id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
math/0601624 | Jean-Francois Marckert | Jean-Maxime Labarbe (LM-Versailles), Jean-Fran\c{c}ois Marckert
(LaBRI) | Asymptotics of Bernoulli random walks, bridges, excursions and meanders
with a given number of peaks | null | null | null | null | math.PR cs.DM | null | A Bernoulli random walk is a random trajectory starting from 0 and having
i.i.d. increments, each of them being $+1$ or -1, equally likely. The other
families cited in the title are Bernoulli random walks under various
conditionings. A peak in a trajectory is a local maximum. In this paper, we
condition the families of trajectories to have a given number of peaks. We show
that, asymptotically, the main effect of setting the number of peaks is to
change the order of magnitude of the trajectories. The counting process of the
peaks, that encodes the repartition of the peaks in the trajectories, is also
studied. It is shown that suitably normalized, it converges to a Brownian
bridge which is independent of the limiting trajectory. Applications in terms
of plane trees and parallelogram polyominoes are also provided.
| [
{
"version": "v1",
"created": "Wed, 25 Jan 2006 19:46:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Labarbe",
"Jean-Maxime",
"",
"LM-Versailles"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0601755 | Wieslaw Bajguz | Wieslaw Bajguz | Graph and Union of Graphs Compositions | 5 pages | null | null | null | math.CO cs.DM | null | Knopfmacher et all [1] was introduced the graph compositions` notion. In this
note we add to these a new construction of tree-like graphs where nodes are
graphs themselves. The first examples of these tree-like compositions, a
corresponding theorem and resulting conclusions are provided.
| [
{
"version": "v1",
"created": "Tue, 31 Jan 2006 09:56:08 GMT"
}
] | 2008-02-10T00:00:00 | [
[
"Bajguz",
"Wieslaw",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0602053 | Noson S. Yanofsky | Noson S. Yanofsky | Towards a Definition of an Algorithm | 38 pages. Fixed typos. Added Refs | Journal of Logic and Computation 2010; | null | null | math.LO cs.LO math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define an algorithm to be the set of programs that implement or express
that algorithm. The set of all programs is partitioned into equivalence
classes. Two programs are equivalent if they are essentially the same program.
The set of equivalence classes forms the category of algorithms. Although the
set of programs does not even form a category, the set of algorithms form a
category with extra structure. The conditions we give that describe when two
programs are essentially the same turn out to be coherence relations that
enrich the category of algorithms with extra structure. Universal properties of
the category of algorithms are proved.
| [
{
"version": "v1",
"created": "Thu, 2 Feb 2006 20:54:04 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Feb 2007 02:07:05 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Jun 2010 20:24:18 GMT"
}
] | 2010-06-14T00:00:00 | [
[
"Yanofsky",
"Noson S.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
math/0602059 | Pavel Chebotarev | Rafig Agaev and Pavel Chebotarev | The Matrix of Maximum Out Forests of a Digraph and Its Applications | 27 pages, 3 figures | Automation and Remote Control 61 (2000) 1424--1450 | null | null | math.CO cs.DS math.AG | null | We study the maximum out forests of a (weighted) digraph and the matrix of
maximum out forests. A maximum out forest of a digraph G is a spanning subgraph
of G that consists of disjoint diverging trees and has the maximum possible
number of arcs. If a digraph contains any out arborescences, then maximum out
forests coincide with them. We provide a new proof to the Markov chain tree
theorem saying that the matrix of Ces`aro limiting probabilities of an
arbitrary stationary finite Markov chain coincides with the normalized matrix
of maximum out forests of the weighted digraph that corresponds to the Markov
chain. We discuss the applications of the matrix of maximum out forests and its
transposition, the matrix of limiting accessibilities of a digraph, to the
problems of preference aggregation, measuring the vertex proximity, and
uncovering the structure of a digraph.
| [
{
"version": "v1",
"created": "Fri, 3 Feb 2006 13:28:50 GMT"
},
{
"version": "v2",
"created": "Sat, 4 Feb 2006 10:44:31 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agaev",
"Rafig",
""
],
[
"Chebotarev",
"Pavel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0602061 | Pavel Chebotarev | Rafig Agaev and Pavel Chebotarev | Spanning Forests of a Digraph and Their Applications | 24 pages | Automation and Remote Control 62 (2001) No.3 443-466 | 10.1023/A:1002862312617 | null | math.CO cs.DM math.RA | null | We study spanning diverging forests of a digraph and related matrices. It is
shown that the normalized matrix of out forests of a digraph coincides with the
transition matrix in a specific observation model for Markov chains related to
the digraph. Expression are given for the Moore-Penrose generalized inverse and
the group inverse of the Kirchhoff (Laplacian) matrix. These expressions
involve the matrix of maximum out forest of the digraph. Every matrix of out
forests with a fixed number of arcs and the normalized matrix of out forests
are represented as polynomials in the Kirchhoff matrix; with the help of these
identities new proofs are given for the matrix-forest theorem and some other
statements. A connection is specified between the forest dimension of a digraph
and the degree of an annihilating polynomial for the Kirchhoff (Laplacian)
matrix. Some accessibility measures for digraph vertices are considered. These
are based on the enumeration of spanning forests.
| [
{
"version": "v1",
"created": "Fri, 3 Feb 2006 14:50:56 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Agaev",
"Rafig",
""
],
[
"Chebotarev",
"Pavel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
math/0602070 | Pavel Chebotarev | Pavel Chebotarev and Elena Shamis | The Matrix-Forest Theorem and Measuring Relations in Small Social Groups | 10 pages | Automation and Remote Control 58 (1997) No. 9 1505-1514 | null | null | math.CO cs.IR math.AG | null | We propose a family of graph structural indices related to the Matrix-forest
theorem. The properties of the basic index that expresses the mutual
connectivity of two vertices are studied in detail. The derivative indices that
measure "dissociation," "solitariness," and "provinciality" of vertices are
also considered. A nonstandard metric on the set of vertices is introduced,
which is determined by their connectivity. The application of these indices in
sociometry is discussed.
| [
{
"version": "v1",
"created": "Sat, 4 Feb 2006 14:55:27 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Shamis",
"Elena",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0602073 | Pavel Chebotarev | Pavel Chebotarev and Elena Shamis | On Proximity Measures for Graph Vertices | 17 pages, 3 figures | Automation and Remote Control 59 (1998), No. 10, Part 2 1443-1459.
Erratum: 60 (1999), No. 2, Part 2 297 | null | null | math.CO cs.DS cs.NI math.MG | null | We study the properties of several proximity measures for the vertices of
weighted multigraphs and multidigraphs. Unlike the classical distance for the
vertices of connected graphs, these proximity measures are applicable to
weighted structures and take into account not only the shortest, but also all
other connections, which is desirable in many applications. To apply these
proximity measures to unweighted structures, every edge should be assigned the
same weight which determines the proportion of taking account of two routes,
from which one is one edge longer than the other. Among the proximity measures
we consider path accessibility, route accessibility, relative forest
accessibility along with its components, accessibility via dense forests, and
connection reliability. A number of characteristic conditions is introduced and
employed to characterize the proximity measures. A topological interpretation
is obtained for the Moore-Penrose generalized inverse of the Laplacian matrix
of a weighted multigraph.
| [
{
"version": "v1",
"created": "Sun, 5 Feb 2006 15:55:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Shamis",
"Elena",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
math/0602154 | Padma Ramanathan | H. Gopalkrishna Gadiyar, K M Sangeeta Maini, R. Padma and Mario Romsy | What is the Inverse of Repeated Square and Multiply Algorithm? | 15 pages | Colloq. Math. 116 (2009) 1-14 | null | null | math.NT cs.CR | null | It is well known that the repeated square and multiply algorithm is an
efficient way of modular exponentiation. The obvious question to ask is if this
algorithm has an inverse which would calculate the discrete logarithm
efficiently. The technical hitch is in fixing the right sign of the square root
and this is the heart of the discrete logarithm problem over finite fields of
characteristic not equal to 2. In this paper a couple of probabilistic
algorithms to compute the discrete logarithm over finite fields are given by
bypassing this difficulty. One of the algorithms was inspired by the famous
3x+1 problem.
| [
{
"version": "v1",
"created": "Wed, 8 Feb 2006 10:01:31 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Mar 2007 10:07:13 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Mar 2007 06:58:21 GMT"
}
] | 2009-07-02T00:00:00 | [
[
"Gadiyar",
"H. Gopalkrishna",
""
],
[
"Maini",
"K M Sangeeta",
""
],
[
"Padma",
"R.",
""
],
[
"Romsy",
"Mario",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0602171 | Pavel Chebotarev | Pavel Chebotarev and Elena Shamis | Preference fusion when the number of alternatives exceeds two: indirect
scoring procedures | 26 pages, 5 figures One typo fixed | Journal of the Franklin Institute, 336 (1999), No.2, 205-226.
Erratum: 336 (1999) No.4, 747-748
(http://dx.doi.org/10.1016/S0016-0032(99)00004-6) | 10.1016/S0016-0032(98)00017-9 | null | math.OC cs.MA math.CO | null | We consider the problem of aggregation of incomplete preferences represented
by arbitrary binary relations or incomplete paired comparison matrices. For a
number of indirect scoring procedures we examine whether or not they satisfy
the axiom of self-consistent monotonicity. The class of {\em win-loss combining
scoring procedures} is introduced which contains a majority of known scoring
procedures. Two main results are established. According to the first one, every
win-loss combining scoring procedure breaks self-consistent monotonicity. The
second result provides a sufficient condition of satisfying self-consistent
monotonicity.
| [
{
"version": "v1",
"created": "Wed, 8 Feb 2006 20:23:37 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Feb 2006 05:30:28 GMT"
},
{
"version": "v3",
"created": "Thu, 20 Apr 2006 16:35:36 GMT"
}
] | 2011-10-11T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Shamis",
"Elena",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0602282 | Ayan Mahalanobis | Ayan Mahalanobis | The Diffie-Hellman Key Exchange Protocol and non-abelian nilpotent
groups | Finally got accepted. The final version. To appear, Israel Journal of
Mathematics | null | null | null | math.GR cs.CR | null | In this paper we study a key exchange protocol similar to Diffie-Hellman key
exchange protocol using abelian subgroups of the automorphism group of a
non-abelian nilpotent group. We also generalize group no.92 of Hall-Senior
table \cite{halltable}, for arbitrary prime $p$ and show that for those groups,
the group of central automorphisms commute. We use these for the key exchange
we are studying.
| [
{
"version": "v1",
"created": "Mon, 13 Feb 2006 20:06:58 GMT"
},
{
"version": "v2",
"created": "Sun, 19 Mar 2006 21:30:43 GMT"
},
{
"version": "v3",
"created": "Thu, 18 Oct 2007 18:31:14 GMT"
}
] | 2007-10-18T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0602493 | Ewa Graczynska dr habil. | Ewa Graczy\'nska and Dietmar Schweigert | The dimension of a variety | The results of the paper were presented at the workshop AAA71 and
CYA21 at B\c{e}dlewo, Poland on February 11, 2006. the paper is submitted to
Discussiones Mathematicae Algebra and Stochastc Methods, special issue | published in Discussiones Mathematicae, General Algebra and
Applications, 27, 2007, pp. 35--47 | null | null | math.LO cs.LO math.GM | null | We invent the notion of a {\it dimension of a variety} $V$ as the cardinality
of all its proper {\it derived} subvarieties (of the same type). The dimensions
of varieties of lattices, varieties of regular bands and other general
algebraic structures are determined.
| [
{
"version": "v1",
"created": "Wed, 22 Feb 2006 12:12:30 GMT"
},
{
"version": "v2",
"created": "Sat, 27 May 2006 10:57:17 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Graczyńska",
"Ewa",
""
],
[
"Schweigert",
"Dietmar",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
math/0602505 | Marcus Hutter | Jan Poland and Marcus Hutter | MDL Convergence Speed for Bernoulli Sequences | 28 pages | Statistics and Computing, 16 (2006) pages 161-175 | 10.1007/s11222-006-6746-3 | IDSIA-04-06 | math.ST cs.IT cs.LG math.IT math.PR stat.TH | null | The Minimum Description Length principle for online sequence
estimation/prediction in a proper learning setup is studied. If the underlying
model class is discrete, then the total expected square loss is a particularly
interesting performance measure: (a) this quantity is finitely bounded,
implying convergence with probability one, and (b) it additionally specifies
the convergence speed. For MDL, in general one can only have loss bounds which
are finite but exponentially larger than those for Bayes mixtures. We show that
this is even the case if the model class contains only Bernoulli distributions.
We derive a new upper bound on the prediction error for countable Bernoulli
classes. This implies a small bound (comparable to the one for Bayes mixtures)
for certain important model classes. We discuss the application to Machine
Learning tasks such as classification and hypothesis testing, and
generalization to countable classes of i.i.d. models.
| [
{
"version": "v1",
"created": "Wed, 22 Feb 2006 16:29:05 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Poland",
"Jan",
""
],
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0602522 | Pavel Chebotarev | Pavel Chebotarev and Elena Shamis | Characterizations of scoring methods for preference aggregation | 33 pages; with tables and figures | Annals of Operations Research, 1998. V. 80. P.299-332 | null | null | math.OC cs.MA math.FA | null | The paper surveys more than forty characterizations of scoring methods for
preference aggregation and contains one new result. A general scoring operator
is {\it self-consistent} if alternative $i$ is assigned a greater score than
$j$ whenever $i$ gets no worse (better) results of comparisons and its
`opponents' are assigned respectively greater (no smaller) scores than those of
$j$. We prove that self-consistency is satisfied if and only if the application
of a scoring operator reduces to the solution of a homogeneous system of
algebraic equations with a monotone function on the left-hand side.
| [
{
"version": "v1",
"created": "Thu, 23 Feb 2006 09:23:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Shamis",
"Elena",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
math/0602552 | Pavel Chebotarev | Pavel Chebotarev and Elena Shamis | From Incomplete Preferences to Ranking via Optimization | 25 pages, 6 figures | A version of this paper was published as: P.Yu.Chebotarev,
E.V.Shamis. Constructing an objective function for aggregating incomplete
preferences, In: A.Tangian and J.Gruber, eds. Econometric Decision Models:
Constructing Scalar-Valued Objective Functions. Lecture Notes in Economics
and Mathematical Systems, Springer-Verlag, 1997, P.100-124 | null | null | math.OC cs.MA math.CO | null | We consider methods for aggregating preferences that are based on the
resolution of discrete optimization problems. The preferences are represented
by arbitrary binary relations (possibly weighted) or incomplete paired
comparison matrices. This incomplete case remains practically unexplored so
far. We examine the properties of several known methods and propose one new
method. In particular, we test whether these methods obey a new axiom referred
to as {\it Self-Consistent Monotonicity}. Some results are established that
characterize solutions of the related optimization problems.
| [
{
"version": "v1",
"created": "Fri, 24 Feb 2006 16:09:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Shamis",
"Elena",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0602573 | Pavel Chebotarev | Pavel Chebotarev and Elena Shamis | The Forest Metrics for Graph Vertices | 14 pages, 19 ref | Electronic Notes in Discrete Mathematics 11 (July 2002) 98-107 | 10.1016/S1571-0653(04)00058-7 | null | math.CO cs.NI math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new graph metric and study its properties. In contrast to the
standard distance in connected graphs, it takes into account all paths between
vertices. Formally, it is defined as d(i,j)=q_{ii}+q_{jj}-q_{ij}-q_{ji}, where
q_{ij} is the (i,j)-entry of the {\em relative forest accessibility matrix}
Q(\epsilon)=(I+\epsilon L)^{-1}, L is the Laplacian matrix of the (weighted)
(multi)graph, and \epsilon is a positive parameter. By the matrix-forest
theorem, the (i,j)-entry of the relative forest accessibility matrix of a graph
provides the specific number of spanning rooted forests such that i and j
belong to the same tree rooted at i. Extremely simple formulas express the
modification of the proposed distance under the basic graph transformations. We
give a topological interpretation of d(i,j) in terms of the probability of
unsuccessful linking i and j in a model of random links. The properties of this
metric are compared with those of some other graph metrics. An application of
this metric is related to clustering procedures such as "centered partition."
In another procedure, the relative forest accessibility and the corresponding
distance serve to choose the centers of the clusters and to assign a cluster to
each non-central vertex. The notion of cumulative weight of connections between
two vertices is proposed. The reasoning involves a reciprocity principle for
weighted multigraphs. Connections between the resistance distance and the
forest distance are established.
| [
{
"version": "v1",
"created": "Sat, 25 Feb 2006 13:26:28 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Apr 2011 09:02:04 GMT"
}
] | 2011-04-29T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Shamis",
"Elena",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
math/0602575 | Pavel Chebotarev | Pavel Chebotarev and Elena Shamis | Matrix-Forest Theorems | Unpublished manuscript (1994-1997); 11 pages | null | null | null | math.CO cs.DM math.RA | http://creativecommons.org/licenses/by-nc-nd/4.0/ | The Laplacian matrix of a graph $G$ is $L(G)=D(G)-A(G)$, where $A(G)$ is the
adjacency matrix and $D(G)$ is the diagonal matrix of vertex degrees. According
to the Matrix-Tree Theorem, the number of spanning trees in $G$ is equal to any
cofactor of an entry of $L(G)$. A rooted forest is a union of disjoint rooted
trees. We consider the matrix $W(G)=I+L(G)$ and prove that the $(i,j)$-cofactor
of $W(G)$ is equal to the number of spanning rooted forests of $G$, in which
the vertices $i$ and $j$ belong to the same tree rooted at $i$. The determinant
of $W(G)$ equals the total number of spanning rooted forests, therefore the
$(i,j)$-entry of the matrix $W^{-1}(G)$ can be considered as a measure of
relative ''forest-accessibility'' of vertex $i$ from $j$ (or $j$ from $i$).
These results follow from somewhat more general theorems we prove, which
concern weighted multigraphs. The analogous theorems for (multi)digraphs are
also established. These results provide a graph-theoretic interpretation for
the adjugate to the Laplacian characteristic matrix.
| [
{
"version": "v1",
"created": "Sat, 25 Feb 2006 15:01:57 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Nov 2023 17:05:30 GMT"
}
] | 2023-11-03T00:00:00 | [
[
"Chebotarev",
"Pavel",
""
],
[
"Shamis",
"Elena",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
math/0603024 | Igor Podlubny | Igor Podlubny, Katarina Kassayova | Towards a better list of citation superstars: compiling a
multidisciplinary list of highly cited researchers | 15 pages, 4 tables | Research Evaluation, vol. 15, no. 3, December 2006, pp. 154-162 | null | null | math.ST cs.GL physics.soc-ph stat.TH | null | A new approach to producing multidisciplinary lists of highly cited
researchers is described and used for compiling a multidisciplinary list of
highly cited researchers. This approach is essentially related to the recently
discovered law of the constant ratios (Podlubny, 2004) and gives a
better-balanced representation of different scientific fields.
| [
{
"version": "v1",
"created": "Wed, 1 Mar 2006 15:26:33 GMT"
},
{
"version": "v2",
"created": "Thu, 18 May 2006 07:22:53 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Podlubny",
"Igor",
""
],
[
"Kassayova",
"Katarina",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0603155 | Michel Fliess | Michel Fliess (INRIA Futurs, LIX), C\'edric Join (INRIA Futurs, CRAN),
Mamadou Mboup (INRIA Futurs), Hebertt Sira-Ramirez | Vers une commande multivariable sans mod\`ele | null | Dans Conf\'erence internationale francophone d'automatique (CIFA
2006) (2006) | null | null | math.OC cs.CE cs.RO physics.class-ph | null | A control strategy without any precise mathematical model is derived for
linear or nonlinear systems which are assumed to be finite-dimensional. Two
convincing numerical simulations are provided.
| [
{
"version": "v1",
"created": "Tue, 7 Mar 2006 08:15:15 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Dec 2007 21:57:40 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Dec 2007 14:35:40 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Fliess",
"Michel",
"",
"INRIA Futurs, LIX"
],
[
"Join",
"Cédric",
"",
"INRIA Futurs, CRAN"
],
[
"Mboup",
"Mamadou",
"",
"INRIA Futurs"
],
[
"Sira-Ramirez",
"Hebertt",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
math/0603207 | Olga Holtz | James Demmel, Ioana Dumitriu, Olga Holtz, Robert Kleinberg | Fast matrix multiplication is stable | 19 pages; final version, expanded and updated to reflect referees'
remarks; to appear in Numerische Mathematik | Numer. Math. 106 (2007), no. 2, 199-224 | 10.1007/s00211-007-0061-6 | null | math.NA cs.CC cs.DS math.GR | null | We perform forward error analysis for a large class of recursive matrix
multiplication algorithms in the spirit of [D. Bini and G. Lotti, Stability of
fast algorithms for matrix multiplication, Numer. Math. 36 (1980), 63--72]. As
a consequence of our analysis, we show that the exponent of matrix
multiplication (the optimal running time) can be achieved by numerically stable
algorithms. We also show that new group-theoretic algorithms proposed in [H.
Cohn, and C. Umans, A group-theoretic approach to fast matrix multiplication,
FOCS 2003, 438--449] and [H. Cohn, R. Kleinberg, B. Szegedy and C. Umans,
Group-theoretic algorithms for matrix multiplication, FOCS 2005, 379--388] are
all included in the class of algorithms to which our analysis applies, and are
therefore numerically stable. We perform detailed error analysis for three
specific fast group-theoretic algorithms.
| [
{
"version": "v1",
"created": "Thu, 9 Mar 2006 04:34:36 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Oct 2006 19:21:20 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Dec 2006 18:15:41 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Demmel",
"James",
""
],
[
"Dumitriu",
"Ioana",
""
],
[
"Holtz",
"Olga",
""
],
[
"Kleinberg",
"Robert",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
math/0603248 | Saugata Basu | Saugata Basu, Richard Pollack, Marie-Francoise Roy | Computing the First Betti Numberand Describing the Connected Components
of Semi-algebraic Sets | null | null | null | null | math.AG cs.SC math.AT | null | In this paper we describe a singly exponential algorithm for computing the
first Betti number of a given semi-algebraic set. Singly exponential algorithms
for computing the zero-th Betti number, and the Euler-Poincar\'e
characteristic, were known before. No singly exponential algorithm was known
for computing any of the individual Betti numbers other than the zero-th one.
We also give algorithms for obtaining semi-algebraic descriptions of the
semi-algebraically connected components of any given real algebraic or
semi-algebraic set in single-exponential time improving on previous results.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 20:00:21 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Basu",
"Saugata",
""
],
[
"Pollack",
"Richard",
""
],
[
"Roy",
"Marie-Francoise",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
}
] |
math/0603256 | Saugata Basu | Saugata Basu, Richard Pollack, Marie-Francoise Roy | An asymptotically tight bound on the number of semi-algebraically
connected components of realizable sign conditions | 19 pages. Bibliography has been updated and a few more references
have been added. This is the final version of this paper which will appear in
Combinatorica | null | null | null | math.CO cs.CG math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove an asymptotically tight bound (asymptotic with respect to the number
of polynomials for fixed degrees and number of variables) on the number of
semi-algebraically connected components of the realizations of all realizable
sign conditions of a family of real polynomials. More precisely, we prove that
the number of semi-algebraically connected components of the realizations of
all realizable sign conditions of a family of $s$ polynomials in
$\R[X_1,...,X_k]$ whose degrees are at most $d$ is bounded by \[
\frac{(2d)^k}{k!}s^k + O(s^{k-1}). \] This improves the best upper bound known
previously which was \[ {1/2}\frac{(8d)^k}{k!}s^k + O(s^{k-1}). \] The new
bound matches asymptotically the lower bound obtained for families of
polynomials each of which is a product of generic polynomials of degree one.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 18:41:15 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Apr 2008 00:16:09 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Jul 2009 12:50:29 GMT"
}
] | 2009-07-14T00:00:00 | [
[
"Basu",
"Saugata",
""
],
[
"Pollack",
"Richard",
""
],
[
"Roy",
"Marie-Francoise",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0603262 | Saugata Basu | Saugata Basu | Computing the Top Betti Numbers of Semi-algebraic Sets Defined by
Quadratic Inequalities in Polynomial Time | Some more details added in Sections 6 and 7 | null | 10.1007/s10208-005-0208-8 | null | math.AG cs.CC math.LO | null | For any $\ell > 0$, we present an algorithm which takes as input a
semi-algebraic set, $S$, defined by $P_1 \leq 0,...,P_s \leq 0$, where each
$P_i \in \R[X_1,...,X_k]$ has degree $\leq 2,$ and computes the top $\ell$
Betti numbers of $S$, $b_{k-1}(S), ..., b_{k-\ell}(S),$ in polynomial time. The
complexity of the algorithm, stated more precisely, is $ \sum_{i=0}^{\ell+2} {s
\choose i} k^{2^{O(\min(\ell,s))}}. $ For fixed $\ell$, the complexity of the
algorithm can be expressed as $s^{\ell+2} k^{2^{O(\ell)}},$ which is polynomial
in the input parameters $s$ and $k$. To our knowledge this is the first
polynomial time algorithm for computing non-trivial topological invariants of
semi-algebraic sets in $\R^k$ defined by polynomial inequalities, where the
number of inequalities is not fixed and the polynomials are allowed to have
degree greater than one. For fixed $s$, we obtain by letting $\ell = k$, an
algorithm for computing all the Betti numbers of $S$ whose complexity is
$k^{2^{O(s)}}$.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 21:22:58 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 15:14:45 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Feb 2007 22:55:49 GMT"
},
{
"version": "v4",
"created": "Thu, 22 Feb 2007 20:54:38 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Basu",
"Saugata",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
math/0603263 | Saugata Basu | Saugata Basu | Computing the First Few Betti Numbers of Semi-algebraic Sets in Single
Exponential Time | null | null | null | null | math.AG cs.SC | null | In this paper we describe an algorithm that takes as input a description of a
semi-algebraic set $S \subset \R^k$, defined by a Boolean formula with atoms of
the form $P > 0, P < 0, P=0$ for $P \in {\mathcal P} \subset \R[X_1,...,X_k],$
and outputs the first $\ell+1$ Betti numbers of $S$, $b_0(S),...,b_\ell(S).$
The complexity of the algorithm is $(sd)^{k^{O(\ell)}},$ where where $s =
#({\mathcal P})$ and $d = \max_{P\in {\mathcal P}}{\rm deg}(P),$ which is
singly exponential in $k$ for $\ell$ any fixed constant. Previously, singly
exponential time algorithms were known only for computing the Euler-Poincar\'e
characteristic, the zero-th and the first Betti numbers.
| [
{
"version": "v1",
"created": "Fri, 10 Mar 2006 21:32:18 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Basu",
"Saugata",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0603606 | P.N. Denisenko | P.N. Denisenko | Lanczos $\tau$-method optimal algorithm in APS for approximating the
mathematical functions | 10 pages. Based on a talk given at the Workshop on Symbolic
Calculations and Exact Methods in Mathematical Physics, Kiev, June 20-26,
2005 | null | null | null | math.NA cs.MS math.CA | null | A new procedure is constructed by means of APS in APLAN language. The
procedure solves the initial-value problem for linear differential equations of
order $k$ with polynomial coefficients and regular singularity in the
initialization point in the interval $[a, b]$ and computes the algebraic
polynomial $y_n$ of given order $n$. A new algorithm of Lanczos $\tau$-method
is built for this procedure, the solution existence $y_n$ of the initial-value
problem proved on this algorithm and also is proved the optimality by precision
of order $k$ derivative of the initial-value problem solution.
| [
{
"version": "v1",
"created": "Sun, 26 Mar 2006 12:30:11 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Denisenko",
"P. N.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
}
] |
math/0603727 | Stephen D. Miller | Stephen D. Miller, Ramarathnam Venkatesan | Spectral Analysis of Pollard Rho Collisions | To appear in Proceedings of ANTS VII | null | null | null | math.NT cs.CR cs.DM math.CO | null | We show that the classical Pollard rho algorithm for discrete logarithms
produces a collision in expected time O(sqrt(n)(log n)^3). This is the first
nontrivial rigorous estimate for the collision probability for the unaltered
Pollard rho graph, and is close to the conjectured optimal bound of O(sqrt(n)).
The result is derived by showing that the mixing time for the random walk on
this graph is O((log n)^3); without the squaring step in the Pollard rho
algorithm, the mixing time would be exponential in log n. The technique
involves a spectral analysis of directed graphs, which captures the effect of
the squaring step.
| [
{
"version": "v1",
"created": "Fri, 31 Mar 2006 12:41:19 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Apr 2006 21:23:54 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Miller",
"Stephen D.",
""
],
[
"Venkatesan",
"Ramarathnam",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0604226 | Hong-Gwa Yeh | Hong-Gwa Yeh | A Dynamic View of Circular Colorings | 23 pages | null | null | null | math.CO cs.DC cs.DM | null | The main contributions of this paper are three-fold. First, we use a dynamic
approach based on Reiter's pioneering work on Karp-Miller computation graphs to
give a new and short proof of Mohar's Minty-type Theorem. Second, we bridge
circular colorings and discrete event dynamic systems to show that the Barbosa
and Gafni's results on circular chromatic number can be generalized to
edge-weighted symmetric directed graphs. Third, we use the above-mentioned
dynamic view of circular colorings to construct new improved lower bounds on
the circular chromatic number of a graph. We show as an example that the
circular chromatic number of the line graph of the Petersen graph can be
determined very easily by using these bounds.
| [
{
"version": "v1",
"created": "Mon, 10 Apr 2006 16:02:53 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Yeh",
"Hong-Gwa",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0604233 | Philippe Rigollet | Philippe Rigollet (PMA) | Generalization error bounds in semi-supervised classification under the
cluster assumption | null | null | null | null | math.ST cs.LG stat.TH | null | We consider semi-supervised classification when part of the available data is
unlabeled. These unlabeled data can be useful for the classification problem
when we make an assumption relating the behavior of the regression function to
that of the marginal distribution. Seeger (2000) proposed the well-known
"cluster assumption" as a reasonable one. We propose a mathematical formulation
of this assumption and a method based on density level sets estimation that
takes advantage of it to achieve fast rates of convergence both in the number
of unlabeled examples and the number of labeled examples.
| [
{
"version": "v1",
"created": "Tue, 11 Apr 2006 05:41:15 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Rigollet",
"Philippe",
"",
"PMA"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0604331 | Jean-Francois Marckert | Ali Akhavi (LIAFA), Jean-Fran\c{c}ois Marckert (LaBRI), Alain Rouault
(LM-Versailles) | On the reduction of a random basis | null | null | null | null | math.PR cs.DS | null | For $g < n$, let $b\_1,...,b\_{n-g}$ be $n - g$ independent vectors in
$\mathbb{R}^n$ with a common distribution invariant by rotation. Considering
these vectors as a basis for the Euclidean lattice they generate, the aim of
this paper is to provide asymptotic results when $n\to +\infty$ concerning the
property that such a random basis is reduced in the sense of {\sc Lenstra,
Lenstra & Lov\'asz}. The proof passes by the study of the process
$(r\_{g+1}^{(n)},r\_{g+2}^{(n)},...,r\_{n-1}^{(n)})$ where $r\_j^{(n)}$ is the
ratio of lengths of two consecutive vectors $b^*\_{n-j+1}$ and $b^*\_{n-j}$
built from $(b\_1,...,b\_{n-g})$ by the Gram--Schmidt orthogonalization
procedure, which we believe to be interesting in its own. We show that, as
$n\to+\infty$, the process $(r\_j^{(n)}-1)\_j$ tends in distribution in some
sense to an explicit process $({\mathcal R}\_j -1)\_j$; some properties of this
latter are provided.
| [
{
"version": "v1",
"created": "Fri, 14 Apr 2006 07:57:50 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Akhavi",
"Ali",
"",
"LIAFA"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
],
[
"Rouault",
"Alain",
"",
"LM-Versailles"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0604366 | Sebastian Roch | Christian Borgs, Jennifer Chayes, Elchanan Mossel, Sebastien Roch | The Kesten-Stigum Reconstruction Bound Is Tight for Roughly Symmetric
Binary Channels | null | null | null | null | math.PR cs.CC q-bio.PE | null | We establish the exact threshold for the reconstruction problem for a binary
asymmetric channel on the b-ary tree, provided that the asymmetry is
sufficiently small. This is the first exact reconstruction threshold obtained
in roughly a decade. We discuss the implications of our result for Glauber
dynamics, phylogenetic reconstruction, and so-called ``replica symmetry
breaking'' in spin glasses and random satisfiability problems.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2006 10:59:09 GMT"
}
] | 2011-09-07T00:00:00 | [
[
"Borgs",
"Christian",
""
],
[
"Chayes",
"Jennifer",
""
],
[
"Mossel",
"Elchanan",
""
],
[
"Roch",
"Sebastien",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
] |
math/0604367 | Sebastian Roch | Shankar Bhamidi, Ram Rajagopal, Sebastien Roch | Network Delay Inference from Additive Metrics | null | null | null | null | math.PR cs.DS cs.NI math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We demonstrate the use of computational phylogenetic techniques to solve a
central problem in inferential network monitoring. More precisely, we design a
novel algorithm for multicast-based delay inference, i.e. the problem of
reconstructing the topology and delay characteristics of a network from
end-to-end delay measurements on network paths. Our inference algorithm is
based on additive metric techniques widely used in phylogenetics. It runs in
polynomial time and requires a sample of size only $\poly(\log n)$.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2006 11:12:31 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 01:20:14 GMT"
}
] | 2011-09-07T00:00:00 | [
[
"Bhamidi",
"Shankar",
""
],
[
"Rajagopal",
"Ram",
""
],
[
"Roch",
"Sebastien",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0604371 | Michael Yampolsky | Mark Braverman, Michael Yampolsky | Constructing Non-Computable Julia Sets | null | null | null | null | math.DS cs.CC | null | We completely characterize the conformal radii of Siegel disks in the family
$$P_\theta(z)=e^{2\pi i\theta}z+z^2,$$ corresponding to {\bf computable}
parameters $\theta$. As a consequence, we constructively produce quadratic
polynomials with {\bf non-computable} Julia sets.
| [
{
"version": "v1",
"created": "Mon, 17 Apr 2006 18:16:05 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Braverman",
"Mark",
""
],
[
"Yampolsky",
"Michael",
""
]
] | [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0604584 | Benjamin Burton | Benjamin A. Burton | Enumeration of non-orientable 3-manifolds using face pairing graphs and
union-find | 37 pages, 34 figures | Discrete and Computational Geometry 38 (2007), no. 3, 527-571 | 10.1007/s00454-007-1307-x | null | math.GT cs.CG math.CO | null | Drawing together techniques from combinatorics and computer science, we
improve the census algorithm for enumerating closed minimal P^2-irreducible
3-manifold triangulations. In particular, new constraints are proven for face
pairing graphs, and pruning techniques are improved using a modification of the
union-find algorithm. Using these results we catalogue all 136 closed
non-orientable P^2-irreducible 3-manifolds that can be formed from at most ten
tetrahedra.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2006 06:19:44 GMT"
}
] | 2011-11-29T00:00:00 | [
[
"Burton",
"Benjamin A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GT",
"description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures",
"span": "(Geometric Topology)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0604611 | M. J. Gagen | Michael J. Gagen and Kae Nemoto | Variational optimization of probability measure spaces resolves the
chain store paradox | 11 pages, 5 figures. Replaced for minor notational correction | null | null | null | math.OC cond-mat.stat-mech cs.GT | null | In game theory, players have continuous expected payoff functions and can use
fixed point theorems to locate equilibria. This optimization method requires
that players adopt a particular type of probability measure space. Here, we
introduce alternate probability measure spaces altering the dimensionality,
continuity, and differentiability properties of what are now the game's
expected payoff functionals. Optimizing such functionals requires generalized
variational and functional optimization methods to locate novel equilibria.
These variational methods can reconcile game theoretic prediction and observed
human behaviours, as we illustrate by resolving the chain store paradox. Our
generalized optimization analysis has significant implications for economics,
artificial intelligence, complex system theory, neurobiology, and biological
evolution and development.
| [
{
"version": "v1",
"created": "Thu, 27 Apr 2006 23:59:46 GMT"
},
{
"version": "v2",
"created": "Thu, 11 May 2006 01:18:14 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Gagen",
"Michael J.",
""
],
[
"Nemoto",
"Kae",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
math/0605232 | Francois Rodier | Fran\c{c}ois Rodier (IML) | Borne sur le degr\'e des polyn\^omes presque parfaitement
non-lin\'eaires | 19 pages | null | null | null | math.AG cs.CR | null | The vectorial Boolean functions are employed in cryptography to build block
coding algorithms. An important criterion on these functions is their
resistance to the differential cryptanalysis. Nyberg defined the notion of
almost perfect non-linearity (APN) to study resistance to the differential
attacks. Up to now, the study of functions APN was especially devoted to power
functions. Recently, Budaghyan and al. showed that certain quadratic
polynomials were APN. Here, we will give a criterion so that a function is not
almost perfectly non-linear. H. Janwa showed, by using Weil's bound, that
certain cyclic codes could not correct two errors. A. Canteaut showed by using
the same method that the functions powers were not APN for a too large value of
the exponent. We use Lang and Weil's bound and a result of P. Deligne on the
Weil's conjectures (or more exactly improvements given by Ghorpade and Lachaud)
about surfaces on finite fields to generalize this result to all the
polynomials. We show therefore that a polynomial cannot be APN if its degree is
too large.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 17:08:17 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Mar 2008 08:35:05 GMT"
},
{
"version": "v3",
"created": "Fri, 2 May 2008 19:41:09 GMT"
}
] | 2008-05-02T00:00:00 | [
[
"Rodier",
"François",
"",
"IML"
]
] | [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0605242 | Shmuel Onn | Jes\'us A. De Loera, Raymond Hemmecke, Shmuel Onn, Robert Weismantel | N-Fold Integer Programming | null | Discrete Optimization, 5:231--241, 2008 | null | null | math.OC cs.CC cs.DM math.CO | null | In this article we study a broad class of integer programming problems in
variable dimension. We show that these so-termed {\em n-fold integer
programming problems} are polynomial time solvable. Our proof involves two
heavy ingredients discovered recently: the equivalence of linear optimization
and so-called directed augmentation, and the stabilization of certain Graver
bases.
We discuss several applications of our algorithm to multiway transportation
problems and to packing problems. One important consequence of our results is a
polynomial time algorithm for the $d$-dimensional integer transportation
problem for long multiway tables. Another interesting application is a new
algorithm for the classical cutting stock problem.
| [
{
"version": "v1",
"created": "Tue, 9 May 2006 20:33:41 GMT"
}
] | 2008-07-24T00:00:00 | [
[
"De Loera",
"Jesús A.",
""
],
[
"Hemmecke",
"Raymond",
""
],
[
"Onn",
"Shmuel",
""
],
[
"Weismantel",
"Robert",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0605334 | Vladimir P. Gerdt | Vladimir P. Gerdt, Yuri A. Blinkov and Vladimir V. Mozzhilkin | Gr\"obner Bases and Generation of Difference Schemes for Partial
Differential Equations | Published in SIGMA (Symmetry, Integrability and Geometry: Methods and
Applications) at http://www.emis.de/journals/SIGMA/ | SIGMA 2 (2006), 051, 26 pages | 10.3842/SIGMA.2006.051 | null | math.RA cs.NA cs.SC math.NA | null | In this paper we present an algorithmic approach to the generation of fully
conservative difference schemes for linear partial differential equations. The
approach is based on enlargement of the equations in their integral
conservation law form by extra integral relations between unknown functions and
their derivatives, and on discretization of the obtained system. The structure
of the discrete system depends on numerical approximation methods for the
integrals occurring in the enlarged system. As a result of the discretization,
a system of linear polynomial difference equations is derived for the unknown
functions and their partial derivatives. A difference scheme is constructed by
elimination of all the partial derivatives. The elimination can be achieved by
selecting a proper elimination ranking and by computing a Gr\"obner basis of
the linear difference ideal generated by the polynomials in the discrete
system. For these purposes we use the difference form of Janet-like Gr\"obner
bases and their implementation in Maple. As illustration of the described
methods and algorithms, we construct a number of difference schemes for Burgers
and Falkowich-Karman equations and discuss their numerical properties.
| [
{
"version": "v1",
"created": "Fri, 12 May 2006 13:34:41 GMT"
}
] | 2008-04-24T00:00:00 | [
[
"Gerdt",
"Vladimir P.",
""
],
[
"Blinkov",
"Yuri A.",
""
],
[
"Mozzhilkin",
"Vladimir V.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
math/0605472 | Nicolas Pouyanne | Nicolas Pouyanne (LM-Versailles) | An algebraic approach to Polya processes | null | Annales de l'IHP - Probabilit\'es et Statistiques (2008) Vol. 44,
No. 2, 293-323 | 10.1214/07-AIHP130 | null | math.CO cs.DM cs.DS math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | P\'olya processes are natural generalization of P\'olya-Eggenberger urn
models. This article presents a new approach of their asymptotic behaviour {\it
via} moments, based on the spectral decomposition of a suitable finite
difference operator on polynomial functions. Especially, it provides new
results for {\it large} processes (a P\'olya process is called {\it small} when
1 is simple eigenvalue of its replacement matrix and when any other eigenvalue
has a real part $\leq 1/2$; otherwise, it is called large).
| [
{
"version": "v1",
"created": "Wed, 17 May 2006 11:52:11 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Jul 2009 05:48:42 GMT"
}
] | 2015-06-26T00:00:00 | [
[
"Pouyanne",
"Nicolas",
"",
"LM-Versailles"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
math/0605498 | Frederic Dambreville | Frederic Dambreville (DGA/CTA/DT/GIP) | Cross-Entropic Learning of a Machine for the Decision in a Partially
Observable Universe | Submitted to EJOR | null | null | null | math.OC cs.AI cs.LG cs.NE cs.RO math.ST stat.TH | null | Revision of the paper previously entitled "Learning a Machine for the
Decision in a Partially Observable Markov Universe" In this paper, we are
interested in optimal decisions in a partially observable universe. Our
approach is to directly approximate an optimal strategic tree depending on the
observation. This approximation is made by means of a parameterized
probabilistic law. A particular family of hidden Markov models, with input
\emph{and} output, is considered as a model of policy. A method for optimizing
the parameters of these HMMs is proposed and applied. This optimization is
based on the cross-entropic principle for rare events simulation developed by
Rubinstein.
| [
{
"version": "v1",
"created": "Thu, 18 May 2006 07:47:58 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Dambreville",
"Frederic",
"",
"DGA/CTA/DT/GIP"
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0605610 | Shmuel Onn | Yael Berstein and Shmuel Onn | Nonlinear Bipartite Matching | null | Discrete Optimization, 5:53--65, 2008 | null | null | math.OC cs.CC cs.DM math.CO | null | We study the problem of optimizing nonlinear objective functions over
bipartite matchings. While the problem is generally intractable, we provide
several efficient algorithms for it, including a deterministic algorithm for
maximizing convex objectives, approximative algorithms for norm minimization
and maximization, and a randomized algorithm for optimizing arbitrary
objectives.
| [
{
"version": "v1",
"created": "Tue, 23 May 2006 11:03:05 GMT"
}
] | 2008-07-24T00:00:00 | [
[
"Berstein",
"Yael",
""
],
[
"Onn",
"Shmuel",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0605740 | Martin Wainwright | Martin J. Wainwright | Sharp thresholds for high-dimensional and noisy recovery of sparsity | Appeared as Technical Report 708, Department of Statistics, UC
Berkeley | null | null | null | math.ST cs.IT math.IT stat.TH | null | The problem of consistently estimating the sparsity pattern of a vector
$\betastar \in \real^\mdim$ based on observations contaminated by noise arises
in various contexts, including subset selection in regression, structure
estimation in graphical models, sparse approximation, and signal denoising. We
analyze the behavior of $\ell_1$-constrained quadratic programming (QP), also
referred to as the Lasso, for recovering the sparsity pattern. Our main result
is to establish a sharp relation between the problem dimension $\mdim$, the
number $\spindex$ of non-zero elements in $\betastar$, and the number of
observations $\numobs$ that are required for reliable recovery. For a broad
class of Gaussian ensembles satisfying mutual incoherence conditions, we
establish existence and compute explicit values of thresholds $\ThreshLow$ and
$\ThreshUp$ with the following properties: for any $\epsilon > 0$, if $\numobs
> 2 (\ThreshUp + \epsilon) \log (\mdim - \spindex) + \spindex + 1$, then the
Lasso succeeds in recovering the sparsity pattern with probability converging
to one for large problems, whereas for $\numobs < 2 (\ThreshLow - \epsilon)
\log (\mdim - \spindex) + \spindex + 1$, then the probability of successful
recovery converges to zero. For the special case of the uniform Gaussian
ensemble, we show that $\ThreshLow = \ThreshUp = 1$, so that the threshold is
sharp and exactly determined.
| [
{
"version": "v1",
"created": "Tue, 30 May 2006 05:49:04 GMT"
}
] | 2007-07-13T00:00:00 | [
[
"Wainwright",
"Martin J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0606022 | A. Caranti | A. Caranti, F. Dalla Volta, M. Sala, F. Villani | Imprimitive permutations groups generated by the round functions of
key-alternating block ciphers and truncated differential cryptanalysis | 9 pages - corrected embarrassing typo in the title | null | null | null | math.GR cs.CR | null | We answer a question of Paterson, showing that all block systems for the
group generated by the round functions of a key-alternating block cipher are
the translates of a linear subspace. Following up remarks of Paterson and
Shamir, we exhibit a connection to truncated differential cryptanalysis.
We also give a condition that guarantees that the group generated by the
round functions of a key-alternating block cipher is primitive. This applies in
particular to AES.
| [
{
"version": "v1",
"created": "Thu, 1 Jun 2006 11:30:29 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jun 2006 12:08:45 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Caranti",
"A.",
""
],
[
"Volta",
"F. Dalla",
""
],
[
"Sala",
"M.",
""
],
[
"Villani",
"F.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0606122 | George Bell | George I. Bell | Diagonal Peg Solitaire | 20 pages, 11 figures | INTEGERS: Electronic Journal of Combinatorial Number Theory 7
(2007) #G01 | null | null | math.CO cs.DM cs.DS | null | We study the classical game of peg solitaire when diagonal jumps are allowed.
We prove that on many boards, one can begin from a full board with one peg
missing, and finish with one peg anywhere on the board. We then consider the
problem of finding solutions that minimize the number of moves (where a move is
one or more jumps by the same peg), and find the shortest solution to the
"central game", which begins and ends at the center. In some cases we can prove
analytically that our solutions are the shortest possible, in other cases we
apply A* or bidirectional search heuristics.
| [
{
"version": "v1",
"created": "Tue, 6 Jun 2006 03:07:27 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jan 2007 15:53:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bell",
"George I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0606315 | Marcus Hutter | Marcus Hutter | Bayesian Regression of Piecewise Constant Functions | 27 pages, 18 figures, 1 table, 3 algorithms | null | null | IDSIA-14-05 | math.ST cs.LG math.PR stat.TH | null | We derive an exact and efficient Bayesian regression algorithm for piecewise
constant functions of unknown segment number, boundary location, and levels. It
works for any noise and segment level prior, e.g. Cauchy which can handle
outliers. We derive simple but good estimates for the in-segment variance. We
also propose a Bayesian regression curve as a better way of smoothing data
without blurring boundaries. The Bayesian approach also allows straightforward
determination of the evidence, break probabilities and error estimates, useful
for model selection and significance and robustness studies. We discuss the
performance on synthetic and real-world examples. Many possible extensions will
be discussed.
| [
{
"version": "v1",
"created": "Tue, 13 Jun 2006 17:05:02 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0606643 | Rami Kanhouche | Rami Kanhouche (CMLA) | Entropy And Vision | null | null | null | null | math.PR cs.CV cs.DB cs.DM cs.LG math.CO | null | In vector quantization the number of vectors used to construct the codebook
is always an undefined problem, there is always a compromise between the number
of vectors and the quantity of information lost during the compression. In this
text we present a minimum of Entropy principle that gives solution to this
compromise and represents an Entropy point of view of signal compression in
general. Also we present a new adaptive Object Quantization technique that is
the same for the compression and the perception.
| [
{
"version": "v1",
"created": "Mon, 26 Jun 2006 13:03:11 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Jun 2006 06:45:22 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Jul 2006 05:18:07 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Kanhouche",
"Rami",
"",
"CMLA"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
math/0606734 | Alexander Barg | Alexander Barg and Oleg R. Musin | Codes in spherical caps | null | Advances in Mathematics of Communications, vol. 1, no. 1, 2007,
131-149 | null | null | math.MG cs.IT math.IT | null | We consider bounds on codes in spherical caps and related problems in
geometry and coding theory. An extension of the Delsarte method is presented
that relates upper bounds on the size of spherical codes to upper bounds on
codes in caps. Several new upper bounds on codes in caps are derived.
Applications of these bounds to estimates of the kissing numbers and one-sided
kissing numbers are considered.
It is proved that the maximum size of codes in spherical caps for large
dimensions is determined by the maximum size of spherical codes, so these
problems are asymptotically equivalent.
| [
{
"version": "v1",
"created": "Wed, 28 Jun 2006 18:46:56 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Mar 2007 16:51:52 GMT"
}
] | 2007-07-16T00:00:00 | [
[
"Barg",
"Alexander",
""
],
[
"Musin",
"Oleg R.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0606771 | Ilya Mironov | Ilya Mironov, Anton Mityagin, Kobbi Nissim | Hard Instances of the Constrained Discrete Logarithm Problem | null | In proceedings of 7th Algorithmic Number Theory Symposium (ANTS
VII), pages 582--598, 2006 | 10.1007/11792086_41 | null | math.NT cs.CR | null | The discrete logarithm problem (DLP) generalizes to the constrained DLP,
where the secret exponent $x$ belongs to a set known to the attacker. The
complexity of generic algorithms for solving the constrained DLP depends on the
choice of the set. Motivated by cryptographic applications, we study sets with
succinct representation for which the constrained DLP is hard. We draw on
earlier results due to Erd\"os et al. and Schnorr, develop geometric tools such
as generalized Menelaus' theorem for proving lower bounds on the complexity of
the constrained DLP, and construct sets with succinct representation with
provable non-trivial lower bounds.
| [
{
"version": "v1",
"created": "Thu, 29 Jun 2006 21:54:51 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Jul 2006 03:10:11 GMT"
}
] | 2018-12-12T00:00:00 | [
[
"Mironov",
"Ilya",
""
],
[
"Mityagin",
"Anton",
""
],
[
"Nissim",
"Kobbi",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
math/0607051 | Naoto Morikawa | Naoto Morikawa | Discrete differential geometry of triangle tiles and algebra of closed
trajectories | 15 pages, 6 figures | null | null | null | math.CO cs.DM math.MG | null | This paper proposes a new mathematical framework that can be applied to
biological problems such as analysis of the structures of proteins and protein
complexes. In particular, it gives a new method for encoding the
three-dimensional structure of a protein into a binary sequence, where proteins
are approximated by a folded tetrahedron sequence. It also gives a new
algebraic framework for describing molecular complexes and their interactions.
For simplicity, we shall explain the framework in the case of two-dimensional
objects. Then, the binary code of a plane curve is obtained as the ``second
derivative'' of the curve and ``fusion and fission'' of closed trajectories is
described algebraically.
| [
{
"version": "v1",
"created": "Mon, 3 Jul 2006 14:18:46 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Morikawa",
"Naoto",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
math/0607071 | Xueliang Li | Xueliang Li, Jianhua Tu | NP-completeness of 4-incidence colorability of semi-cubic graphs | 11 pages | null | null | null | math.CO cs.CC | null | The incidence coloring conjecture, proposed by Brualdi and Massey in 1993,
states that the incidence coloring number of every graph is at most ${\it
\Delta}+2$, where ${\it \Delta}$ is the maximum degree of a graph. The
conjecture was shown to be false in general by Guiduli in 1997, following the
work of Algor and Alon. However, in 2005 Maydanskiy proved that the conjecture
holds for any graph with ${\it \Delta}\leq 3$. It is easily deduced that the
incidence coloring number of a semi-cubic graph is 4 or 5. In this paper, we
show that it is already NP-complete to determine if a semi-cubic graph is
4-incidence colorable, and therefore it is NP-complete to determine if a
general graph is $k$-incidence colorable.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2006 08:19:26 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Li",
"Xueliang",
""
],
[
"Tu",
"Jianhua",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
math/0607088 | Dirk Oliver Theis | Adam N. Letchford and Dirk Oliver Theis | Odd minimum cut sets and b-matchings revisited | 6 pages. An extended abstract of an earlier version appeared in Proc.
IPCO X (2004) | null | null | null | math.OC cs.DM | null | The famous Padberg-Rao separation algorithm for b-matching polyhedra can be
implemented to run in O(n^2m log(n^2/m)) time in the uncapacitated case, and in
O(nm^2 log(n^2/m)) time in the capacitated case (where n is the number of
vertices and m is the number of edges of the underlying graph). We give a new
and simple algorithm for the capacitated case which can be implemented to run
in O(n^2m log(n^2/m)) time.
| [
{
"version": "v1",
"created": "Tue, 4 Jul 2006 11:39:28 GMT"
}
] | 2011-12-08T00:00:00 | [
[
"Letchford",
"Adam N.",
""
],
[
"Theis",
"Dirk Oliver",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0607243 | Romain Abraham | Isabelle Abraham (DCRE), Romain Abraham (MAPMO), Maitine Bergounioux
(MAPMO) | An active curve approach for tomographic reconstruction of binary
radially symmetric objects | null | null | null | null | math.OC cs.CV | null | This paper deals with a method of tomographic reconstruction of radially
symmetric objects from a single radiograph, in order to study the behavior of
shocked material. The usual tomographic reconstruction algorithms such as
generalized inverse or filtered back-projection cannot be applied here because
data are very noisy and the inverse problem associated to single view
tomographic reconstruction is highly unstable. In order to improve the
reconstruction, we propose here to add some a priori assumptions on the looked
after object. One of these assumptions is that the object is binary and
consequently, the object may be described by the curves that separate the two
materials. We present a model that lives in BV space and leads to a non local
Hamilton-Jacobi equation, via a level set strategy. Numerical experiments are
performed (using level sets methods) on synthetic objects.
| [
{
"version": "v1",
"created": "Mon, 10 Jul 2006 17:08:49 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Abraham",
"Isabelle",
"",
"DCRE"
],
[
"Abraham",
"Romain",
"",
"MAPMO"
],
[
"Bergounioux",
"Maitine",
"",
"MAPMO"
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
math/0607368 | Josephine Yu | Bernd Sturmfels, Jenia Tevelev, Josephine Yu | The Newton Polytope of the Implicit Equation | 18 pages, 3 figures | Moscow Mathematical Journal 7 (2007), no. 2, 327--346, 351 | null | null | math.CO cs.SC math.AG | null | We apply tropical geometry to study the image of a map defined by Laurent
polynomials with generic coefficients. If this image is a hypersurface then our
approach gives a construction of its Newton polytope.
| [
{
"version": "v1",
"created": "Sun, 16 Jul 2006 05:55:34 GMT"
}
] | 2012-02-13T00:00:00 | [
[
"Sturmfels",
"Bernd",
""
],
[
"Tevelev",
"Jenia",
""
],
[
"Yu",
"Josephine",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0607411 | Jean-Gabriel Luque | G\'erard Duchamp (LIPN), Eric Laugerotte (LIFAR EA2655), Jean-Gabriel
Luque (IGM-LabInfo) | Extending the scalars of minimizations | null | SCI, \'{E}tats-Unis d'Am\'{e}rique (2001) | null | null | math.CO cs.DS cs.SC | null | In the classical theory of formal languages, finite state automata allow to
recognize the words of a rational subset of $\Sigma^*$ where $\Sigma$ is a set
of symbols (or the alphabet). Now, given a semiring $(\K,+,.)$, one can
construct $\K$-subsets of $\Sigma^*$ in the sense of Eilenberg, that are
alternatively called noncommutative formal power series for which a framework
very similar to language theory has been constructed Particular noncommutative
formal power series, which are called rational series, are the behaviour of a
family of weighted automata (or $\K$-automata). In order to get an efficient
encoding, it may be interesting to point out one of them with the smallest
number of states. Minimization processes of $\K$-automata already exist for
$\K$ being: {\bf a)} a field, {\bf b)} a noncommutative field, {\bf c)} a PID .
When $\K$ is the bolean semiring, such a minimization process (with
isomorphisms of minimal objects) is known within the category of deterministic
automata. Minimal automata have been proved to be isomorphic in cases {\bf (a)}
and {\bf (b)}. But the proof given for (b) is not constructive. In fact, it
lays on the existence of a basis for a submodule of $\K^n$. Here we give an
independent algorithm which reproves this fact and an example of a pair of
nonisomorphic minimal automata. Moreover, we examine the possibility of
extending {\bf (c)}. To this end, we provide an {\em Effective Minimization
Process} (or {\em EMP}) which can be used for more general sets of
coefficients.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:06:59 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Duchamp",
"Gérard",
"",
"LIPN"
],
[
"Laugerotte",
"Eric",
"",
"LIFAR EA2655"
],
[
"Luque",
"Jean-Gabriel",
"",
"IGM-LabInfo"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0607412 | Jean-Gabriel Luque | G\'erard Duchamp (LIPN), Marianne Flouret (LIH EA3219), Eric
Laugerotte (LIFAR EA2655), Jean-Gabriel Luque (IGM-LabInfo) | Direct and dual laws for automata with multiplicities | null | Theoretical Computer Science 267 (2001) 105-120 | null | null | math.CO cs.DM cs.SC | null | We present here theoretical results coming from the implementation of the
package called AMULT (automata with multiplicities in several noncommutative
variables). We show that classical formulas are ``almost every time'' optimal,
characterize the dual laws preserving rationality and also relators that are
compatible with these laws.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 07:08:35 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Duchamp",
"Gérard",
"",
"LIPN"
],
[
"Flouret",
"Marianne",
"",
"LIH EA3219"
],
[
"Laugerotte",
"Eric",
"",
"LIFAR EA2655"
],
[
"Luque",
"Jean-Gabriel",
"",
"IGM-LabInfo"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0607420 | Jean-Gabriel Luque | Jean-Gabriel Luque (IGM-LabInfo), G\'erard Henry Edmond Duchamp (LIPN) | Transitive factorizations of free partially commutative monoids and Lie
algebras | null | Discrete Mathematics 246, Issue 1-3 (2002) 83 - 97 | null | null | math.CO cs.DM cs.SC math.GM | null | Let $\M(A,\theta)$ be a free partially commutative monoid. We give here a
necessary and sufficient condition on a subalphabet $B\subset A$ such that the
right factor of a bisection $\M(A,\theta)=\M(B,\theta\_B).T$ be also partially
commutative free. This extends strictly the (classical) elimination theory on
partial commutations and allows to construct new factorizations of
$\M(A,\theta)$ and associated bases of $L\_K(A,\theta)$.
| [
{
"version": "v1",
"created": "Tue, 18 Jul 2006 12:42:33 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Luque",
"Jean-Gabriel",
"",
"IGM-LabInfo"
],
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
}
] |
math/0607462 | Nicolas Tabareau | Nicolas Tabareau (PPS) | De l'oprateur de trace dans les jeux de Conway | null | null | null | null | math.CT cs.PL | null | In this report, we propose a game semantics model of intuitionistic linear
logic with a notion of brackets and a trace operator. This model is a revised
version of Conway games augmented with an algebraicly defined gain which enable
to describe well bracketed strategies. We then show the existence of a free
cocommutative comonoid in the category of Conway. To conclude, we propose a new
model of an Algol-like language with higher-order using the presence of a trace
operator in our model to describe the memorial aspect of the language.
| [
{
"version": "v1",
"created": "Wed, 19 Jul 2006 12:43:02 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Tabareau",
"Nicolas",
"",
"PPS"
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
math/0607507 | Yana Volkovich | N. Litvak, W.R.W. Scheinhardt and Y. Volkovich | In-Degree and PageRank of Web pages: Why do they follow similar power
laws? | 20 pages, 3 figures; typos added; reference added | null | null | Memorandum 1807, Dept. of Applied. Mathematics, University of Twente | math.PR cs.IR | null | The PageRank is a popularity measure designed by Google to rank Web pages.
Experiments confirm that the PageRank obeys a `power law' with the same
exponent as the In-Degree. This paper presents a novel mathematical model that
explains this phenomenon. The relation between the PageRank and In-Degree is
modelled through a stochastic equation, which is inspired by the original
definition of the PageRank, and is analogous to the well-known distributional
identity for the busy period in the M/G/1 queue. Further, we employ the theory
of regular variation and Tauberian theorems to analytically prove that the tail
behavior of the PageRank and the In-Degree differ only by a multiplicative
factor, for which we derive a closed-form expression. Our analytical results
are in good agreement with experimental data.
| [
{
"version": "v1",
"created": "Thu, 20 Jul 2006 16:07:10 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Nov 2006 15:11:12 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Dec 2006 11:19:48 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Litvak",
"N.",
""
],
[
"Scheinhardt",
"W. R. W.",
""
],
[
"Volkovich",
"Y.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
math/0607597 | Georges-Henri Cottet | Mathieu Coquerelle (LMC - Imag, Gravir - Imag), J\'er\'emie Allard
(GRAVIR - Imag), Georges-Henri Cottet (LMC - Imag), Marie-Paule Cani (GRAVIR
- Imag) | A Vortex Method for Bi-phasic Fluids Interacting with Rigid Bodies | null | null | null | null | math.NA cs.GR | null | We present an accurate Lagrangian method based on vortex particles,
level-sets, and immersed boundary methods, for animating the interplay between
two fluids and rigid solids. We show that a vortex method is a good choice for
simulating bi-phase flow, such as liquid and gas, with a good level of realism.
Vortex particles are localized at the interfaces between the two fluids and
within the regions of high turbulence. We gain local precision and efficiency
from the stable advection permitted by the vorticity formulation. Moreover, our
numerical method straightforwardly solves the two-way coupling problem between
the fluids and animated rigid solids. This new approach is validated through
numerical comparisons with reference experiments from the computational fluid
community. We also show that the visually appealing results obtained in the CG
community can be reproduced with increased efficiency and an easier
implementation.
| [
{
"version": "v1",
"created": "Mon, 24 Jul 2006 12:25:59 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Coquerelle",
"Mathieu",
"",
"LMC - Imag, Gravir - Imag"
],
[
"Allard",
"Jérémie",
"",
"GRAVIR - Imag"
],
[
"Cottet",
"Georges-Henri",
"",
"LMC - Imag"
],
[
"Cani",
"Marie-Paule",
"",
"GRAVIR\n - Imag"
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
math/0607648 | Lek-Heng Lim | Lek-Heng Lim | Singular Values and Eigenvalues of Tensors: A Variational Approach | null | Proceedings of the IEEE International Workshop on Computational
Advances in Multi-Sensor Adaptive Processing (CAMSAP '05), Vol. 1 (2005), pp.
129--132 | null | SCCM Technical Report 05-10 | math.SP cs.IR cs.NA math.NA math.OC | null | We propose a theory of eigenvalues, eigenvectors, singular values, and
singular vectors for tensors based on a constrained variational approach much
like the Rayleigh quotient for symmetric matrix eigenvalues. These notions are
particularly useful in generalizing certain areas where the spectral theory of
matrices has traditionally played an important role. For illustration, we will
discuss a multilinear generalization of the Perron-Frobenius theorem.
| [
{
"version": "v1",
"created": "Wed, 26 Jul 2006 03:07:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Lim",
"Lek-Heng",
""
]
] | [
{
"class": "Mathematics",
"code": "math.SP",
"description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices",
"span": "(Spectral Theory)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
math/0608116 | Frederic Dambreville | Frederic Dambreville (DGA/CEP/GIP/SRO) | Conflict Free Rule for Combining Evidences | Submitted to DSmT book Vol. 2, F. Smarandache and J. Dezert editors | null | null | null | math.LO cs.LO math.ST stat.TH | null | Recent works have investigated the problem of the conflict redistribution in
the fusion rules of evidence theories. As a consequence of these works, many
new rules have been proposed. Now, there is not a clear theoretical criterion
for a choice of a rule instead another. The present chapter proposes a new
theoretically grounded rule, based on a new concept of sensor independence.
This new rule avoids the conflict redistribution, by an adaptive combination of
the beliefs. Both the logical grounds and the algorithmic implementation are
considered.
| [
{
"version": "v1",
"created": "Fri, 4 Aug 2006 04:53:24 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Dambreville",
"Frederic",
"",
"DGA/CEP/GIP/SRO"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0608210 | Henrik B\"a\"arnhielm | Henrik B\"a\"arnhielm | Recognising the Suzuki groups in their natural representations | null | J. Algebra 300 (1), 171-198, 2006 | 10.1016/j.jalgebra.2006.02.010 | null | math.GR cs.DS | null | Under the assumption of a certain conjecture, for which there exists strong
experimental evidence, we produce an efficient algorithm for constructive
membership testing in the Suzuki groups Sz(q), where q = 2^{2m + 1} for some m
> 0, in their natural representations of degree 4. It is a Las Vegas algorithm
with running time O{log(q)} field operations, and a preprocessing step with
running time O{log(q) loglog(q)} field operations. The latter step needs an
oracle for the discrete logarithm problem in GF(q).
We also produce a recognition algorithm for Sz(q) = <X>. This is a Las Vegas
algorithm with running time O{|X|^2} field operations.
Finally, we give a Las Vegas algorithm that, given <X>^h = Sz(q) for some h
in GL(4, q), finds some g such that <X>^g = Sz(q). The running time is O{log(q)
loglog(q) + |X|} field operations.
Implementations of the algorithms are available for the computer system
MAGMA.
| [
{
"version": "v1",
"created": "Wed, 9 Aug 2006 02:43:35 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Bäärnhielm",
"Henrik",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0608522 | Matthias Hein | Matthias Hein, Jean-Yves Audibert and Ulrike von Luxburg | Graph Laplacians and their convergence on random neighborhood graphs | Improved presentation, typos corrected, to appear in JMLR | null | null | null | math.ST cs.LG stat.TH | null | Given a sample from a probability measure with support on a submanifold in
Euclidean space one can construct a neighborhood graph which can be seen as an
approximation of the submanifold. The graph Laplacian of such a graph is used
in several machine learning methods like semi-supervised learning,
dimensionality reduction and clustering. In this paper we determine the
pointwise limit of three different graph Laplacians used in the literature as
the sample size increases and the neighborhood size approaches zero. We show
that for a uniform measure on the submanifold all graph Laplacians have the
same limit up to constants. However in the case of a non-uniform measure on the
submanifold only the so called random walk graph Laplacian converges to the
weighted Laplace-Beltrami operator.
| [
{
"version": "v1",
"created": "Mon, 21 Aug 2006 18:35:42 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jun 2007 08:23:07 GMT"
}
] | 2007-06-27T00:00:00 | [
[
"Hein",
"Matthias",
""
],
[
"Audibert",
"Jean-Yves",
""
],
[
"von Luxburg",
"Ulrike",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0608556 | Martin Wainwright | XuanLong Nguyen, Martin J. Wainwright, Michael I. Jordan | On optimal quantization rules for some problems in sequential
decentralized detection | Published as IEEE Transactions on Information Theory, Vol. 54(7),
3285-3295, 2008 | null | 10.1109/TIT.2008.924647 | null | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the design of systems for sequential decentralized detection, a
problem that entails several interdependent choices: the choice of a stopping
rule (specifying the sample size), a global decision function (a choice between
two competing hypotheses), and a set of quantization rules (the local decisions
on the basis of which the global decision is made). This paper addresses an
open problem of whether in the Bayesian formulation of sequential decentralized
detection, optimal local decision functions can be found within the class of
stationary rules. We develop an asymptotic approximation to the optimal cost of
stationary quantization rules and exploit this approximation to show that
stationary quantizers are not optimal in a broad class of settings. We also
consider the class of blockwise stationary quantizers, and show that
asymptotically optimal quantizers are likelihood-based threshold rules.
| [
{
"version": "v1",
"created": "Tue, 22 Aug 2006 19:44:40 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Nov 2008 22:11:11 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Nguyen",
"XuanLong",
""
],
[
"Wainwright",
"Martin J.",
""
],
[
"Jordan",
"Michael I.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0608571 | Reinhard Muskens | Reinhard Muskens | Intensional Models for the Theory of Types | 25 pages | null | null | null | math.LO cs.AI | null | In this paper we define intensional models for the classical theory of types,
thus arriving at an intensional type logic ITL. Intensional models generalize
Henkin's general models and have a natural definition. As a class they do not
validate the axiom of Extensionality. We give a cut-free sequent calculus for
type theory and show completeness of this calculus with respect to the class of
intensional models via a model existence theorem. After this we turn our
attention to applications. Firstly, it is argued that, since ITL is truly
intensional, it can be used to model ascriptions of propositional attitude
without predicting logical omniscience. In order to illustrate this a small
fragment of English is defined and provided with an ITL semantics. Secondly, it
is shown that ITL models contain certain objects that can be identified with
possible worlds. Essential elements of modal logic become available within
classical type theory once the axiom of Extensionality is given up.
| [
{
"version": "v1",
"created": "Wed, 23 Aug 2006 10:33:20 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Muskens",
"Reinhard",
""
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
math/0608603 | Wolfgang Steiner | Lubomira Balkova, Edita Pelantova, Wolfgang Steiner (LIAFA) | Sequences with constant number of return words | null | null | null | null | math.CO cs.DM | null | An infinite word has the property $R_m$ if every factor has exactly $m$
return words. Vuillon showed that $R_2$ characterizes Sturmian words. We prove
that a word satisfies $R_m$ if its complexity function is $(m-1)n+1$ and if it
contains no weak bispecial factor. These conditions are necessary for $m=3$,
whereas for $m=4$ the complexity function need not be $3n+1$. New examples of
words satisfying $R_m$ are given by words related to digital expansions in real
bases.
| [
{
"version": "v1",
"created": "Thu, 24 Aug 2006 10:09:32 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Sep 2006 13:52:37 GMT"
},
{
"version": "v3",
"created": "Fri, 27 Apr 2007 19:18:12 GMT"
},
{
"version": "v4",
"created": "Thu, 27 Sep 2007 11:20:29 GMT"
}
] | 2007-09-27T00:00:00 | [
[
"Balkova",
"Lubomira",
"",
"LIAFA"
],
[
"Pelantova",
"Edita",
"",
"LIAFA"
],
[
"Steiner",
"Wolfgang",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0608713 | Gilles Blanchard | Gilles Blanchard (FHG FIRST.IDA), Fran\c{c}ois Fleuret (EPFL -- CVLAB) | Occam's hammer: a link between randomized learning and multiple testing
FDR control | 13 pages -- conference communication type format | null | null | null | math.ST cs.LG stat.TH | null | We establish a generic theoretical tool to construct probabilistic bounds for
algorithms where the output is a subset of objects from an initial pool of
candidates (or more generally, a probability distribution on said pool). This
general device, dubbed "Occam's hammer'', acts as a meta layer when a
probabilistic bound is already known on the objects of the pool taken
individually, and aims at controlling the proportion of the objects in the set
output not satisfying their individual bound. In this regard, it can be seen as
a non-trivial generalization of the "union bound with a prior'' ("Occam's
razor''), a familiar tool in learning theory. We give applications of this
principle to randomized classifiers (providing an interesting alternative
approach to PAC-Bayes bounds) and multiple testing (where it allows to retrieve
exactly and extend the so-called Benjamini-Yekutieli testing procedure).
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 12:35:53 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Blanchard",
"Gilles",
"",
"FHG FIRST.IDA"
],
[
"Fleuret",
"François",
"",
"EPFL -- CVLAB"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0608733 | Peter Bubenik | Peter Bubenik | Context for models of concurrency | 18 pages, to appear in Electronic Notes in Theoretical Computer
Science, preliminary version in Proceedings of the Workshop on Geometry and
Topology in Concurrency and Distributed Computing, BRICS Notes NS-04-2,
pp.33-49 | Electron. Notes Theor. Comput. Sci. 230 (2009) 3-21 | 10.1016/j.entcs.2009.02.014 | null | math.AT cs.DC | null | Many categories have been used to model concurrency. Using any of these, the
challenge is to reduce a given model to a smaller representation which
nevertheless preserves the relevant computer-scientific information. That is,
one wants to replace a given model with a simpler model with the same directed
homotopy-type. Unfortunately, the obvious definition of directed homotopy
equivalence is too coarse. This paper introduces the notion of context to
refine this definition.
| [
{
"version": "v1",
"created": "Tue, 29 Aug 2006 20:18:44 GMT"
}
] | 2009-04-27T00:00:00 | [
[
"Bubenik",
"Peter",
""
]
] | [
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
math/0608789 | Branko Malesevic | Branko J. Malesevic | One method for proving inequalities by computer | Accepted in Journal of Inequalities and Applications | null | null | null | math.CA cs.GR cs.MS cs.NA math.GM math.NA | null | In this article we consider a method for proving a class of analytical
inequalities via minimax rational approximations. All numerical calculations in
this paper are given by Maple computer program.
| [
{
"version": "v1",
"created": "Thu, 31 Aug 2006 14:59:20 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Sep 2006 15:08:57 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Oct 2006 19:30:42 GMT"
},
{
"version": "v4",
"created": "Tue, 10 Oct 2006 14:16:17 GMT"
},
{
"version": "v5",
"created": "Wed, 1 Nov 2006 15:17:41 GMT"
},
{
"version": "v6",
"created": "Sun, 5 Nov 2006 15:17:19 GMT"
},
{
"version": "v7",
"created": "Sat, 11 Nov 2006 16:25:24 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Malesevic",
"Branko J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.GM",
"description": "Mathematical material of general interest, topics not covered elsewhere",
"span": "(General Mathematics)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
math/0609360 | Eberhard H.-A. Gerbracht | Eberhard H.-A. Gerbracht | Minimal Polynomials for the Coordinates of the Harborth Graph | v1: documentclass amsart, 16 pages, 4 figures. v2: same as v1, but
now has 18 pages, with a final section ("Coda") on the consequences to the
structure of the Harborth graph and some references added; some typos
corrected. v3: minor change to the introduction (re: history of the Harborth
Graph); one reference added; some more typos corrected | null | null | null | math.CO cs.SC | null | The Harborth graph is the smallest known example of a 4-regular planar
unit-distance graph. In this paper we give an analytical description of the
coordinates of its vertices for a particular embedding in the Euclidean plane.
More precisely, we show, how to calculate the minimal polynomials of the
coordinates of its vertices (with the help of a computer algebra system), and
list those. Furthermore some algebraic properties of these polynomials, and
consequences to the structure of the Harborth graph are determined.
| [
{
"version": "v1",
"created": "Wed, 13 Sep 2006 17:27:55 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Oct 2006 18:18:11 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Jan 2007 11:07:39 GMT"
}
] | 2007-09-20T00:00:00 | [
[
"Gerbracht",
"Eberhard H. -A.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
math/0609461 | Frederic Dambreville | Frederic Dambreville (DGA/CTA/DT/GIP) | Cross-Entropy method: convergence issues for extended implementation | Paper written for the workshop "Rare Event SIMulation 2006", Bamberg,
Germany | null | null | null | math.OC cs.LG cs.NE math.ST stat.TH | null | The cross-entropy method (CE) developed by R. Rubinstein is an elegant
practical principle for simulating rare events. The method approximates the
probability of the rare event by means of a family of probabilistic models. The
method has been extended to optimization, by considering an optimal event as a
rare event. CE works rather good when dealing with deterministic function
optimization. Now, it appears that two conditions are needed for a good
convergence of the method. First, it is necessary to have a family of models
sufficiently flexible for discriminating the optimal events. Indirectly, it
appears also that the function to be optimized should be deterministic. The
purpose of this paper is to consider the case of partially discriminating model
family, and of stochastic functions. It will be shown on simple examples that
the CE could fail when relaxing these hypotheses. Alternative improvements of
the CE method are investigated and compared on random examples in order to
handle this issue.
| [
{
"version": "v1",
"created": "Sat, 16 Sep 2006 07:00:36 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Dambreville",
"Frederic",
"",
"DGA/CTA/DT/GIP"
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0609562 | David Joyner | David Joyner | On quadratic residue codes and hyperelliptic curves | 18 pages, no figures | null | null | null | math.CO cs.IT math.AG math.IT math.NT | null | A long standing problem has been to develop "good" binary linear codes to be
used for error-correction. This paper investigates in some detail an attack on
this problem using a connection between quadratic residue codes and
hyperelliptic curves. One question which coding theory is used to attack is:
Does there exist a c<2 such that, for all sufficiently large $p$ and all
subsets S of GF(p), we have |X_S(GF(p))| < cp?
| [
{
"version": "v1",
"created": "Wed, 20 Sep 2006 14:12:12 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Feb 2008 13:56:18 GMT"
}
] | 2008-02-21T00:00:00 | [
[
"Joyner",
"David",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
math/0610067 | Narad Rampersad | Narad Rampersad | On the context-freeness of the set of words containing overlaps | 8 pages | null | null | null | math.CO cs.FL | null | We show that the set of binary words containing overlaps is not unambiguously
context-free and that the set of ternary words containing overlaps is not
context-free. We also show that the set of binary words that are not subwords
of the Thue-Morse word is not unambiguously context-free.
| [
{
"version": "v1",
"created": "Mon, 2 Oct 2006 18:12:59 GMT"
}
] | 2009-03-29T00:00:00 | [
[
"Rampersad",
"Narad",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
math/0610121 | Kamal Khuri-Makdisi | Fatima K. Abu Salem (Computer Science Department, American University
of Beirut) and Kamal Khuri-Makdisi (Center for Advanced Mathematical
Sciences, American University of Beirut) | Fast Jacobian group operations for C_{3,4} curves over a large finite
field | 25 pages, identical to version 2 except for a remark about the
published version of the article, which includes Magma code for the
algorithms | LMS J. Comput. Math. 10 (2007) 307-328, may be downloaded from
http://www.lms.ac.uk/jcm/10/lms2006-049/ | null | null | math.NT cs.SC math.AG | null | Let C be an arbitrary smooth algebraic curve of genus g over a large finite
field K. We revisit fast addition algorithms in the Jacobian of C due to
Khuri-Makdisi (math.NT/0409209, to appear in Math. Comp.). The algorithms,
which reduce to linear algebra in vector spaces of dimension O(g) once |K| >>
g, and which asymptotically require O(g^{2.376}) field operations using fast
linear algebra, are shown to perform efficiently even for certain low genus
curves. Specifically, we provide explicit formulae for performing the group law
on Jacobians of C_{3,4} curves of genus 3. We show that, typically, the
addition of two distinct elements in the Jacobian of a C_{3,4} curve requires
117 multiplications and 2 inversions in K, and an element can be doubled using
129 multiplications and 2 inversions in K. This represents an improvement of
approximately 20% over previous methods.
| [
{
"version": "v1",
"created": "Tue, 3 Oct 2006 16:13:39 GMT"
},
{
"version": "v2",
"created": "Mon, 28 May 2007 13:25:06 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Aug 2007 11:46:49 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Salem",
"Fatima K. Abu",
"",
"Computer Science Department, American University\n of Beirut"
],
[
"Khuri-Makdisi",
"Kamal",
"",
"Center for Advanced Mathematical\n Sciences, American University of Beirut"
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0610184 | Savas Dayanik | Erhan Bayraktar, Savas Dayanik, Ioannis Karatzas | Adaptive Poisson disorder problem | Published at http://dx.doi.org/10.1214/105051606000000312 in the
Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute
of Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2006, Vol. 16, No. 3, 1190-1261 | 10.1214/105051606000000312 | IMS-AAP-AAP0171 | math.PR cs.IT math.IT math.ST stat.TH | null | We study the quickest detection problem of a sudden change in the arrival
rate of a Poisson process from a known value to an unknown and unobservable
value at an unknown and unobservable disorder time. Our objective is to design
an alarm time which is adapted to the history of the arrival process and
detects the disorder time as soon as possible. In previous solvable versions of
the Poisson disorder problem, the arrival rate after the disorder has been
assumed a known constant. In reality, however, we may at most have some prior
information about the likely values of the new arrival rate before the disorder
actually happens, and insufficient estimates of the new rate after the disorder
happens. Consequently, we assume in this paper that the new arrival rate after
the disorder is a random variable. The detection problem is shown to admit a
finite-dimensional Markovian sufficient statistic, if the new rate has a
discrete distribution with finitely many atoms. Furthermore, the detection
problem is cast as a discounted optimal stopping problem with running cost for
a finite-dimensional piecewise-deterministic Markov process. This optimal
stopping problem is studied in detail in the special case where the new arrival
rate has Bernoulli distribution. This is a nontrivial optimal stopping problem
for a two-dimensional piecewise-deterministic Markov process driven by the same
point process. Using a suitable single-jump operator, we solve it fully,
describe the analytic properties of the value function and the stopping region,
and present methods for their numerical calculation. We provide a concrete
example where the value function does not satisfy the smooth-fit principle on a
proper subset of the connected, continuously differentiable optimal stopping
boundary, whereas it does on the complement of this set.
| [
{
"version": "v1",
"created": "Thu, 5 Oct 2006 13:45:48 GMT"
}
] | 2007-08-03T00:00:00 | [
[
"Bayraktar",
"Erhan",
""
],
[
"Dayanik",
"Savas",
""
],
[
"Karatzas",
"Ioannis",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0610680 | Mathew D. Penrose | T. Schreiber, Mathew D. Penrose and J. E. Yukich | Gaussian limits for multidimensional random sequential packing at
saturation (extended version) | 31 pages | null | 10.1007/s00220-007-0218-2 | null | math.PR cs.OH | null | Consider the random sequential packing model with infinite input and in any
dimension. When the input consists of non-zero volume convex solids we show
that the total number of solids accepted over cubes of volume $\lambda$ is
asymptotically normal as $\lambda \to \infty$. We provide a rate of
approximation to the normal and show that the finite dimensional distributions
of the packing measures converge to those of a mean zero generalized Gaussian
field. The method of proof involves showing that the collection of accepted
solids satisfies the weak spatial dependence condition known as stabilization.
| [
{
"version": "v1",
"created": "Mon, 23 Oct 2006 19:50:59 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Oct 2006 20:32:26 GMT"
}
] | 2015-06-26T00:00:00 | [
[
"Schreiber",
"T.",
""
],
[
"Penrose",
"Mathew D.",
""
],
[
"Yukich",
"J. E.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
math/0611194 | Jean-Francois Marckert | Yvan Le Borgne (LaBRI), Jean-Fran\c{c}ois Marckert (LaBRI) | Directed animals in the gas | null | null | null | null | math.PR cs.DM | null | In this paper, we revisit the enumeration of directed animals using gas
models. We show that there exists a natural construction of random directed
animals on any directed graph together with a particle system that explains at
the level of objects the formal link known between the density of the gas model
and the generating function of directed animals counted according to the area.
This provides some new methods to compute the generating function of directed
animals counted according to area, and leads in the particular case of the
square lattice to new combinatorial results and questions. A model of gas
related to directed animals counted according to area and perimeter on any
directed graph is also exhibited.
| [
{
"version": "v1",
"created": "Tue, 7 Nov 2006 15:56:57 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Borgne",
"Yvan Le",
"",
"LaBRI"
],
[
"Marckert",
"Jean-François",
"",
"LaBRI"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0611422 | Marie Cottrell | Marie Cottrell (MATISSE, Samos), Sma\"Il Ibbou (MATISSE, Samos),
Patrick Letr\'emy (MATISSE, Samos), Patrick Rousset (CEREQ) | Cartes auto-organis\'{e}es pour l'analyse exploratoire de donn\'{e}es et
la visualisation | Article de synth\`{e}se sur les applications de l'algorithme de
Kohonen pour la visualisation et l'analyse de donn\'{e}es | Journal de la Soci\'{e}t\'{e} Fran\c{c}aise de Statistique 144
n°4 (2003) 67-106 | null | null | math.ST cs.NE nlin.AO stat.TH | null | This paper shows how to use the Kohonen algorithm to represent
multidimensional data, by exploiting the self-organizing property. It is
possible to get such maps as well for quantitative variables as for qualitative
ones, or for a mixing of both. The contents of the paper come from various
works by SAMOS-MATISSE members, in particular by E. de Bodt, B. Girard, P.
Letr\'{e}my, S. Ibbou, P. Rousset. Most of the examples have been studied with
the computation routines written by Patrick Letr\'{e}my, with the language
IML-SAS, which are available on the WEB page http://samos.univ-paris1.fr.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 12:52:21 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Cottrell",
"Marie",
"",
"MATISSE, Samos"
],
[
"Ibbou",
"SmaÏl",
"",
"MATISSE, Samos"
],
[
"Letrémy",
"Patrick",
"",
"MATISSE, Samos"
],
[
"Rousset",
"Patrick",
"",
"CEREQ"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0611433 | Marie Cottrell | Patrick Letr\'emy (SAMOS), Marie Cottrell (SAMOS) | Working times in atypical forms of employment: the special case of
part-time work | Chapitre 5, \`{a} la suite de la conf\'{e}rence ACSEG 2001 \`{a}
Rennes | Connectionist Approaches in Economics and Management Sciences
Kluwer (Ed.) (2003) 111-129 | null | null | math.ST cs.NE stat.TH | null | In the present article, we attempt to devise a typology of forms of part-time
employment by applying a widely used neuronal methodology called Kohonen maps.
Starting out with data that we describe using category-specific variables, we
show how it is possible to represent observations and the modalities of the
variables that define them simultaneously, on a single map. This allows us to
ascertain, and to try to describe, the main categories of part-time employment.
| [
{
"version": "v1",
"created": "Tue, 14 Nov 2006 16:03:38 GMT"
}
] | 2016-08-16T00:00:00 | [
[
"Letrémy",
"Patrick",
"",
"SAMOS"
],
[
"Cottrell",
"Marie",
"",
"SAMOS"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0611666 | Biskup Marek | Noam Berger, Marek Biskup, Christopher E. Hoffman, Gady Kozma | Anomalous heat-kernel decay for random walk among bounded random
conductances | 22 pages. Includes a self-contained proof of isoperimetric inequality
for supercritical percolation clusters. Version to appear in AIHP +
additional corrections | Ann. Inst. H. Poincare Probab. Statist. 274 (2008), no. 2, 374-392 | 10.1214/07-AIHP126 | null | math.PR cs.DM math-ph math.MP | null | We consider the nearest-neighbor simple random walk on $\Z^d$, $d\ge2$,
driven by a field of bounded random conductances $\omega_{xy}\in[0,1]$. The
conductance law is i.i.d. subject to the condition that the probability of
$\omega_{xy}>0$ exceeds the threshold for bond percolation on $\Z^d$. For
environments in which the origin is connected to infinity by bonds with
positive conductances, we study the decay of the $2n$-step return probability
$P_\omega^{2n}(0,0)$. We prove that $P_\omega^{2n}(0,0)$ is bounded by a random
constant times $n^{-d/2}$ in $d=2,3$, while it is $o(n^{-2})$ in $d\ge5$ and
$O(n^{-2}\log n)$ in $d=4$. By producing examples with anomalous heat-kernel
decay approaching $1/n^2$ we prove that the $o(n^{-2})$ bound in $d\ge5$ is the
best possible. We also construct natural $n$-dependent environments that
exhibit the extra $\log n$ factor in $d=4$. See also math.PR/0701248.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 04:06:43 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Feb 2007 06:28:02 GMT"
},
{
"version": "v3",
"created": "Sat, 24 Mar 2007 21:50:47 GMT"
},
{
"version": "v4",
"created": "Tue, 26 Jun 2007 23:19:23 GMT"
}
] | 2009-04-26T00:00:00 | [
[
"Berger",
"Noam",
""
],
[
"Biskup",
"Marek",
""
],
[
"Hoffman",
"Christopher E.",
""
],
[
"Kozma",
"Gady",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
math/0611679 | Dominique Rossin | Dominique Rossin (LIAFA), Mathilde Bouvel (LIAFA) | Longest Common Pattern between two Permutations | null | Algebr. Geom. Topol. 7 (2007) 829-843 | 10.2140/agt.2007.7.829 | null | math.CO cs.DM cs.DS | null | In this paper, we give a polynomial (O(n^8)) algorithm for finding a longest
common pattern between two permutations of size n given that one is separable.
We also give an algorithm for general permutations whose complexity depends on
the length of the longest simple permutation involved in one of our
permutations.
| [
{
"version": "v1",
"created": "Wed, 22 Nov 2006 10:47:05 GMT"
}
] | 2014-10-01T00:00:00 | [
[
"Rossin",
"Dominique",
"",
"LIAFA"
],
[
"Bouvel",
"Mathilde",
"",
"LIAFA"
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0611918 | Boaz Tsaban | Martin Hock and Boaz Tsaban | Solving random equations in Garside groups using length functions | null | null | null | null | math.GR cs.CR math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a systematic exposition of memory-length algorithms for solving
equations in noncommutative groups. This exposition clarifies some points
untouched in earlier expositions. We then focus on the main ingredient in these
attacks: Length functions.
After a self-contained introduction to Garside groups, we describe length
functions induced by the greedy normal form and by the rational normal form in
these groups, and compare their worst-case performances.
Our main concern is Artin's braid groups, with their two known Garside
presentations, due to Artin and due to Birman-Ko-Lee (BKL). We show that in
$B_3$ equipped with the BKL presentation, the (efficiently computable) rational
normal form of each element is a geodesic, i.e., is a representative of minimal
length for that element. (For Artin's presentation of $B_3$, Berger supplied in
1994 a method to obtain geodesic representatives in $B_3$.)
For an arbitrary number of strands, finding the geodesic length of an element
is NP-hard, by a 1991 result of by Paterson and Razborov. We show that a good
estimation of the geodesic length of a braid in Artin's presentation is
measuring the length of its rational form in the \emph{BKL} presentation. This
is proved theoretically for the worst case, and experimental evidence is
provided for the generic case.
| [
{
"version": "v1",
"created": "Wed, 29 Nov 2006 16:34:43 GMT"
},
{
"version": "v2",
"created": "Sun, 20 May 2007 14:08:08 GMT"
},
{
"version": "v3",
"created": "Sun, 12 Oct 2008 22:08:10 GMT"
},
{
"version": "v4",
"created": "Sat, 30 Oct 2010 20:41:46 GMT"
}
] | 2010-11-02T00:00:00 | [
[
"Hock",
"Martin",
""
],
[
"Tsaban",
"Boaz",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
math/0611937 | Karl Schlechta | Karl Schlechta (LIF) | Remarks on Inheritance Systems | null | null | null | null | math.LO cs.AI | null | We try a conceptual analysis of inheritance diagrams, first in abstract
terms, and then compare to "normality" and the "small/big sets" of preferential
and related reasoning. The main ideas are about nodes as truth values and
information sources, truth comparison by paths, accessibility or relevance of
information by paths, relative normality, and prototypical reasoning.
| [
{
"version": "v1",
"created": "Thu, 30 Nov 2006 09:26:12 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Jan 2007 17:58:36 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Mar 2007 14:23:24 GMT"
},
{
"version": "v4",
"created": "Sun, 19 Aug 2007 16:46:45 GMT"
}
] | 2007-08-19T00:00:00 | [
[
"Schlechta",
"Karl",
"",
"LIF"
]
] | [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
math/0612046 | Sebastian Roch | Elchanan Mossel, Sebastien Roch | On the Submodularity of Influence in Social Networks | null | null | null | null | math.PR cs.GT cs.SI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the
spread of influence in social networks. A social network can be represented by
a directed graph where the nodes are individuals and the edges indicate a form
of social relationship. A simple way to model the diffusion of ideas,
innovative behavior, or ``word-of-mouth'' effects on such a graph is to
consider an increasing process of ``infected'' (or active) nodes: each node
becomes infected once an activation function of the set of its infected
neighbors crosses a certain threshold value. Such a model was introduced by KKT
in \cite{KeKlTa:03,KeKlTa:05} where the authors also impose several natural
assumptions: the threshold values are (uniformly) random; and the activation
functions are monotone and submodular. For an initial set of active nodes $S$,
let $\sigma(S)$ denote the expected number of active nodes at termination. Here
we prove a conjecture of KKT: we show that the function $\sigma(S)$ is
submodular under the assumptions above. We prove the same result for the
expected value of any monotone, submodular function of the set of active nodes
at termination.
| [
{
"version": "v1",
"created": "Sat, 2 Dec 2006 07:00:48 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 01:40:04 GMT"
}
] | 2011-09-07T00:00:00 | [
[
"Mossel",
"Elchanan",
""
],
[
"Roch",
"Sebastien",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
}
] |
math/0612083 | Yves Guiraud | Yves Guiraud | Termination orders for 3-dimensional rewriting | 30 pages, 35 figures | Journal of Pure and Applied Algebra, Volume 207, Issue 2, October
2006, Pages 341-371 | 10.1016/j.jpaa.2005.10.011 | null | math.CT cs.LO | null | This paper studies 3-polygraphs as a framework for rewriting on
two-dimensional words. A translation of term rewriting systems into
3-polygraphs with explicit resource management is given, and the respective
computational properties of each system are studied. Finally, a convergent
3-polygraph for the (commutative) theory of Z/2Z-vector spaces is given. In
order to prove these results, it is explained how to craft a class of
termination orders for 3-polygraphs.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 11:32:52 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guiraud",
"Yves",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0612084 | Yves Guiraud | Yves Guiraud | Termination orders for 3-polygraphs | 4 pages, 12 figures | Comptes-Rendus de l'Academie des Sciences Serie I, Volume 342,
Issue 4, 15 February 2006, Pages 219-222 | 10.1016/j.crma.2005.12.019 | null | math.CT cs.LO | null | This note presents the first known class of termination orders for
3-polygraphs, together with an application.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 11:45:08 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guiraud",
"Yves",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0612088 | Yves Guiraud | Yves Guiraud | Two polygraphic presentations of Petri nets | 28 pages, 24 figures | Theoretical Computer Science, Volume 360, Issues 1-3, 21 August
2006, Pages 124-146 | 10.1016/j.tcs.2006.02.015 | null | math.CT cs.LO | null | This document gives an algebraic and two polygraphic translations of Petri
nets, all three providing an easier way to describe reductions and to identify
some of them. The first one sees places as generators of a commutative monoid
and transitions as rewriting rules on it: this setting is totally equivalent to
Petri nets, but lacks any graphical intuition. The second one considers places
as 1-dimensional cells and transitions as 2-dimensional ones: this translation
recovers a graphical meaning but raises many difficulties since it uses
explicit permutations. Finally, the third translation sees places as
degenerated 2-dimensional cells and transitions as 3-dimensional ones: this is
a setting equivalent to Petri nets, equipped with a graphical interpretation.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 12:35:10 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guiraud",
"Yves",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
math/0612089 | Yves Guiraud | Yves Guiraud | The three dimensions of proofs | 38 pages, 50 figures | Annals of Pure and Applied Logic, Volume 141, Issues 1-2, August
2006, Pages 266-295 | 10.1016/j.apal.2005.12.012 | null | math.CT cs.LO math.LO | null | In this document, we study a 3-polygraphic translation for the proofs of SKS,
a formal system for classical propositional logic. We prove that the free
3-category generated by this 3-polygraph describes the proofs of classical
propositional logic modulo structural bureaucracy. We give a 3-dimensional
generalization of Penrose diagrams and use it to provide several pictures of a
proof. We sketch how local transformations of proofs yield a non contrived
example of 4-dimensional rewriting.
| [
{
"version": "v1",
"created": "Mon, 4 Dec 2006 13:03:09 GMT"
}
] | 2007-05-23T00:00:00 | [
[
"Guiraud",
"Yves",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
math/0612264 | Olga Holtz | James Demmel, Ioana Dumitriu, Olga Holtz | Fast linear algebra is stable | 26 pages; final version; to appear in Numerische Mathematik | Numer. Math. 108 (2007), no. 1, 59-91 | 10.1007/s00211-007-0114-x | null | math.NA cs.CC cs.DS | null | In an earlier paper, we showed that a large class of fast recursive matrix
multiplication algorithms is stable in a normwise sense, and that in fact if
multiplication of $n$-by-$n$ matrices can be done by any algorithm in
$O(n^{\omega + \eta})$ operations for any $\eta > 0$, then it can be done
stably in $O(n^{\omega + \eta})$ operations for any $\eta > 0$. Here we extend
this result to show that essentially all standard linear algebra operations,
including LU decomposition, QR decomposition, linear equation solving, matrix
inversion, solving least squares problems, (generalized) eigenvalue problems
and the singular value decomposition can also be done stably (in a normwise
sense) in $O(n^{\omega + \eta})$ operations.
| [
{
"version": "v1",
"created": "Sun, 10 Dec 2006 20:44:57 GMT"
},
{
"version": "v2",
"created": "Tue, 22 May 2007 19:31:20 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Aug 2007 20:15:50 GMT"
}
] | 2011-11-09T00:00:00 | [
[
"Demmel",
"James",
""
],
[
"Dumitriu",
"Ioana",
""
],
[
"Holtz",
"Olga",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
math/0612612 | George Bell | George I. Bell, Daniel S. Hirschberg, Pablo Guerrero-Garcia | The minimum size required of a solitaire army | 22 pages, 12 figures | INTEGERS: Electronic Journal of Combinatorial Number Theory 7
(2007) #G07 | null | null | math.CO cs.DM | null | The solitaire army is a one-person peg jumping game where a player attempts
to advance an "army" of pegs as far as possible into empty territory. The game
was introduced by John Conway and is also known as "Conway's Soldiers". We
consider various generalizations of this game in different 2D geometries, unify
them under a common mathematical framework, and find the minimum size army
capable of advancing a given number of steps.
| [
{
"version": "v1",
"created": "Wed, 20 Dec 2006 17:55:27 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Aug 2007 13:43:51 GMT"
}
] | 2007-08-11T00:00:00 | [
[
"Bell",
"George I.",
""
],
[
"Hirschberg",
"Daniel S.",
""
],
[
"Guerrero-Garcia",
"Pablo",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
math/0612682 | Alexander Olshevsky | Alex Olshevsky, John N. Tsitsiklis | Convergence Speed in Distributed Consensus and Control | null | null | null | null | math.OC cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the convergence speed of distributed iterative algorithms for the
consensus and averaging problems, with emphasis on the latter. We first
consider the case of a fixed communication topology. We show that a simple
adaptation of a consensus algorithm leads to an averaging algorithm. We prove
lower bounds on the worst-case convergence time for various classes of linear,
time-invariant, distributed consensus methods, and provide an algorithm that
essentially matches those lower bounds. We then consider the case of a
time-varying topology, and provide a polynomial-time averaging algorithm.
| [
{
"version": "v1",
"created": "Fri, 22 Dec 2006 06:45:41 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jan 2009 22:01:01 GMT"
}
] | 2011-06-13T00:00:00 | [
[
"Olshevsky",
"Alex",
""
],
[
"Tsitsiklis",
"John N.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
] |
math/0701020 | Branko Malesevic | Bojan D. Banjac, Milica D. Makragic, Branko J. Malesevic | Some notes on a method for proving inequalities by computer | in Results in Mathematics 07/2015 | null | 10.1007/s00025-015-0485-8 | null | math.CA cs.MS math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we consider mathematical fundamentals of one method for
proving inequalities by computer, based on the Remez algorithm. Using the
well-known results of undecidability of the existence of zeros of real
elementary functions, we demonstrate that the considered method generally in
practice becomes one heuristic for the verification of inequalities. We give
some improvements of the inequalities considered in the theorems for which the
existing proofs have been based on the numerical verifications of Remez
algorithm.
| [
{
"version": "v1",
"created": "Sun, 31 Dec 2006 07:16:29 GMT"
},
{
"version": "v10",
"created": "Tue, 28 Oct 2014 17:19:06 GMT"
},
{
"version": "v11",
"created": "Wed, 6 May 2015 17:27:47 GMT"
},
{
"version": "v12",
"created": "Tue, 14 Jul 2015 18:14:12 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Jul 2007 17:26:10 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Dec 2012 19:48:14 GMT"
},
{
"version": "v4",
"created": "Fri, 25 Jan 2013 16:29:02 GMT"
},
{
"version": "v5",
"created": "Mon, 28 Jan 2013 20:59:27 GMT"
},
{
"version": "v6",
"created": "Wed, 15 May 2013 18:09:40 GMT"
},
{
"version": "v7",
"created": "Fri, 17 May 2013 06:48:25 GMT"
},
{
"version": "v8",
"created": "Fri, 29 Nov 2013 17:28:20 GMT"
},
{
"version": "v9",
"created": "Wed, 19 Feb 2014 18:48:06 GMT"
}
] | 2015-07-15T00:00:00 | [
[
"Banjac",
"Bojan D.",
""
],
[
"Makragic",
"Milica D.",
""
],
[
"Malesevic",
"Branko J.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
math/0701102 | Sasha Sodin | Shachar Lovett and Sasha Sodin | Almost Euclidean sections of the N-dimensional cross-polytope using O(N)
random bits | 16 pages; minor changes in the introduction to make it more
accessible to both Math and CS readers | Commun. Contemp. Math. 10 (2008), no. 4, 477--489. | 10.1142/S0219199708002879 | null | math.FA cs.CC math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known that R^N has subspaces of dimension proportional to N on
which the \ell_1 norm is equivalent to the \ell_2 norm; however, no explicit
constructions are known. Extending earlier work by Artstein--Avidan and Milman,
we prove that such a subspace can be generated using O(N) random bits.
| [
{
"version": "v1",
"created": "Wed, 3 Jan 2007 18:25:26 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jan 2007 22:06:56 GMT"
},
{
"version": "v3",
"created": "Mon, 20 Oct 2008 16:57:36 GMT"
}
] | 2009-04-12T00:00:00 | [
[
"Lovett",
"Shachar",
""
],
[
"Sodin",
"Sasha",
""
]
] | [
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
math/0701131 | Holger Rauhut | Holger Rauhut, Karin Schnass, Pierre Vandergheynst | Compressed Sensing and Redundant Dictionaries | error in a constant corrected | IEEE Trans. Inform. Theory, 54(5):2210-2219, 2008 | 10.1109/TIT.2008.920190 | null | math.PR cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article extends the concept of compressed sensing to signals that are
not sparse in an orthonormal basis but rather in a redundant dictionary. It is
shown that a matrix, which is a composition of a random matrix of certain type
and a deterministic dictionary, has small restricted isometry constants. Thus,
signals that are sparse with respect to the dictionary can be recovered via
Basis Pursuit from a small number of random measurements. Further, thresholding
is investigated as recovery algorithm for compressed sensing and conditions are
provided that guarantee reconstruction with high probability. The different
schemes are compared by numerical experiments.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 09:13:40 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Nov 2010 11:15:17 GMT"
}
] | 2010-11-10T00:00:00 | [
[
"Rauhut",
"Holger",
""
],
[
"Schnass",
"Karin",
""
],
[
"Vandergheynst",
"Pierre",
""
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
math/0701142 | Marie Cottrell | Eric De Bodt (ESA, Iag-Fin, Dice), Marie Cottrell (MATISSE, Samos),
Patrick Letr\'emy (MATISSE, Samos), Michel Verleysen (DICE) | On the use of self-organizing maps to accelerate vector quantization | A la suite de la conference ESANN 1999 | Neurocomputing 56 (2004) 187-203 | 10.1016/j.neucom.2003.09.009 | null | math.ST cs.NE stat.TH | null | Self-organizing maps (SOM) are widely used for their topology preservation
property: neighboring input vectors are quantified (or classified) either on
the same location or on neighbor ones on a predefined grid. SOM are also widely
used for their more classical vector quantization property. We show in this
paper that using SOM instead of the more classical Simple Competitive Learning
(SCL) algorithm drastically increases the speed of convergence of the vector
quantization process. This fact is demonstrated through extensive simulations
on artificial and real examples, with specific SOM (fixed and decreasing
neighborhoods) and SCL algorithms.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 15:42:43 GMT"
}
] | 2016-08-14T00:00:00 | [
[
"De Bodt",
"Eric",
"",
"ESA, Iag-Fin, Dice"
],
[
"Cottrell",
"Marie",
"",
"MATISSE, Samos"
],
[
"Letrémy",
"Patrick",
"",
"MATISSE, Samos"
],
[
"Verleysen",
"Michel",
"",
"DICE"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0701144 | Marie Cottrell | Eric De Bodt (ESA, Iag-Fin), Marie Cottrell (SAMOS, Matisse), Michel
Verleysen (DICE) | Statistical tools to assess the reliability of self-organizing maps | A la suite de la conf\'{e}rence ESANN 2000 | Neural Networks 15, 8-9 (2002) 967-978 | null | null | math.ST cs.NE stat.TH | null | Results of neural network learning are always subject to some variability,
due to the sensitivity to initial conditions, to convergence to local minima,
and, sometimes more dramatically, to sampling variability. This paper presents
a set of tools designed to assess the reliability of the results of
Self-Organizing Maps (SOM), i.e. to test on a statistical basis the confidence
we can have on the result of a specific SOM. The tools concern the quantization
error in a SOM, and the neighborhood relations (both at the level of a specific
pair of observations and globally on the map). As a by-product, these measures
also allow to assess the adequacy of the number of units chosen in a map. The
tools may also be used to measure objectively how the SOM are less sensitive to
non-linear optimization problems (local minima, convergence, etc.) than other
neural network models.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 16:04:09 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"De Bodt",
"Eric",
"",
"ESA, Iag-Fin"
],
[
"Cottrell",
"Marie",
"",
"SAMOS, Matisse"
],
[
"Verleysen",
"Michel",
"",
"DICE"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0701145 | Marie Cottrell | Riadh Kallel (MATISSE, Samos), Marie Cottrell (MATISSE, Samos),
Vincent Vigneron (MATISSE, Samos) | Bootstrap for neural model selection | A la suite de la conf\'{e}rence ESANN 2000 | Neurocomputing 48 (2002) 175-183 | 10.1016/S0925-2312(01)00650-6 | null | math.ST cs.NE stat.TH | null | Bootstrap techniques (also called resampling computation techniques) have
introduced new advances in modeling and model evaluation. Using resampling
methods to construct a series of new samples which are based on the original
data set, allows to estimate the stability of the parameters. Properties such
as convergence and asymptotic normality can be checked for any particular
observed data set. In most cases, the statistics computed on the generated data
sets give a good idea of the confidence regions of the estimates. In this
paper, we debate on the contribution of such methods for model selection, in
the case of feedforward neural networks. The method is described and compared
with the leave-one-out resampling method. The effectiveness of the bootstrap
method, versus the leave-one-out methode, is checked through a number of
examples.
| [
{
"version": "v1",
"created": "Thu, 4 Jan 2007 16:18:33 GMT"
}
] | 2007-06-13T00:00:00 | [
[
"Kallel",
"Riadh",
"",
"MATISSE, Samos"
],
[
"Cottrell",
"Marie",
"",
"MATISSE, Samos"
],
[
"Vigneron",
"Vincent",
"",
"MATISSE, Samos"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0701152 | Marie Cottrell | Marie Cottrell (MATISSE, Samos), Patrick Letr\'emy (MATISSE, Samos) | Missing values : processing with the Kohonen algorithm | null | Dans ASMDA 2005 CD-ROM Proceedings - ASMDA 2005, Brest : France
(2005) | null | null | math.ST cs.NE stat.TH | null | The processing of data which contain missing values is a complicated and
always awkward problem, when the data come from real-world contexts. In
applications, we are very often in front of observations for which all the
values are not available, and this can occur for many reasons: typing errors,
fields left unanswered in surveys, etc. Most of the statistical software (as
SAS for example) simply suppresses incomplete observations. It has no practical
consequence when the data are very numerous. But if the number of remaining
data is too small, it can remove all significance to the results. To avoid
suppressing data in that way, it is possible to replace a missing value with
the mean value of the corresponding variable, but this approximation can be
very bad when the variable has a large variance. So it is very worthwhile
seeing that the Kohonen algorithm (as well as the Forgy algorithm) perfectly
deals with data with missing values, without having to estimate them
beforehand. We are particularly interested in the Kohonen algorithm for its
visualization properties.
| [
{
"version": "v1",
"created": "Fri, 5 Jan 2007 06:06:02 GMT"
}
] | 2007-10-04T00:00:00 | [
[
"Cottrell",
"Marie",
"",
"MATISSE, Samos"
],
[
"Letrémy",
"Patrick",
"",
"MATISSE, Samos"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0701261 | Urs Niesen | Urs Niesen, Aslan Tchamkerten | Tracking Stopping Times Through Noisy Observations | 19 pages, 4 figures, to appear in IEEE Transactions on Information
Theory | IEEE Transactions on Information Theory, vol. 55, pp. 422-432,
January 2009 | 10.1109/TIT.2008.2008115 | null | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A novel quickest detection setting is proposed which is a generalization of
the well-known Bayesian change-point detection model. Suppose
\{(X_i,Y_i)\}_{i\geq 1} is a sequence of pairs of random variables, and that S
is a stopping time with respect to \{X_i\}_{i\geq 1}. The problem is to find a
stopping time T with respect to \{Y_i\}_{i\geq 1} that optimally tracks S, in
the sense that T minimizes the expected reaction delay E(T-S)^+, while keeping
the false-alarm probability P(T<S) below a given threshold \alpha \in [0,1].
This problem formulation applies in several areas, such as in communication,
detection, forecasting, and quality control.
Our results relate to the situation where the X_i's and Y_i's take values in
finite alphabets and where S is bounded by some positive integer \kappa. By
using elementary methods based on the analysis of the tree structure of
stopping times, we exhibit an algorithm that computes the optimal average
reaction delays for all \alpha \in [0,1], and constructs the associated optimal
stopping times T. Under certain conditions on \{(X_i,Y_i)\}_{i\geq 1} and S,
the algorithm running time is polynomial in \kappa.
| [
{
"version": "v1",
"created": "Tue, 9 Jan 2007 18:10:42 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Jan 2007 19:58:47 GMT"
},
{
"version": "v3",
"created": "Fri, 8 Jun 2007 16:00:33 GMT"
},
{
"version": "v4",
"created": "Sun, 31 Aug 2008 21:23:01 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Niesen",
"Urs",
""
],
[
"Tchamkerten",
"Aslan",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0701419 | Gilles Stoltz | Gabor Lugosi, Shie Mannor, Gilles Stoltz (DMA) | Strategies for prediction under imperfect monitoring | Journal version of a COLT conference paper | Mathematics of Operations Research (2008) \`a para\^itre | null | null | math.ST cs.LG stat.TH | null | We propose simple randomized strategies for sequential prediction under
imperfect monitoring, that is, when the forecaster does not have access to the
past outcomes but rather to a feedback signal. The proposed strategies are
consistent in the sense that they achieve, asymptotically, the best possible
average reward. It was Rustichini (1999) who first proved the existence of such
consistent predictors. The forecasters presented here offer the first
constructive proof of consistency. Moreover, the proposed algorithms are
computationally efficient. We also establish upper bounds for the rates of
convergence. In the case of deterministic feedback, these rates are optimal up
to logarithmic terms.
| [
{
"version": "v1",
"created": "Mon, 15 Jan 2007 16:45:38 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Apr 2007 18:54:48 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jul 2007 15:44:59 GMT"
},
{
"version": "v4",
"created": "Mon, 7 Jan 2008 14:21:58 GMT"
}
] | 2008-01-07T00:00:00 | [
[
"Lugosi",
"Gabor",
"",
"DMA"
],
[
"Mannor",
"Shie",
"",
"DMA"
],
[
"Stoltz",
"Gilles",
"",
"DMA"
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
math/0701647 | Jean-Luc Marichal | Raymond Bisdorff, Jean-Luc Marichal | Counting non-isomorphic maximal independent sets of the n-cycle graph | Revised version | Journal of Integer Sequences 11 (5) (2008), Article 08.5.7 | null | null | math.CO cs.DM math.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The number of maximal independent sets of the n-cycle graph C_n is known to
be the nth term of the Perrin sequence. The action of the automorphism group of
C_n on the family of these maximal independent sets partitions this family into
disjoint orbits, which represent the non-isomorphic (i.e., defined up to a
rotation and a reflection) maximal independent sets. We provide exact formulas
for the total number of orbits and the number of orbits having a given number
of isomorphic representatives. We also provide exact formulas for the total
number of unlabeled (i.e., defined up to a rotation) maximal independent sets
and the number of unlabeled maximal independent sets having a given number of
isomorphic representatives. It turns out that these formulas involve both
Perrin and Padovan sequences.
| [
{
"version": "v1",
"created": "Tue, 23 Jan 2007 15:37:47 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Dec 2008 13:54:51 GMT"
}
] | 2010-11-19T00:00:00 | [
[
"Bisdorff",
"Raymond",
""
],
[
"Marichal",
"Jean-Luc",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
}
] |
math/0701791 | Boris Ettinger | Boris Ettinger, Niv Sarig, Yosef Yomdin | Linear versus Non-linear Acquisition of Step-Functions | Major revision, added chapters 4, 5. 34 pages, 3 figures | null | null | null | math.CA cs.CV | null | We address in this paper the following two closely related problems:
1. How to represent functions with singularities (up to a prescribed
accuracy) in a compact way?
2. How to reconstruct such functions from a small number of measurements?
The stress is on a comparison of linear and non-linear approaches. As a model
case we use piecewise-constant functions on [0,1], in particular, the Heaviside
jump function. Considered as a curve in the Hilbert space, it is completely
characterized by the fact that any two its disjoint chords are orthogonal. We
reinterpret this fact in a context of step-functions in one or two variables.
Next we study the limitations on representability and reconstruction of
piecewise-constant functions by linear and semi-linear methods. Our main tools
in this problem are Kolmogorov's n-width and entropy, as well as Temlyakov's
(N,m)-width.
On the positive side, we show that a very accurate non-linear reconstruction
is possible. It goes through a solution of certain specific non-linear systems
of algebraic equations. We discuss the form of these systems and methods of
their solution, stressing their relation to Moment Theory and Complex Analysis.
Finally, we informally discuss two problems in Computer Imaging which are
parallel to the problems 1 and 2 above: compression of still images and
video-sequences on one side, and image reconstruction from indirect measurement
(for example, in Computer Tomography), on the other.
| [
{
"version": "v1",
"created": "Sat, 27 Jan 2007 09:26:16 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Nov 2007 04:09:12 GMT"
}
] | 2007-11-01T00:00:00 | [
[
"Ettinger",
"Boris",
""
],
[
"Sarig",
"Niv",
""
],
[
"Yomdin",
"Yosef",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
Subsets and Splits