id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
math/0601624
Jean-Francois Marckert
Jean-Maxime Labarbe (LM-Versailles), Jean-Fran\c{c}ois Marckert (LaBRI)
Asymptotics of Bernoulli random walks, bridges, excursions and meanders with a given number of peaks
null
null
null
null
math.PR cs.DM
null
A Bernoulli random walk is a random trajectory starting from 0 and having i.i.d. increments, each of them being $+1$ or -1, equally likely. The other families cited in the title are Bernoulli random walks under various conditionings. A peak in a trajectory is a local maximum. In this paper, we condition the families of trajectories to have a given number of peaks. We show that, asymptotically, the main effect of setting the number of peaks is to change the order of magnitude of the trajectories. The counting process of the peaks, that encodes the repartition of the peaks in the trajectories, is also studied. It is shown that suitably normalized, it converges to a Brownian bridge which is independent of the limiting trajectory. Applications in terms of plane trees and parallelogram polyominoes are also provided.
[ { "version": "v1", "created": "Wed, 25 Jan 2006 19:46:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Labarbe", "Jean-Maxime", "", "LM-Versailles" ], [ "Marckert", "Jean-François", "", "LaBRI" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0601755
Wieslaw Bajguz
Wieslaw Bajguz
Graph and Union of Graphs Compositions
5 pages
null
null
null
math.CO cs.DM
null
Knopfmacher et all [1] was introduced the graph compositions` notion. In this note we add to these a new construction of tree-like graphs where nodes are graphs themselves. The first examples of these tree-like compositions, a corresponding theorem and resulting conclusions are provided.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 09:56:08 GMT" } ]
2008-02-10T00:00:00
[ [ "Bajguz", "Wieslaw", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0602053
Noson S. Yanofsky
Noson S. Yanofsky
Towards a Definition of an Algorithm
38 pages. Fixed typos. Added Refs
Journal of Logic and Computation 2010;
null
null
math.LO cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define an algorithm to be the set of programs that implement or express that algorithm. The set of all programs is partitioned into equivalence classes. Two programs are equivalent if they are essentially the same program. The set of equivalence classes forms the category of algorithms. Although the set of programs does not even form a category, the set of algorithms form a category with extra structure. The conditions we give that describe when two programs are essentially the same turn out to be coherence relations that enrich the category of algorithms with extra structure. Universal properties of the category of algorithms are proved.
[ { "version": "v1", "created": "Thu, 2 Feb 2006 20:54:04 GMT" }, { "version": "v2", "created": "Sun, 25 Feb 2007 02:07:05 GMT" }, { "version": "v3", "created": "Thu, 10 Jun 2010 20:24:18 GMT" } ]
2010-06-14T00:00:00
[ [ "Yanofsky", "Noson S.", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
math/0602059
Pavel Chebotarev
Rafig Agaev and Pavel Chebotarev
The Matrix of Maximum Out Forests of a Digraph and Its Applications
27 pages, 3 figures
Automation and Remote Control 61 (2000) 1424--1450
null
null
math.CO cs.DS math.AG
null
We study the maximum out forests of a (weighted) digraph and the matrix of maximum out forests. A maximum out forest of a digraph G is a spanning subgraph of G that consists of disjoint diverging trees and has the maximum possible number of arcs. If a digraph contains any out arborescences, then maximum out forests coincide with them. We provide a new proof to the Markov chain tree theorem saying that the matrix of Ces`aro limiting probabilities of an arbitrary stationary finite Markov chain coincides with the normalized matrix of maximum out forests of the weighted digraph that corresponds to the Markov chain. We discuss the applications of the matrix of maximum out forests and its transposition, the matrix of limiting accessibilities of a digraph, to the problems of preference aggregation, measuring the vertex proximity, and uncovering the structure of a digraph.
[ { "version": "v1", "created": "Fri, 3 Feb 2006 13:28:50 GMT" }, { "version": "v2", "created": "Sat, 4 Feb 2006 10:44:31 GMT" } ]
2007-05-23T00:00:00
[ [ "Agaev", "Rafig", "" ], [ "Chebotarev", "Pavel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
math/0602061
Pavel Chebotarev
Rafig Agaev and Pavel Chebotarev
Spanning Forests of a Digraph and Their Applications
24 pages
Automation and Remote Control 62 (2001) No.3 443-466
10.1023/A:1002862312617
null
math.CO cs.DM math.RA
null
We study spanning diverging forests of a digraph and related matrices. It is shown that the normalized matrix of out forests of a digraph coincides with the transition matrix in a specific observation model for Markov chains related to the digraph. Expression are given for the Moore-Penrose generalized inverse and the group inverse of the Kirchhoff (Laplacian) matrix. These expressions involve the matrix of maximum out forest of the digraph. Every matrix of out forests with a fixed number of arcs and the normalized matrix of out forests are represented as polynomials in the Kirchhoff matrix; with the help of these identities new proofs are given for the matrix-forest theorem and some other statements. A connection is specified between the forest dimension of a digraph and the degree of an annihilating polynomial for the Kirchhoff (Laplacian) matrix. Some accessibility measures for digraph vertices are considered. These are based on the enumeration of spanning forests.
[ { "version": "v1", "created": "Fri, 3 Feb 2006 14:50:56 GMT" } ]
2007-05-23T00:00:00
[ [ "Agaev", "Rafig", "" ], [ "Chebotarev", "Pavel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
math/0602070
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
The Matrix-Forest Theorem and Measuring Relations in Small Social Groups
10 pages
Automation and Remote Control 58 (1997) No. 9 1505-1514
null
null
math.CO cs.IR math.AG
null
We propose a family of graph structural indices related to the Matrix-forest theorem. The properties of the basic index that expresses the mutual connectivity of two vertices are studied in detail. The derivative indices that measure "dissociation," "solitariness," and "provinciality" of vertices are also considered. A nonstandard metric on the set of vertices is introduced, which is determined by their connectivity. The application of these indices in sociometry is discussed.
[ { "version": "v1", "created": "Sat, 4 Feb 2006 14:55:27 GMT" } ]
2007-05-23T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
math/0602073
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
On Proximity Measures for Graph Vertices
17 pages, 3 figures
Automation and Remote Control 59 (1998), No. 10, Part 2 1443-1459. Erratum: 60 (1999), No. 2, Part 2 297
null
null
math.CO cs.DS cs.NI math.MG
null
We study the properties of several proximity measures for the vertices of weighted multigraphs and multidigraphs. Unlike the classical distance for the vertices of connected graphs, these proximity measures are applicable to weighted structures and take into account not only the shortest, but also all other connections, which is desirable in many applications. To apply these proximity measures to unweighted structures, every edge should be assigned the same weight which determines the proportion of taking account of two routes, from which one is one edge longer than the other. Among the proximity measures we consider path accessibility, route accessibility, relative forest accessibility along with its components, accessibility via dense forests, and connection reliability. A number of characteristic conditions is introduced and employed to characterize the proximity measures. A topological interpretation is obtained for the Moore-Penrose generalized inverse of the Laplacian matrix of a weighted multigraph.
[ { "version": "v1", "created": "Sun, 5 Feb 2006 15:55:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
math/0602154
Padma Ramanathan
H. Gopalkrishna Gadiyar, K M Sangeeta Maini, R. Padma and Mario Romsy
What is the Inverse of Repeated Square and Multiply Algorithm?
15 pages
Colloq. Math. 116 (2009) 1-14
null
null
math.NT cs.CR
null
It is well known that the repeated square and multiply algorithm is an efficient way of modular exponentiation. The obvious question to ask is if this algorithm has an inverse which would calculate the discrete logarithm efficiently. The technical hitch is in fixing the right sign of the square root and this is the heart of the discrete logarithm problem over finite fields of characteristic not equal to 2. In this paper a couple of probabilistic algorithms to compute the discrete logarithm over finite fields are given by bypassing this difficulty. One of the algorithms was inspired by the famous 3x+1 problem.
[ { "version": "v1", "created": "Wed, 8 Feb 2006 10:01:31 GMT" }, { "version": "v2", "created": "Thu, 1 Mar 2007 10:07:13 GMT" }, { "version": "v3", "created": "Tue, 13 Mar 2007 06:58:21 GMT" } ]
2009-07-02T00:00:00
[ [ "Gadiyar", "H. Gopalkrishna", "" ], [ "Maini", "K M Sangeeta", "" ], [ "Padma", "R.", "" ], [ "Romsy", "Mario", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0602171
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
Preference fusion when the number of alternatives exceeds two: indirect scoring procedures
26 pages, 5 figures One typo fixed
Journal of the Franklin Institute, 336 (1999), No.2, 205-226. Erratum: 336 (1999) No.4, 747-748 (http://dx.doi.org/10.1016/S0016-0032(99)00004-6)
10.1016/S0016-0032(98)00017-9
null
math.OC cs.MA math.CO
null
We consider the problem of aggregation of incomplete preferences represented by arbitrary binary relations or incomplete paired comparison matrices. For a number of indirect scoring procedures we examine whether or not they satisfy the axiom of self-consistent monotonicity. The class of {\em win-loss combining scoring procedures} is introduced which contains a majority of known scoring procedures. Two main results are established. According to the first one, every win-loss combining scoring procedure breaks self-consistent monotonicity. The second result provides a sufficient condition of satisfying self-consistent monotonicity.
[ { "version": "v1", "created": "Wed, 8 Feb 2006 20:23:37 GMT" }, { "version": "v2", "created": "Thu, 9 Feb 2006 05:30:28 GMT" }, { "version": "v3", "created": "Thu, 20 Apr 2006 16:35:36 GMT" } ]
2011-10-11T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0602282
Ayan Mahalanobis
Ayan Mahalanobis
The Diffie-Hellman Key Exchange Protocol and non-abelian nilpotent groups
Finally got accepted. The final version. To appear, Israel Journal of Mathematics
null
null
null
math.GR cs.CR
null
In this paper we study a key exchange protocol similar to Diffie-Hellman key exchange protocol using abelian subgroups of the automorphism group of a non-abelian nilpotent group. We also generalize group no.92 of Hall-Senior table \cite{halltable}, for arbitrary prime $p$ and show that for those groups, the group of central automorphisms commute. We use these for the key exchange we are studying.
[ { "version": "v1", "created": "Mon, 13 Feb 2006 20:06:58 GMT" }, { "version": "v2", "created": "Sun, 19 Mar 2006 21:30:43 GMT" }, { "version": "v3", "created": "Thu, 18 Oct 2007 18:31:14 GMT" } ]
2007-10-18T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0602493
Ewa Graczynska dr habil.
Ewa Graczy\'nska and Dietmar Schweigert
The dimension of a variety
The results of the paper were presented at the workshop AAA71 and CYA21 at B\c{e}dlewo, Poland on February 11, 2006. the paper is submitted to Discussiones Mathematicae Algebra and Stochastc Methods, special issue
published in Discussiones Mathematicae, General Algebra and Applications, 27, 2007, pp. 35--47
null
null
math.LO cs.LO math.GM
null
We invent the notion of a {\it dimension of a variety} $V$ as the cardinality of all its proper {\it derived} subvarieties (of the same type). The dimensions of varieties of lattices, varieties of regular bands and other general algebraic structures are determined.
[ { "version": "v1", "created": "Wed, 22 Feb 2006 12:12:30 GMT" }, { "version": "v2", "created": "Sat, 27 May 2006 10:57:17 GMT" } ]
2016-08-16T00:00:00
[ [ "Graczyńska", "Ewa", "" ], [ "Schweigert", "Dietmar", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
math/0602505
Marcus Hutter
Jan Poland and Marcus Hutter
MDL Convergence Speed for Bernoulli Sequences
28 pages
Statistics and Computing, 16 (2006) pages 161-175
10.1007/s11222-006-6746-3
IDSIA-04-06
math.ST cs.IT cs.LG math.IT math.PR stat.TH
null
The Minimum Description Length principle for online sequence estimation/prediction in a proper learning setup is studied. If the underlying model class is discrete, then the total expected square loss is a particularly interesting performance measure: (a) this quantity is finitely bounded, implying convergence with probability one, and (b) it additionally specifies the convergence speed. For MDL, in general one can only have loss bounds which are finite but exponentially larger than those for Bayes mixtures. We show that this is even the case if the model class contains only Bernoulli distributions. We derive a new upper bound on the prediction error for countable Bernoulli classes. This implies a small bound (comparable to the one for Bayes mixtures) for certain important model classes. We discuss the application to Machine Learning tasks such as classification and hypothesis testing, and generalization to countable classes of i.i.d. models.
[ { "version": "v1", "created": "Wed, 22 Feb 2006 16:29:05 GMT" } ]
2007-07-16T00:00:00
[ [ "Poland", "Jan", "" ], [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0602522
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
Characterizations of scoring methods for preference aggregation
33 pages; with tables and figures
Annals of Operations Research, 1998. V. 80. P.299-332
null
null
math.OC cs.MA math.FA
null
The paper surveys more than forty characterizations of scoring methods for preference aggregation and contains one new result. A general scoring operator is {\it self-consistent} if alternative $i$ is assigned a greater score than $j$ whenever $i$ gets no worse (better) results of comparisons and its `opponents' are assigned respectively greater (no smaller) scores than those of $j$. We prove that self-consistency is satisfied if and only if the application of a scoring operator reduces to the solution of a homogeneous system of algebraic equations with a monotone function on the left-hand side.
[ { "version": "v1", "created": "Thu, 23 Feb 2006 09:23:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" } ]
math/0602552
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
From Incomplete Preferences to Ranking via Optimization
25 pages, 6 figures
A version of this paper was published as: P.Yu.Chebotarev, E.V.Shamis. Constructing an objective function for aggregating incomplete preferences, In: A.Tangian and J.Gruber, eds. Econometric Decision Models: Constructing Scalar-Valued Objective Functions. Lecture Notes in Economics and Mathematical Systems, Springer-Verlag, 1997, P.100-124
null
null
math.OC cs.MA math.CO
null
We consider methods for aggregating preferences that are based on the resolution of discrete optimization problems. The preferences are represented by arbitrary binary relations (possibly weighted) or incomplete paired comparison matrices. This incomplete case remains practically unexplored so far. We examine the properties of several known methods and propose one new method. In particular, we test whether these methods obey a new axiom referred to as {\it Self-Consistent Monotonicity}. Some results are established that characterize solutions of the related optimization problems.
[ { "version": "v1", "created": "Fri, 24 Feb 2006 16:09:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0602573
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
The Forest Metrics for Graph Vertices
14 pages, 19 ref
Electronic Notes in Discrete Mathematics 11 (July 2002) 98-107
10.1016/S1571-0653(04)00058-7
null
math.CO cs.NI math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new graph metric and study its properties. In contrast to the standard distance in connected graphs, it takes into account all paths between vertices. Formally, it is defined as d(i,j)=q_{ii}+q_{jj}-q_{ij}-q_{ji}, where q_{ij} is the (i,j)-entry of the {\em relative forest accessibility matrix} Q(\epsilon)=(I+\epsilon L)^{-1}, L is the Laplacian matrix of the (weighted) (multi)graph, and \epsilon is a positive parameter. By the matrix-forest theorem, the (i,j)-entry of the relative forest accessibility matrix of a graph provides the specific number of spanning rooted forests such that i and j belong to the same tree rooted at i. Extremely simple formulas express the modification of the proposed distance under the basic graph transformations. We give a topological interpretation of d(i,j) in terms of the probability of unsuccessful linking i and j in a model of random links. The properties of this metric are compared with those of some other graph metrics. An application of this metric is related to clustering procedures such as "centered partition." In another procedure, the relative forest accessibility and the corresponding distance serve to choose the centers of the clusters and to assign a cluster to each non-central vertex. The notion of cumulative weight of connections between two vertices is proposed. The reasoning involves a reciprocity principle for weighted multigraphs. Connections between the resistance distance and the forest distance are established.
[ { "version": "v1", "created": "Sat, 25 Feb 2006 13:26:28 GMT" }, { "version": "v2", "created": "Thu, 28 Apr 2011 09:02:04 GMT" } ]
2011-04-29T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
math/0602575
Pavel Chebotarev
Pavel Chebotarev and Elena Shamis
Matrix-Forest Theorems
Unpublished manuscript (1994-1997); 11 pages
null
null
null
math.CO cs.DM math.RA
http://creativecommons.org/licenses/by-nc-nd/4.0/
The Laplacian matrix of a graph $G$ is $L(G)=D(G)-A(G)$, where $A(G)$ is the adjacency matrix and $D(G)$ is the diagonal matrix of vertex degrees. According to the Matrix-Tree Theorem, the number of spanning trees in $G$ is equal to any cofactor of an entry of $L(G)$. A rooted forest is a union of disjoint rooted trees. We consider the matrix $W(G)=I+L(G)$ and prove that the $(i,j)$-cofactor of $W(G)$ is equal to the number of spanning rooted forests of $G$, in which the vertices $i$ and $j$ belong to the same tree rooted at $i$. The determinant of $W(G)$ equals the total number of spanning rooted forests, therefore the $(i,j)$-entry of the matrix $W^{-1}(G)$ can be considered as a measure of relative ''forest-accessibility'' of vertex $i$ from $j$ (or $j$ from $i$). These results follow from somewhat more general theorems we prove, which concern weighted multigraphs. The analogous theorems for (multi)digraphs are also established. These results provide a graph-theoretic interpretation for the adjugate to the Laplacian characteristic matrix.
[ { "version": "v1", "created": "Sat, 25 Feb 2006 15:01:57 GMT" }, { "version": "v2", "created": "Thu, 2 Nov 2023 17:05:30 GMT" } ]
2023-11-03T00:00:00
[ [ "Chebotarev", "Pavel", "" ], [ "Shamis", "Elena", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
math/0603024
Igor Podlubny
Igor Podlubny, Katarina Kassayova
Towards a better list of citation superstars: compiling a multidisciplinary list of highly cited researchers
15 pages, 4 tables
Research Evaluation, vol. 15, no. 3, December 2006, pp. 154-162
null
null
math.ST cs.GL physics.soc-ph stat.TH
null
A new approach to producing multidisciplinary lists of highly cited researchers is described and used for compiling a multidisciplinary list of highly cited researchers. This approach is essentially related to the recently discovered law of the constant ratios (Podlubny, 2004) and gives a better-balanced representation of different scientific fields.
[ { "version": "v1", "created": "Wed, 1 Mar 2006 15:26:33 GMT" }, { "version": "v2", "created": "Thu, 18 May 2006 07:22:53 GMT" } ]
2007-06-13T00:00:00
[ [ "Podlubny", "Igor", "" ], [ "Kassayova", "Katarina", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0603155
Michel Fliess
Michel Fliess (INRIA Futurs, LIX), C\'edric Join (INRIA Futurs, CRAN), Mamadou Mboup (INRIA Futurs), Hebertt Sira-Ramirez
Vers une commande multivariable sans mod\`ele
null
Dans Conf\'erence internationale francophone d'automatique (CIFA 2006) (2006)
null
null
math.OC cs.CE cs.RO physics.class-ph
null
A control strategy without any precise mathematical model is derived for linear or nonlinear systems which are assumed to be finite-dimensional. Two convincing numerical simulations are provided.
[ { "version": "v1", "created": "Tue, 7 Mar 2006 08:15:15 GMT" }, { "version": "v2", "created": "Tue, 18 Dec 2007 21:57:40 GMT" }, { "version": "v3", "created": "Fri, 21 Dec 2007 14:35:40 GMT" } ]
2011-11-09T00:00:00
[ [ "Fliess", "Michel", "", "INRIA Futurs, LIX" ], [ "Join", "Cédric", "", "INRIA Futurs, CRAN" ], [ "Mboup", "Mamadou", "", "INRIA Futurs" ], [ "Sira-Ramirez", "Hebertt", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
math/0603207
Olga Holtz
James Demmel, Ioana Dumitriu, Olga Holtz, Robert Kleinberg
Fast matrix multiplication is stable
19 pages; final version, expanded and updated to reflect referees' remarks; to appear in Numerische Mathematik
Numer. Math. 106 (2007), no. 2, 199-224
10.1007/s00211-007-0061-6
null
math.NA cs.CC cs.DS math.GR
null
We perform forward error analysis for a large class of recursive matrix multiplication algorithms in the spirit of [D. Bini and G. Lotti, Stability of fast algorithms for matrix multiplication, Numer. Math. 36 (1980), 63--72]. As a consequence of our analysis, we show that the exponent of matrix multiplication (the optimal running time) can be achieved by numerically stable algorithms. We also show that new group-theoretic algorithms proposed in [H. Cohn, and C. Umans, A group-theoretic approach to fast matrix multiplication, FOCS 2003, 438--449] and [H. Cohn, R. Kleinberg, B. Szegedy and C. Umans, Group-theoretic algorithms for matrix multiplication, FOCS 2005, 379--388] are all included in the class of algorithms to which our analysis applies, and are therefore numerically stable. We perform detailed error analysis for three specific fast group-theoretic algorithms.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 04:34:36 GMT" }, { "version": "v2", "created": "Thu, 26 Oct 2006 19:21:20 GMT" }, { "version": "v3", "created": "Thu, 7 Dec 2006 18:15:41 GMT" } ]
2007-05-23T00:00:00
[ [ "Demmel", "James", "" ], [ "Dumitriu", "Ioana", "" ], [ "Holtz", "Olga", "" ], [ "Kleinberg", "Robert", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
math/0603248
Saugata Basu
Saugata Basu, Richard Pollack, Marie-Francoise Roy
Computing the First Betti Numberand Describing the Connected Components of Semi-algebraic Sets
null
null
null
null
math.AG cs.SC math.AT
null
In this paper we describe a singly exponential algorithm for computing the first Betti number of a given semi-algebraic set. Singly exponential algorithms for computing the zero-th Betti number, and the Euler-Poincar\'e characteristic, were known before. No singly exponential algorithm was known for computing any of the individual Betti numbers other than the zero-th one. We also give algorithms for obtaining semi-algebraic descriptions of the semi-algebraically connected components of any given real algebraic or semi-algebraic set in single-exponential time improving on previous results.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 20:00:21 GMT" } ]
2007-05-23T00:00:00
[ [ "Basu", "Saugata", "" ], [ "Pollack", "Richard", "" ], [ "Roy", "Marie-Francoise", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" } ]
math/0603256
Saugata Basu
Saugata Basu, Richard Pollack, Marie-Francoise Roy
An asymptotically tight bound on the number of semi-algebraically connected components of realizable sign conditions
19 pages. Bibliography has been updated and a few more references have been added. This is the final version of this paper which will appear in Combinatorica
null
null
null
math.CO cs.CG math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove an asymptotically tight bound (asymptotic with respect to the number of polynomials for fixed degrees and number of variables) on the number of semi-algebraically connected components of the realizations of all realizable sign conditions of a family of real polynomials. More precisely, we prove that the number of semi-algebraically connected components of the realizations of all realizable sign conditions of a family of $s$ polynomials in $\R[X_1,...,X_k]$ whose degrees are at most $d$ is bounded by \[ \frac{(2d)^k}{k!}s^k + O(s^{k-1}). \] This improves the best upper bound known previously which was \[ {1/2}\frac{(8d)^k}{k!}s^k + O(s^{k-1}). \] The new bound matches asymptotically the lower bound obtained for families of polynomials each of which is a product of generic polynomials of degree one.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 18:41:15 GMT" }, { "version": "v2", "created": "Tue, 22 Apr 2008 00:16:09 GMT" }, { "version": "v3", "created": "Tue, 14 Jul 2009 12:50:29 GMT" } ]
2009-07-14T00:00:00
[ [ "Basu", "Saugata", "" ], [ "Pollack", "Richard", "" ], [ "Roy", "Marie-Francoise", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
math/0603262
Saugata Basu
Saugata Basu
Computing the Top Betti Numbers of Semi-algebraic Sets Defined by Quadratic Inequalities in Polynomial Time
Some more details added in Sections 6 and 7
null
10.1007/s10208-005-0208-8
null
math.AG cs.CC math.LO
null
For any $\ell > 0$, we present an algorithm which takes as input a semi-algebraic set, $S$, defined by $P_1 \leq 0,...,P_s \leq 0$, where each $P_i \in \R[X_1,...,X_k]$ has degree $\leq 2,$ and computes the top $\ell$ Betti numbers of $S$, $b_{k-1}(S), ..., b_{k-\ell}(S),$ in polynomial time. The complexity of the algorithm, stated more precisely, is $ \sum_{i=0}^{\ell+2} {s \choose i} k^{2^{O(\min(\ell,s))}}. $ For fixed $\ell$, the complexity of the algorithm can be expressed as $s^{\ell+2} k^{2^{O(\ell)}},$ which is polynomial in the input parameters $s$ and $k$. To our knowledge this is the first polynomial time algorithm for computing non-trivial topological invariants of semi-algebraic sets in $\R^k$ defined by polynomial inequalities, where the number of inequalities is not fixed and the polynomials are allowed to have degree greater than one. For fixed $s$, we obtain by letting $\ell = k$, an algorithm for computing all the Betti numbers of $S$ whose complexity is $k^{2^{O(s)}}$.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 21:22:58 GMT" }, { "version": "v2", "created": "Thu, 1 Feb 2007 15:14:45 GMT" }, { "version": "v3", "created": "Tue, 13 Feb 2007 22:55:49 GMT" }, { "version": "v4", "created": "Thu, 22 Feb 2007 20:54:38 GMT" } ]
2007-05-23T00:00:00
[ [ "Basu", "Saugata", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
math/0603263
Saugata Basu
Saugata Basu
Computing the First Few Betti Numbers of Semi-algebraic Sets in Single Exponential Time
null
null
null
null
math.AG cs.SC
null
In this paper we describe an algorithm that takes as input a description of a semi-algebraic set $S \subset \R^k$, defined by a Boolean formula with atoms of the form $P > 0, P < 0, P=0$ for $P \in {\mathcal P} \subset \R[X_1,...,X_k],$ and outputs the first $\ell+1$ Betti numbers of $S$, $b_0(S),...,b_\ell(S).$ The complexity of the algorithm is $(sd)^{k^{O(\ell)}},$ where where $s = #({\mathcal P})$ and $d = \max_{P\in {\mathcal P}}{\rm deg}(P),$ which is singly exponential in $k$ for $\ell$ any fixed constant. Previously, singly exponential time algorithms were known only for computing the Euler-Poincar\'e characteristic, the zero-th and the first Betti numbers.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 21:32:18 GMT" } ]
2007-05-23T00:00:00
[ [ "Basu", "Saugata", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
math/0603606
P.N. Denisenko
P.N. Denisenko
Lanczos $\tau$-method optimal algorithm in APS for approximating the mathematical functions
10 pages. Based on a talk given at the Workshop on Symbolic Calculations and Exact Methods in Mathematical Physics, Kiev, June 20-26, 2005
null
null
null
math.NA cs.MS math.CA
null
A new procedure is constructed by means of APS in APLAN language. The procedure solves the initial-value problem for linear differential equations of order $k$ with polynomial coefficients and regular singularity in the initialization point in the interval $[a, b]$ and computes the algebraic polynomial $y_n$ of given order $n$. A new algorithm of Lanczos $\tau$-method is built for this procedure, the solution existence $y_n$ of the initial-value problem proved on this algorithm and also is proved the optimality by precision of order $k$ derivative of the initial-value problem solution.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 12:30:11 GMT" } ]
2007-05-23T00:00:00
[ [ "Denisenko", "P. N.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" } ]
math/0603727
Stephen D. Miller
Stephen D. Miller, Ramarathnam Venkatesan
Spectral Analysis of Pollard Rho Collisions
To appear in Proceedings of ANTS VII
null
null
null
math.NT cs.CR cs.DM math.CO
null
We show that the classical Pollard rho algorithm for discrete logarithms produces a collision in expected time O(sqrt(n)(log n)^3). This is the first nontrivial rigorous estimate for the collision probability for the unaltered Pollard rho graph, and is close to the conjectured optimal bound of O(sqrt(n)). The result is derived by showing that the mixing time for the random walk on this graph is O((log n)^3); without the squaring step in the Pollard rho algorithm, the mixing time would be exponential in log n. The technique involves a spectral analysis of directed graphs, which captures the effect of the squaring step.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 12:41:19 GMT" }, { "version": "v2", "created": "Fri, 21 Apr 2006 21:23:54 GMT" } ]
2007-05-23T00:00:00
[ [ "Miller", "Stephen D.", "" ], [ "Venkatesan", "Ramarathnam", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0604226
Hong-Gwa Yeh
Hong-Gwa Yeh
A Dynamic View of Circular Colorings
23 pages
null
null
null
math.CO cs.DC cs.DM
null
The main contributions of this paper are three-fold. First, we use a dynamic approach based on Reiter's pioneering work on Karp-Miller computation graphs to give a new and short proof of Mohar's Minty-type Theorem. Second, we bridge circular colorings and discrete event dynamic systems to show that the Barbosa and Gafni's results on circular chromatic number can be generalized to edge-weighted symmetric directed graphs. Third, we use the above-mentioned dynamic view of circular colorings to construct new improved lower bounds on the circular chromatic number of a graph. We show as an example that the circular chromatic number of the line graph of the Petersen graph can be determined very easily by using these bounds.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 16:02:53 GMT" } ]
2007-05-23T00:00:00
[ [ "Yeh", "Hong-Gwa", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0604233
Philippe Rigollet
Philippe Rigollet (PMA)
Generalization error bounds in semi-supervised classification under the cluster assumption
null
null
null
null
math.ST cs.LG stat.TH
null
We consider semi-supervised classification when part of the available data is unlabeled. These unlabeled data can be useful for the classification problem when we make an assumption relating the behavior of the regression function to that of the marginal distribution. Seeger (2000) proposed the well-known "cluster assumption" as a reasonable one. We propose a mathematical formulation of this assumption and a method based on density level sets estimation that takes advantage of it to achieve fast rates of convergence both in the number of unlabeled examples and the number of labeled examples.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 05:41:15 GMT" } ]
2007-06-13T00:00:00
[ [ "Rigollet", "Philippe", "", "PMA" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0604331
Jean-Francois Marckert
Ali Akhavi (LIAFA), Jean-Fran\c{c}ois Marckert (LaBRI), Alain Rouault (LM-Versailles)
On the reduction of a random basis
null
null
null
null
math.PR cs.DS
null
For $g < n$, let $b\_1,...,b\_{n-g}$ be $n - g$ independent vectors in $\mathbb{R}^n$ with a common distribution invariant by rotation. Considering these vectors as a basis for the Euclidean lattice they generate, the aim of this paper is to provide asymptotic results when $n\to +\infty$ concerning the property that such a random basis is reduced in the sense of {\sc Lenstra, Lenstra & Lov\'asz}. The proof passes by the study of the process $(r\_{g+1}^{(n)},r\_{g+2}^{(n)},...,r\_{n-1}^{(n)})$ where $r\_j^{(n)}$ is the ratio of lengths of two consecutive vectors $b^*\_{n-j+1}$ and $b^*\_{n-j}$ built from $(b\_1,...,b\_{n-g})$ by the Gram--Schmidt orthogonalization procedure, which we believe to be interesting in its own. We show that, as $n\to+\infty$, the process $(r\_j^{(n)}-1)\_j$ tends in distribution in some sense to an explicit process $({\mathcal R}\_j -1)\_j$; some properties of this latter are provided.
[ { "version": "v1", "created": "Fri, 14 Apr 2006 07:57:50 GMT" } ]
2007-05-23T00:00:00
[ [ "Akhavi", "Ali", "", "LIAFA" ], [ "Marckert", "Jean-François", "", "LaBRI" ], [ "Rouault", "Alain", "", "LM-Versailles" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0604366
Sebastian Roch
Christian Borgs, Jennifer Chayes, Elchanan Mossel, Sebastien Roch
The Kesten-Stigum Reconstruction Bound Is Tight for Roughly Symmetric Binary Channels
null
null
null
null
math.PR cs.CC q-bio.PE
null
We establish the exact threshold for the reconstruction problem for a binary asymmetric channel on the b-ary tree, provided that the asymmetry is sufficiently small. This is the first exact reconstruction threshold obtained in roughly a decade. We discuss the implications of our result for Glauber dynamics, phylogenetic reconstruction, and so-called ``replica symmetry breaking'' in spin glasses and random satisfiability problems.
[ { "version": "v1", "created": "Mon, 17 Apr 2006 10:59:09 GMT" } ]
2011-09-07T00:00:00
[ [ "Borgs", "Christian", "" ], [ "Chayes", "Jennifer", "" ], [ "Mossel", "Elchanan", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
math/0604367
Sebastian Roch
Shankar Bhamidi, Ram Rajagopal, Sebastien Roch
Network Delay Inference from Additive Metrics
null
null
null
null
math.PR cs.DS cs.NI math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate the use of computational phylogenetic techniques to solve a central problem in inferential network monitoring. More precisely, we design a novel algorithm for multicast-based delay inference, i.e. the problem of reconstructing the topology and delay characteristics of a network from end-to-end delay measurements on network paths. Our inference algorithm is based on additive metric techniques widely used in phylogenetics. It runs in polynomial time and requires a sample of size only $\poly(\log n)$.
[ { "version": "v1", "created": "Mon, 17 Apr 2006 11:12:31 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 01:20:14 GMT" } ]
2011-09-07T00:00:00
[ [ "Bhamidi", "Shankar", "" ], [ "Rajagopal", "Ram", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0604371
Michael Yampolsky
Mark Braverman, Michael Yampolsky
Constructing Non-Computable Julia Sets
null
null
null
null
math.DS cs.CC
null
We completely characterize the conformal radii of Siegel disks in the family $$P_\theta(z)=e^{2\pi i\theta}z+z^2,$$ corresponding to {\bf computable} parameters $\theta$. As a consequence, we constructively produce quadratic polynomials with {\bf non-computable} Julia sets.
[ { "version": "v1", "created": "Mon, 17 Apr 2006 18:16:05 GMT" } ]
2007-05-23T00:00:00
[ [ "Braverman", "Mark", "" ], [ "Yampolsky", "Michael", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0604584
Benjamin Burton
Benjamin A. Burton
Enumeration of non-orientable 3-manifolds using face pairing graphs and union-find
37 pages, 34 figures
Discrete and Computational Geometry 38 (2007), no. 3, 527-571
10.1007/s00454-007-1307-x
null
math.GT cs.CG math.CO
null
Drawing together techniques from combinatorics and computer science, we improve the census algorithm for enumerating closed minimal P^2-irreducible 3-manifold triangulations. In particular, new constraints are proven for face pairing graphs, and pruning techniques are improved using a modification of the union-find algorithm. Using these results we catalogue all 136 closed non-orientable P^2-irreducible 3-manifolds that can be formed from at most ten tetrahedra.
[ { "version": "v1", "created": "Thu, 27 Apr 2006 06:19:44 GMT" } ]
2011-11-29T00:00:00
[ [ "Burton", "Benjamin A.", "" ] ]
[ { "class": "Mathematics", "code": "math.GT", "description": "Manifolds, orbifolds, polyhedra, cell complexes, foliations, geometric structures", "span": "(Geometric Topology)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0604611
M. J. Gagen
Michael J. Gagen and Kae Nemoto
Variational optimization of probability measure spaces resolves the chain store paradox
11 pages, 5 figures. Replaced for minor notational correction
null
null
null
math.OC cond-mat.stat-mech cs.GT
null
In game theory, players have continuous expected payoff functions and can use fixed point theorems to locate equilibria. This optimization method requires that players adopt a particular type of probability measure space. Here, we introduce alternate probability measure spaces altering the dimensionality, continuity, and differentiability properties of what are now the game's expected payoff functionals. Optimizing such functionals requires generalized variational and functional optimization methods to locate novel equilibria. These variational methods can reconcile game theoretic prediction and observed human behaviours, as we illustrate by resolving the chain store paradox. Our generalized optimization analysis has significant implications for economics, artificial intelligence, complex system theory, neurobiology, and biological evolution and development.
[ { "version": "v1", "created": "Thu, 27 Apr 2006 23:59:46 GMT" }, { "version": "v2", "created": "Thu, 11 May 2006 01:18:14 GMT" } ]
2007-05-23T00:00:00
[ [ "Gagen", "Michael J.", "" ], [ "Nemoto", "Kae", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
math/0605232
Francois Rodier
Fran\c{c}ois Rodier (IML)
Borne sur le degr\'e des polyn\^omes presque parfaitement non-lin\'eaires
19 pages
null
null
null
math.AG cs.CR
null
The vectorial Boolean functions are employed in cryptography to build block coding algorithms. An important criterion on these functions is their resistance to the differential cryptanalysis. Nyberg defined the notion of almost perfect non-linearity (APN) to study resistance to the differential attacks. Up to now, the study of functions APN was especially devoted to power functions. Recently, Budaghyan and al. showed that certain quadratic polynomials were APN. Here, we will give a criterion so that a function is not almost perfectly non-linear. H. Janwa showed, by using Weil's bound, that certain cyclic codes could not correct two errors. A. Canteaut showed by using the same method that the functions powers were not APN for a too large value of the exponent. We use Lang and Weil's bound and a result of P. Deligne on the Weil's conjectures (or more exactly improvements given by Ghorpade and Lachaud) about surfaces on finite fields to generalize this result to all the polynomials. We show therefore that a polynomial cannot be APN if its degree is too large.
[ { "version": "v1", "created": "Tue, 9 May 2006 17:08:17 GMT" }, { "version": "v2", "created": "Sat, 1 Mar 2008 08:35:05 GMT" }, { "version": "v3", "created": "Fri, 2 May 2008 19:41:09 GMT" } ]
2008-05-02T00:00:00
[ [ "Rodier", "François", "", "IML" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0605242
Shmuel Onn
Jes\'us A. De Loera, Raymond Hemmecke, Shmuel Onn, Robert Weismantel
N-Fold Integer Programming
null
Discrete Optimization, 5:231--241, 2008
null
null
math.OC cs.CC cs.DM math.CO
null
In this article we study a broad class of integer programming problems in variable dimension. We show that these so-termed {\em n-fold integer programming problems} are polynomial time solvable. Our proof involves two heavy ingredients discovered recently: the equivalence of linear optimization and so-called directed augmentation, and the stabilization of certain Graver bases. We discuss several applications of our algorithm to multiway transportation problems and to packing problems. One important consequence of our results is a polynomial time algorithm for the $d$-dimensional integer transportation problem for long multiway tables. Another interesting application is a new algorithm for the classical cutting stock problem.
[ { "version": "v1", "created": "Tue, 9 May 2006 20:33:41 GMT" } ]
2008-07-24T00:00:00
[ [ "De Loera", "Jesús A.", "" ], [ "Hemmecke", "Raymond", "" ], [ "Onn", "Shmuel", "" ], [ "Weismantel", "Robert", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0605334
Vladimir P. Gerdt
Vladimir P. Gerdt, Yuri A. Blinkov and Vladimir V. Mozzhilkin
Gr\"obner Bases and Generation of Difference Schemes for Partial Differential Equations
Published in SIGMA (Symmetry, Integrability and Geometry: Methods and Applications) at http://www.emis.de/journals/SIGMA/
SIGMA 2 (2006), 051, 26 pages
10.3842/SIGMA.2006.051
null
math.RA cs.NA cs.SC math.NA
null
In this paper we present an algorithmic approach to the generation of fully conservative difference schemes for linear partial differential equations. The approach is based on enlargement of the equations in their integral conservation law form by extra integral relations between unknown functions and their derivatives, and on discretization of the obtained system. The structure of the discrete system depends on numerical approximation methods for the integrals occurring in the enlarged system. As a result of the discretization, a system of linear polynomial difference equations is derived for the unknown functions and their partial derivatives. A difference scheme is constructed by elimination of all the partial derivatives. The elimination can be achieved by selecting a proper elimination ranking and by computing a Gr\"obner basis of the linear difference ideal generated by the polynomials in the discrete system. For these purposes we use the difference form of Janet-like Gr\"obner bases and their implementation in Maple. As illustration of the described methods and algorithms, we construct a number of difference schemes for Burgers and Falkowich-Karman equations and discuss their numerical properties.
[ { "version": "v1", "created": "Fri, 12 May 2006 13:34:41 GMT" } ]
2008-04-24T00:00:00
[ [ "Gerdt", "Vladimir P.", "" ], [ "Blinkov", "Yuri A.", "" ], [ "Mozzhilkin", "Vladimir V.", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
math/0605472
Nicolas Pouyanne
Nicolas Pouyanne (LM-Versailles)
An algebraic approach to Polya processes
null
Annales de l'IHP - Probabilit\'es et Statistiques (2008) Vol. 44, No. 2, 293-323
10.1214/07-AIHP130
null
math.CO cs.DM cs.DS math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
P\'olya processes are natural generalization of P\'olya-Eggenberger urn models. This article presents a new approach of their asymptotic behaviour {\it via} moments, based on the spectral decomposition of a suitable finite difference operator on polynomial functions. Especially, it provides new results for {\it large} processes (a P\'olya process is called {\it small} when 1 is simple eigenvalue of its replacement matrix and when any other eigenvalue has a real part $\leq 1/2$; otherwise, it is called large).
[ { "version": "v1", "created": "Wed, 17 May 2006 11:52:11 GMT" }, { "version": "v2", "created": "Sat, 11 Jul 2009 05:48:42 GMT" } ]
2015-06-26T00:00:00
[ [ "Pouyanne", "Nicolas", "", "LM-Versailles" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
math/0605498
Frederic Dambreville
Frederic Dambreville (DGA/CTA/DT/GIP)
Cross-Entropic Learning of a Machine for the Decision in a Partially Observable Universe
Submitted to EJOR
null
null
null
math.OC cs.AI cs.LG cs.NE cs.RO math.ST stat.TH
null
Revision of the paper previously entitled "Learning a Machine for the Decision in a Partially Observable Markov Universe" In this paper, we are interested in optimal decisions in a partially observable universe. Our approach is to directly approximate an optimal strategic tree depending on the observation. This approximation is made by means of a parameterized probabilistic law. A particular family of hidden Markov models, with input \emph{and} output, is considered as a model of policy. A method for optimizing the parameters of these HMMs is proposed and applied. This optimization is based on the cross-entropic principle for rare events simulation developed by Rubinstein.
[ { "version": "v1", "created": "Thu, 18 May 2006 07:47:58 GMT" } ]
2007-06-13T00:00:00
[ [ "Dambreville", "Frederic", "", "DGA/CTA/DT/GIP" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0605610
Shmuel Onn
Yael Berstein and Shmuel Onn
Nonlinear Bipartite Matching
null
Discrete Optimization, 5:53--65, 2008
null
null
math.OC cs.CC cs.DM math.CO
null
We study the problem of optimizing nonlinear objective functions over bipartite matchings. While the problem is generally intractable, we provide several efficient algorithms for it, including a deterministic algorithm for maximizing convex objectives, approximative algorithms for norm minimization and maximization, and a randomized algorithm for optimizing arbitrary objectives.
[ { "version": "v1", "created": "Tue, 23 May 2006 11:03:05 GMT" } ]
2008-07-24T00:00:00
[ [ "Berstein", "Yael", "" ], [ "Onn", "Shmuel", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0605740
Martin Wainwright
Martin J. Wainwright
Sharp thresholds for high-dimensional and noisy recovery of sparsity
Appeared as Technical Report 708, Department of Statistics, UC Berkeley
null
null
null
math.ST cs.IT math.IT stat.TH
null
The problem of consistently estimating the sparsity pattern of a vector $\betastar \in \real^\mdim$ based on observations contaminated by noise arises in various contexts, including subset selection in regression, structure estimation in graphical models, sparse approximation, and signal denoising. We analyze the behavior of $\ell_1$-constrained quadratic programming (QP), also referred to as the Lasso, for recovering the sparsity pattern. Our main result is to establish a sharp relation between the problem dimension $\mdim$, the number $\spindex$ of non-zero elements in $\betastar$, and the number of observations $\numobs$ that are required for reliable recovery. For a broad class of Gaussian ensembles satisfying mutual incoherence conditions, we establish existence and compute explicit values of thresholds $\ThreshLow$ and $\ThreshUp$ with the following properties: for any $\epsilon > 0$, if $\numobs > 2 (\ThreshUp + \epsilon) \log (\mdim - \spindex) + \spindex + 1$, then the Lasso succeeds in recovering the sparsity pattern with probability converging to one for large problems, whereas for $\numobs < 2 (\ThreshLow - \epsilon) \log (\mdim - \spindex) + \spindex + 1$, then the probability of successful recovery converges to zero. For the special case of the uniform Gaussian ensemble, we show that $\ThreshLow = \ThreshUp = 1$, so that the threshold is sharp and exactly determined.
[ { "version": "v1", "created": "Tue, 30 May 2006 05:49:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0606022
A. Caranti
A. Caranti, F. Dalla Volta, M. Sala, F. Villani
Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis
9 pages - corrected embarrassing typo in the title
null
null
null
math.GR cs.CR
null
We answer a question of Paterson, showing that all block systems for the group generated by the round functions of a key-alternating block cipher are the translates of a linear subspace. Following up remarks of Paterson and Shamir, we exhibit a connection to truncated differential cryptanalysis. We also give a condition that guarantees that the group generated by the round functions of a key-alternating block cipher is primitive. This applies in particular to AES.
[ { "version": "v1", "created": "Thu, 1 Jun 2006 11:30:29 GMT" }, { "version": "v2", "created": "Mon, 12 Jun 2006 12:08:45 GMT" } ]
2007-05-23T00:00:00
[ [ "Caranti", "A.", "" ], [ "Volta", "F. Dalla", "" ], [ "Sala", "M.", "" ], [ "Villani", "F.", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0606122
George Bell
George I. Bell
Diagonal Peg Solitaire
20 pages, 11 figures
INTEGERS: Electronic Journal of Combinatorial Number Theory 7 (2007) #G01
null
null
math.CO cs.DM cs.DS
null
We study the classical game of peg solitaire when diagonal jumps are allowed. We prove that on many boards, one can begin from a full board with one peg missing, and finish with one peg anywhere on the board. We then consider the problem of finding solutions that minimize the number of moves (where a move is one or more jumps by the same peg), and find the shortest solution to the "central game", which begins and ends at the center. In some cases we can prove analytically that our solutions are the shortest possible, in other cases we apply A* or bidirectional search heuristics.
[ { "version": "v1", "created": "Tue, 6 Jun 2006 03:07:27 GMT" }, { "version": "v2", "created": "Thu, 25 Jan 2007 15:53:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Bell", "George I.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0606315
Marcus Hutter
Marcus Hutter
Bayesian Regression of Piecewise Constant Functions
27 pages, 18 figures, 1 table, 3 algorithms
null
null
IDSIA-14-05
math.ST cs.LG math.PR stat.TH
null
We derive an exact and efficient Bayesian regression algorithm for piecewise constant functions of unknown segment number, boundary location, and levels. It works for any noise and segment level prior, e.g. Cauchy which can handle outliers. We derive simple but good estimates for the in-segment variance. We also propose a Bayesian regression curve as a better way of smoothing data without blurring boundaries. The Bayesian approach also allows straightforward determination of the evidence, break probabilities and error estimates, useful for model selection and significance and robustness studies. We discuss the performance on synthetic and real-world examples. Many possible extensions will be discussed.
[ { "version": "v1", "created": "Tue, 13 Jun 2006 17:05:02 GMT" } ]
2007-06-13T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0606643
Rami Kanhouche
Rami Kanhouche (CMLA)
Entropy And Vision
null
null
null
null
math.PR cs.CV cs.DB cs.DM cs.LG math.CO
null
In vector quantization the number of vectors used to construct the codebook is always an undefined problem, there is always a compromise between the number of vectors and the quantity of information lost during the compression. In this text we present a minimum of Entropy principle that gives solution to this compromise and represents an Entropy point of view of signal compression in general. Also we present a new adaptive Object Quantization technique that is the same for the compression and the perception.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 13:03:11 GMT" }, { "version": "v2", "created": "Wed, 28 Jun 2006 06:45:22 GMT" }, { "version": "v3", "created": "Tue, 18 Jul 2006 05:18:07 GMT" } ]
2007-05-23T00:00:00
[ [ "Kanhouche", "Rami", "", "CMLA" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
math/0606734
Alexander Barg
Alexander Barg and Oleg R. Musin
Codes in spherical caps
null
Advances in Mathematics of Communications, vol. 1, no. 1, 2007, 131-149
null
null
math.MG cs.IT math.IT
null
We consider bounds on codes in spherical caps and related problems in geometry and coding theory. An extension of the Delsarte method is presented that relates upper bounds on the size of spherical codes to upper bounds on codes in caps. Several new upper bounds on codes in caps are derived. Applications of these bounds to estimates of the kissing numbers and one-sided kissing numbers are considered. It is proved that the maximum size of codes in spherical caps for large dimensions is determined by the maximum size of spherical codes, so these problems are asymptotically equivalent.
[ { "version": "v1", "created": "Wed, 28 Jun 2006 18:46:56 GMT" }, { "version": "v2", "created": "Wed, 21 Mar 2007 16:51:52 GMT" } ]
2007-07-16T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Musin", "Oleg R.", "" ] ]
[ { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0606771
Ilya Mironov
Ilya Mironov, Anton Mityagin, Kobbi Nissim
Hard Instances of the Constrained Discrete Logarithm Problem
null
In proceedings of 7th Algorithmic Number Theory Symposium (ANTS VII), pages 582--598, 2006
10.1007/11792086_41
null
math.NT cs.CR
null
The discrete logarithm problem (DLP) generalizes to the constrained DLP, where the secret exponent $x$ belongs to a set known to the attacker. The complexity of generic algorithms for solving the constrained DLP depends on the choice of the set. Motivated by cryptographic applications, we study sets with succinct representation for which the constrained DLP is hard. We draw on earlier results due to Erd\"os et al. and Schnorr, develop geometric tools such as generalized Menelaus' theorem for proving lower bounds on the complexity of the constrained DLP, and construct sets with succinct representation with provable non-trivial lower bounds.
[ { "version": "v1", "created": "Thu, 29 Jun 2006 21:54:51 GMT" }, { "version": "v2", "created": "Mon, 24 Jul 2006 03:10:11 GMT" } ]
2018-12-12T00:00:00
[ [ "Mironov", "Ilya", "" ], [ "Mityagin", "Anton", "" ], [ "Nissim", "Kobbi", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
math/0607051
Naoto Morikawa
Naoto Morikawa
Discrete differential geometry of triangle tiles and algebra of closed trajectories
15 pages, 6 figures
null
null
null
math.CO cs.DM math.MG
null
This paper proposes a new mathematical framework that can be applied to biological problems such as analysis of the structures of proteins and protein complexes. In particular, it gives a new method for encoding the three-dimensional structure of a protein into a binary sequence, where proteins are approximated by a folded tetrahedron sequence. It also gives a new algebraic framework for describing molecular complexes and their interactions. For simplicity, we shall explain the framework in the case of two-dimensional objects. Then, the binary code of a plane curve is obtained as the ``second derivative'' of the curve and ``fusion and fission'' of closed trajectories is described algebraically.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 14:18:46 GMT" } ]
2007-05-23T00:00:00
[ [ "Morikawa", "Naoto", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
math/0607071
Xueliang Li
Xueliang Li, Jianhua Tu
NP-completeness of 4-incidence colorability of semi-cubic graphs
11 pages
null
null
null
math.CO cs.CC
null
The incidence coloring conjecture, proposed by Brualdi and Massey in 1993, states that the incidence coloring number of every graph is at most ${\it \Delta}+2$, where ${\it \Delta}$ is the maximum degree of a graph. The conjecture was shown to be false in general by Guiduli in 1997, following the work of Algor and Alon. However, in 2005 Maydanskiy proved that the conjecture holds for any graph with ${\it \Delta}\leq 3$. It is easily deduced that the incidence coloring number of a semi-cubic graph is 4 or 5. In this paper, we show that it is already NP-complete to determine if a semi-cubic graph is 4-incidence colorable, and therefore it is NP-complete to determine if a general graph is $k$-incidence colorable.
[ { "version": "v1", "created": "Tue, 4 Jul 2006 08:19:26 GMT" } ]
2007-05-23T00:00:00
[ [ "Li", "Xueliang", "" ], [ "Tu", "Jianhua", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
math/0607088
Dirk Oliver Theis
Adam N. Letchford and Dirk Oliver Theis
Odd minimum cut sets and b-matchings revisited
6 pages. An extended abstract of an earlier version appeared in Proc. IPCO X (2004)
null
null
null
math.OC cs.DM
null
The famous Padberg-Rao separation algorithm for b-matching polyhedra can be implemented to run in O(n^2m log(n^2/m)) time in the uncapacitated case, and in O(nm^2 log(n^2/m)) time in the capacitated case (where n is the number of vertices and m is the number of edges of the underlying graph). We give a new and simple algorithm for the capacitated case which can be implemented to run in O(n^2m log(n^2/m)) time.
[ { "version": "v1", "created": "Tue, 4 Jul 2006 11:39:28 GMT" } ]
2011-12-08T00:00:00
[ [ "Letchford", "Adam N.", "" ], [ "Theis", "Dirk Oliver", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0607243
Romain Abraham
Isabelle Abraham (DCRE), Romain Abraham (MAPMO), Maitine Bergounioux (MAPMO)
An active curve approach for tomographic reconstruction of binary radially symmetric objects
null
null
null
null
math.OC cs.CV
null
This paper deals with a method of tomographic reconstruction of radially symmetric objects from a single radiograph, in order to study the behavior of shocked material. The usual tomographic reconstruction algorithms such as generalized inverse or filtered back-projection cannot be applied here because data are very noisy and the inverse problem associated to single view tomographic reconstruction is highly unstable. In order to improve the reconstruction, we propose here to add some a priori assumptions on the looked after object. One of these assumptions is that the object is binary and consequently, the object may be described by the curves that separate the two materials. We present a model that lives in BV space and leads to a non local Hamilton-Jacobi equation, via a level set strategy. Numerical experiments are performed (using level sets methods) on synthetic objects.
[ { "version": "v1", "created": "Mon, 10 Jul 2006 17:08:49 GMT" } ]
2007-05-23T00:00:00
[ [ "Abraham", "Isabelle", "", "DCRE" ], [ "Abraham", "Romain", "", "MAPMO" ], [ "Bergounioux", "Maitine", "", "MAPMO" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
math/0607368
Josephine Yu
Bernd Sturmfels, Jenia Tevelev, Josephine Yu
The Newton Polytope of the Implicit Equation
18 pages, 3 figures
Moscow Mathematical Journal 7 (2007), no. 2, 327--346, 351
null
null
math.CO cs.SC math.AG
null
We apply tropical geometry to study the image of a map defined by Laurent polynomials with generic coefficients. If this image is a hypersurface then our approach gives a construction of its Newton polytope.
[ { "version": "v1", "created": "Sun, 16 Jul 2006 05:55:34 GMT" } ]
2012-02-13T00:00:00
[ [ "Sturmfels", "Bernd", "" ], [ "Tevelev", "Jenia", "" ], [ "Yu", "Josephine", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
math/0607411
Jean-Gabriel Luque
G\'erard Duchamp (LIPN), Eric Laugerotte (LIFAR EA2655), Jean-Gabriel Luque (IGM-LabInfo)
Extending the scalars of minimizations
null
SCI, \'{E}tats-Unis d'Am\'{e}rique (2001)
null
null
math.CO cs.DS cs.SC
null
In the classical theory of formal languages, finite state automata allow to recognize the words of a rational subset of $\Sigma^*$ where $\Sigma$ is a set of symbols (or the alphabet). Now, given a semiring $(\K,+,.)$, one can construct $\K$-subsets of $\Sigma^*$ in the sense of Eilenberg, that are alternatively called noncommutative formal power series for which a framework very similar to language theory has been constructed Particular noncommutative formal power series, which are called rational series, are the behaviour of a family of weighted automata (or $\K$-automata). In order to get an efficient encoding, it may be interesting to point out one of them with the smallest number of states. Minimization processes of $\K$-automata already exist for $\K$ being: {\bf a)} a field, {\bf b)} a noncommutative field, {\bf c)} a PID . When $\K$ is the bolean semiring, such a minimization process (with isomorphisms of minimal objects) is known within the category of deterministic automata. Minimal automata have been proved to be isomorphic in cases {\bf (a)} and {\bf (b)}. But the proof given for (b) is not constructive. In fact, it lays on the existence of a basis for a submodule of $\K^n$. Here we give an independent algorithm which reproves this fact and an example of a pair of nonisomorphic minimal automata. Moreover, we examine the possibility of extending {\bf (c)}. To this end, we provide an {\em Effective Minimization Process} (or {\em EMP}) which can be used for more general sets of coefficients.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:06:59 GMT" } ]
2016-08-16T00:00:00
[ [ "Duchamp", "Gérard", "", "LIPN" ], [ "Laugerotte", "Eric", "", "LIFAR EA2655" ], [ "Luque", "Jean-Gabriel", "", "IGM-LabInfo" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
math/0607412
Jean-Gabriel Luque
G\'erard Duchamp (LIPN), Marianne Flouret (LIH EA3219), Eric Laugerotte (LIFAR EA2655), Jean-Gabriel Luque (IGM-LabInfo)
Direct and dual laws for automata with multiplicities
null
Theoretical Computer Science 267 (2001) 105-120
null
null
math.CO cs.DM cs.SC
null
We present here theoretical results coming from the implementation of the package called AMULT (automata with multiplicities in several noncommutative variables). We show that classical formulas are ``almost every time'' optimal, characterize the dual laws preserving rationality and also relators that are compatible with these laws.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 07:08:35 GMT" } ]
2016-08-16T00:00:00
[ [ "Duchamp", "Gérard", "", "LIPN" ], [ "Flouret", "Marianne", "", "LIH EA3219" ], [ "Laugerotte", "Eric", "", "LIFAR EA2655" ], [ "Luque", "Jean-Gabriel", "", "IGM-LabInfo" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
math/0607420
Jean-Gabriel Luque
Jean-Gabriel Luque (IGM-LabInfo), G\'erard Henry Edmond Duchamp (LIPN)
Transitive factorizations of free partially commutative monoids and Lie algebras
null
Discrete Mathematics 246, Issue 1-3 (2002) 83 - 97
null
null
math.CO cs.DM cs.SC math.GM
null
Let $\M(A,\theta)$ be a free partially commutative monoid. We give here a necessary and sufficient condition on a subalphabet $B\subset A$ such that the right factor of a bisection $\M(A,\theta)=\M(B,\theta\_B).T$ be also partially commutative free. This extends strictly the (classical) elimination theory on partial commutations and allows to construct new factorizations of $\M(A,\theta)$ and associated bases of $L\_K(A,\theta)$.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 12:42:33 GMT" } ]
2016-08-16T00:00:00
[ [ "Luque", "Jean-Gabriel", "", "IGM-LabInfo" ], [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" } ]
math/0607462
Nicolas Tabareau
Nicolas Tabareau (PPS)
De l'oprateur de trace dans les jeux de Conway
null
null
null
null
math.CT cs.PL
null
In this report, we propose a game semantics model of intuitionistic linear logic with a notion of brackets and a trace operator. This model is a revised version of Conway games augmented with an algebraicly defined gain which enable to describe well bracketed strategies. We then show the existence of a free cocommutative comonoid in the category of Conway. To conclude, we propose a new model of an Algol-like language with higher-order using the presence of a trace operator in our model to describe the memorial aspect of the language.
[ { "version": "v1", "created": "Wed, 19 Jul 2006 12:43:02 GMT" } ]
2007-05-23T00:00:00
[ [ "Tabareau", "Nicolas", "", "PPS" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
math/0607507
Yana Volkovich
N. Litvak, W.R.W. Scheinhardt and Y. Volkovich
In-Degree and PageRank of Web pages: Why do they follow similar power laws?
20 pages, 3 figures; typos added; reference added
null
null
Memorandum 1807, Dept. of Applied. Mathematics, University of Twente
math.PR cs.IR
null
The PageRank is a popularity measure designed by Google to rank Web pages. Experiments confirm that the PageRank obeys a `power law' with the same exponent as the In-Degree. This paper presents a novel mathematical model that explains this phenomenon. The relation between the PageRank and In-Degree is modelled through a stochastic equation, which is inspired by the original definition of the PageRank, and is analogous to the well-known distributional identity for the busy period in the M/G/1 queue. Further, we employ the theory of regular variation and Tauberian theorems to analytically prove that the tail behavior of the PageRank and the In-Degree differ only by a multiplicative factor, for which we derive a closed-form expression. Our analytical results are in good agreement with experimental data.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 16:07:10 GMT" }, { "version": "v2", "created": "Tue, 21 Nov 2006 15:11:12 GMT" }, { "version": "v3", "created": "Mon, 4 Dec 2006 11:19:48 GMT" } ]
2007-05-23T00:00:00
[ [ "Litvak", "N.", "" ], [ "Scheinhardt", "W. R. W.", "" ], [ "Volkovich", "Y.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
math/0607597
Georges-Henri Cottet
Mathieu Coquerelle (LMC - Imag, Gravir - Imag), J\'er\'emie Allard (GRAVIR - Imag), Georges-Henri Cottet (LMC - Imag), Marie-Paule Cani (GRAVIR - Imag)
A Vortex Method for Bi-phasic Fluids Interacting with Rigid Bodies
null
null
null
null
math.NA cs.GR
null
We present an accurate Lagrangian method based on vortex particles, level-sets, and immersed boundary methods, for animating the interplay between two fluids and rigid solids. We show that a vortex method is a good choice for simulating bi-phase flow, such as liquid and gas, with a good level of realism. Vortex particles are localized at the interfaces between the two fluids and within the regions of high turbulence. We gain local precision and efficiency from the stable advection permitted by the vorticity formulation. Moreover, our numerical method straightforwardly solves the two-way coupling problem between the fluids and animated rigid solids. This new approach is validated through numerical comparisons with reference experiments from the computational fluid community. We also show that the visually appealing results obtained in the CG community can be reproduced with increased efficiency and an easier implementation.
[ { "version": "v1", "created": "Mon, 24 Jul 2006 12:25:59 GMT" } ]
2016-08-16T00:00:00
[ [ "Coquerelle", "Mathieu", "", "LMC - Imag, Gravir - Imag" ], [ "Allard", "Jérémie", "", "GRAVIR - Imag" ], [ "Cottet", "Georges-Henri", "", "LMC - Imag" ], [ "Cani", "Marie-Paule", "", "GRAVIR\n - Imag" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
math/0607648
Lek-Heng Lim
Lek-Heng Lim
Singular Values and Eigenvalues of Tensors: A Variational Approach
null
Proceedings of the IEEE International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP '05), Vol. 1 (2005), pp. 129--132
null
SCCM Technical Report 05-10
math.SP cs.IR cs.NA math.NA math.OC
null
We propose a theory of eigenvalues, eigenvectors, singular values, and singular vectors for tensors based on a constrained variational approach much like the Rayleigh quotient for symmetric matrix eigenvalues. These notions are particularly useful in generalizing certain areas where the spectral theory of matrices has traditionally played an important role. For illustration, we will discuss a multilinear generalization of the Perron-Frobenius theorem.
[ { "version": "v1", "created": "Wed, 26 Jul 2006 03:07:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Lim", "Lek-Heng", "" ] ]
[ { "class": "Mathematics", "code": "math.SP", "description": "Schrodinger operators, operators on manifolds, general differential operators, numerical studies, integral operators, discrete models, resonances, non-self-adjoint operators, random operators/matrices", "span": "(Spectral Theory)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
math/0608116
Frederic Dambreville
Frederic Dambreville (DGA/CEP/GIP/SRO)
Conflict Free Rule for Combining Evidences
Submitted to DSmT book Vol. 2, F. Smarandache and J. Dezert editors
null
null
null
math.LO cs.LO math.ST stat.TH
null
Recent works have investigated the problem of the conflict redistribution in the fusion rules of evidence theories. As a consequence of these works, many new rules have been proposed. Now, there is not a clear theoretical criterion for a choice of a rule instead another. The present chapter proposes a new theoretically grounded rule, based on a new concept of sensor independence. This new rule avoids the conflict redistribution, by an adaptive combination of the beliefs. Both the logical grounds and the algorithmic implementation are considered.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 04:53:24 GMT" } ]
2007-06-13T00:00:00
[ [ "Dambreville", "Frederic", "", "DGA/CEP/GIP/SRO" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0608210
Henrik B\"a\"arnhielm
Henrik B\"a\"arnhielm
Recognising the Suzuki groups in their natural representations
null
J. Algebra 300 (1), 171-198, 2006
10.1016/j.jalgebra.2006.02.010
null
math.GR cs.DS
null
Under the assumption of a certain conjecture, for which there exists strong experimental evidence, we produce an efficient algorithm for constructive membership testing in the Suzuki groups Sz(q), where q = 2^{2m + 1} for some m > 0, in their natural representations of degree 4. It is a Las Vegas algorithm with running time O{log(q)} field operations, and a preprocessing step with running time O{log(q) loglog(q)} field operations. The latter step needs an oracle for the discrete logarithm problem in GF(q). We also produce a recognition algorithm for Sz(q) = <X>. This is a Las Vegas algorithm with running time O{|X|^2} field operations. Finally, we give a Las Vegas algorithm that, given <X>^h = Sz(q) for some h in GL(4, q), finds some g such that <X>^g = Sz(q). The running time is O{log(q) loglog(q) + |X|} field operations. Implementations of the algorithms are available for the computer system MAGMA.
[ { "version": "v1", "created": "Wed, 9 Aug 2006 02:43:35 GMT" } ]
2007-05-23T00:00:00
[ [ "Bäärnhielm", "Henrik", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0608522
Matthias Hein
Matthias Hein, Jean-Yves Audibert and Ulrike von Luxburg
Graph Laplacians and their convergence on random neighborhood graphs
Improved presentation, typos corrected, to appear in JMLR
null
null
null
math.ST cs.LG stat.TH
null
Given a sample from a probability measure with support on a submanifold in Euclidean space one can construct a neighborhood graph which can be seen as an approximation of the submanifold. The graph Laplacian of such a graph is used in several machine learning methods like semi-supervised learning, dimensionality reduction and clustering. In this paper we determine the pointwise limit of three different graph Laplacians used in the literature as the sample size increases and the neighborhood size approaches zero. We show that for a uniform measure on the submanifold all graph Laplacians have the same limit up to constants. However in the case of a non-uniform measure on the submanifold only the so called random walk graph Laplacian converges to the weighted Laplace-Beltrami operator.
[ { "version": "v1", "created": "Mon, 21 Aug 2006 18:35:42 GMT" }, { "version": "v2", "created": "Wed, 27 Jun 2007 08:23:07 GMT" } ]
2007-06-27T00:00:00
[ [ "Hein", "Matthias", "" ], [ "Audibert", "Jean-Yves", "" ], [ "von Luxburg", "Ulrike", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0608556
Martin Wainwright
XuanLong Nguyen, Martin J. Wainwright, Michael I. Jordan
On optimal quantization rules for some problems in sequential decentralized detection
Published as IEEE Transactions on Information Theory, Vol. 54(7), 3285-3295, 2008
null
10.1109/TIT.2008.924647
null
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the design of systems for sequential decentralized detection, a problem that entails several interdependent choices: the choice of a stopping rule (specifying the sample size), a global decision function (a choice between two competing hypotheses), and a set of quantization rules (the local decisions on the basis of which the global decision is made). This paper addresses an open problem of whether in the Bayesian formulation of sequential decentralized detection, optimal local decision functions can be found within the class of stationary rules. We develop an asymptotic approximation to the optimal cost of stationary quantization rules and exploit this approximation to show that stationary quantizers are not optimal in a broad class of settings. We also consider the class of blockwise stationary quantizers, and show that asymptotically optimal quantizers are likelihood-based threshold rules.
[ { "version": "v1", "created": "Tue, 22 Aug 2006 19:44:40 GMT" }, { "version": "v2", "created": "Wed, 26 Nov 2008 22:11:11 GMT" } ]
2016-11-17T00:00:00
[ [ "Nguyen", "XuanLong", "" ], [ "Wainwright", "Martin J.", "" ], [ "Jordan", "Michael I.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0608571
Reinhard Muskens
Reinhard Muskens
Intensional Models for the Theory of Types
25 pages
null
null
null
math.LO cs.AI
null
In this paper we define intensional models for the classical theory of types, thus arriving at an intensional type logic ITL. Intensional models generalize Henkin's general models and have a natural definition. As a class they do not validate the axiom of Extensionality. We give a cut-free sequent calculus for type theory and show completeness of this calculus with respect to the class of intensional models via a model existence theorem. After this we turn our attention to applications. Firstly, it is argued that, since ITL is truly intensional, it can be used to model ascriptions of propositional attitude without predicting logical omniscience. In order to illustrate this a small fragment of English is defined and provided with an ITL semantics. Secondly, it is shown that ITL models contain certain objects that can be identified with possible worlds. Essential elements of modal logic become available within classical type theory once the axiom of Extensionality is given up.
[ { "version": "v1", "created": "Wed, 23 Aug 2006 10:33:20 GMT" } ]
2007-05-23T00:00:00
[ [ "Muskens", "Reinhard", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
math/0608603
Wolfgang Steiner
Lubomira Balkova, Edita Pelantova, Wolfgang Steiner (LIAFA)
Sequences with constant number of return words
null
null
null
null
math.CO cs.DM
null
An infinite word has the property $R_m$ if every factor has exactly $m$ return words. Vuillon showed that $R_2$ characterizes Sturmian words. We prove that a word satisfies $R_m$ if its complexity function is $(m-1)n+1$ and if it contains no weak bispecial factor. These conditions are necessary for $m=3$, whereas for $m=4$ the complexity function need not be $3n+1$. New examples of words satisfying $R_m$ are given by words related to digital expansions in real bases.
[ { "version": "v1", "created": "Thu, 24 Aug 2006 10:09:32 GMT" }, { "version": "v2", "created": "Mon, 4 Sep 2006 13:52:37 GMT" }, { "version": "v3", "created": "Fri, 27 Apr 2007 19:18:12 GMT" }, { "version": "v4", "created": "Thu, 27 Sep 2007 11:20:29 GMT" } ]
2007-09-27T00:00:00
[ [ "Balkova", "Lubomira", "", "LIAFA" ], [ "Pelantova", "Edita", "", "LIAFA" ], [ "Steiner", "Wolfgang", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0608713
Gilles Blanchard
Gilles Blanchard (FHG FIRST.IDA), Fran\c{c}ois Fleuret (EPFL -- CVLAB)
Occam's hammer: a link between randomized learning and multiple testing FDR control
13 pages -- conference communication type format
null
null
null
math.ST cs.LG stat.TH
null
We establish a generic theoretical tool to construct probabilistic bounds for algorithms where the output is a subset of objects from an initial pool of candidates (or more generally, a probability distribution on said pool). This general device, dubbed "Occam's hammer'', acts as a meta layer when a probabilistic bound is already known on the objects of the pool taken individually, and aims at controlling the proportion of the objects in the set output not satisfying their individual bound. In this regard, it can be seen as a non-trivial generalization of the "union bound with a prior'' ("Occam's razor''), a familiar tool in learning theory. We give applications of this principle to randomized classifiers (providing an interesting alternative approach to PAC-Bayes bounds) and multiple testing (where it allows to retrieve exactly and extend the so-called Benjamini-Yekutieli testing procedure).
[ { "version": "v1", "created": "Tue, 29 Aug 2006 12:35:53 GMT" } ]
2007-06-13T00:00:00
[ [ "Blanchard", "Gilles", "", "FHG FIRST.IDA" ], [ "Fleuret", "François", "", "EPFL -- CVLAB" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0608733
Peter Bubenik
Peter Bubenik
Context for models of concurrency
18 pages, to appear in Electronic Notes in Theoretical Computer Science, preliminary version in Proceedings of the Workshop on Geometry and Topology in Concurrency and Distributed Computing, BRICS Notes NS-04-2, pp.33-49
Electron. Notes Theor. Comput. Sci. 230 (2009) 3-21
10.1016/j.entcs.2009.02.014
null
math.AT cs.DC
null
Many categories have been used to model concurrency. Using any of these, the challenge is to reduce a given model to a smaller representation which nevertheless preserves the relevant computer-scientific information. That is, one wants to replace a given model with a simpler model with the same directed homotopy-type. Unfortunately, the obvious definition of directed homotopy equivalence is too coarse. This paper introduces the notion of context to refine this definition.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 20:18:44 GMT" } ]
2009-04-27T00:00:00
[ [ "Bubenik", "Peter", "" ] ]
[ { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
math/0608789
Branko Malesevic
Branko J. Malesevic
One method for proving inequalities by computer
Accepted in Journal of Inequalities and Applications
null
null
null
math.CA cs.GR cs.MS cs.NA math.GM math.NA
null
In this article we consider a method for proving a class of analytical inequalities via minimax rational approximations. All numerical calculations in this paper are given by Maple computer program.
[ { "version": "v1", "created": "Thu, 31 Aug 2006 14:59:20 GMT" }, { "version": "v2", "created": "Sat, 30 Sep 2006 15:08:57 GMT" }, { "version": "v3", "created": "Sat, 7 Oct 2006 19:30:42 GMT" }, { "version": "v4", "created": "Tue, 10 Oct 2006 14:16:17 GMT" }, { "version": "v5", "created": "Wed, 1 Nov 2006 15:17:41 GMT" }, { "version": "v6", "created": "Sun, 5 Nov 2006 15:17:19 GMT" }, { "version": "v7", "created": "Sat, 11 Nov 2006 16:25:24 GMT" } ]
2007-05-23T00:00:00
[ [ "Malesevic", "Branko J.", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.GM", "description": "Mathematical material of general interest, topics not covered elsewhere", "span": "(General Mathematics)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
math/0609360
Eberhard H.-A. Gerbracht
Eberhard H.-A. Gerbracht
Minimal Polynomials for the Coordinates of the Harborth Graph
v1: documentclass amsart, 16 pages, 4 figures. v2: same as v1, but now has 18 pages, with a final section ("Coda") on the consequences to the structure of the Harborth graph and some references added; some typos corrected. v3: minor change to the introduction (re: history of the Harborth Graph); one reference added; some more typos corrected
null
null
null
math.CO cs.SC
null
The Harborth graph is the smallest known example of a 4-regular planar unit-distance graph. In this paper we give an analytical description of the coordinates of its vertices for a particular embedding in the Euclidean plane. More precisely, we show, how to calculate the minimal polynomials of the coordinates of its vertices (with the help of a computer algebra system), and list those. Furthermore some algebraic properties of these polynomials, and consequences to the structure of the Harborth graph are determined.
[ { "version": "v1", "created": "Wed, 13 Sep 2006 17:27:55 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2006 18:18:11 GMT" }, { "version": "v3", "created": "Wed, 24 Jan 2007 11:07:39 GMT" } ]
2007-09-20T00:00:00
[ [ "Gerbracht", "Eberhard H. -A.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
math/0609461
Frederic Dambreville
Frederic Dambreville (DGA/CTA/DT/GIP)
Cross-Entropy method: convergence issues for extended implementation
Paper written for the workshop "Rare Event SIMulation 2006", Bamberg, Germany
null
null
null
math.OC cs.LG cs.NE math.ST stat.TH
null
The cross-entropy method (CE) developed by R. Rubinstein is an elegant practical principle for simulating rare events. The method approximates the probability of the rare event by means of a family of probabilistic models. The method has been extended to optimization, by considering an optimal event as a rare event. CE works rather good when dealing with deterministic function optimization. Now, it appears that two conditions are needed for a good convergence of the method. First, it is necessary to have a family of models sufficiently flexible for discriminating the optimal events. Indirectly, it appears also that the function to be optimized should be deterministic. The purpose of this paper is to consider the case of partially discriminating model family, and of stochastic functions. It will be shown on simple examples that the CE could fail when relaxing these hypotheses. Alternative improvements of the CE method are investigated and compared on random examples in order to handle this issue.
[ { "version": "v1", "created": "Sat, 16 Sep 2006 07:00:36 GMT" } ]
2007-06-13T00:00:00
[ [ "Dambreville", "Frederic", "", "DGA/CTA/DT/GIP" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0609562
David Joyner
David Joyner
On quadratic residue codes and hyperelliptic curves
18 pages, no figures
null
null
null
math.CO cs.IT math.AG math.IT math.NT
null
A long standing problem has been to develop "good" binary linear codes to be used for error-correction. This paper investigates in some detail an attack on this problem using a connection between quadratic residue codes and hyperelliptic curves. One question which coding theory is used to attack is: Does there exist a c<2 such that, for all sufficiently large $p$ and all subsets S of GF(p), we have |X_S(GF(p))| < cp?
[ { "version": "v1", "created": "Wed, 20 Sep 2006 14:12:12 GMT" }, { "version": "v2", "created": "Thu, 21 Feb 2008 13:56:18 GMT" } ]
2008-02-21T00:00:00
[ [ "Joyner", "David", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
math/0610067
Narad Rampersad
Narad Rampersad
On the context-freeness of the set of words containing overlaps
8 pages
null
null
null
math.CO cs.FL
null
We show that the set of binary words containing overlaps is not unambiguously context-free and that the set of ternary words containing overlaps is not context-free. We also show that the set of binary words that are not subwords of the Thue-Morse word is not unambiguously context-free.
[ { "version": "v1", "created": "Mon, 2 Oct 2006 18:12:59 GMT" } ]
2009-03-29T00:00:00
[ [ "Rampersad", "Narad", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
math/0610121
Kamal Khuri-Makdisi
Fatima K. Abu Salem (Computer Science Department, American University of Beirut) and Kamal Khuri-Makdisi (Center for Advanced Mathematical Sciences, American University of Beirut)
Fast Jacobian group operations for C_{3,4} curves over a large finite field
25 pages, identical to version 2 except for a remark about the published version of the article, which includes Magma code for the algorithms
LMS J. Comput. Math. 10 (2007) 307-328, may be downloaded from http://www.lms.ac.uk/jcm/10/lms2006-049/
null
null
math.NT cs.SC math.AG
null
Let C be an arbitrary smooth algebraic curve of genus g over a large finite field K. We revisit fast addition algorithms in the Jacobian of C due to Khuri-Makdisi (math.NT/0409209, to appear in Math. Comp.). The algorithms, which reduce to linear algebra in vector spaces of dimension O(g) once |K| >> g, and which asymptotically require O(g^{2.376}) field operations using fast linear algebra, are shown to perform efficiently even for certain low genus curves. Specifically, we provide explicit formulae for performing the group law on Jacobians of C_{3,4} curves of genus 3. We show that, typically, the addition of two distinct elements in the Jacobian of a C_{3,4} curve requires 117 multiplications and 2 inversions in K, and an element can be doubled using 129 multiplications and 2 inversions in K. This represents an improvement of approximately 20% over previous methods.
[ { "version": "v1", "created": "Tue, 3 Oct 2006 16:13:39 GMT" }, { "version": "v2", "created": "Mon, 28 May 2007 13:25:06 GMT" }, { "version": "v3", "created": "Wed, 22 Aug 2007 11:46:49 GMT" } ]
2007-08-23T00:00:00
[ [ "Salem", "Fatima K. Abu", "", "Computer Science Department, American University\n of Beirut" ], [ "Khuri-Makdisi", "Kamal", "", "Center for Advanced Mathematical\n Sciences, American University of Beirut" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
math/0610184
Savas Dayanik
Erhan Bayraktar, Savas Dayanik, Ioannis Karatzas
Adaptive Poisson disorder problem
Published at http://dx.doi.org/10.1214/105051606000000312 in the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2006, Vol. 16, No. 3, 1190-1261
10.1214/105051606000000312
IMS-AAP-AAP0171
math.PR cs.IT math.IT math.ST stat.TH
null
We study the quickest detection problem of a sudden change in the arrival rate of a Poisson process from a known value to an unknown and unobservable value at an unknown and unobservable disorder time. Our objective is to design an alarm time which is adapted to the history of the arrival process and detects the disorder time as soon as possible. In previous solvable versions of the Poisson disorder problem, the arrival rate after the disorder has been assumed a known constant. In reality, however, we may at most have some prior information about the likely values of the new arrival rate before the disorder actually happens, and insufficient estimates of the new rate after the disorder happens. Consequently, we assume in this paper that the new arrival rate after the disorder is a random variable. The detection problem is shown to admit a finite-dimensional Markovian sufficient statistic, if the new rate has a discrete distribution with finitely many atoms. Furthermore, the detection problem is cast as a discounted optimal stopping problem with running cost for a finite-dimensional piecewise-deterministic Markov process. This optimal stopping problem is studied in detail in the special case where the new arrival rate has Bernoulli distribution. This is a nontrivial optimal stopping problem for a two-dimensional piecewise-deterministic Markov process driven by the same point process. Using a suitable single-jump operator, we solve it fully, describe the analytic properties of the value function and the stopping region, and present methods for their numerical calculation. We provide a concrete example where the value function does not satisfy the smooth-fit principle on a proper subset of the connected, continuously differentiable optimal stopping boundary, whereas it does on the complement of this set.
[ { "version": "v1", "created": "Thu, 5 Oct 2006 13:45:48 GMT" } ]
2007-08-03T00:00:00
[ [ "Bayraktar", "Erhan", "" ], [ "Dayanik", "Savas", "" ], [ "Karatzas", "Ioannis", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0610680
Mathew D. Penrose
T. Schreiber, Mathew D. Penrose and J. E. Yukich
Gaussian limits for multidimensional random sequential packing at saturation (extended version)
31 pages
null
10.1007/s00220-007-0218-2
null
math.PR cs.OH
null
Consider the random sequential packing model with infinite input and in any dimension. When the input consists of non-zero volume convex solids we show that the total number of solids accepted over cubes of volume $\lambda$ is asymptotically normal as $\lambda \to \infty$. We provide a rate of approximation to the normal and show that the finite dimensional distributions of the packing measures converge to those of a mean zero generalized Gaussian field. The method of proof involves showing that the collection of accepted solids satisfies the weak spatial dependence condition known as stabilization.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 19:50:59 GMT" }, { "version": "v2", "created": "Mon, 23 Oct 2006 20:32:26 GMT" } ]
2015-06-26T00:00:00
[ [ "Schreiber", "T.", "" ], [ "Penrose", "Mathew D.", "" ], [ "Yukich", "J. E.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
math/0611194
Jean-Francois Marckert
Yvan Le Borgne (LaBRI), Jean-Fran\c{c}ois Marckert (LaBRI)
Directed animals in the gas
null
null
null
null
math.PR cs.DM
null
In this paper, we revisit the enumeration of directed animals using gas models. We show that there exists a natural construction of random directed animals on any directed graph together with a particle system that explains at the level of objects the formal link known between the density of the gas model and the generating function of directed animals counted according to the area. This provides some new methods to compute the generating function of directed animals counted according to area, and leads in the particular case of the square lattice to new combinatorial results and questions. A model of gas related to directed animals counted according to area and perimeter on any directed graph is also exhibited.
[ { "version": "v1", "created": "Tue, 7 Nov 2006 15:56:57 GMT" } ]
2007-05-23T00:00:00
[ [ "Borgne", "Yvan Le", "", "LaBRI" ], [ "Marckert", "Jean-François", "", "LaBRI" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0611422
Marie Cottrell
Marie Cottrell (MATISSE, Samos), Sma\"Il Ibbou (MATISSE, Samos), Patrick Letr\'emy (MATISSE, Samos), Patrick Rousset (CEREQ)
Cartes auto-organis\'{e}es pour l'analyse exploratoire de donn\'{e}es et la visualisation
Article de synth\`{e}se sur les applications de l'algorithme de Kohonen pour la visualisation et l'analyse de donn\'{e}es
Journal de la Soci\'{e}t\'{e} Fran\c{c}aise de Statistique 144 n&deg;4 (2003) 67-106
null
null
math.ST cs.NE nlin.AO stat.TH
null
This paper shows how to use the Kohonen algorithm to represent multidimensional data, by exploiting the self-organizing property. It is possible to get such maps as well for quantitative variables as for qualitative ones, or for a mixing of both. The contents of the paper come from various works by SAMOS-MATISSE members, in particular by E. de Bodt, B. Girard, P. Letr\'{e}my, S. Ibbou, P. Rousset. Most of the examples have been studied with the computation routines written by Patrick Letr\'{e}my, with the language IML-SAS, which are available on the WEB page http://samos.univ-paris1.fr.
[ { "version": "v1", "created": "Tue, 14 Nov 2006 12:52:21 GMT" } ]
2016-08-16T00:00:00
[ [ "Cottrell", "Marie", "", "MATISSE, Samos" ], [ "Ibbou", "SmaÏl", "", "MATISSE, Samos" ], [ "Letrémy", "Patrick", "", "MATISSE, Samos" ], [ "Rousset", "Patrick", "", "CEREQ" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0611433
Marie Cottrell
Patrick Letr\'emy (SAMOS), Marie Cottrell (SAMOS)
Working times in atypical forms of employment: the special case of part-time work
Chapitre 5, \`{a} la suite de la conf\'{e}rence ACSEG 2001 \`{a} Rennes
Connectionist Approaches in Economics and Management Sciences Kluwer (Ed.) (2003) 111-129
null
null
math.ST cs.NE stat.TH
null
In the present article, we attempt to devise a typology of forms of part-time employment by applying a widely used neuronal methodology called Kohonen maps. Starting out with data that we describe using category-specific variables, we show how it is possible to represent observations and the modalities of the variables that define them simultaneously, on a single map. This allows us to ascertain, and to try to describe, the main categories of part-time employment.
[ { "version": "v1", "created": "Tue, 14 Nov 2006 16:03:38 GMT" } ]
2016-08-16T00:00:00
[ [ "Letrémy", "Patrick", "", "SAMOS" ], [ "Cottrell", "Marie", "", "SAMOS" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0611666
Biskup Marek
Noam Berger, Marek Biskup, Christopher E. Hoffman, Gady Kozma
Anomalous heat-kernel decay for random walk among bounded random conductances
22 pages. Includes a self-contained proof of isoperimetric inequality for supercritical percolation clusters. Version to appear in AIHP + additional corrections
Ann. Inst. H. Poincare Probab. Statist. 274 (2008), no. 2, 374-392
10.1214/07-AIHP126
null
math.PR cs.DM math-ph math.MP
null
We consider the nearest-neighbor simple random walk on $\Z^d$, $d\ge2$, driven by a field of bounded random conductances $\omega_{xy}\in[0,1]$. The conductance law is i.i.d. subject to the condition that the probability of $\omega_{xy}>0$ exceeds the threshold for bond percolation on $\Z^d$. For environments in which the origin is connected to infinity by bonds with positive conductances, we study the decay of the $2n$-step return probability $P_\omega^{2n}(0,0)$. We prove that $P_\omega^{2n}(0,0)$ is bounded by a random constant times $n^{-d/2}$ in $d=2,3$, while it is $o(n^{-2})$ in $d\ge5$ and $O(n^{-2}\log n)$ in $d=4$. By producing examples with anomalous heat-kernel decay approaching $1/n^2$ we prove that the $o(n^{-2})$ bound in $d\ge5$ is the best possible. We also construct natural $n$-dependent environments that exhibit the extra $\log n$ factor in $d=4$. See also math.PR/0701248.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 04:06:43 GMT" }, { "version": "v2", "created": "Thu, 1 Feb 2007 06:28:02 GMT" }, { "version": "v3", "created": "Sat, 24 Mar 2007 21:50:47 GMT" }, { "version": "v4", "created": "Tue, 26 Jun 2007 23:19:23 GMT" } ]
2009-04-26T00:00:00
[ [ "Berger", "Noam", "" ], [ "Biskup", "Marek", "" ], [ "Hoffman", "Christopher E.", "" ], [ "Kozma", "Gady", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
math/0611679
Dominique Rossin
Dominique Rossin (LIAFA), Mathilde Bouvel (LIAFA)
Longest Common Pattern between two Permutations
null
Algebr. Geom. Topol. 7 (2007) 829-843
10.2140/agt.2007.7.829
null
math.CO cs.DM cs.DS
null
In this paper, we give a polynomial (O(n^8)) algorithm for finding a longest common pattern between two permutations of size n given that one is separable. We also give an algorithm for general permutations whose complexity depends on the length of the longest simple permutation involved in one of our permutations.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 10:47:05 GMT" } ]
2014-10-01T00:00:00
[ [ "Rossin", "Dominique", "", "LIAFA" ], [ "Bouvel", "Mathilde", "", "LIAFA" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0611918
Boaz Tsaban
Martin Hock and Boaz Tsaban
Solving random equations in Garside groups using length functions
null
null
null
null
math.GR cs.CR math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a systematic exposition of memory-length algorithms for solving equations in noncommutative groups. This exposition clarifies some points untouched in earlier expositions. We then focus on the main ingredient in these attacks: Length functions. After a self-contained introduction to Garside groups, we describe length functions induced by the greedy normal form and by the rational normal form in these groups, and compare their worst-case performances. Our main concern is Artin's braid groups, with their two known Garside presentations, due to Artin and due to Birman-Ko-Lee (BKL). We show that in $B_3$ equipped with the BKL presentation, the (efficiently computable) rational normal form of each element is a geodesic, i.e., is a representative of minimal length for that element. (For Artin's presentation of $B_3$, Berger supplied in 1994 a method to obtain geodesic representatives in $B_3$.) For an arbitrary number of strands, finding the geodesic length of an element is NP-hard, by a 1991 result of by Paterson and Razborov. We show that a good estimation of the geodesic length of a braid in Artin's presentation is measuring the length of its rational form in the \emph{BKL} presentation. This is proved theoretically for the worst case, and experimental evidence is provided for the generic case.
[ { "version": "v1", "created": "Wed, 29 Nov 2006 16:34:43 GMT" }, { "version": "v2", "created": "Sun, 20 May 2007 14:08:08 GMT" }, { "version": "v3", "created": "Sun, 12 Oct 2008 22:08:10 GMT" }, { "version": "v4", "created": "Sat, 30 Oct 2010 20:41:46 GMT" } ]
2010-11-02T00:00:00
[ [ "Hock", "Martin", "" ], [ "Tsaban", "Boaz", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
math/0611937
Karl Schlechta
Karl Schlechta (LIF)
Remarks on Inheritance Systems
null
null
null
null
math.LO cs.AI
null
We try a conceptual analysis of inheritance diagrams, first in abstract terms, and then compare to "normality" and the "small/big sets" of preferential and related reasoning. The main ideas are about nodes as truth values and information sources, truth comparison by paths, accessibility or relevance of information by paths, relative normality, and prototypical reasoning.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 09:26:12 GMT" }, { "version": "v2", "created": "Sat, 27 Jan 2007 17:58:36 GMT" }, { "version": "v3", "created": "Fri, 9 Mar 2007 14:23:24 GMT" }, { "version": "v4", "created": "Sun, 19 Aug 2007 16:46:45 GMT" } ]
2007-08-19T00:00:00
[ [ "Schlechta", "Karl", "", "LIF" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
math/0612046
Sebastian Roch
Elchanan Mossel, Sebastien Roch
On the Submodularity of Influence in Social Networks
null
null
null
null
math.PR cs.GT cs.SI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove and extend a conjecture of Kempe, Kleinberg, and Tardos (KKT) on the spread of influence in social networks. A social network can be represented by a directed graph where the nodes are individuals and the edges indicate a form of social relationship. A simple way to model the diffusion of ideas, innovative behavior, or ``word-of-mouth'' effects on such a graph is to consider an increasing process of ``infected'' (or active) nodes: each node becomes infected once an activation function of the set of its infected neighbors crosses a certain threshold value. Such a model was introduced by KKT in \cite{KeKlTa:03,KeKlTa:05} where the authors also impose several natural assumptions: the threshold values are (uniformly) random; and the activation functions are monotone and submodular. For an initial set of active nodes $S$, let $\sigma(S)$ denote the expected number of active nodes at termination. Here we prove a conjecture of KKT: we show that the function $\sigma(S)$ is submodular under the assumptions above. We prove the same result for the expected value of any monotone, submodular function of the set of active nodes at termination.
[ { "version": "v1", "created": "Sat, 2 Dec 2006 07:00:48 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 01:40:04 GMT" } ]
2011-09-07T00:00:00
[ [ "Mossel", "Elchanan", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" } ]
math/0612083
Yves Guiraud
Yves Guiraud
Termination orders for 3-dimensional rewriting
30 pages, 35 figures
Journal of Pure and Applied Algebra, Volume 207, Issue 2, October 2006, Pages 341-371
10.1016/j.jpaa.2005.10.011
null
math.CT cs.LO
null
This paper studies 3-polygraphs as a framework for rewriting on two-dimensional words. A translation of term rewriting systems into 3-polygraphs with explicit resource management is given, and the respective computational properties of each system are studied. Finally, a convergent 3-polygraph for the (commutative) theory of Z/2Z-vector spaces is given. In order to prove these results, it is explained how to craft a class of termination orders for 3-polygraphs.
[ { "version": "v1", "created": "Mon, 4 Dec 2006 11:32:52 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiraud", "Yves", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0612084
Yves Guiraud
Yves Guiraud
Termination orders for 3-polygraphs
4 pages, 12 figures
Comptes-Rendus de l'Academie des Sciences Serie I, Volume 342, Issue 4, 15 February 2006, Pages 219-222
10.1016/j.crma.2005.12.019
null
math.CT cs.LO
null
This note presents the first known class of termination orders for 3-polygraphs, together with an application.
[ { "version": "v1", "created": "Mon, 4 Dec 2006 11:45:08 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiraud", "Yves", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0612088
Yves Guiraud
Yves Guiraud
Two polygraphic presentations of Petri nets
28 pages, 24 figures
Theoretical Computer Science, Volume 360, Issues 1-3, 21 August 2006, Pages 124-146
10.1016/j.tcs.2006.02.015
null
math.CT cs.LO
null
This document gives an algebraic and two polygraphic translations of Petri nets, all three providing an easier way to describe reductions and to identify some of them. The first one sees places as generators of a commutative monoid and transitions as rewriting rules on it: this setting is totally equivalent to Petri nets, but lacks any graphical intuition. The second one considers places as 1-dimensional cells and transitions as 2-dimensional ones: this translation recovers a graphical meaning but raises many difficulties since it uses explicit permutations. Finally, the third translation sees places as degenerated 2-dimensional cells and transitions as 3-dimensional ones: this is a setting equivalent to Petri nets, equipped with a graphical interpretation.
[ { "version": "v1", "created": "Mon, 4 Dec 2006 12:35:10 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiraud", "Yves", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
math/0612089
Yves Guiraud
Yves Guiraud
The three dimensions of proofs
38 pages, 50 figures
Annals of Pure and Applied Logic, Volume 141, Issues 1-2, August 2006, Pages 266-295
10.1016/j.apal.2005.12.012
null
math.CT cs.LO math.LO
null
In this document, we study a 3-polygraphic translation for the proofs of SKS, a formal system for classical propositional logic. We prove that the free 3-category generated by this 3-polygraph describes the proofs of classical propositional logic modulo structural bureaucracy. We give a 3-dimensional generalization of Penrose diagrams and use it to provide several pictures of a proof. We sketch how local transformations of proofs yield a non contrived example of 4-dimensional rewriting.
[ { "version": "v1", "created": "Mon, 4 Dec 2006 13:03:09 GMT" } ]
2007-05-23T00:00:00
[ [ "Guiraud", "Yves", "" ] ]
[ { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
math/0612264
Olga Holtz
James Demmel, Ioana Dumitriu, Olga Holtz
Fast linear algebra is stable
26 pages; final version; to appear in Numerische Mathematik
Numer. Math. 108 (2007), no. 1, 59-91
10.1007/s00211-007-0114-x
null
math.NA cs.CC cs.DS
null
In an earlier paper, we showed that a large class of fast recursive matrix multiplication algorithms is stable in a normwise sense, and that in fact if multiplication of $n$-by-$n$ matrices can be done by any algorithm in $O(n^{\omega + \eta})$ operations for any $\eta > 0$, then it can be done stably in $O(n^{\omega + \eta})$ operations for any $\eta > 0$. Here we extend this result to show that essentially all standard linear algebra operations, including LU decomposition, QR decomposition, linear equation solving, matrix inversion, solving least squares problems, (generalized) eigenvalue problems and the singular value decomposition can also be done stably (in a normwise sense) in $O(n^{\omega + \eta})$ operations.
[ { "version": "v1", "created": "Sun, 10 Dec 2006 20:44:57 GMT" }, { "version": "v2", "created": "Tue, 22 May 2007 19:31:20 GMT" }, { "version": "v3", "created": "Tue, 28 Aug 2007 20:15:50 GMT" } ]
2011-11-09T00:00:00
[ [ "Demmel", "James", "" ], [ "Dumitriu", "Ioana", "" ], [ "Holtz", "Olga", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
math/0612612
George Bell
George I. Bell, Daniel S. Hirschberg, Pablo Guerrero-Garcia
The minimum size required of a solitaire army
22 pages, 12 figures
INTEGERS: Electronic Journal of Combinatorial Number Theory 7 (2007) #G07
null
null
math.CO cs.DM
null
The solitaire army is a one-person peg jumping game where a player attempts to advance an "army" of pegs as far as possible into empty territory. The game was introduced by John Conway and is also known as "Conway's Soldiers". We consider various generalizations of this game in different 2D geometries, unify them under a common mathematical framework, and find the minimum size army capable of advancing a given number of steps.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 17:55:27 GMT" }, { "version": "v2", "created": "Sat, 11 Aug 2007 13:43:51 GMT" } ]
2007-08-11T00:00:00
[ [ "Bell", "George I.", "" ], [ "Hirschberg", "Daniel S.", "" ], [ "Guerrero-Garcia", "Pablo", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
math/0612682
Alexander Olshevsky
Alex Olshevsky, John N. Tsitsiklis
Convergence Speed in Distributed Consensus and Control
null
null
null
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the convergence speed of distributed iterative algorithms for the consensus and averaging problems, with emphasis on the latter. We first consider the case of a fixed communication topology. We show that a simple adaptation of a consensus algorithm leads to an averaging algorithm. We prove lower bounds on the worst-case convergence time for various classes of linear, time-invariant, distributed consensus methods, and provide an algorithm that essentially matches those lower bounds. We then consider the case of a time-varying topology, and provide a polynomial-time averaging algorithm.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 06:45:41 GMT" }, { "version": "v2", "created": "Wed, 14 Jan 2009 22:01:01 GMT" } ]
2011-06-13T00:00:00
[ [ "Olshevsky", "Alex", "" ], [ "Tsitsiklis", "John N.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
math/0701020
Branko Malesevic
Bojan D. Banjac, Milica D. Makragic, Branko J. Malesevic
Some notes on a method for proving inequalities by computer
in Results in Mathematics 07/2015
null
10.1007/s00025-015-0485-8
null
math.CA cs.MS math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we consider mathematical fundamentals of one method for proving inequalities by computer, based on the Remez algorithm. Using the well-known results of undecidability of the existence of zeros of real elementary functions, we demonstrate that the considered method generally in practice becomes one heuristic for the verification of inequalities. We give some improvements of the inequalities considered in the theorems for which the existing proofs have been based on the numerical verifications of Remez algorithm.
[ { "version": "v1", "created": "Sun, 31 Dec 2006 07:16:29 GMT" }, { "version": "v10", "created": "Tue, 28 Oct 2014 17:19:06 GMT" }, { "version": "v11", "created": "Wed, 6 May 2015 17:27:47 GMT" }, { "version": "v12", "created": "Tue, 14 Jul 2015 18:14:12 GMT" }, { "version": "v2", "created": "Wed, 11 Jul 2007 17:26:10 GMT" }, { "version": "v3", "created": "Mon, 31 Dec 2012 19:48:14 GMT" }, { "version": "v4", "created": "Fri, 25 Jan 2013 16:29:02 GMT" }, { "version": "v5", "created": "Mon, 28 Jan 2013 20:59:27 GMT" }, { "version": "v6", "created": "Wed, 15 May 2013 18:09:40 GMT" }, { "version": "v7", "created": "Fri, 17 May 2013 06:48:25 GMT" }, { "version": "v8", "created": "Fri, 29 Nov 2013 17:28:20 GMT" }, { "version": "v9", "created": "Wed, 19 Feb 2014 18:48:06 GMT" } ]
2015-07-15T00:00:00
[ [ "Banjac", "Bojan D.", "" ], [ "Makragic", "Milica D.", "" ], [ "Malesevic", "Branko J.", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
math/0701102
Sasha Sodin
Shachar Lovett and Sasha Sodin
Almost Euclidean sections of the N-dimensional cross-polytope using O(N) random bits
16 pages; minor changes in the introduction to make it more accessible to both Math and CS readers
Commun. Contemp. Math. 10 (2008), no. 4, 477--489.
10.1142/S0219199708002879
null
math.FA cs.CC math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known that R^N has subspaces of dimension proportional to N on which the \ell_1 norm is equivalent to the \ell_2 norm; however, no explicit constructions are known. Extending earlier work by Artstein--Avidan and Milman, we prove that such a subspace can be generated using O(N) random bits.
[ { "version": "v1", "created": "Wed, 3 Jan 2007 18:25:26 GMT" }, { "version": "v2", "created": "Mon, 22 Jan 2007 22:06:56 GMT" }, { "version": "v3", "created": "Mon, 20 Oct 2008 16:57:36 GMT" } ]
2009-04-12T00:00:00
[ [ "Lovett", "Shachar", "" ], [ "Sodin", "Sasha", "" ] ]
[ { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
math/0701131
Holger Rauhut
Holger Rauhut, Karin Schnass, Pierre Vandergheynst
Compressed Sensing and Redundant Dictionaries
error in a constant corrected
IEEE Trans. Inform. Theory, 54(5):2210-2219, 2008
10.1109/TIT.2008.920190
null
math.PR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article extends the concept of compressed sensing to signals that are not sparse in an orthonormal basis but rather in a redundant dictionary. It is shown that a matrix, which is a composition of a random matrix of certain type and a deterministic dictionary, has small restricted isometry constants. Thus, signals that are sparse with respect to the dictionary can be recovered via Basis Pursuit from a small number of random measurements. Further, thresholding is investigated as recovery algorithm for compressed sensing and conditions are provided that guarantee reconstruction with high probability. The different schemes are compared by numerical experiments.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 09:13:40 GMT" }, { "version": "v2", "created": "Tue, 9 Nov 2010 11:15:17 GMT" } ]
2010-11-10T00:00:00
[ [ "Rauhut", "Holger", "" ], [ "Schnass", "Karin", "" ], [ "Vandergheynst", "Pierre", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
math/0701142
Marie Cottrell
Eric De Bodt (ESA, Iag-Fin, Dice), Marie Cottrell (MATISSE, Samos), Patrick Letr\'emy (MATISSE, Samos), Michel Verleysen (DICE)
On the use of self-organizing maps to accelerate vector quantization
A la suite de la conference ESANN 1999
Neurocomputing 56 (2004) 187-203
10.1016/j.neucom.2003.09.009
null
math.ST cs.NE stat.TH
null
Self-organizing maps (SOM) are widely used for their topology preservation property: neighboring input vectors are quantified (or classified) either on the same location or on neighbor ones on a predefined grid. SOM are also widely used for their more classical vector quantization property. We show in this paper that using SOM instead of the more classical Simple Competitive Learning (SCL) algorithm drastically increases the speed of convergence of the vector quantization process. This fact is demonstrated through extensive simulations on artificial and real examples, with specific SOM (fixed and decreasing neighborhoods) and SCL algorithms.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 15:42:43 GMT" } ]
2016-08-14T00:00:00
[ [ "De Bodt", "Eric", "", "ESA, Iag-Fin, Dice" ], [ "Cottrell", "Marie", "", "MATISSE, Samos" ], [ "Letrémy", "Patrick", "", "MATISSE, Samos" ], [ "Verleysen", "Michel", "", "DICE" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0701144
Marie Cottrell
Eric De Bodt (ESA, Iag-Fin), Marie Cottrell (SAMOS, Matisse), Michel Verleysen (DICE)
Statistical tools to assess the reliability of self-organizing maps
A la suite de la conf\'{e}rence ESANN 2000
Neural Networks 15, 8-9 (2002) 967-978
null
null
math.ST cs.NE stat.TH
null
Results of neural network learning are always subject to some variability, due to the sensitivity to initial conditions, to convergence to local minima, and, sometimes more dramatically, to sampling variability. This paper presents a set of tools designed to assess the reliability of the results of Self-Organizing Maps (SOM), i.e. to test on a statistical basis the confidence we can have on the result of a specific SOM. The tools concern the quantization error in a SOM, and the neighborhood relations (both at the level of a specific pair of observations and globally on the map). As a by-product, these measures also allow to assess the adequacy of the number of units chosen in a map. The tools may also be used to measure objectively how the SOM are less sensitive to non-linear optimization problems (local minima, convergence, etc.) than other neural network models.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 16:04:09 GMT" } ]
2007-06-13T00:00:00
[ [ "De Bodt", "Eric", "", "ESA, Iag-Fin" ], [ "Cottrell", "Marie", "", "SAMOS, Matisse" ], [ "Verleysen", "Michel", "", "DICE" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0701145
Marie Cottrell
Riadh Kallel (MATISSE, Samos), Marie Cottrell (MATISSE, Samos), Vincent Vigneron (MATISSE, Samos)
Bootstrap for neural model selection
A la suite de la conf\'{e}rence ESANN 2000
Neurocomputing 48 (2002) 175-183
10.1016/S0925-2312(01)00650-6
null
math.ST cs.NE stat.TH
null
Bootstrap techniques (also called resampling computation techniques) have introduced new advances in modeling and model evaluation. Using resampling methods to construct a series of new samples which are based on the original data set, allows to estimate the stability of the parameters. Properties such as convergence and asymptotic normality can be checked for any particular observed data set. In most cases, the statistics computed on the generated data sets give a good idea of the confidence regions of the estimates. In this paper, we debate on the contribution of such methods for model selection, in the case of feedforward neural networks. The method is described and compared with the leave-one-out resampling method. The effectiveness of the bootstrap method, versus the leave-one-out methode, is checked through a number of examples.
[ { "version": "v1", "created": "Thu, 4 Jan 2007 16:18:33 GMT" } ]
2007-06-13T00:00:00
[ [ "Kallel", "Riadh", "", "MATISSE, Samos" ], [ "Cottrell", "Marie", "", "MATISSE, Samos" ], [ "Vigneron", "Vincent", "", "MATISSE, Samos" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0701152
Marie Cottrell
Marie Cottrell (MATISSE, Samos), Patrick Letr\'emy (MATISSE, Samos)
Missing values : processing with the Kohonen algorithm
null
Dans ASMDA 2005 CD-ROM Proceedings - ASMDA 2005, Brest : France (2005)
null
null
math.ST cs.NE stat.TH
null
The processing of data which contain missing values is a complicated and always awkward problem, when the data come from real-world contexts. In applications, we are very often in front of observations for which all the values are not available, and this can occur for many reasons: typing errors, fields left unanswered in surveys, etc. Most of the statistical software (as SAS for example) simply suppresses incomplete observations. It has no practical consequence when the data are very numerous. But if the number of remaining data is too small, it can remove all significance to the results. To avoid suppressing data in that way, it is possible to replace a missing value with the mean value of the corresponding variable, but this approximation can be very bad when the variable has a large variance. So it is very worthwhile seeing that the Kohonen algorithm (as well as the Forgy algorithm) perfectly deals with data with missing values, without having to estimate them beforehand. We are particularly interested in the Kohonen algorithm for its visualization properties.
[ { "version": "v1", "created": "Fri, 5 Jan 2007 06:06:02 GMT" } ]
2007-10-04T00:00:00
[ [ "Cottrell", "Marie", "", "MATISSE, Samos" ], [ "Letrémy", "Patrick", "", "MATISSE, Samos" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0701261
Urs Niesen
Urs Niesen, Aslan Tchamkerten
Tracking Stopping Times Through Noisy Observations
19 pages, 4 figures, to appear in IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 55, pp. 422-432, January 2009
10.1109/TIT.2008.2008115
null
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel quickest detection setting is proposed which is a generalization of the well-known Bayesian change-point detection model. Suppose \{(X_i,Y_i)\}_{i\geq 1} is a sequence of pairs of random variables, and that S is a stopping time with respect to \{X_i\}_{i\geq 1}. The problem is to find a stopping time T with respect to \{Y_i\}_{i\geq 1} that optimally tracks S, in the sense that T minimizes the expected reaction delay E(T-S)^+, while keeping the false-alarm probability P(T<S) below a given threshold \alpha \in [0,1]. This problem formulation applies in several areas, such as in communication, detection, forecasting, and quality control. Our results relate to the situation where the X_i's and Y_i's take values in finite alphabets and where S is bounded by some positive integer \kappa. By using elementary methods based on the analysis of the tree structure of stopping times, we exhibit an algorithm that computes the optimal average reaction delays for all \alpha \in [0,1], and constructs the associated optimal stopping times T. Under certain conditions on \{(X_i,Y_i)\}_{i\geq 1} and S, the algorithm running time is polynomial in \kappa.
[ { "version": "v1", "created": "Tue, 9 Jan 2007 18:10:42 GMT" }, { "version": "v2", "created": "Sun, 28 Jan 2007 19:58:47 GMT" }, { "version": "v3", "created": "Fri, 8 Jun 2007 16:00:33 GMT" }, { "version": "v4", "created": "Sun, 31 Aug 2008 21:23:01 GMT" } ]
2016-11-17T00:00:00
[ [ "Niesen", "Urs", "" ], [ "Tchamkerten", "Aslan", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0701419
Gilles Stoltz
Gabor Lugosi, Shie Mannor, Gilles Stoltz (DMA)
Strategies for prediction under imperfect monitoring
Journal version of a COLT conference paper
Mathematics of Operations Research (2008) \`a para\^itre
null
null
math.ST cs.LG stat.TH
null
We propose simple randomized strategies for sequential prediction under imperfect monitoring, that is, when the forecaster does not have access to the past outcomes but rather to a feedback signal. The proposed strategies are consistent in the sense that they achieve, asymptotically, the best possible average reward. It was Rustichini (1999) who first proved the existence of such consistent predictors. The forecasters presented here offer the first constructive proof of consistency. Moreover, the proposed algorithms are computationally efficient. We also establish upper bounds for the rates of convergence. In the case of deterministic feedback, these rates are optimal up to logarithmic terms.
[ { "version": "v1", "created": "Mon, 15 Jan 2007 16:45:38 GMT" }, { "version": "v2", "created": "Sun, 22 Apr 2007 18:54:48 GMT" }, { "version": "v3", "created": "Thu, 12 Jul 2007 15:44:59 GMT" }, { "version": "v4", "created": "Mon, 7 Jan 2008 14:21:58 GMT" } ]
2008-01-07T00:00:00
[ [ "Lugosi", "Gabor", "", "DMA" ], [ "Mannor", "Shie", "", "DMA" ], [ "Stoltz", "Gilles", "", "DMA" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
math/0701647
Jean-Luc Marichal
Raymond Bisdorff, Jean-Luc Marichal
Counting non-isomorphic maximal independent sets of the n-cycle graph
Revised version
Journal of Integer Sequences 11 (5) (2008), Article 08.5.7
null
null
math.CO cs.DM math.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The number of maximal independent sets of the n-cycle graph C_n is known to be the nth term of the Perrin sequence. The action of the automorphism group of C_n on the family of these maximal independent sets partitions this family into disjoint orbits, which represent the non-isomorphic (i.e., defined up to a rotation and a reflection) maximal independent sets. We provide exact formulas for the total number of orbits and the number of orbits having a given number of isomorphic representatives. We also provide exact formulas for the total number of unlabeled (i.e., defined up to a rotation) maximal independent sets and the number of unlabeled maximal independent sets having a given number of isomorphic representatives. It turns out that these formulas involve both Perrin and Padovan sequences.
[ { "version": "v1", "created": "Tue, 23 Jan 2007 15:37:47 GMT" }, { "version": "v2", "created": "Mon, 15 Dec 2008 13:54:51 GMT" } ]
2010-11-19T00:00:00
[ [ "Bisdorff", "Raymond", "" ], [ "Marichal", "Jean-Luc", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" } ]
math/0701791
Boris Ettinger
Boris Ettinger, Niv Sarig, Yosef Yomdin
Linear versus Non-linear Acquisition of Step-Functions
Major revision, added chapters 4, 5. 34 pages, 3 figures
null
null
null
math.CA cs.CV
null
We address in this paper the following two closely related problems: 1. How to represent functions with singularities (up to a prescribed accuracy) in a compact way? 2. How to reconstruct such functions from a small number of measurements? The stress is on a comparison of linear and non-linear approaches. As a model case we use piecewise-constant functions on [0,1], in particular, the Heaviside jump function. Considered as a curve in the Hilbert space, it is completely characterized by the fact that any two its disjoint chords are orthogonal. We reinterpret this fact in a context of step-functions in one or two variables. Next we study the limitations on representability and reconstruction of piecewise-constant functions by linear and semi-linear methods. Our main tools in this problem are Kolmogorov's n-width and entropy, as well as Temlyakov's (N,m)-width. On the positive side, we show that a very accurate non-linear reconstruction is possible. It goes through a solution of certain specific non-linear systems of algebraic equations. We discuss the form of these systems and methods of their solution, stressing their relation to Moment Theory and Complex Analysis. Finally, we informally discuss two problems in Computer Imaging which are parallel to the problems 1 and 2 above: compression of still images and video-sequences on one side, and image reconstruction from indirect measurement (for example, in Computer Tomography), on the other.
[ { "version": "v1", "created": "Sat, 27 Jan 2007 09:26:16 GMT" }, { "version": "v2", "created": "Thu, 1 Nov 2007 04:09:12 GMT" } ]
2007-11-01T00:00:00
[ [ "Ettinger", "Boris", "" ], [ "Sarig", "Niv", "" ], [ "Yomdin", "Yosef", "" ] ]
[ { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]