresponding compatibility
requirements for the EFT functions. The machinery that we set up serves
different purposes. It offers a general scheme for performing dynamical
analysis of dark energy and modified gravity models within the model
independent framework of EFT; the general results, obtained with this
technique, can be projected into specific models, as we show in one example. It
also can be used to determine appropriate ansatze for the three EFT background
functions when studying the dynamics of cosmological perturbations in the
context of large scale structure tests of gravity.
| 0.820229 | 0.671267 | 0.148962 |
1806.03995 | The topological trees with extremal Matula numbers | Let $T$ be a rooted tree with branches $T_1,T_2,\ldots,T_r$ and $p_m$ the
$m$-th prime number ($p_1=2,p_2=3,p_3=5,\ldots$). The Matula number $M(T)$ of
$T$ is $p_{M(T_1)}\cdot p_{M(T_2)}\cdot \ldots \cdot p_{M(T_r)}$, starting with
$M(\bullet)=1$. It was put forward half a century ago by the American
mathematician David Matula. In this paper, we prove that the star (consisting
of a root and leaves attached to it) and the binary caterpillar (a binary tree
whose internal vertices form a path starting at the root) have the smallest and
greatest Matula number, respectively, over all topological trees (rooted trees
without vertices of outdegree $1$) with a prescribed number of leaves -- the
extremal values are also derived.
| We consider certain groups of tree automorphisms as so-called diffeological
groups. The notion of diffeology, due to Souriau, allows to endow non-manifold
topological spaces, such as regular trees that we look at, with a kind of a
differentiable structure that in many ways is close to that of a smooth
manifold; a suitable notion of a diffeological group follows. We first study
the question of what kind of a diffeological structure is the most natural to
put on a regular tree in a way that the underlying topology be the standard one
of the tree. We then proceed to consider the group of all automorphisms of the
tree as a diffeological space, with respect to the functional diffeology,
showing that this diffeology is actually the discrete one, the fact that
therefore is true for its subgroups as well.
| 0.839614 | 0.774569 | 0.065044 |
1806.04348 | Schur Function Expansions and the Rational Shuffle Conjecture | Gorsky and Negut introduced operators $Q_{m,n}$ on symmetric functions and
conjectured that, in the case where $m$ and $n$ are relatively prime, the
expansion of $Q_{m,n}(-1)^n$ in terms of the fundamental quasi-symmetric
functions are given by polynomials introduced by Hikita. Later, Bergeron,
Garsia, Leven and Xin extended and refined the conjectures of Gorsky and Negut
to give a combinatorial interpretation of the coefficients that arise in the
expansion of $Q_{m,n}(-1)^n$ in terms of the fundamental quasi-symmetric
functions for arbitrary $m$ and $n$ which we will call the Rational Shuffle
Conjecture. In the special case $Q_{n+1,n}(-1)^{n}$, the Rational Shuffle
Conjecture becomes the Shuffle Conjecture of Haglund, Haiman, Loehr, Remmel,
and Ulyanov. The Shuffle Conjecture was proved in 2015 by Carlsson and Mellit
and full Rational Shuffle Conjecture was later proved by Mellit. The main goal
of this paper is to study the combinatorics of the coefficients that arise in
the Schur function expansion of $Q_{m,n}(-1)^n$ in certain special cases. Leven
gave a combinatorial proof of the Schur function expansion of
$Q_{2,2n+1}(-1)^{2n+1}$ and $Q_{2n+1,2}(-1)^2$. In this paper, we explore
several symmetries in the combinatorics of the coefficients that arise in the
Schur function expansion of $Q_{m,n}(-1)^n$. Especially, we study the
hook-shaped Schur function coefficients, and the Schur function expansion of
$Q_{m,n}(-1)^n$ in the case where $m$ or $n$ equals $3$.
| This paper contains the results of my PhD-thesis. I will show the K- and
L-theoretic Farrell-Jones conjecture (FJC) for the general linear groups over
the rationals and over the rational functions over a finite field. This
especially implies the conjecture for all S-arithmetic groups.
| 0.887417 | 0.748254 | 0.139163 |
1806.05346 | How many zeroes? Counting the number of solutions of systems of
polynomials via geometry at infinity (Preliminary Draft) | In this book we describe an approach through toric geometry to the following
problem: "estimate the number (counted with appropriate multiplicity) of
isolated solutions of n polynomial equations in n variables over an
algebraically closed field k." The outcome of this approach is the number of
solutions for "generic" systems in terms of their "Newton polytopes," and an
explicit characterization of what makes a system "generic." The pioneering work
in this field was done in the 1970s by Kushnirenko, Bernstein and Khovanskii,
who completely solved the problem of counting solutions of generic systems on
the "torus" (k\0)^n. In the context of our problem, however, the natural domain
of solutions is not the torus, but the affine space k^n. There were a number of
works on extension of Bernstein's theorem to the case of affine space, and
recently it has been completely resolved, the final steps having been carried
out by the author. The aim of this book is to present these results in a
coherent way. We start from the beginning, namely Bernstein's beautiful theorem
which expresses the number of solutions of generic systems in terms of the
mixed volume of their Newton polytopes. We give complete proofs, over arbitrary
algebraically closed fields, of Bernstein's theorem and its recent extension to
the affine space, and describe some open problems. We also apply the developed
techniques to derive and generalize Kushnirenko's results on Milnor numbers of
hypersurface singularities which in 1970s served as a precursor to the
development of toric geometry. Care was taken to make this book as elementary
as possible. In particular, we develop all the necessary algebraic geometry
(modulo some explicitly stated basic results).
| Plagne recently determined the asymptotic behavior of the function E(h),
which counts the maximum possible number of essential elements in an additive
basis for N of order h. Here we extend his investigations by studying
asymptotic behavior of the function E(h,k), which counts the maximum possible
number of essential subsets of size k, in a basis of order h. For a fixed k and
with h going to infinity, we show that E(h,k) = \Theta_{k} ([h^{k}/\log
h]^{1/(k+1)}). The determination of a more precise asymptotic formula is shown
to depend on the solution of the well-known "postage stamp problem" in finite
cyclic groups. On the other hand, with h fixed and k going to infinity, we show
that E(h,k) \sim (h-1) {\log k \over \log \log k}.
| 0.822202 | 0.785453 | 0.036749 |
1806.05523 | Bounds and algorithms for $k$-truss | A $k$-truss is a relaxation of a $k$-clique developed by Cohen (2005),
specifically a connected graph where every edge is incident to at least $k$
triangles. This has proved to be a useful tool in identifying cohesive
subnetworks in a variety of real-world graphs. Despite its simplicity and its
utility, the combinatorial and algorithmic aspects of trusses have not been
thoroughly explored.
We provide nearly-tight bounds on the edge counts of $k$-trusses. We also
give two improved algorithms for finding trusses in large-scale graphs. First,
we present a simplified and faster algorithm, based on approach discussed in
Wang & Cheng (2012). Second, we present a theoretical algorithm based on fast
matrix multiplication; this extends an algorithm of Bjorklund et al. (2014) for
generating triangles from a static graph to a dynamic data-structure.
| We consider two multi-armed bandit problems with $n$ arms: (i) given an
$\epsilon > 0$, identify an arm with mean that is within $\epsilon$ of the
largest mean and (ii) given a threshold $\mu_0$ and integer $k$, identify $k$
arms with means larger than $\mu_0$. Existing lower bounds and algorithms for
the PAC framework suggest that both of these problems require $\Omega(n)$
samples. However, we argue that these definitions not only conflict with how
these algorithms are used in practice, but also that these results disagree
with intuition that says (i) requires only $\Theta(\frac{n}{m})$ samples where
$m = |\{ i : \mu_i > \max_{i \in [n]} \mu_i - \epsilon\}|$ and (ii) requires
$\Theta(\frac{n}{m}k)$ samples where $m = |\{ i : \mu_i > \mu_0 \}|$. We
provide definitions that formalize these intuitions, obtain lower bounds that
match the above sample complexities, and develop explicit, practical algorithms
that achieve nearly matching upper bounds.
| 0.860335 | 0.673728 | 0.186607 |
1806.06917 | Implementation of Peridynamics utilizing HPX -- the C++ standard library
for parallelism and concurrency | Peridynamics is a non-local generalization of continuum mechanics tailored to
address discontinuous displacement fields arising in fracture mechanics. As
many non-local approaches, peridynamics requires considerable computing
resources to solve practical problems. Several implementations of peridynamics
utilizing CUDA, OpenCL, and MPI were developed to address this important issue.
On modern supercomputers, asynchronous many task systems are emerging to
address the new architecture of computational nodes. This paper presents a
peridynamics EMU nodal discretization implementation with the C++ Standard
Library for Concurrency and Parallelism (HPX), an open source asynchronous many
task run time system. The code is designed for modular expandability, so as to
simplify it to extend with new material models or discretizations. The code is
convergent for implicit time integration and recovers theoretical solutions.
Explicit time integration, convergence results are presented to showcase the
agreement of results with theoretical claims in previous works. Two benchmark
tests on code scalability are applied demonstrating agreement between this
code's scalability and theoretical estimations.
| We describe a new C++ library for multiprecision arithmetic for numbers in
the order of 100--500 bits, i.e., representable with just a few limbs. The
library is written in "optimizing-compiler-friendly" C++, with an emphasis on
the use of fixed-size arrays and particular function-argument-passing styles
(including the avoidance of naked pointers) to allow the limbs to be allocated
on the stack or even in registers. Depending on the particular functionality,
we get close to, or significantly beat the performance of existing libraries
for multiprecision arithmetic that employ hand-optimized assembly code.
Most functions in the library are constant-time, which is a necessity for
secure implementations of cryptographic protocols.
Beyond the favorable runtime performance, our library is, to the best of the
author's knowledge, the first library that offers big-integer computations
during compile-time. For example, when implementing finite-field arithmetic
with a fixed modulus, this feature enables the automatic precomputation (at
compile time) of the special modulus-dependent constants required for Barrett
and Montgomery reduction. Another application is to parse (at compile-time) a
base-10-encoded big-integer literal.
| 0.849605 | 0.760393 | 0.089212 |
1806.07048 | Bayesian Sequential Inference in Dynamic Survival Models | Dynamic hazard models are applied to analyze time-varying effects of
covariates on the survival time. The state-of-the-art methods for learning
parameters in the Bayesian framework are MCMC methods but due to high
correlations among the time-varying effect parameters, they converge very
slowly. To handle these correlations efficiently, we apply a Sequential Monte
Carlo (SMC) method commonly known as Particle Filter (PF). We develop a
proposal distribution tailored to the nature of the survival data based on the
second order Taylor series expansion of the posterior distribution and the
linear Bayes theory. Our PF based sampler is shown to be faster and generates
an effective sample size that is more than two orders of magnitude larger than
a state-of-the-art MCMC sampler for the same computing time.
| We present an improved Bayesian framework for performing inference of affine
transformations of constrained functions. We focus on quadrature with
nonnegative functions, a common task in Bayesian inference. We consider
constraints on the range of the function of interest, such as nonnegativity or
boundedness. Although our framework is general, we derive explicit
approximation schemes for these constraints, and argue for the use of a log
transformation for functions with high dynamic range such as likelihood
surfaces. We propose a novel method for optimizing hyperparameters in this
framework: we optimize the marginal likelihood in the original space, as
opposed to in the transformed space. The result is a model that better explains
the actual data. Experiments on synthetic and real-world data demonstrate our
framework achieves superior estimates using less wall-clock time than existing
Bayesian quadrature procedures.
| 0.855289 | 0.780179 | 0.075109 |
1806.08301 | The Online Saddle Point Problem: Applications to Online Convex
Optimization with Knapsacks | We study the online saddle point problem, an online learning problem where at
each iteration a pair of actions need to be chosen without knowledge of the
current and future (convex-concave) payoff functions. The objective is to
minimize the gap between the cumulative payoffs and the saddle point value of
the aggregate payoff function, which we measure using a metric called
"SP-regret". The problem generalizes the online convex optimization framework
and can be interpreted as finding the Nash equilibrium for the aggregate of a
sequence of two-player zero-sum games. We propose an algorithm that achieves
$\tilde{O}(\sqrt{T})$ SP-regret in the general case, and $O(\log T)$ SP-regret
for the strongly convex-concave case. We then consider an online convex
optimization with knapsacks problem motivated by a wide variety of applications
such as: dynamic pricing, auctions, and crowdsourcing. We relate this problem
to the online saddle point problem and establish $O(\sqrt{T})$ regret using a
primal-dual algorithm.
| We consider the stochastic optimization problem where a convex function is
minimized observing recursively the gradients. We introduce SAEW, a new
procedure that accelerates exponential weights procedures with the slow rate
$1/\sqrt{T}$ to procedures achieving the fast rate $1/T$. Under the strong
convexity of the risk, we achieve the optimal rate of convergence for
approximating sparse parameters in $\mathbb{R}^d$. The acceleration is achieved
by using successive averaging steps in an online fashion. The procedure also
produces sparse estimators thanks to additional hard threshold steps.
| 0.886029 | 0.790873 | 0.095156 |
1806.09011 | Starflows with singularities of different indices | A vector field X is called a star flow if every periodic orbit of any vector
field C1-close to X is hypebolic. It is known that a generic star flow in
dimensions 3 and 4 are such that the chain recurrence classes are either
hyperboilc or singular hyperbolic ([MPP] and [GSW]) We present a nonempty open
set of star flows on a 5 dimensional manifold for which two singular points of
different indices belong (robusly) to the same chain recurrence class. This
prevents the class to be singular hyperbolic. We show that this chain
recurrence class is robustly chain transitive. The firts and only example of
this phenomena is in [BCGP]. We proove that this example has a weak form of
hyperbolicity called strong multisingular hyperbolicity. This is a particular
case of the multisingular hyperbolicity presented in [BdL] and this implies
that the example is a star flow.
| For a class of solutions of the fundamental difference equation of isotropic
loop quantum cosmology, the difference equation can be replaced by a
differential equation valid for {\em all} values of the triad variable. The
differential equation admits a `unique' non-singular continuation through
vanishing triad. A WKB approximation for the solutions leads to an effective
continuum Hamiltonian. The effective dynamics is also non-singular (no big bang
singularity) and approximates the classical dynamics for large volumes. The
effective evolution is thus a more reliable model for further phenomenological
implications of the small volume effects.
| 0.823337 | 0.661413 | 0.161923 |
1806.10229 | A Simulational Model for Witnessing Quantum Effects of Gravity Using IBM
Quantum Computer | Witnessing quantum effects in the gravitational field is found to be
exceptionally difficult in practice due to lack of empirical evidence. Hence, a
debate is going on among physicists whether gravity has a quantum domain or
not. There had been no successful experiments at all to show the quantum nature
of gravity till two recent independent works by Bose et al. [Phys. Rev. Lett.
119, 240401 (2017)] and by Marletto and Vedral [Phy. Rev. Lett. 119, 240402
(2017)]. The authors have proposed schemes to test the quantumness of gravity
in two small test masses by entangling two spatially separated objects using
gravitational interactions. They provide a method to witness the entanglement
using spin correlation measurements, which could imply evidence for gravity
being a quantum coherent mediator. Here we propose a simulational model by
providing a new quantum circuit for verifying the above schemes. We simulate
the schemes for the first time in IBM's 5-qubit quantum chip 'ibmqx4' by
developing a quantum system which shows effects analogous to quantum gravity
and calculates the degree of entanglement of the spin correlation. The
entanglement witness over a range is obtained for different experimental
parameters.
| We discuss an efficient physical realization of topological quantum walks on
a finite lattice. The $N$-point lattice is realized with $\log_2 N$ qubits, and
the quantum circuit utilizes a number of quantum gates which is polynomial in
the number of qubits. In a certain scaling limit, we show that a large number
of steps is implemented with a number of quantum gates which is independent of
the number of steps. We ran the quantum algorithm on the IBM-Q five-qubit
quantum computer, thus experimentally demonstrating topological features, such
as boundary bound states, on a lattice with $N=4$ points.
| 0.8632 | 0.695603 | 0.167597 |
1806.10749 | On Optimality of Adaptive Linear-Quadratic Regulators | Performance of adaptive control policies is assessed through the regret with
respect to the optimal regulator, which reflects the increase in the operating
cost due to uncertainty about the dynamics parameters. However, available
results in the literature do not provide a quantitative characterization of the
effect of the unknown parameters on the regret. Further, there are problems
regarding the efficient implementation of some of the existing adaptive
policies. Finally, results regarding the accuracy with which the system's
parameters are identified are scarce and rather incomplete.
This study aims to comprehensively address these three issues. First, by
introducing a novel decomposition of adaptive policies, we establish a sharp
expression for the regret of an arbitrary policy in terms of the deviations
from the optimal regulator. Second, we show that adaptive policies based on a
slight modification of the widely used Certainty Equivalence scheme are
efficient. Specifically, we establish a regret of (nearly) square-root rate for
two families of randomized adaptive policies. The presented regret bounds are
obtained by using anti-concentration results on the random matrices employed
for randomizing the estimates of the unknown parameters. Moreover, we study the
minimal additional information needed on dynamics matrices for which the regret
will become of logarithmic order. Finally, the rate at which the unknown
parameters of the system are being identified is specified.
| Let $k$ be a number field and $\tilde k$ a fixed quadratic extension of $k$.
In this paper and its companion, we find the mean value of the product of class
numbers and regulators of two quadratic extensions $F,F^*\not=\tilde k$
contained in the biquadratic extensions of $k$ containing $\tilde k$.
| 0.784252 | 0.663832 | 0.12042 |
1807.01361 | Connecting Velocity and Entanglement in Quantum Walks | We investigate the relation between transport properties and entanglement
between the internal (spin) and external (position) degrees of freedom in
one-dimensional discrete time quantum walks. We obtain closed-form expressions
for the long-time position variance and asymptotic entanglement of quantum
walks whose time evolution is given by any balanced quantum coin, starting from
any initial qubit and position states following a delta-like (local) and
Gaussian distributions. We find out that the knowledge of the limit velocity of
the walker together with the polar angle of the initial qubit provide the
asymptotic entanglement for local states, while this velocity with the quantum
coin phases give it for highly delocalized states.
| We establish a quantitative connection between the amount of lost classical
information about a quantum state and the concomitant loss of entanglement.
Using methods that have been developed for the optimal purification of mixed
states we find a class of mixed states with known distillable entanglement.
These results can be used to determine the quantum capacity of a quantum
channel which randomizes the order of transmitted signals.
| 0.897261 | 0.784609 | 0.112652 |
1807.02173 | A Comprehensive Survey on Addressing Methods in the Internet of Things | Over the last ten years, both research in and the real world application of
Internet of Things (IoT) have grown exponentially. The aim of IoT devices is to
connect all things around us to the Internet and thus provide us with smarter
cities, intelligent homes and generally more comfortable lives. Supporting
these devices have led to several new challenges which must be addressed. One
of the critical challenges facing interacting with IoT devices is addressing
billions of devices (things) around the world, including: computers, tablets,
smart phones, wearable devices, sensors and embedded computers, etc. This paper
comprehensively surveys addressing methods for IoT devices including their
advantages and disadvantages thereof. Metrics are proposed and used for
evaluating these methods.
| In recent years, mobile devices (e.g., smartphones and tablets) have met an
increasing commercial success and have become a fundamental element of the
everyday life for billions of people all around the world. Mobile devices are
used not only for traditional communication activities (e.g., voice calls and
messages) but also for more advanced tasks made possible by an enormous amount
of multi-purpose applications (e.g., finance, gaming, and shopping). As a
result, those devices generate a significant network traffic (a consistent part
of the overall Internet traffic). For this reason, the research community has
been investigating security and privacy issues that are related to the network
traffic generated by mobile devices, which could be analyzed to obtain
information useful for a variety of goals (ranging from device security and
network optimization, to fine-grained user profiling).
In this paper, we review the works that contributed to the state of the art
of network traffic analysis targeting mobile devices. In particular, we present
a systematic classification of the works in the literature according to three
criteria: (i) the goal of the analysis; (ii) the point where the network
traffic is captured; and (iii) the targeted mobile platforms. In this survey,
we consider points of capturing such as Wi-Fi Access Points, software
simulation, and inside real mobile devices or emulators. For the surveyed
works, we review and compare analysis techniques, validation methods, and
achieved results. We also discuss possible countermeasures, challenges and
possible directions for future research on mobile traffic analysis and other
emerging domains (e.g., Internet of Things). We believe our survey will be a
reference work for researchers and practitioners in this research field.
| 0.838356 | 0.659594 | 0.178762 |
Subsets and Splits