Next Page: 10000

          Best of arXiv.org for AI, Machine Learning, and Deep Learning – June 2018 | insideBIGDATA      Cache   Translate Page   Web Page Cache   
In this recurring monthly feature, we filter recent research papers appearing on the arXiv.org preprint server for compelling subjects relating to AI, machine learning and deep learning – from disciplines including statistics, mathematics and computer science – and provide you with a useful “best of” list for the past month, as insideBIGDATA reports.
 

Researchers from all over the world contribute to this repository as a prelude to the peer review process for publication in traditional journals. arXiv contains a veritable treasure trove of learning methods you may use one day in the solution of data science problems. We hope to save you some time by picking out articles that represent the most promise for the typical data scientist. The articles listed below represent a fraction of all articles appearing on the preprint server. They are listed in no particular order with a link to each paper along with a brief overview. Especially relevant articles are marked with a “thumbs up” icon. Consider that these are academic research papers, typically geared toward graduate students, post docs, and seasoned professionals. They generally contain a high degree of mathematics so be prepared. 
Enjoy!
Read more...

Source: insideBIGDATA

          英スタートアップ「Wayve」が20分で運転を学習する自律走行車向け人工知能を開発      Cache   Translate Page   Web Page Cache   
英ケンブリッジ大学の研究チームが創設したスタートアップ企業「Wayve(ウェイブ)」は、世界で初めて、人工知能(AI)の手法のひとつ「深層強化学習」を自律走行車に応用し、その成果を研究論文共有プラットフォーム「arXiv...
          The Activity of the Neighbours of Seyfert Galaxies      Cache   Translate Page   Web Page Cache   
Дата и время публикации : 2011-11-17T13:17:42Z Авторы публикации и институты : E. Koulouridis M. Plionis V. Chavushyan D. Dultzin Y. Krongold I. Georgantopoulos J. Leon-Tavares Ссылка на журнал-издание: Ссылка на журнал-издание не найденаКоментарии к cтатье: Accepted for publication in A&A. 17 pages, 4 figures. arXiv admin note: substantial text overlap with arXiv:0910.1355v1 (withdrawn)Первичная категория: astro-ph.CO [...]
          类星体经引力透镜成像成单数还是双数像?      Cache   Translate Page   Web Page Cache   

非常好的问题!非常适合纠正一个爱好者常有的误会!这个答案有好几个转折,希望你有耐心看完:

一个质量有限,引力势没有奇点,且允许光线透过的质量分布作为透镜,必成奇数像。这个约定俗成叫做 Odd-number Theorm (奇数像定理)

说人话就是:星系作为透镜,背后的类星体这样的天体在观察者眼里一定是成奇数像的。如果前景“透镜”是一个点源 (比如,孤立的超大质量黑洞。。。) ,在源和象不完美对齐的时候的确是成两个像的。

这个想法首先由 Dyer & Roeder 1980 对质量分布为椭球的星系提出;Burke 1981 进行了推广,得到了上面陈述的更一般的奇数像定理;而严格的微分拓扑数学证明是 McKenzie 1985 年给出的。关于这个定理在几何上的严格性似乎还有一点争议 (例如:Gottlieb 1994),但是在天文上有物理意义的情况下都是成立的。我是数学白痴,所以不乱说任何数学上的东西了,如果你真的感兴趣,可以看这篇专门讲引力透镜背后数学的讲义。在这里,作者利用Poincare-Hopf指数定理给出了证明。

Dyer & Roeder 1980 的文章是从简单几何角度出发考虑的特定情况,还是可以看懂的。如果不用任何数学来说的话,就是:引力透镜成像可以看成是从源所在的平面向成像平面的一个向量空间上的映射。从源 (类星体) 发出的光只有在特定的方向上可以到达观测者的眼里,就是成像。这个过程可以写成一个方程,可以证明,解的个数总是奇数的。Dyer & Roeder考虑的情况是二维平面上的,解的个数是1个或者3个。而对于三维的情况,解的个数可以是1个,3个,或者5个。

写到这里,你可能会觉得答案还是非常反直觉的。因为的确那么多观测到的透镜类星体都是如提问者所说的两重像或者四重像呀?这是因为,理论上能成像,但实际上能不能看到是另外一回事。像的相对强度和位置是受前景透镜质量分布影响的,可以有各种变化。

如果源是点源,透镜质量分布对称,源和像严格对齐,那么只成一个像。这个像的位置就是透镜的中心,所以几乎观测不到的。对不满足这些情况的透镜,奇数像 (3个或者5个) 中总有一个会距离透镜的中心非常接近,换句话说,离透镜本身光度分布最强的地方接近;而且这个像的强度往往很弱。。。所以观测上非常难看到。我打开闪光灯,要你告诉我闪光灯旁边有没有一个LED指示灯,你估计会掐死我的。。。需要说明的是,在寻找透镜类星体的时候,经常会看见只有三个像的情况。这其实是因为有两个像都离中心过近或者过于暗淡了。(参考文章开头的图,答案就是能看到三个:围着星系中心成弧形分布的三个颜色比较蓝的点状天体)

然鹅 (转折又来了!),这个中心像非常重要!

我们都知道引力透镜是广义相对论恩赐给天文学家的一个超级工具!一个现象,仅仅和源到像之间的爱因斯坦半径以内的总质量的分布有关,和任何具体的物理过程都没关系!所以,利用引力透镜研究星系和大尺度上的质量分布,尤其是很可能占主导的暗物质的质量分布是再好不过了。

透镜类星体这样珍稀的天体更是研究星系中心质量分布的最好工具了。关于星系中心有没有暗物质,暗物质占多少?暗物质质量分布受不受重子物质的物理过程影响?中心的质量分布是平下来 (所谓Core)还是翘上去 (所谓Cusp)?这些都是天文学家们到现在还在掐架的问题。在这些问题上,暗弱中心像的作用就体现出来了:这个像的位置和强度对中心质量分布很敏感,如果能观测到,可以帮助我们解开前面说的问题的答案!关于这点,Rusin和马中珮 2001年的文章, 毛淑德,Witt和Koopmans 2001年的文章, Keeton 2003年的文章都是是比较好的读物。

基本上说,星系中心的质量分布越集中,越致密,中心像的位置就越靠中心 (用天体物理语言就是 Steeper central density profile),越难被观测到;注意这里说的是总质量分布,暗物质有发言权的。反之,质量分布越“平坦”,中心像就越容易被看到。

当然,理论上证明容易,观测上找到的确是很难很难的。到目前为止有确认的暗弱中心像的透镜类星体是很少的。首先你要能扣除一个近于完美的前景星系的模型;然后要在残差图像各种乱七八糟的结构里找到一个暗弱的天体;然后你要去跑各种透镜质量分布模型,让这个像的位置能和模型对上;最好还能够确认这个像的能量分布 (观测到的颜色) 和其他像一致。。。这是非常需要细致。。。和运气的工作。

一开始大家认为最有希望的探测方式是用具有超高分辨率的甚长基线射电干涉阵列来看透镜类星体附近的射电连续谱。不仅仅是因为分辨率高,而且因为如果赶上运气好,背景的类星体是射电噪的 (黑洞产生的喷流的同步加速辐射释放出巨大的射电能量),而前景透镜星系没有强烈的射电活动,在射电连续谱上,前景透镜星系是“透明”的。比如 Winn, Rusin, & Kochanek 2003 年观测到的这个:

这篇文章发表在ApJ上,只是说“Possible”。作者们其实对五个类似的系统做了研究,都找到了中心像的候选,但大多数可能性很低。再过了一年,他们才比较确信这个 J1632-0033真的是找到中心像了,于是忙不迭地刷了篇Nature....

当然,并非只有射电波段才能成功,毕竟也不是所有的背景类星体都那么听话的有强射电连续谱辐射。只要分辨率给力,一样可以出奇迹!2005年,东京大学的稻田直久和当时还在普林斯顿大学的大栗真宗领导的团队,利用哈勃空间望远镜的红外照相机NICMOS在透镜类星体系统 SDSS J1004+4112主要透镜星系中心旁边0.2角秒的地方,找到了一个可信度很高的透镜系统的第五个中心像!当然,这也仅仅是可能的候选。

相信你看了这几个例子后,应该能理解这个观测的难度在哪里了。到目前为止,可能性比较高的中心像观测例子都是很少的。

2008年,萌萌的大栗真宗卷土重来,这次是在一个星系团整体暗物质晕为透镜的透镜类星体系统里找到了三重像。在这个特例下,由于前景星系团质量分布的给力,第三像其实不在星系团中心,分离度更高,而且亮度也不错,直接得到了光谱认证!结合文章里给出的漂亮的透镜模型 (图三),这个稀有的星系团透镜类星体甚至被用来给冷暗物质宇宙学模型站台。(

在这之后,天体物理进入了大视场巡天观测的时代,而类星体透镜研究也再不是零敲碎打的个案分析了,而是进入了系统的图像搜索,后续高分辨,光谱认证观测时代。但即便如此,系统的搜索透镜类星体依然不是很容易的事情。目前,全自动图像分析,机器学习等技术纷纷加入战局,相信未来一定会有更多的透镜类星体中心像被挖掘出来的。


最后,用PanSTARRS团队去年发现的一个非常漂亮的透镜类星体五重像奖励还真的读到了最后的你吧。





来源:知乎 www.zhihu.com
作者:黄崧

【知乎日报】千万用户的选择,做朋友圈里的新鲜事分享大牛。 点击下载

此问题还有 1 个回答,查看全部。

          Электронная библиотека БГУ вошла в 30 лучших репозиториев мира      Cache   Translate Page   Web Page Cache   

 Электронная библиотека БГУ вошла в 30 лучших репозиториев мира! По последним данным мирового рейтинга «Transparent Ranking of Repositories» она заняла 27 место в мире. Среди вузовских репозиториев Электронная библиотека замыкает тройку лидеров, уступив позиции Федеральному университету Рио-Гранде-ду-Сул (Бразилия) и Университету Киото (Япония).
 Фундаментальная библиотека БГУ первая в Беларуси начала осуществлять работу по созданию институционального репозитория и размещению в открытом доступе полнотекстовых научных публикаций, учебных и методических материалов ученых и преподавателей университета. Кроме того, библиотека БГУ внедрила процесс перевода имеющихся в своем фонде документов в электронный формат с целью их доступности для всего мирового научного сообщества. В настоящее время в собрании Электронной библиотеки БГУ более 130 000 публикаций ученых и преподавателей университета.
Рейтинг «Transparent Ranking of Repositories» учитывает количество документов в открытом доступе и степень их индексирования поисковой системой по полным текстам научных публикаций «Google Scholar». Таким образом, оценивается уровень открытости академических ресурсов и их интеграция в мировое информационное пространство.
По состоянию на июль месяц текущего года «Transparent Ranking of Repositories» охватил одну тысячу цифровых хранилищ учреждений высшего образования и исследовательских центров со всего мира. Первые строчки заняли «China National Knowledge Infrastructure», «Japan Science and Technology Information Aggregator Electronic J-STAGE», «Europe PubMed Central», «Arxiv.org». Среди белорусских электронных архивов места распределились следующим образом: БНТУ (93), БГТУ (376), ПолессГУ (352), ПГУ (386), ВГМУ (418), ВГУ им. П.Машерова (426), ГрГУ им. Я.Купалы (480), ГрГМУ (565), ГГТУ им. П.Сухого (598), МГУ им. А.Кулешова (608), ГГУ им. Ф.Скорины (775), БРУ (915), БарГУ (845), БГПУ им. М.Танка (948), БГАТУ (956). Среди университетов стран-соседей лучшие показатели у репозиториев Сумского государственного университета (70), Уральского федерального университета (80), Казанского федерального университета (104), Томского государственного университета (105), Национального технического университета «Харьковский политехнический институт» (120), Томского политехнического университета (126), Университета Тарту (145).
Рейтинг репозиториев открытого доступа является инициативой лаборатории «Cybermetrics Lab» научного центра Испании «Concejo Superior de Investigaciones Científicas (CSIC)» (Высший совет по научным исследованиям). Целью ведения рейтинга репозиториев является поддержка открытого доступа к научным публикациям и учебным материалам в электронной форме. С помощью рейтинга его создатели стремятся дополнительно мотивировать исследователей публиковать результаты своей научной деятельности в интернете, делая их доступными для коллег и заинтересованных людей, в какой бы стране они не находились. Одна из основных идей рейтинга электронных библиотек – стимулирование обмена информацией между учеными мира за счет публикации результатов исследований вузов на вузовских сайтах. Это особенно важно в современных условиях, когда обмен научной информацией приобретает первостепенное значение в глобальном масштабе.


          Optimization of a SSP's Header Bidding Strategy using Thompson Sampling. (arXiv:1807.03299v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Grégoire Jauvion, Nicolas Grislain, Pascal Sielenou Dkengne (IMT), Aurélien Garivier (IMT), Sébastien Gerchinovitz (IMT)

Over the last decade, digital media (web or app publishers) generalized the use of real time ad auctions to sell their ad spaces. Multiple auction platforms, also called Supply-Side Platforms (SSP), were created. Because of this multiplicity, publishers started to create competition between SSPs. In this setting, there are two successive auctions: a second price auction in each SSP and a secondary, first price auction, called header bidding auction, between SSPs.In this paper, we consider an SSP competing with other SSPs for ad spaces. The SSP acts as an intermediary between an advertiser wanting to buy ad spaces and a web publisher wanting to sell its ad spaces, and needs to define a bidding strategy to be able to deliver to the advertisers as many ads as possible while spending as little as possible. The revenue optimization of this SSP can be written as a contextual bandit problem, where the context consists of the information available about the ad opportunity, such as properties of the internet user or of the ad placement.Using classical multi-armed bandit strategies (such as the original versions of UCB and EXP3) is inefficient in this setting and yields a low convergence speed, as the arms are very correlated. In this paper we design and experiment a version of the Thompson Sampling algorithm that easily takes this correlation into account. We combine this bayesian algorithm with a particle filter, which permits to handle non-stationarity by sequentially estimating the distribution of the highest bid to beat in order to win an auction. We apply this methodology on two real auction datasets, and show that it significantly outperforms more classical approaches.The strategy defined in this paper is being developed to be deployed on thousands of publishers worldwide.


          An Architecture for the Integration of Different Functional and Structural Plant Models. (arXiv:1807.03300v1 [cs.CY])      Cache   Translate Page   Web Page Cache   

Authors: Qinqin Long, Winfried Kurth, Christophe Pradal, Vincent Migault, Benoît Pallas

Plant scientists use Functional Structural Plant Models (FSPMs) to model plant systems within a limited space-time range. To allow FSPMs to abstract complex plant systems beyond a single model's limitation, an integration that compounds different FSPMs could be a possible solution. However, the integration involves many technical dimensions and a generic software infrastructure for all integration cases is not possible. In this paper, we analyze the requirements of the integration with all the technical dimensions. Instead of an infrastructure, we propose a generic architecture with specific process-related components as a logical level solution by combining an ETL (Extract, Transform and Load) based sub architecture and a C/S (Client/Server) based sub architecture. This allows the integration of different FSP models hosted on the same and different FSP modeling platforms in a flexible way. We demonstrate the usability of the architecture by the implementation of a full infrastructure for the integration of two specific FSPMs, and we illustrate the effectiveness of the infrastructure by several integrative tests.


          Adaptive Adversarial Attack on Scene Text Recognition. (arXiv:1807.03326v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Xiaoyong Yuan, Pan He, Xiaolin Andy Li

Recent studies have shown that state-of-the-art deep learning models are vulnerable to the inputs with small perturbations (adversarial examples). We observe two critical obstacles in adversarial examples: (i) Strong adversarial attacks require manually tuning hyper-parameters, which take longer time to construct a single adversarial example, making it impractical to attack real-time systems; (ii) Most of the studies focus on non-sequential tasks, such as image classification and object detection. Only a few consider sequential tasks. Despite extensive research studies, the cause of adversarial examples remains an open problem, especially on sequential tasks. We propose an adaptive adversarial attack, called AdaptiveAttack, to speed up the process of generating adversarial examples. To validate its effectiveness, we leverage the scene text detection task as a case study of sequential adversarial examples. We further visualize the generated adversarial examples to analyze the cause of sequential adversarial examples. AdaptiveAttack achieved over 99.9\% success rate with 3-6 times speedup compared to state-of-the-art adversarial attacks.


          CANAL: A Cache Timing Analysis Framework via LLVM Transformation. (arXiv:1807.03329v1 [cs.SE])      Cache   Translate Page   Web Page Cache   

Authors: Chungha Sung, Brandon Paulsen, Chao Wang

A unified modeling framework for non-functional properties of a program is essential for research in software analysis and verification, since it reduces burdens on individual researchers to implement new approaches and compare existing approaches. We present CANAL, a framework that models the cache behaviors of a program by transforming its intermediate representation in the LLVM compiler. CANAL inserts auxiliary variables and instructions over these variables, to allow standard verification tools to handle a new class of cache related properties, e.g., for computing the worst-case execution time and detecting side-channel leaks. We demonstrate the effectiveness of CANAL using three verification tools: KLEE, SMACK and Crab-llvm. We confirm the accuracy of our cache model by comparing with CPU cycle-accurate simulation results of GEM5. CANAL is available on GitHub and YouTube.


          An Interesting Structural Property Related to the Problem of Computing All the Best Swap Edges of a Tree Spanner in Unweighted Graphs. (arXiv:1807.03331v1 [cs.DM])      Cache   Translate Page   Web Page Cache   

Authors: Davide Bilò, Kleitos Papadopoulos

In this draft we prove an interesting structural property related to the problem of computing {\em all the best swap edges} of a {\em tree spanner} in unweighted graphs. Previous papers show that the maximum stretch factor of the tree where a failing edge is temporarily swapped with any other available edge that reconnects the tree depends only on the {\em critical edge}. However, in principle, each of the $O(n^2)$ swap edges, where $n$ is the number of vertices of the tree, may have its own critical edge. In this draft we show that there are at most 6 critical edges, i.e., each tree edge $e$ has a {\em critical set} of size at most 6 such that, a critical edge of each swap edge of $e$ is contained in the critical set.


          Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing. (arXiv:1807.03337v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj

In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal end-to-end transmission delay. In addition, we show that using such technique, we can significantly reduce the transmission delay as compared to the conventional approach. In some scenarios, such reduction can even scale with the size of the network. More precisely, by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the end-to-end delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upper-bounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches.


          Troubling Trends in Machine Learning Scholarship. (arXiv:1807.03341v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Zachary C. Lipton, Jacob Steinhardt

Collectively, machine learning (ML) researchers are engaged in the creation and dissemination of knowledge about data-driven algorithms. In a given paper, researchers might aspire to any subset of the following goals, among others: to theoretically characterize what is learnable, to obtain understanding through empirically rigorous experiments, or to build a working system that has high predictive accuracy. While determining which knowledge warrants inquiry may be subjective, once the topic is fixed, papers are most valuable to the community when they act in service of the reader, creating foundational knowledge and communicating as clearly as possible.

Recent progress in machine learning comes despite frequent departures from these ideals. In this paper, we focus on the following four patterns that appear to us to be trending in ML scholarship: (i) failure to distinguish between explanation and speculation; (ii) failure to identify the sources of empirical gains, e.g., emphasizing unnecessary modifications to neural architectures when gains actually stem from hyper-parameter tuning; (iii) mathiness: the use of mathematics that obfuscates or impresses rather than clarifies, e.g., by confusing technical and non-technical concepts; and (iv) misuse of language, e.g., by choosing terms of art with colloquial connotations or by overloading established technical terms.

While the causes behind these patterns are uncertain, possibilities include the rapid expansion of the community, the consequent thinness of the reviewer pool, and the often-misaligned incentives between scholarship and short-term measures of success (e.g., bibliometrics, attention, and entrepreneurial opportunity). While each pattern offers a corresponding remedy (don't do it), we also discuss some speculative suggestions for how the community might combat these trends.


          PCL: Proposal Cluster Learning for Weakly Supervised Object Detection. (arXiv:1807.03342v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Peng Tang, Xinggang Wang, Song Bai, Wei Shen, Xiang Bai, Wenyu Liu, Alan Yuille

Weakly Supervised Object Detection (WSOD), using only image-level annotations to train object detectors, is of growing importance in object recognition. In this paper, we propose a novel end-to-end deep network for WSOD. Unlike previous networks that transfer the object detection problem to an image classification problem using Multiple Instance Learning (MIL), our strategy generates proposal clusters to learn refined instance classifiers by an iterative process. The proposals in the same cluster are spatially adjacent and associated with the same object. This prevents the network from concentrating too much on parts of objects instead of whole objects. We first show that instances can be assigned object or background labels directly based on proposal clusters for instance classifier refinement, and then show that treating each cluster as a small new bag yields fewer ambiguities than the directly assigning label method. The iterative instance classifier refinement is implemented online using multiple streams in convolutional neural networks, where the first is an MIL network and the others are for instance classifier refinement supervised by the preceding one. Experiments are conducted on the PASCAL VOC and ImageNet detection benchmarks for WSOD. Results show that our method outperforms the previous state of the art significantly.


          Complex Fully Convolutional Neural Networks for MR Image Reconstruction. (arXiv:1807.03343v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Muneer Ahmad Dedmari, Sailesh Conjeti, Santiago Estrada, Phillip Ehses, Tony Stöcker, Martin Reuter

Undersampling the k-space data is widely adopted for acceleration of Magnetic Resonance Imaging (MRI). Current deep learning based approaches for supervised learning of MRI image reconstruction employ real-valued operations and representations by treating complex valued k-space/spatial-space as real values. In this paper, we propose complex dense fully convolutional neural network ($\mathbb{C}$DFNet) for learning to de-alias the reconstruction artifacts within undersampled MRI images. We fashioned a densely-connected fully convolutional block tailored for complex-valued inputs by introducing dedicated layers such as complex convolution, batch normalization, non-linearities etc. $\mathbb{C}$DFNet leverages the inherently complex-valued nature of input k-space and learns richer representations. We demonstrate improved perceptual quality and recovery of anatomical structures through $\mathbb{C}$DFNet in contrast to its real-valued counterparts.


          Using Swarm Optimization To Enhance Autoencoders Images. (arXiv:1807.03346v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Maisa Doaud, Michael Mayo

Autoencoders learn data representations through reconstruction. Robust training is the key factor affecting the quality of the learned representations and, consequently, the accuracy of the application that use them. Previous works suggested methods for deciding the optimal autoencoder configuration which allows for robust training. Nevertheless, improving the accuracy of a trained autoencoder has got limited, if no, attention. We propose a new approach that improves the accuracy of a trained autoencoders results and answers the following question, Given a trained autoencoder, a test image, and using a real-parameter optimizer, can we generate better quality reconstructed image version than the one generated by the autoencoder?. Our proposed approach combines both the decoder part of a trained Resitricted Boltman Machine-based autoencoder with the Competitive Swarm Optimization algorithm. Experiments show that it is possible to reconstruct images using trained decoder from randomly initialized representations. Results also show that our approach reconstructed better quality images than the autoencoder in most of the test cases. Indicating that, we can use the approach for improving the performance of a pre-trained autoencoder if it does not give satisfactory results.


          Coordinating the Motion of Labeled Discs with Optimality Guarantees under Extreme Density. (arXiv:1807.03347v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Rupesh Chinta, Shuai D. Han, Jingjin Yu

We push the limit in planning collision-free motions for routing uniform labeled discs in two dimensions. First, from a theoretical perspective, we show that the constant-factor time-optimal routing of labeled discs can be achieved using a polynomial-time algorithm with robot density over $50\%$ in the limit (i.e., over half of the workspace may be occupied by the discs). Second, from a more practical standpoint, we provide a high performance algorithm that computes near-optimal (e.g., $1.x$) solutions under the same density setting.


          Detecting Socio-Economic Impact of Cultural Investment Through Geo-Social Network Analysis. (arXiv:1807.03350v1 [cs.CY])      Cache   Translate Page   Web Page Cache   

Authors: Xiao Zhou, Desislava Hristova, Anastasios Noulas, Cecilia Mascolo

Taking advantage of nearly 4 million transition records for three years in London from a popular location-based social network service, Foursquare, we study how to track the impact and measure the effectiveness of cultural investment in small urban areas. We reveal the underlying relationships between socio-economic status, local cultural expenditure, and network features extracted from user mobility trajectories. This research presents how geo-social and mobile services more generally can be used as a proxy to track local changes as government financial effort is put in developing urban areas, and thus gives evidence and suggestions for further policy-making and investment optimization.


          The Impact of Ridesharing in Mobility-on-Demand Systems: Simulation Case Study in Prague. (arXiv:1807.03352v1 [cs.CY])      Cache   Translate Page   Web Page Cache   

Authors: Davide Fiedler, Michal Čertický, Javier Alonso-Mora, Michal Čáp

In densely populated-cities, the use of private cars for personal transportation is unsustainable, due to high parking and road capacity requirements. The mobility-on-demand systems have been proposed as an alternative to a private car. Such systems consist of a fleet of vehicles that the user of the system can hail for one-way point-to-point trips. These systems employ large-scale vehicle sharing, i.e., one vehicle can be used by several people during one day and consequently the fleet size and the parking space requirements can be reduced, but, at the cost of a non-negligible increase in vehicles miles driven in the system. The miles driven in the system can be reduced by ridesharing, where several people traveling in a similar direction are matched and travel in one vehicle. We quantify the potential of ridesharing in a hypothetical mobility-on-demand system designed to serve all trips that are currently realized by private car in the city of Prague. Our results show that by employing a ridesharing strategy that guarantees travel time prolongation of no more than 10 minutes, the average occupancy of a vehicle will increase to 2.7 passengers. Consequently, the number of vehicle miles traveled will decrease to 35% of the amount in the MoD system without ridesharing and to 60% of the amount in the present state.


          Data Mining in Scientometrics: usage analysis for academic publications. (arXiv:1807.03353v1 [cs.DL])      Cache   Translate Page   Web Page Cache   

Authors: Olesya Mryglod, Yurij Holovatch, Ralph Kenna

We perform a statistical analysis of scientific-publication data with a goal to provide quantitative analysis of scientific process. Such an investigation belongs to the newly established field of scientometrics: a branch of the general science of science that covers all quantitative methods to analyze science and research process. As a case study we consider download and citation statistics of the journal `Europhysics Letters' (EPL), as Europe's flagship letters journal of broad interest to the physics community. While citations are usually considered as an indicator of academic impact, downloads reflect rather the level of attractiveness or popularity of a publication. We discuss peculiarities of both processes and correlations between them.


          HDFD --- A High Deformation Facial Dynamics Benchmark for Evaluation of Non-Rigid Surface Registration and Classification. (arXiv:1807.03354v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Gareth Andrews, Sam Endean, Roberto Dyke, Yukun Lai, Gwenno Ffrancon, Gary KL Tam

Objects that undergo non-rigid deformation are common in the real world. A typical and challenging example is the human faces. While various techniques have been developed for deformable shape registration and classification, benchmarks with detailed labels and landmarks suitable for evaluating such techniques are still limited. In this paper, we present a novel facial dynamic dataset HDFD which addresses the gap of existing datasets, including 4D funny faces with substantial non-isometric deformation, and 4D visual-audio faces of spoken phrases in a minority language (Welsh). Both datasets are captured from 21 participants. The sequences are manually landmarked, with the spoken phrases further rated by a Welsh expert for level of fluency. These are useful for quantitative evaluation of both registration and classification tasks. We further develop a methodology to evaluate several recent non-rigid surface registration techniques, using our dynamic sequences as test cases. The study demonstrates the significance and usefulness of our new dataset --- a challenging benchmark dataset for future techniques.


          The automatic detection of the information operations event basis. (arXiv:1807.03360v1 [cs.CY])      Cache   Translate Page   Web Page Cache   

Authors: D.V. Lande, C.V. Prishchepa

The methodology of automatic detection of the event basis of information operations, reflected in thematic information flows, is described. The presented methodology is based on the technologies for identifying information operations, the formation of the terminological basis of the subject area, the application of cluster analysis with cluster centroids, determined by analyzing the terminology of the information flow. The clusters formed in this way reflect the main events occurring during the information operations and reveal the technique for their implementation.


          Weakly-Supervised Convolutional Neural Networks for Multimodal Image Registration. (arXiv:1807.03361v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Yipeng Hu, Marc Modat, Eli Gibson, Wenqi Li, Nooshin Ghavami, Ester Bonmati, Guotai Wang, Steven Bandula, Caroline M. Moore, Mark Emberton, Sébastien Ourselin, J. Alison Noble, Dean C. Barratt, Tom Vercauteren

One of the fundamental challenges in supervised learning for multimodal image registration is the lack of ground-truth for voxel-level spatial correspondence. This work describes a method to infer voxel-level transformation from higher-level correspondence information contained in anatomical labels. We argue that such labels are more reliable and practical to obtain for reference sets of image pairs than voxel-level correspondence. Typical anatomical labels of interest may include solid organs, vessels, ducts, structure boundaries and other subject-specific ad hoc landmarks. The proposed end-to-end convolutional neural network approach aims to predict displacement fields to align multiple labelled corresponding structures for individual image pairs during the training, while only unlabelled image pairs are used as the network input for inference. We highlight the versatility of the proposed strategy, for training, utilising diverse types of anatomical labels, which need not to be identifiable over all training image pairs. At inference, the resulting 3D deformable image registration algorithm runs in real-time and is fully-automated without requiring any anatomical labels or initialisation. Several network architecture variants are compared for registering T2-weighted magnetic resonance images and 3D transrectal ultrasound images from prostate cancer patients. A median target registration error of 3.6 mm on landmark centroids and a median Dice of 0.87 on prostate glands are achieved from cross-validation experiments, in which 108 pairs of multimodal images from 76 patients were tested with high-quality anatomical labels.


          Hybrid-Vehcloud: An Obstacle Shadowing Approach for VANETs in Urban Environment. (arXiv:1807.03362v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Anirudh Paranjothi, Mohammad S Khan, Mohammed Atiquzzaman

Routing of messages in Vehicular Ad-hoc Networks (VANETs) is challenging due to obstacle shadowing regions with high vehicle densities, which leads to frequent disconnection problems and blocks radio wave propagation between vehicles. Previous researchers used multi-hop, vehicular cloud or roadside infrastructures to solve the routing issue among the vehicles, but they suffer from significant packet delays and frequent packet losses arising from obstacle shadowing. We proposed a vehicular cloud based hybrid technique called Hybrid-Vehcloud to disseminate messages in obstacle shadowing regions, and multi-hop technique to disseminate messages in non-obstacle shadowing regions. The novelty of our approach lies in the fact that our proposed technique dynamically adapts between obstacle shadowing and non-obstacle shadowing regions. Simulation based performance analysis of Hybrid-Vehcloud showed improved performance over Cloud-assisted Message Downlink Dissemination Scheme (CMDS), Cross-Layer Broadcast Protocol (CLBP) and Cloud-VANET schemes at high vehicle densities.


          Talk the Walk: Navigating New York City through Grounded Dialogue. (arXiv:1807.03367v1 [cs.AI])      Cache   Translate Page   Web Page Cache   

Authors: Harm de Vries, Kurt Shuster, Dhruv Batra, Devi Parikh, Jason Weston, Douwe Kiela

We introduce "Talk The Walk", the first large-scale dialogue dataset grounded in action and perception. The task involves two agents (a "guide" and a "tourist") that communicate via natural language in order to achieve a common goal: having the tourist navigate to a given target location. The task and dataset, which are described in detail, are challenging and their full solution is an open problem that we pose to the community. We (i) focus on the task of tourist localization and develop the novel Masked Attention for Spatial Convolutions (MASC) mechanism that allows for grounding tourist utterances into the guide's map, (ii) show it yields significant improvements for both emergent and natural language communication, and (iii) using this method, we establish non-trivial baselines on the full task.


          n-metrics for multiple graph alignment. (arXiv:1807.03368v1 [cs.DM])      Cache   Translate Page   Web Page Cache   

Authors: Sam Safavi, Jose Bento

The work of Ioannidis et al. 2018 introduces a family of distances between two graphs that provides tractable graph alignment strategies. Importantly, the alignment scores produced by this family satisfy the properties of metrics, which is very useful in several learning tasks. In this paper, we generalize this work to compare n graphs by introducing a family of distances, which is an n-metric, i.e., an extension of a metric to n elements that includes a generalization of the triangle inequality. Our new family of distances, includes the ones in the work of Ioannidis et al. 2018 as a special case, and can produce tractable alignments between multiple graphs.


          Ensemble Kalman Filtering for Online Gaussian Process Regression and Learning. (arXiv:1807.03369v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Danil Kuzin, Le Yang, Olga Isupova, Lyudmila Mihaylova

Gaussian process regression is a machine learning approach which has been shown its power for estimation of unknown functions. However, Gaussian processes suffer from high computational complexity, as in a basic form they scale cubically with the number of observations. Several approaches based on inducing points were proposed to handle this problem in a static context. These methods though face challenges with real-time tasks and when the data is received sequentially over time. In this paper, a novel online algorithm for training sparse Gaussian process models is presented. It treats the mean and hyperparameters of the Gaussian process as the state and parameters of the ensemble Kalman filter, respectively. The online evaluation of the parameters and the state is performed on new upcoming samples of data. This procedure iteratively improves the accuracy of parameter estimates. The ensemble Kalman filter reduces the computational complexity required to obtain predictions with Gaussian processes preserving the accuracy level of these predictions. The performance of the proposed method is demonstrated on the synthetic dataset and real large dataset of UK house prices.


          Beyond Pixels: Image Provenance Analysis Leveraging Metadata. (arXiv:1807.03376v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Aparna Bharati, Daniel Moreira, Joel Brogan, Patricia Hale, Kevin W. Bowyer, Patrick J. Flynn, Anderson Rocha, Walter J. Scheirer

Creative works, whether paintings or memes, follow unique journeys that result in their final form. Understanding these journeys, a process known as "provenance analysis", provides rich insights into the use, motivation, and authenticity underlying any given work. The application of this type of study to the expanse of unregulated content on the Internet is what we consider in this paper. Provenance analysis provides a snapshot of the chronology and validity of content as it is uploaded, re-uploaded, and modified over time. Although still in its infancy, automated provenance analysis for online multimedia is already being applied to different types of content. Most current works seek to build provenance graphs based on the shared content between images or videos. This can be a computationally expensive task, especially when considering the vast influx of content that the Internet sees every day. Utilizing non-content-based information, such as timestamps, geotags, and camera IDs can help provide important insights into the path a particular image or video has traveled during its time on the Internet without large computational overhead. This paper tests the scope and applicability of metadata-based inferences for provenance graph construction in two different scenarios: digital image forensics and cultural analytics.


          Online Scoring with Delayed Information: A Convex Optimization Viewpoint. (arXiv:1807.03379v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Avishek Ghosh, Kannan Ramchandran

We consider a system where agents enter in an online fashion and are evaluated based on their attributes or context vectors. There can be practical situations where this context is partially observed, and the unobserved part comes after some delay. We assume that an agent, once left, cannot re-enter the system. Therefore, the job of the system is to provide an estimated score for the agent based on her instantaneous score and possibly some inference of the instantaneous score over the delayed score. In this paper, we estimate the delayed context via an online convex game between the agent and the system. We argue that the error in the score estimate accumulated over $T$ iterations is small if the regret of the online convex game is small. Further, we leverage side information about the delayed context in the form of a correlation function with the known context. We consider the settings where the delay is fixed or arbitrarily chosen by an adversary. Furthermore, we extend the formulation to the setting where the contexts are drawn from some Banach space. Overall, we show that the average penalty for not knowing the delayed context while making a decision scales with $\mathcal{O}(\frac{1}{\sqrt{T}})$, where this can be improved to $\mathcal{O}(\frac{\log T}{T})$ under special setting.


          An Attention Model for group-level emotion recognition. (arXiv:1807.03380v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Aarush Gupta (1), Dakshit Agrawal (1), Hardik Chauhan (1), Jose Dolz (2), Marco Pedersoli (2) ((1) Indian Institute of Technology Roorkee, India, (2) École de Technologie Supérieure, Montreal, Canada)

In this paper we propose a new approach for classifying the global emotion of images containing groups of people. To achieve this task, we consider two different and complementary sources of information: i) a global representation of the entire image (ii) a local representation where only faces are considered. While the global representation of the image is learned with a convolutional neural network (CNN), the local representation is obtained by merging face features through an attention mechanism. The two representations are first learned independently with two separate CNN branches and then fused through concatenation in order to obtain the final group-emotion classifier. For our submission to the EmotiW 2018 group-level emotion recognition challenge, we combine several variations of the proposed model into an ensemble, obtaining a final accuracy of 64.83% on the test set and ranking 4th among all challenge participants.


          Multicore architecture and cache optimization techniques for solving graph problems. (arXiv:1807.03383v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Alvaro Tzul

With the advent of era of Big Data and Internet of Things, there has been an exponential increase in the availability of large data sets. These data sets require in-depth analysis that provides intelligence for improvements in methods for academia and industry. Majority of the data sets are represented and available in the form of graphs. Therefore, the problem at hand is to address solving graph problems. Since the data sets are large, the time it takes to analyze the data is significant. Hence, in this paper, we explore techniques that can exploit existing multicore architecture to address the issue. Currently, most Central Processing Units have incorporated multicore design; in addition, co-processors such as Graphics Processing Units have large number of cores that can used to gain significant speedup. Therefore, in this paper techniques to exploit the advantages of multicore architecture is studied.


          Process Monitoring Using Maximum Sequence Divergence. (arXiv:1807.03387v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Yihuang Kang, Vladimir Zadorozhny

Process Monitoring involves tracking a system's behaviors, evaluating the current state of the system, and discovering interesting events that require immediate actions. In this paper, we consider monitoring temporal system state sequences to help detect the changes of dynamic systems, check the divergence of the system development, and evaluate the significance of the deviation. We begin with discussions of data reduction, symbolic data representation, and the anomaly detection in temporal discrete sequences. Time-series representation methods are also discussed and used in this paper to discretize raw data into sequences of system states. Markov Chains and stationary state distributions are continuously generated from temporal sequences to represent snapshots of the system dynamics in different time frames. We use generalized Jensen-Shannon Divergence as the measure to monitor changes of the stationary symbol probability distributions and evaluate the significance of system deviations. We prove that the proposed approach is able to detect deviations of the systems we monitor and assess the deviation significance in probabilistic manner.


          Evolving Multimodal Robot Behavior via Many Stepping Stones with the Combinatorial Multi-Objective Evolutionary Algorithm. (arXiv:1807.03392v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Joost Huizinga, Jeff Clune

An important challenge in reinforcement learning, including evolutionary robotics, is to solve multimodal problems, where agents have to act in qualitatively different ways depending on the circumstances. Because multimodal problems are often too difficult to solve directly, it is helpful to take advantage of staging, where a difficult task is divided into simpler subtasks that can serve as stepping stones for solving the overall problem. Unfortunately, choosing an effective ordering for these subtasks is difficult, and a poor ordering can reduce the speed and performance of the learning process. Here, we provide a thorough introduction and investigation of the Combinatorial Multi-Objective Evolutionary Algorithm (CMOEA), which avoids ordering subtasks by allowing all combinations of subtasks to be explored simultaneously. We compare CMOEA against two algorithms that can similarly optimize on multiple subtasks simultaneously: NSGA-II and Lexicase Selection. The algorithms are tested on a multimodal robotics problem with six subtasks as well as a maze navigation problem with a hundred subtasks. On these problems, CMOEA either outperforms or is competitive with the controls. Separately, we show that adding a linear combination over all objectives can improve the ability of NSGA-II to solve these multimodal problems. Lastly, we show that, in contrast to NSGA-II and Lexicase Selection, CMOEA can effectively leverage secondary objectives to achieve state-of-the-art results on the robotics task. In general, our experiments suggest that CMOEA is a promising, state-of-the-art algorithm for solving multimodal problems.


          Towards Non-Parametric Learning to Rank. (arXiv:1807.03395v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Ao Liu, Qiong Wu, Zhenming Liu, Lirong Xia

This paper studies a stylized, yet natural, learning-to-rank problem and points out the critical incorrectness of a widely used nearest neighbor algorithm. We consider a model with $n$ agents (users) $\{x_i\}_{i \in [n]}$ and $m$ alternatives (items) $\{y_j\}_{j \in [m]}$, each of which is associated with a latent feature vector. Agents rank items nondeterministically according to the Plackett-Luce model, where the higher the utility of an item to the agent, the more likely this item will be ranked high by the agent. Our goal is to find neighbors of an arbitrary agent or alternative in the latent space.

We first show that the Kendall-tau distance based kNN produces incorrect results in our model. Next, we fix the problem by introducing a new algorithm with features constructed from "global information" of the data matrix. Our approach is in sharp contrast to most existing feature engineering methods. Finally, we design another new algorithm identifying similar alternatives. The construction of alternative features can be done using "local information," highlighting the algorithmic difference between finding similar agents and similar alternatives.


          On Training Recurrent Networks with Truncated Backpropagation Through Time in Speech Recognition. (arXiv:1807.03396v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Hao Tang, James Glass

Recurrent neural networks have been the dominant models for many speech and language processing tasks. However, we understand little about the behavior and the class of functions recurrent networks can realize. Moreover, the heuristics used during training complicate the analyses. In this paper, we study recurrent networks' ability to learn long-term dependency in the context of speech recognition. We consider two decoding approaches, online and batch decoding, and show the classes of functions to which the decoding approaches correspond. We then draw a connection between batch decoding and a popular training approach for recurrent networks, truncated backpropagation through time. Changing the decoding approach restricts the amount of past history recurrent networks can use for prediction, allowing us to analyze their ability to remember. Empirically, we utilize long-term dependency in subphonetic states, phonemes, and words, and show how the design decisions, such as the decoding approach, lookahead, context frames, and consecutive prediction, characterize the behavior of recurrent networks. Finally, we draw a connection between Markov processes and vanishing gradients. These results have implications for studying the long-term dependency in speech data and how these properties are learned by recurrent networks.


          Detecting Levels of Depression in Text Based on Metrics. (arXiv:1807.03397v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Ashwath Kumar Salimath, Robin K Thomas, Sethuram Ramalinga Reddy, Yuhao Qiao

Depression is one of the most common and a major concern for society. Proper monitoring using devices that can aid in its detection could be helpful to prevent it all together. The Distress Analysis Interview Corpus (DAIC) is used to build a metric-based depression detection. We have designed a metric to describe the level of depression using negative sentences and classify the participant accordingly. The score generated from the algorithm is then levelled up to denote the intensity of depression. The results show that measuring depression is very complex to using text alone as other factors are not taken into consideration. Further, In the paper, the limitations of measuring depression using text are described, and future suggestions are made.


          Jointly Embedding Entities and Text with Distant Supervision. (arXiv:1807.03399v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Denis Newman-Griffis, Albert M. Lai, Eric Fosler-Lussier

Learning representations for knowledge base entities and concepts is becoming increasingly important for NLP applications. However, recent entity embedding methods have relied on structured resources that are expensive to create for new domains and corpora. We present a distantly-supervised method for jointly learning embeddings of entities and text from an unnanotated corpus, using only a list of mappings between entities and surface forms. We learn embeddings from open-domain and biomedical corpora, and compare against prior methods that rely on human-annotated text or large knowledge graph structure. Our embeddings capture entity similarity and relatedness better than prior work, both in existing biomedical datasets and a new Wikipedia-based dataset that we release to the community. Results on analogy completion and entity sense disambiguation indicate that entities and words capture complementary information that can be effectively combined for downstream use.


          High-Resolution Mammogram Synthesis using Progressive Generative Adversarial Networks. (arXiv:1807.03401v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Dimitrios Korkinof, Tobias Rijken, Michael O'Neill, Joseph Yearsley, Hugh Harvey, Ben Glocker

The ability to generate synthetic medical images is useful for data augmentation, domain transfer, and out-of-distribution detection. However, generating realistic, high-resolution medical images is challenging, particularly for Full Field Digital Mammograms (FFDM), due to the textural heterogeneity, fine structural details and specific tissue properties. In this paper, we explore the use of progressively trained generative adversarial networks (GANs) to synthesize mammograms, overcoming the underlying instabilities when training such adversarial models. This work is the first to show that generation of realistic synthetic medical images is feasible at up to 1280x1024 pixels, the highest resolution achieved for medical image synthesis, enabling visualizations within standard mammographic hanging protocols. We hope this work can serve as a useful guide and facilitate further research on GANs in the medical imaging domain.


          IGLOO: Slicing the Features Space to Represent Long Sequences. (arXiv:1807.03402v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Vsevolod Sourkov

We introduce a new neural network architecture, IGLOO, which aims at providing a representation for long sequences where RNNs fail to converge. The structure uses the relationships between random patches sliced out of the features space of some backbone 1 dimensional CNN to find a representation. This paper explains the implementation of the method and provides benchmark results commonly used for RNNs and compare IGLOO to other structures recently published. It is found that IGLOO can deal with sequences of up to 25,000 time steps. For shorter sequences it is also found to be effective and we find that it achieves the highest score in the literature for the permuted MNIST task. Benchmarks also show that IGLOO can run at the speed of the CuDNN optimised GRU or LSTM without being tied to any specific hardware.


          Optimal Parameter Choices via Precise Black-Box Analysis. (arXiv:1807.03403v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Benjamin Doerr, Carola Doerr, Jing Yang

It has been observed that some working principles of evolutionary algorithms, in particular, the influence of the parameters, cannot be understood from results on the asymptotic order of the runtime, but only from more precise results. In this work, we complement the emerging topic of precise runtime analysis with a first precise complexity theoretic result. Our vision is that the interplay between algorithm analysis and complexity theory becomes a fruitful tool also for analyses more precise than asymptotic orders of magnitude.

As particular result, we prove that the unary unbiased black-box complexity of the OneMax benchmark function class is $n \ln(n) - cn \pm o(n)$ for a constant $c$ which is between $0.2539$ and $0.2665$. This runtime can be achieved with a simple (1+1)-type algorithm using a fitness-dependent mutation strength. When translated into the fixed-budget perspective, our algorithm finds solutions which are roughly 13\% closer to the optimum than those of the best previously known algorithms. To prove our results, we formulate several new versions of the variable drift theorems which might be of independent interest.


          Hierarchical Visualization of Materials Space with Graph Convolutional Neural Networks. (arXiv:1807.03404v1 [cond-mat.mtrl-sci])      Cache   Translate Page   Web Page Cache   

Authors: Tian Xie, Jeffrey C. Grossman

The combination of high throughput computation and machine learning has led to a new paradigm in materials design by allowing for the direct screening of vast portions of structural, chemical, and property space. The use of these powerful techniques leads to the generation of enormous amounts of data, which in turn calls for new techniques to efficiently explore and visualize the materials space to help identify underlying patterns. In this work, we develop a unified framework to hierarchically visualize the compositional and structural similarities between materials in an arbitrary material space. We demonstrate the potential for such a visualization approach by showing that patterns emerge automatically that reflect similarities at different scales in three representative classes of materials: perovskites, elemental boron, and general inorganic crystals, covering material spaces of different compositions, structures, and both. For perovskites, elemental similarities are learned that reflects multiple aspects of atom properties. For elemental boron, structural motifs emerge automatically showing characteristic boron local environments. For inorganic crystals, the similarity and stability of local coordination environments are shown combining different center and neighbor atoms. The method could help transition to a data-centered exploration of materials space in automated materials design.


          High Fidelity Semantic Shape Completion for Point Clouds using Latent Optimization. (arXiv:1807.03407v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Swaminathan Gurumurthy, Shubham Agrawal

Semantic shape completion is a challenging problem in 3D computer vision where the task is to generate a complete 3D shape using a partial 3D shape as input. We propose a learning-based approach to complete incomplete 3D shapes through generative modeling and latent manifold optimization. Our algorithm works directly on point clouds. We use an autoencoder and a GAN to learn a distribution of embeddings for point clouds of object classes. An input point cloud with missing regions is first encoded to a feature vector. The representations learnt by the GAN are then used to find the best latent vector on the manifold using a combined optimization that finds a vector in the manifold of plausible vectors that is close to the original input (both in the feature space and the output space of the decoder). Experiments show that our algorithm is capable of successfully reconstructing point clouds with large missing regions with very high fidelity without having to rely on exemplar based database retrieval.


          Who is Killed by Police: Introducing Supervised Attention for Hierarchical LSTMs. (arXiv:1807.03409v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Minh Nguyen, Thien Huu Nguyen

Finding names of people killed by police has become increasingly important as police shootings get more and more public attention (police killing detection). Unfortunately, there has been not much work in the literature addressing this problem. The early work in this field \cite{keith2017identifying} proposed a distant supervision framework based on Expectation Maximization (EM) to deal with the multiple appearances of the names in documents. However, such EM-based framework cannot take full advantages of deep learning models, necessitating the use of hand-designed features to improve the detection performance. In this work, we present a novel deep learning method to solve the problem of police killing recognition. The proposed method relies on hierarchical LSTMs to model the multiple sentences that contain the person names of interests, and introduce supervised attention mechanisms based on semantical word lists and dependency trees to upweight the important contextual words. Our experiments demonstrate the benefits of the proposed model and yield the state-of-the-art performance for police killing detection.


          Fast Kinodynamic Bipedal Locomotion Planning with Moving Obstacles. (arXiv:1807.03415v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Junhyeok Ahn, Orion Campbell, Donghyun Kim, Luis Sentis

We present a sampling-based kinodynamic planning framework for a bipedal robot in complex environments. Unlike other footstep planner which typically plan footstep locations and the biped dynamics in separate steps, we handle both simultaneously. Three advantages of this approach are (1) the ability to differentiate alternate routes while selecting footstep locations based on the temporal duration of the route as determined by the Linear Inverted Pendulum Model dynamics, (2) the ability to perform collision checking through time so that collisions with moving obstacles are prevented without avoiding their entire trajectory, and (3) the ability to specify a minimum forward velocity for the biped. To generate a dynamically consistent description of the walking behavior, we exploit the Phase Space Planner. To plan a collision free route toward the goal, we adapt planning strategies from non-holonomic wheeled robots to gather a sequence of inputs for the PSP. This allows us to efficiently approximate dynamic and kinematic constraints on bipedal motion, to apply a sampling based planning algorithms, and to use the Dubin's path as the steering method to connect two points in the configuration space. The results of the algorithm are sent to a Whole Body Controller to generate full body dynamic walking behavior.


          Interpreting and Explaining Deep Neural Networks for Classification of Audio Signals. (arXiv:1807.03418v1 [cs.SD])      Cache   Translate Page   Web Page Cache   

Authors: Sören Becker, Marcel Ackermann, Sebastian Lapuschkin, Klaus-Robert Müller, Wojciech Samek

Interpretability of deep neural networks is a recently emerging area of machine learning research targeting a better understanding of how models perform feature selection and derive their classification decisions. In this paper, two neural network architectures are trained on spectrogram and raw waveform data for audio classification tasks on a newly created audio dataset and layer-wise relevance propagation (LRP), a previously proposed interpretability method, is applied to investigate the models' feature selection and decision making. It is demonstrated that the networks are highly reliant on feature marked as relevant by LRP through systematic manipulation of the input data. Our results show that by making deep audio classifiers interpretable, one can analyze and compare the properties and strategies of different models beyond classification accuracy, which potentially opens up new ways for model improvements.


          Capacity of Two-Way Channels with Symmetry Properties. (arXiv:1807.03422v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Jian-Jia Weng, Lin Song, Fady Alajaji, Tamás Linder

In this paper, we make use of channel symmetry properties to determine the capacity region of three types of two-way networks: (a) two-user memoryless two-way channels (TWCs), (b) two-user TWCs with memory, and (c) three-user multiaccess/degraded broadcast (MA/DB) TWCs. For each network, symmetry conditions under which Shannon's random coding inner bound is tight are given. For two-user memoryless TWCs, prior results are substantially generalized by viewing a TWC as two interacting state-dependent one-way channels. The capacity of symmetric TWCs with memory, whose outputs are functions of the inputs and independent stationary and ergodic noise processes, is also obtained. Moreover, various channel symmetry properties under which Shannon's inner bound is tight are identified for three-user MA/DB TWCs. The results not only enlarge the class of symmetric TWCs whose capacity region can be exactly determined but also imply that adaptive coding, not improving capacity, is unnecessary for such channels.


          A GPU-Oriented Algorithm Design for Secant-Based Dimensionality Reduction. (arXiv:1807.03425v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Henry Kvinge, Elin Farnell, Michael Kirby, Chris Peterson

Dimensionality-reduction techniques are a fundamental tool for extracting useful information from high-dimensional data sets. Because secant sets encode manifold geometry, they are a useful tool for designing meaningful data-reduction algorithms. In one such approach, the goal is to construct a projection that maximally avoids secant directions and hence ensures that distinct data points are not mapped too close together in the reduced space. This type of algorithm is based on a mathematical framework inspired by the constructive proof of Whitney's embedding theorem from differential topology. Computing all (unit) secants for a set of points is by nature computationally expensive, thus opening the door for exploitation of GPU architecture for achieving fast versions of these algorithms. We present a polynomial-time data-reduction algorithm that produces a meaningful low-dimensional representation of a data set by iteratively constructing improved projections within the framework described above. Key to our algorithm design and implementation is the use of GPUs which, among other things, minimizes the computational time required for the calculation of all secant lines. One goal of this report is to share ideas with GPU experts and to discuss a class of mathematical algorithms that may be of interest to the broader GPU community.


          A New Variational Model for Binary Classification in the Supervised Learning Context. (arXiv:1807.03431v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Carlos David Brito Pacheco, Carlos Francisco Brito Loeza

We examine the supervised learning problem in its continuous setting and give a general optimality condition through techniques of functional analysis and the calculus of variations. This enables us to solve the optimality condition for the desired function u numerically and make several comparisons with other widely utilized su- pervised learning models. We employ the accuracy and area under the receiver operating characteristic curve as metrics of the performance. Finally 3 analyses are conducted based on these two mentioned metrics where we compare the models and make conclusions to determine whether or not our method is competitive.


          Unsupervised Domain Adaptation for Automatic Estimation of Cardiothoracic Ratio. (arXiv:1807.03434v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Nanqing Dong, Michael Kampffmeyer, Xiaodan Liang, Zeya Wang, Wei Dai, Eric P. Xing

The cardiothoracic ratio (CTR), a clinical metric of heart size in chest X-rays (CXRs), is a key indicator of cardiomegaly. Manual measurement of CTR is time-consuming and can be affected by human subjectivity, making it desirable to design computer-aided systems that assist clinicians in the diagnosis process. Automatic CTR estimation through chest organ segmentation, however, requires large amounts of pixel-level annotated data, which is often unavailable. To alleviate this problem, we propose an unsupervised domain adaptation framework based on adversarial networks. The framework learns domain invariant feature representations from openly available data sources to produce accurate chest organ segmentation for unlabeled datasets. Specifically, we propose a model that enforces our intuition that prediction masks should be domain independent. Hence, we introduce a discriminator that distinguishes segmentation predictions from ground truth masks. We evaluate our system's prediction based on the assessment of radiologists and demonstrate the clinical practicability for the diagnosis of cardiomegaly. We finally illustrate on the JSRT dataset that the semi-supervised performance of our model is also very promising.


          Improved Approximations for Free-Order Prophets and Second-Price Auctions. (arXiv:1807.03435v1 [cs.GT])      Cache   Translate Page   Web Page Cache   

Authors: Hedyeh Beyhaghi, Negin Golrezaei, Renato Paes Leme, Martin Pal, Balasubramanian Siva

We study the fundamental problem of selling a single indivisible item to one of $n$ buyers with independent and potentially nonidentical value distributions. We focus on two simple and widely used selling mechanisms: the second price auction with \emph{eager} personalized reserve prices and the sequential posted price mechanism. Using a new approach, we improve the best-known performance guarantees for these mechanisms. We show that for every value of the number of buyers $n$, the eager second price (ESP) auction and sequential posted price mechanisms respectively earn at least $0.6620$ and $0.6543$ fractions of the optimal revenue. We also provide improved performance guarantees for these mechanisms when the number of buyers is small, which is the more relevant regime for many applications of interest. This in particular implies an improved bound of $0.6543$ for free-order prophet inequalities.

Motivated by our improved revenue bounds, we further study the problem of optimizing reserve prices in the ESP auctions when the sorted order of personalized reserve prices among bidders is exogenous. We show that this problem can be solved polynomially. In addition, by analyzing a real auction dataset from Google's advertising exchange, we demonstrate the effectiveness of order-based pricing.


          Developing Brain Atlas through Deep Learning. (arXiv:1807.03440v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Asim Iqbal, Romesa Khan, Theofanis Karayannis

To uncover the organizational principles governing the human brain, neuroscientists are in need of developing high-throughput methods that can explore the structure and function of distinct brain regions using animal models. The first step towards this goal is to accurately register the regions of interest in a mouse brain, against a standard reference atlas, with minimum human supervision. The second step is to scale this approach to different animal ages, so as to also allow insights into normal and pathological brain development and aging. We introduce here a fully automated convolutional neural network-based method (SeBRe) for registration through Segmenting Brain Regions of interest in mice at different ages. We demonstrate the validity of our method on different mouse brain post-natal (P) developmental time points, across a range of neuronal markers. Our method outperforms the existing brain registration methods, and provides the minimum mean squared error (MSE) score on a mouse brain dataset. We propose that our deep learning-based registration method can (i) accelerate brain-wide exploration of region-specific changes in brain development and (ii) replace the existing complex brain registration methodology, by simply segmenting brain regions of interest for high-throughput brain-wide analysis.


          Using Complex Network Theory for Temporal Locality in Network Traffic Flows. (arXiv:1807.03454v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Jin-Fa Wang, Hai Zhao, Shuai-Zong Si, Hao Yu, Shuai Chao, Xuan He

Monitoring the interaction behaviors of network traffic flows and detecting unwanted Internet applications and anomalous flows have become a challenging problem, since many applications obfuscate their network traffic flow using unregistered port numbers or payload encryption. In this paper, the temporal locality complex network model--TLCN is proposed as a way to monitor, analyze and visualize network traffic flows. TLCNs model the interaction behaviors of large-scale network traffic flows, where the nodes and the edges can be defined to represent different flow levels and flow interactions separately. Then, the statistical characteristics and dynamic behaviors of the TLCNs are studied to represent TLCN's structure representing ability to the flow interactions. According to the analysis of TLCN statistical characteristics with different Internet applications, we found that the weak interaction flows prefer to form the small-world TLCN and the strong interaction flows prefer to the scale-free TLCN. In the studies of anomaly behaviors of TLCNs, the network structure of attacked TLCNs can have a remarkable feature for three attack patterns, and the evolution of TLCNs exhibits a good consistency between TLCN structure and attack process. With the introduction of TLCNs, we are able to harness a wealth of tools and graph modeling techniques from a diverse set of disciplines.


          Predicting property damage from tornadoes with deep learning. (arXiv:1807.03456v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Jeremy Diaz, Maxwell Joseph

Tornadoes are the most violent of all atmospheric storms. In a typical year, the United States experiences hundreds of tornadoes with associated damages on the order of one billion dollars. Community preparation and resilience would benefit from accurate predictions of these economic losses, particularly as populations in tornado-prone areas continue to increase in density and extent. Here, we use artificial neural networks to predict tornado-induced property damage using publicly available data. We find that the large number of tornadoes which cause zero property damage (30.6% of the data) poses a challenge for predictive models. We developed a model that predicts whether a tornado will cause property damage to a high degree of accuracy (out of sample accuracy = 0.829 and AUROC = 0.873). Conditional on a tornado causing damage, another model predicts the amount of damage. When combined, these two models yield an expected value for the amount of property damage caused by a tornado event. From the best-performing models (out of sample mean squared error = 0.089 and R2 = 0.473), we provide an interactive, gridded map of monthly expected values for the year 2018. One major weakness is that the model predictive power is optimized with log-transformed, mean-normalized property damages, however this leads to large natural-scale residuals for the most destructive tornadoes. The predictive capacity of this model along with an interactive interface may provide an opportunity for science-informed tornado disaster planning.


          SceneEDNet: A Deep Learning Approach for Scene Flow Estimation. (arXiv:1807.03464v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Ravi Kumar Thakur, Snehasis Mukherjee

Estimating scene flow in RGB-D videos is attracting much interest of the computer vision researchers, due to its potential applications in robotics. The state-of-the-art techniques for scene flow estimation, typically rely on the knowledge of scene structure of the frame and the correspondence between frames. However, with the increasing amount of RGB-D data captured from sophisticated sensors like Microsoft Kinect, and the recent advances in the area of sophisticated deep learning techniques, introduction of an efficient deep learning technique for scene flow estimation, is becoming important. This paper introduces a first effort to apply a deep learning method for direct estimation of scene flow by presenting a fully convolutional neural network with an encoder-decoder (ED) architecture. The proposed network SceneEDNet involves estimation of three dimensional motion vectors of all the scene points from sequence of stereo images. The training for direct estimation of scene flow is done using consecutive pairs of stereo images and corresponding scene flow ground truth. The proposed architecture is applied on a huge dataset and provides meaningful results.


          The Kannan-Lov\'asz-Simonovits Conjecture. (arXiv:1807.03465v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Yin Tat Lee, Santosh S. Vempala

The Kannan-Lov\'asz-Simonovits conjecture says that the Cheeger constant of any logconcave density is achieved to within a universal, dimension-independent constant factor by a hyperplane-induced subset. Here we survey the origin and consequences of the conjecture (in geometry, probability, information theory and algorithms) as well as recent progress resulting in the current best bounds. The conjecture has lead to several techniques of general interest.


          Learning a Single Tucker Decomposition Network for Lossy Image Compression with Multiple Bits-Per-Pixel Rates. (arXiv:1807.03470v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Jianrui Cai, Zisheng Cao, Lei Zhang

Lossy image compression (LIC), which aims to utilize inexact approximations to represent an image more compactly, is a classical problem in image processing. Recently, deep convolutional neural networks (CNNs) have achieved interesting results in LIC by learning an encoder-quantizer-decoder network from a large amount of data. However, existing CNN-based LIC methods usually can only train a network for a specific bits-per-pixel (bpp). Such a "one network per bpp" problem limits the generality and flexibility of CNNs to practical LIC applications. In this paper, we propose to learn a single CNN which can perform LIC at multiple bpp rates. A simple yet effective Tucker Decomposition Network (TDNet) is developed, where there is a novel tucker decomposition layer (TDL) to decompose a latent image representation into a set of projection matrices and a core tensor. By changing the rank of the core tensor and its quantization, we can easily adjust the bpp rate of latent image representation within a single CNN. Furthermore, an iterative non-uniform quantization scheme is presented to optimize the quantizer, and a coarse-to-fine training strategy is introduced to reconstruct the decompressed images. Extensive experiments demonstrate the state-of-the-art compression performance of TDNet in terms of both PSNR and MS-SSIM indices.


          Phase reconstruction from amplitude spectrograms based on von-Mises-distribution deep neural network. (arXiv:1807.03474v1 [cs.SD])      Cache   Translate Page   Web Page Cache   

Authors: Shinnosuke Takamichi, Yuki Saito, Norihiro Takamune, Daichi Kitamura, Hiroshi Saruwatari

This paper presents a deep neural network (DNN)-based phase reconstruction from amplitude spectrograms. In audio signal and speech processing, the amplitude spectrogram is often used for processing, and the corresponding phase spectrogram is reconstructed from the amplitude spectrogram on the basis of the Griffin-Lim method. However, the Griffin-Lim method causes unnatural artifacts in synthetic speech. Addressing this problem, we introduce the von-Mises-distribution DNN for phase reconstruction. The DNN is a generative model having the von Mises distribution that can model distributions of a periodic variable such as a phase, and the model parameters of the DNN are estimated on the basis of the maximum likelihood criterion. Furthermore, we propose a group-delay loss for DNN training to make the predicted group delay close to a natural group delay. The experimental results demonstrate that 1) the trained DNN can predict group delay accurately more than phases themselves, and 2) our phase reconstruction methods achieve better speech quality than the conventional Griffin-Lim method.


          On Controller Design for Systems on Manifolds in Euclidean Space. (arXiv:1807.03475v1 [math.OC])      Cache   Translate Page   Web Page Cache   

Authors: Dong Eui Chang

A new method is developed to design controllers in Euclidean space for systems defined on manifolds. The idea is to embed the state-space manifold $M$ of a given control system into some Euclidean space $\mathbb R^n$, extend the system from $M$ to the ambient space $\mathbb R^n$, and modify it outside $M$ to add transversal stability to $M$ in the final dynamics in $\mathbb R^n$. Controllers are designed for the final system in the ambient space $\mathbb R^n$. Then, their restriction to $M$ produces controllers for the original system on $M$. This method has the merit that only one single global Cartesian coordinate system in the ambient space $\mathbb R^n$ is used for controller synthesis, and any controller design method in $\mathbb R^n$, such as the linearization method, can be globally applied for the controller synthesis. The proposed method is successfully applied to the tracking problem for the following two benchmark systems: the fully actuated rigid body system and the quadcopter drone system.


          Shape analysis of framed space curves. (arXiv:1807.03477v1 [math.DG])      Cache   Translate Page   Web Page Cache   

Authors: Tom Needham

In the elastic shape analysis approach to shape matching and object classification, plane curves are represented as points in an infinite-dimensional Riemannian manifold, wherein shape dissimilarity is measured by geodesic distance. A remarkable result of Younes, Michor, Shah and Mumford says that the space of closed planar shapes, endowed with a natural metric, is isometric to an infinite-dimensional Grassmann manifold via the so-called square root transform. This result facilitates efficient shape comparison by virtue of explicit descriptions of Grassmannian geodesics. In this paper, we extend this shape analysis framework to treat shapes of framed space curves. By considering framed curves, we are able to generalize the square root transform by using quaternionic arithmetic and properties of the Hopf fibration. Under our coordinate transformation, the space of closed framed curves corresponds to an infinite-dimensional complex Grassmannian. This allows us to describe geodesics in framed curve space explicitly. We are also able to produce explicit geodesics between closed, unframed space curves by studying the action of the loop group of the circle on the Grassmann manifold. Averages of collections of plane and space curves are computed via a novel algorithm utilizing flag means.


          An Adaptive Learning Method of Restricted Boltzmann Machine by Neuron Generation and Annihilation Algorithm. (arXiv:1807.03478v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Shin Kamada, Takumi Ichimura

Restricted Boltzmann Machine (RBM) is a generative stochastic energy-based model of artificial neural network for unsupervised learning. Recently, RBM is well known to be a pre-training method of Deep Learning. In addition to visible and hidden neurons, the structure of RBM has a number of parameters such as the weights between neurons and the coefficients for them. Therefore, we may meet some difficulties to determine an optimal network structure to analyze big data. In order to evade the problem, we investigated the variance of parameters to find an optimal structure during learning. For the reason, we should check the variance of parameters to cause the fluctuation for energy function in RBM model. In this paper, we propose the adaptive learning method of RBM that can discover an optimal number of hidden neurons according to the training situation by applying the neuron generation and annihilation algorithm. In this method, a new hidden neuron is generated if the energy function is not still converged and the variance of the parameters is large. Moreover, the inactivated hidden neuron will be annihilated if the neuron does not affect the learning situation. The experimental results for some benchmark data sets were discussed in this paper.


          Efficient Reassembling of Three-Regular Planar Graphs. (arXiv:1807.03479v1 [cs.DS])      Cache   Translate Page   Web Page Cache   

Authors: Assaf Kfoury, Benjamin Sisson

A reassembling of a simple graph G = (V,E) is an abstraction of a problem arising in earlier studies of network analysis. There are several equivalent definitions of graph reassembling; in this report we use a definition which makes it closest to the notion of graph carving. A reassembling is a rooted binary tree whose nodes are subsets of V and whose leaf nodes are singleton sets, with each of the latter containing a distinct vertex of G. The parent of two nodes in the reassembling is the union of the two children's vertex sets. The root node of the reassembling is the full set V. The edge-boundary degree of a node in the reassembling is the number of edges in G that connect vertices in the node's set to vertices not in the node's set. A reassembling's alpha-measure is the largest edge-boundary degree of any node in the reassembling. A reassembling of G is alpha-optimal if its alpha-measure is the minimum among all alpha-measures of G's reassemblings.

The problem of finding an alpha-optimal reassembling of a simple graph in general was already shown to be NP-hard.

In this report we present an algorithm which, given a 3-regular plane graph G = (V,E) as input, returns a reassembling of G with an alpha-measure independent of n (number of vertices in G) and upper-bounded by 2k, where k is the edge-outerplanarity of G. (Edge-outerplanarity is distinct but closely related to the usual notion of outerplanarity; as with outerplanarity, for a fixed edge-outerplanarity k, the number n of vertices can be arbitrarily large.) Our algorithm runs in time linear in n. Moreover, we construct a class of $3$-regular plane graphs for which this alpha-measure is optimal, by proving that 2k is the lower bound on the alpha-measure of any reassembling of a graph in that class.


          Neural Task Graphs: Generalizing to Unseen Tasks from a Single Video Demonstration. (arXiv:1807.03480v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: De-An Huang, Suraj Nair, Danfei Xu, Yuke Zhu, Animesh Garg, Li Fei-Fei, Silvio Savarese, Juan Carlos Niebles

Our goal is for a robot to execute a previously unseen task based on a single video demonstration of the task. The success of our approach relies on the principle of transferring knowledge from seen tasks to unseen ones with similar semantics. More importantly, we hypothesize that to successfully execute a complex task from a single video demonstration, it is necessary to explicitly incorporate compositionality to the model. To test our hypothesis, we propose Neural Task Graph (NTG) Networks, which use task graph as the intermediate representation to modularize the representations of both the video demonstration and the derived policy. We show this formulation achieves strong inter-task generalization on two complex tasks: Block Stacking in BulletPhysics and Object Collection in AI2-THOR. We further show that the same principle is applicable to real-world videos. We show that NTG can improve data efficiency of few-shot activity understanding in the Breakfast Dataset.


          An Adaptive Learning Method of Deep Belief Network by Layer Generation Algorithm. (arXiv:1807.03486v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Shin Kamada, Takumi Ichimura

Deep Belief Network (DBN) has a deep architecture that represents multiple features of input patterns hierarchically with the pre-trained Restricted Boltzmann Machines (RBM). A traditional RBM or DBN model cannot change its network structure during the learning phase. Our proposed adaptive learning method can discover the optimal number of hidden neurons and weights and/or layers according to the input space. The model is an important method to take account of the computational cost and the model stability. The regularities to hold the sparse structure of network is considerable problem, since the extraction of explicit knowledge from the trained network should be required. In our previous research, we have developed the hybrid method of adaptive structural learning method of RBM and Learning Forgetting method to the trained RBM. In this paper, we propose the adaptive learning method of DBN that can determine the optimal number of layers during the learning. We evaluated our proposed model on some benchmark data sets.


          Fine Tuning Method by using Knowledge Acquisition from Deep Belief Network. (arXiv:1807.03487v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Shin Kamada, Takumi Ichimura

We developed an adaptive structure learning method of Restricted Boltzmann Machine (RBM) which can generate/annihilate neurons by self-organizing learning method according to input patterns. Moreover, the adaptive Deep Belief Network (DBN) in the assemble process of pre-trained RBM layer was developed. The proposed method presents to score a great success to the training data set for big data benchmark test such as CIFAR-10. However, the classification capability of the test data set, which are included unknown patterns, is high, but does not lead perfect correct solution. We investigated the wrong specified data and then some characteristic patterns were found. In this paper, the knowledge related to the patterns is embedded into the classification algorithm of trained DBN. As a result, the classification capability can achieve a great success (97.1\% to unknown data set).


          Dynamics of Taxi-like Logistics Systems: Theory and Microscopic Simulations. (arXiv:1807.03488v1 [nlin.AO])      Cache   Translate Page   Web Page Cache   

Authors: Bo Yang, Qianxiao Li

In this paper we study the dynamics of a class of bi-agent logistics systems consisting of two types of agents interacting on an arbitrary complex network. By approximating the system with simple microscopic models and solving them analytically, we reveal some universal dynamical features of such logistics systems, and propose the applications of such features for system optimisations. Large scale agent-based numerical simulations are also carried out to explore more realistic and complicated systems, with interesting emergent behaviours that can be well understood from our analytical studies. Using the taxi system as a typical logistics system with commuters and empty taxis as two types of agents, we illustrate two dynamical phases with distinct behaviours, separated by a phase boundary that can be identified as the optimal number of taxis for a particular taxi system. We show that these features, and the tuning of the optimal number of taxis, can be applied to various situations, including taxi systems allowing real-time dynamical ride-sharing. Our studies could lead to a theoretical basis for the understanding of a large class of bi-agent logistics systems, that can be useful for systematic optimisations via judicious benchmarking of routing and resource allocation strategies.


          Easing Embedding Learning by Comprehensive Transcription of Heterogeneous Information Networks. (arXiv:1807.03490v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Yu Shi, Qi Zhu, Fang Guo, Chao Zhang, Jiawei Han

Heterogeneous information networks (HINs) are ubiquitous in real-world applications. In the meantime, network embedding has emerged as a convenient tool to mine and learn from networked data. As a result, it is of interest to develop HIN embedding methods. However, the heterogeneity in HINs introduces not only rich information but also potentially incompatible semantics, which poses special challenges to embedding learning in HINs. With the intention to preserve the rich yet potentially incompatible information in HIN embedding, we propose to study the problem of comprehensive transcription of heterogeneous information networks. The comprehensive transcription of HINs also provides an easy-to-use approach to unleash the power of HINs, since it requires no additional supervision, expertise, or feature engineering. To cope with the challenges in the comprehensive transcription of HINs, we propose the HEER algorithm, which embeds HINs via edge representations that are further coupled with properly-learned heterogeneous metrics. To corroborate the efficacy of HEER, we conducted experiments on two large-scale real-words datasets with an edge reconstruction task and multiple case studies. Experiment results demonstrate the effectiveness of the proposed HEER model and the utility of edge representations and heterogeneous metrics. The code and data are available at https://github.com/GentleZhu/HEER.


          Deep-speare: A Joint Neural Model of Poetic Language, Meter and Rhyme. (arXiv:1807.03491v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Jey Han Lau, Trevor Cohn, Timothy Baldwin, Julian Brooke, Adam Hammond

In this paper, we propose a joint architecture that captures language, rhyme and meter for sonnet modelling. We assess the quality of generated poems using crowd and expert judgements. The stress and rhyme models perform very well, as generated poems are largely indistinguishable from human-written poems. Expert evaluation, however, reveals that a vanilla language model captures meter implicitly, and that machine-generated poems still underperform in terms of readability and emotion. Our research shows the importance expert evaluation for poetry generation, and that future research should look beyond rhyme/meter and focus on poetic language.


          The Recommendation System to SNS Community for Tourists by Using Altruistic Behaviors. (arXiv:1807.03492v1 [cs.MA])      Cache   Translate Page   Web Page Cache   

Authors: Takumi Ichimura, Takuya Uemoto, Shin Kamada

We have already developed the recommendation system of sightseeing information on SNS by using smartphone based user participatory sensing system. The system can post the attractive information for tourists to the specified Facebook page by our developed smartphone application. The users in Facebook, who are interested in sightseeing, can come flocking through information space from far and near. However, the activities in the community on SNS are only supported by the specified people called a hub. We proposed the method of vitalization of tourist behaviors to give a stimulus to the people. We developed the simulation system for multi agent system with altruistic behaviors inspired by the Army Ants. The army ant takes feeding action with altruistic behaviors to suppress selfish behavior to a common object used by a plurality of users in common. In this paper, we introduced the altruism behavior determined by some simulation to vitalize the SNS community. The efficiency of the revitalization process of the community was investigated by some experimental simulation results.


          A Recommendation System of Grants to Acquire External Funds. (arXiv:1807.03493v1 [cs.IR])      Cache   Translate Page   Web Page Cache   

Authors: Shin Kamada, Takumi Ichimura, Takanobu Watanabe

The recommendation system of the competitive grants to university researchers by using the Grants-in-Aid for Scientific Research (KAKEN) keywords has been developed. The system can determine the recommendation order of researchers to each grant by the using the association rules between KAKEN application and various information from the web site of the corresponding grant. However, our developed previous system has some fatal errors in the retrieval algorithm. We modify the algorithm and extend the retrieval data for web mining. If the grant information is not enough to determine the relation, the system investigates the past KAKEN records in the database for the researcher who acquired the past grant. Moreover, the system retrieves the papers of the researchers to search their interests. As a result, the agreement degree of the researcher's interest to the grant increases. This paper discusses some simulation results.


          Significance-based Estimation-of-Distribution Algorithms. (arXiv:1807.03495v1 [cs.NE])      Cache   Translate Page   Web Page Cache   

Authors: Benjamin Doerr, Martin Krejca

Estimation-of-distribution algorithms (EDAs) are randomized search heuristics that maintain a stochastic model of the solution space. This model is updated from iteration to iteration based on the quality of the solutions sampled according to the model. As previous works show, this short-term perspective can lead to erratic updates of the model, in particular, to bit-frequencies approaching a random boundary value. This can lead to significant performance losses.

In order to overcome this problem, we propose a new EDA that takes into account a longer history of samples and updates its model only with respect to information which it classifies as statistically significant. We prove that this significance-based compact genetic algorithm (sig-cGA) optimizes the common benchmark functions OneMax and LeadingOnes both in $O(n \log n)$ time, a result shown for no other EDA or evolutionary algorithm so far. For the recently proposed scGA -- an EDA that tries to prevent erratic model updates by imposing a bias to the uniformly distributed model -- we prove that it optimizes OneMax only in a time exponential in the hypothetical population size $1/\rho$.


          Recovering affine features from orientation- and scale-invariant ones. (arXiv:1807.03503v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Daniel Barath

An approach is proposed for recovering affine correspondences (ACs) from orientation- and scale-invariant, e.g. SIFT, features. The method calculates the affine parameters consistent with a pre-estimated epipolar geometry from the point coordinates and the scales and rotations which the feature detector obtains. The closed-form solution is given as the roots of a quadratic polynomial equation, thus having two possible real candidates and fast procedure, i.e. <1 millisecond. It is shown, as a possible application, that using the proposed algorithm allows us to estimate a homography for every single correspondence independently. It is validated both in our synthetic environment and on publicly available real world datasets, that the proposed technique leads to accurate ACs. Also, the estimated homographies have similar accuracy to what the state-of-the-art methods obtain, but due to requiring only a single correspondence, the robust estimation, e.g. by locally optimized RANSAC, is an order of magnitude faster.


          Automatic Rumor Detection on Microblogs: A Survey. (arXiv:1807.03505v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Juan Cao, Junbo Guo, Xirong Li, Zhiwei Jin, Han Guo, Jintao Li

The ever-increasing amount of multimedia content on modern social media platforms are valuable in many applications. While the openness and convenience features of social media also foster many rumors online. Without verification, these rumors would reach thousands of users immediately and cause serious damages. Many efforts have been taken to defeat online rumors automatically by mining the rich content provided on the open network with machine learning techniques. Most rumor detection methods can be categorized in three paradigms: the hand-crafted features based classification approaches, the propagation-based approaches and the neural networks approaches. In this survey, we introduce a formal definition of rumor in comparison with other definitions used in literatures. We summary the studies of automatic rumor detection so far and present details in three paradigms of rumor detection. We also give an introduction on existing datasets for rumor detection which would benefit following researches in this area. We give our suggestions for future rumors detection on microblogs as a conclusion.


          Practical Program Repair via Bytecode Mutation. (arXiv:1807.03512v1 [cs.SE])      Cache   Translate Page   Web Page Cache   

Authors: Ali Ghanbari, Lingming Zhang

Software debugging is tedious, time-consuming, and even error-prone by itself. So, various automated debugging techniques have been proposed in the literature to facilitate the debugging process. Automated Program Repair (APR) is one of the most recent advances in automated debugging, and can directly produce patches for buggy programs with minimal human intervention. Although various advanced APR techniques (including those that are either search-based or semantic-based) have been proposed, the simplistic mutation-based APR technique, which simply uses pre-defined mutation operators (e.g., changing a>=b into a>b) to mutate programs for finding patches, has not yet been thoroughly studied. In this paper, we implement the first practical bytecode-level APR technique, PraPR, and present the first extensive study on fixing real-world bugs (e.g., Defects4J bugs) using bytecode mutation. The experimental results show that surprisingly even PraPR with only the basic traditional mutators can produce genuine patches for 18 bugs. Furthermore, with our augmented mutators, PraPR is able to produce genuine patches for 43 bugs, significantly outperforming state-of-the-art APR. It is also an order of magnitude faster, indicating a promising future for bytecode-mutation-based APR.


          Topic-Guided Attention for Image Captioning. (arXiv:1807.03514v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Zhihao Zhu, Zhan Xue, Zejian Yuan

Attention mechanisms have attracted considerable interest in image captioning because of its powerful performance. Existing attention-based models use feedback information from the caption generator as guidance to determine which of the image features should be attended to. A common defect of these attention generation methods is that they lack a higher-level guiding information from the image itself, which sets a limit on selecting the most informative image features. Therefore, in this paper, we propose a novel attention mechanism, called topic-guided attention, which integrates image topics in the attention model as a guiding information to help select the most important image features. Moreover, we extract image features and image topics with separate networks, which can be fine-tuned jointly in an end-to-end manner during training. The experimental results on the benchmark Microsoft COCO dataset show that our method yields state-of-art performance on various quantitative metrics.


          A Reinforcement Learning Approach to Jointly Adapt Vehicular Communications and Planning for Optimized Driving. (arXiv:1807.03515v1 [cs.SY])      Cache   Translate Page   Web Page Cache   

Authors: Mayank K. Pal, Rupali Bhati, Anil Sharma, Sanjit K. Kaul, Saket Anand, P. B. Sujit

Our premise is that autonomous vehicles must optimize communications and motion planning jointly. Specifically, a vehicle must adapt its motion plan staying cognizant of communications rate related constraints and adapt the use of communications while being cognizant of motion planning related restrictions that may be imposed by the on-road environment. To this end, we formulate a reinforcement learning problem wherein an autonomous vehicle jointly chooses (a) a motion planning action that executes on-road and (b) a communications action of querying sensed information from the infrastructure. The goal is to optimize the driving utility of the autonomous vehicle. We apply the Q-learning algorithm to make the vehicle learn the optimal policy, which makes the optimal choice of planning and communications actions at any given time. We demonstrate the ability of the optimal policy to smartly adapt communications and planning actions, while achieving large driving utilities, using simulations.


          Parallel Gaussian Channels Corrupted by Independent States With a State-Cognitive Helper. (arXiv:1807.03518v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Michael Dikshtein, Ruchen Duan, Yingbin Liang, Shlomo Shamai (Shitz)

We consider a state-dependent parallel Gaussian channel with independent states and a common cognitive helper, in which two transmitters wish to send independent information to their corresponding receivers over two parallel subchannels. Each channel is corrupted by independent additive Gaussian state. The states are not known to the transmitters nor to the receivers, but known to a helper in a noncausal manner. The helper's goal is to assist a reliable communication by mitigating the state. Outer and inner bounds are derived and segments of the capacity region is characterized for various channel parameters.


          Multiresolution Tree Networks for 3D Point Cloud Processing. (arXiv:1807.03520v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Matheus Gadelha, Rui Wang, Subhransu Maji

We present multiresolution tree-structured networks to process point clouds for 3D shape understanding and generation tasks. Our network represents a 3D shape as a set of locality-preserving 1D ordered list of points at multiple resolutions. This allows efficient feed-forward processing through 1D convolutions, coarse-to-fine analysis through a multi-grid architecture, and it leads to faster convergence and small memory footprint during training. The proposed tree-structured encoders can be used to classify shapes and outperform existing point-based architectures on shape classification benchmarks, while tree-structured decoders can be used for generating point clouds directly and they outperform existing approaches for image-to-shape inference tasks learned using the ShapeNet dataset. Our model also allows unsupervised learning of point-cloud based shapes by using a variational autoencoder, leading to higher-quality generated shapes.


          Privacy-Adversarial User Representations in Recommender Systems. (arXiv:1807.03521v1 [cs.IR])      Cache   Translate Page   Web Page Cache   

Authors: Yehezkel S. Resheff, Yanai Elazar, Moni Shahar, Oren Sar Shalom

Latent factor models for recommender systems represent users and items as low dimensional vectors. Privacy risks have been previously studied mostly in the context of recovery of personal information in the form of usage records from the training data. However, the user representations themselves may be used together with external data to recover private user information such as gender and age. In this paper we show that user vectors calculated by a common recommender system can be exploited in this way. We propose the privacy-adversarial framework to eliminate such leakage, and study the trade-off between recommender performance and leakage both theoretically and empirically using a benchmark dataset. We briefly discuss further applications of this method towards the generation of deeper and more insightful recommendations.


          DLOPT: Deep Learning Optimization Library. (arXiv:1807.03523v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Andrés Camero, Jamal Toutouh, Enrique Alba

Deep learning hyper-parameter optimization is a tough task. Finding an appropriate network configuration is a key to success, however most of the times this labor is roughly done. In this work we introduce a novel library to tackle this problem, the Deep Learning Optimization Library: DLOPT. We briefly describe its architecture and present a set of use examples. This is an open source project developed under the GNU GPL v3 license and it is freely available at https://github.com/acamero/dlopt


          On the minimum weights of binary linear complementary dual codes. (arXiv:1807.03525v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Makoto Araya, Masaaki Harada

Linear complementary dual codes (or codes with complementary duals) are codes whose intersections with their dual codes are trivial. We study the largest minimum weight $d(n,k)$ among all binary linear complementary dual $[n,k]$ codes. We determine $d(n,4)$ for $n \equiv 2,3,4,5,6,9,10,13 \pmod{15}$, and $d(n,5)$ for $n \equiv 3,4,5,7,11,19,20,22,26 \pmod{31}$. Combined with known results, the values $d(n,k)$ are also determined for $n \le 24$.


          Algebraic Equivalence of Linear Structural Equation Models. (arXiv:1807.03527v1 [math.ST])      Cache   Translate Page   Web Page Cache   

Authors: Thijs van Ommen, Joris M. Mooij

Despite their popularity, many questions about the algebraic constraints imposed by linear structural equation models remain open problems. For causal discovery, two of these problems are especially important: the enumeration of the constraints imposed by a model, and deciding whether two graphs define the same statistical model. We show how the half-trek criterion can be used to make progress in both of these problems. We apply our theoretical results to a small-scale model selection problem, and find that taking the additional algebraic constraints into account may lead to significant improvements in model selection accuracy.


          Deep Underwater Image Enhancement. (arXiv:1807.03528v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Saeed Anwar, Chongyi Li, Fatih Porikli

In an underwater scene, wavelength-dependent light absorption and scattering degrade the visibility of images, causing low contrast and distorted color casts. To address this problem, we propose a convolutional neural network based image enhancement model, i.e., UWCNN, which is trained efficiently using a synthetic underwater image database. Unlike the existing works that require the parameters of underwater imaging model estimation or impose inflexible frameworks applicable only for specific scenes, our model directly reconstructs the clear latent underwater image by leveraging on an automatic end-to-end and data-driven training mechanism. Compliant with underwater imaging models and optical properties of underwater scenes, we first synthesize ten different marine image databases. Then, we separately train multiple UWCNN models for each underwater image formation type. Experimental results on real-world and synthetic underwater images demonstrate that the presented method generalizes well on different underwater scenes and outperforms the existing methods both qualitatively and quantitatively. Besides, we conduct an ablation study to demonstrate the effect of each component in our network.


          Soft-TTL: Time-Varying Fractional Caching. (arXiv:1807.03537v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Jasper Goseling, Osvaldo Simeone

Standard Time-to-Live (TTL) cache management prescribes the storage of entire files, or possibly fractions thereof, for a given amount of time after a request. As a generalization of this approach, this work proposes the storage of a time-varying, diminishing, fraction of a requested file. Accordingly, the cache progressively evicts parts of the file over an interval of time following a request. The strategy, which is referred to as soft-TTL, is justified by the fact that traffic traces are often characterized by arrival processes that display a decreasing, but non-negligible, probability of observing a request as the time elapsed since the last request increases. An optimization-based analysis of soft-TTL is presented, demonstrating the important role played by the hazard function of the inter-arrival request process, which measures the likelihood of observing a request as a function of the time since the most recent request.


          A strategic framework for identifying the critical factors of 4G technology diffusion in I.R. Iran - A Fuzzy DEMATEL approach. (arXiv:1807.03542v1 [cs.CY])      Cache   Translate Page   Web Page Cache   

Authors: Hossein Sabzian, Hossein Gharib, Seyyed Mostafa Seyyed Hashemi, Ali Maleki

As the most prominent representative of 4G, Long term evolution (LTE) technology has become a focal point for mobile network operators all over the world. However, although Iranian main operators like MCI and Irancell have hugely invested on deployment of this technology, its diffusion has been very slow with a penetration rate of 0.06 at the end of spring 2017. Nevertheless, if this rate doesn't increase, it will yield some negative unintended consequences for telecom operators such as (I) Failure to provide a large number of high quality services (II) Inability to compete with OTT technologies (III) Loss of many revenue opportunities (IV) Prolongation of payback period and (V) The lack of technological integrability with fifth generation networks (5G) and loss of many IOT opportunities. Through discussing the literature of technology adoption and diffusion both generally and specifically, identifying the major limitations of these studies and establishing a comprehensive factor set based on four major groups of (I) mobile handset and operators-related factors (II) subscribers-related biological factors, (III) subscribers-related perceptual factors and (IV) subscribers-related contextual factors, a novel fuzzy DEMATEL model has been developed by which all ICT policy makers can not only get a clear knowledge of factors influencing technology adoption but also know the critical success factors (CSFs) influencing Iranians' mindsets towards LTE adoption. Therefore, they can make effective and actionable policies to scale up LTE diffusion or other ICT-related technologies throughout the society.


          Dual optimization for convex constrained objectives without the gradient-Lipschitz assumption. (arXiv:1807.03545v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Martin Bompaire, Emmanuel Bacry, Stéphane Gaïffas

The minimization of convex objectives coming from linear supervised learning problems, such as penalized generalized linear models, can be formulated as finite sums of convex functions. For such problems, a large set of stochastic first-order solvers based on the idea of variance reduction are available and combine both computational efficiency and sound theoretical guarantees (linear convergence rates). Such rates are obtained under both gradient-Lipschitz and strong convexity assumptions. Motivated by learning problems that do not meet the gradient-Lipschitz assumption, such as linear Poisson regression, we work under another smoothness assumption, and obtain a linear convergence rate for a shifted version of Stochastic Dual Coordinate Ascent (SDCA) that improves the current state-of-the-art. Our motivation for considering a solver working on the Fenchel-dual problem comes from the fact that such objectives include many linear constraints, that are easier to deal with in the dual. Our approach and theoretical findings are validated on several datasets, for Poisson regression and another objective coming from the negative log-likelihood of the Hawkes process, which is a family of models which proves extremely useful for the modeling of information propagation in social networks and causality inference.


          Parallel Architecture Hardware and General Purpose Operating System Co-design. (arXiv:1807.03546v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Oskar Schirmer

Because most optimisations to achieve higher computational performance eventually are limited, parallelism that scales is required. Parallelised hardware alone is not sufficient, but software that matches the architecture is required to gain best performance. For decades now, hardware design has been guided by the basic design of existing software, to avoid the higher cost to redesign the latter. In doing so, however, quite a variety of superior concepts is excluded a priori. Consequently, co-design of both hardware and software is crucial where highest performance is the goal. For special purpose application, this co-design is common practice. For general purpose application, however, a precondition for usability of a computer system is an operating system which is both comprehensive and dynamic. As no such operating system has ever been designed, a sketch for a comprehensive dynamic operating system is presented, based on a straightforward hardware architecture to demonstrate how design decisions regarding software and hardware do coexist and harmonise.


          Accurate Scene Text Detection through Border Semantics Awareness and Bootstrapping. (arXiv:1807.03547v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Chuhui Xue, Shijian Lu, Fangneng Zhan

This paper presents a scene text detection technique that exploits bootstrapping and text border semantics for accurate localization of texts in scenes. A novel bootstrapping technique is designed which samples multiple 'subsections' of a word or text line and accordingly relieves the constraint of limited training data effectively. At the same time, the repeated sampling of text 'subsections' improves the consistency of the predicted text feature maps which is critical in predicting a single complete instead of multiple broken boxes for long words or text lines. In addition, a semantics-aware text border detection technique is designed which produces four types of text border segments for each scene text. With semantics-aware text borders, scene texts can be localized more accurately by regressing text pixels around the ends of words or text lines instead of all text pixels which often leads to inaccurate localization while dealing with long words or text lines. Extensive experiments demonstrate the effectiveness of the proposed techniques, and superior performance is obtained over several public datasets, e. g. 80.1 f-score for the MSRA-TD500, 67.1 f-score for the ICDAR2017-RCTW, etc.


          Multiuser One-Bit Massive MIMO Precoding Under MPSK Signaling. (arXiv:1807.03548v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Mingjie Shao, Qiang Li, Yatao Liu, Wing-Kin Ma

Most recently, there has been a flurry of research activities on studying how massive MIMO precoding should be designed when the digital-to-analog conversion at the transmitter side is operated by cheap one-bit digital-to-analog converters (DACs). Such research is motivated by the desire to substantially cut down the hardware cost and power consumption of the radio-frequency chain, which is unaffordable in massive MIMO if high-resolution DACs are still used. One-bit MIMO precoding design problems are much harder to solve than their high-resolution DAC counterparts. In our previous work, we developed a minimum symbol-error probability (SEP) design for one-bit precoding under the multiuser MISO downlink scenario and under quadrature amplitude modulation signaling. Leveraging on the previous work, this work shows how the minimum SEP design is applied to M-ary phase shift keying (MPSK) signaling. Simulation results show that our minimum SEP design delivers significantly better bit-error rate (BER) performance than the other designs for higher-order PSK such as 8-PSK and 16-PSK. As a minor, but useful, side contribution, we also tackle an MPSK SEP characterization problem which was only intuitively treated in the prior arts.


          An Empirical Approach For Probing the Definiteness of Kernels. (arXiv:1807.03555v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Martin Zaefferer, Thomas Bartz-Beielstein, Günter Rudolph

Models like support vector machines or Gaussian process regression often require positive semi-definite kernels. These kernels may be based on distance functions. While definiteness is proven for common distances and kernels, a proof for a new kernel may require too much time and effort for users who simply aim at practical usage. Furthermore, designing definite distances or kernels may be equally intricate. Finally, models can be enabled to use indefinite kernels. This may deteriorate the accuracy or computational cost of the model. Hence, an efficient method to determine definiteness is required. We propose an empirical approach. We show that sampling as well as optimization with an evolutionary algorithm may be employed to determine definiteness. We provide a proof-of-concept with 16 different distance measures for permutations. Our approach allows to disprove definiteness if a respective counter-example is found. It can also provide an estimate of how likely it is to obtain indefinite kernel matrices. This provides a simple, efficient tool to decide whether additional effort should be spent on designing/selecting a more suitable kernel or algorithm.


          Parallax Bundle Adjustment on Manifold with Convexified Initialization. (arXiv:1807.03556v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Liyang Liu, Teng Zhang, Yi Liu, Brenton Leighton, Liang Zhao, Shoudong Huang, Gamini Dissanayake

Bundle adjustment (BA) with parallax angle based feature parameterization has been shown to have superior performance over BA using inverse depth or XYZ feature forms. In this paper, we propose an improved version of the parallax BA algorithm (PMBA) by extending it to the manifold domain along with observation-ray based objective function. With this modification, the problem formulation faithfully mimics the projective nature in a camera's image formation, BA is able to achieve better convergence, accuracy and robustness. This is particularly useful in handling diverse outdoor environments and collinear motion modes. Capitalizing on these properties, we further propose a pose-graph simplification to PMBA, with significant dimensionality reduction. This pose-graph model is convex in nature, easy to solve and its solution can serve as a good initial guess to the original BA problem which is intrinsically non-convex. We provide theoretical proof that our global initialization strategy can guarantee a near-optimal solution. Using a series of experiments involving diverse environmental conditions and motions, we demonstrate PMBA's superior convergence performance in comparison to other BA methods. We also show that, without incremental initialization or via third-party information, our global initialization process helps to bootstrap the full BA successfully in various scenarios, sequential or out-of-order, including some datasets from the "Bundle Adjustment in the Large" database.


          Bandits with Side Observations: Bounded vs. Logarithmic Regret. (arXiv:1807.03558v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Rémy Degenne, Evrard Garcelon, Vianney Perchet

We consider the classical stochastic multi-armed bandit but where, from time to time and roughly with frequency $\epsilon$, an extra observation is gathered by the agent for free. We prove that, no matter how small $\epsilon$ is the agent can ensure a regret uniformly bounded in time.

More precisely, we construct an algorithm with a regret smaller than $\sum_i \frac{\log(1/\epsilon)}{\Delta_i}$, up to multiplicative constant and loglog terms. We also prove a matching lower-bound, stating that no reasonable algorithm can outperform this quantity.


          DXRAM's Fault-Tolerance Mechanisms Meet High Speed I/O Devices. (arXiv:1807.03562v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Kevin Beineke, Stefan Nothaas, Michael Schoettner

In-memory key-value stores provide consistent low-latency access to all objects which is important for interactive large-scale applications like social media networks or online graph analytics and also opens up new application areas. But, when storing the data in RAM on thousands of servers one has to consider server failures. Only a few in-memory key-value stores provide automatic online recovery of failed servers. The most prominent example of these systems is RAMCloud. Another system with sophisticated fault-tolerance mechanisms is DXRAM which is optimized for small data objects. In this report, we detail the remote replication process which is based on logs, investigate selection strategies for the reorganization of these logs and evaluate the reorganization performance for sequential, random, zipf and hot-and-cold distributions in DXRAM. This is also the first time DXRAM's backup system is evaluated with high speed I/O devices, specifically with 56 GBit/s InfiniBand interconnect and PCI-e SSDs. Furthermore, we discuss the copyset replica distribution to reduce the probability for data loss and the adaptations to the original approach for DXRAM.


          A modelling language for the effective design of Java annotations. (arXiv:1807.03566v1 [cs.PL])      Cache   Translate Page   Web Page Cache   

Authors: Irene Córdoba, Juan de Lara

This paper describes a new modelling language for the effective design of Java annotations. Since their inclusion in the 5th edition of Java, annotations have grown from a useful tool for the addition of meta-data to play a central role in many popular software projects. Usually they are conceived as sets with dependency and integrity constraints within them; however, the native support provided by Java for expressing this design is very limited. To overcome its deficiencies and make explicit the rich conceptual model which lies behind a set of annotations, we propose a domain-specific modelling language. The proposal has been implemented as an Eclipse plug-in, including an editor and an integrated code generator that synthesises annotation processors. The language has been tested using a real set of annotations from the Java Persistence API (JPA). It has proven to cover a greater scope with respect to other related work in different shared areas of application.


          Small-Variance Asymptotics for Nonparametric Bayesian Overlapping Stochastic Blockmodels. (arXiv:1807.03570v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Gundeep Arora, Anupreet Porwal, Kanupriya Agarwal, Avani Samdariya, Piyush Rai

The latent feature relational model (LFRM) is a generative model for graph-structured data to learn a binary vector representation for each node in the graph. The binary vector denotes the node's membership in one or more communities. At its core, the LFRM miller2009nonparametric is an overlapping stochastic blockmodel, which defines the link probability between any pair of nodes as a bilinear function of their community membership vectors. Moreover, using a nonparametric Bayesian prior (Indian Buffet Process) enables learning the number of communities automatically from the data. However, despite its appealing properties, inference in LFRM remains a challenge and is typically done via MCMC methods. This can be slow and may take a long time to converge. In this work, we develop a small-variance asymptotics based framework for the non-parametric Bayesian LFRM. This leads to an objective function that retains the nonparametric Bayesian flavor of LFRM, while enabling us to design deterministic inference algorithms for this model, that are easy to implement (using generic or specialized optimization routines) and are fast in practice. Our results on several benchmark datasets demonstrate that our algorithm is competitive to methods such as MCMC, while being much faster.


          A Game-Based Approximate Verification of Deep Neural Networks with Provable Guarantees. (arXiv:1807.03571v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Min Wu, Matthew Wicker, Wenjie Ruan, Xiaowei Huang, Marta Kwiatkowska

Despite the improved accuracy of deep neural networks, the discovery of adversarial examples has raised serious safety concerns. In this paper, we study two variants of pointwise robustness, the maximum safe radius problem, which for a given input sample computes the minimum distance to an adversarial example, and the feature robustness problem, which aims to quantify the robustness of individual features to adversarial perturbations. We demonstrate that, under the assumption of Lipschitz continuity, both problems can be approximated using finite optimisation by discretising the input space, and the approximation has provable guarantees, i.e., the error is bounded. We then show that the resulting optimisation problems can be reduced to the solution of two-player turn-based games, where the first player selects features and the second perturbs the image within the feature. While the second player aims to minimise the distance to an adversarial example, depending on the optimisation objective the first player can be cooperative or competitive. We employ an anytime approach to solve the games, in the sense of approximating the value of a game by monotonically improving its upper and lower bounds. The Monte Carlo tree search algorithm is applied to compute upper bounds for both games, and the Admissible A* and the Alpha-Beta Pruning algorithms are, respectively, used to compute lower bounds for the maximum safety radius and feature robustness games. When working on the upper bound of the maximum safe radius problem, our tool demonstrates competitive performance against existing adversarial example crafting algorithms. Furthermore, we show how our framework can be deployed to evaluate pointwise robustness of neural networks in safety-critical applications such as traffic sign recognition in self-driving cars.


          SiL: An Approach for Adjusting Applications to Heterogeneous Systems Under Perturbations. (arXiv:1807.03577v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Ali Mohammed, Florina M. Ciorba

Scientific applications consist of large and computationally-intensive loops. Dynamic loop scheduling (DLS) techniques are used to load balance the execution of such applications. Load imbalance can be caused by variations in loop iteration execution times due to problem, algorithmic, or systemic characteristics (also, perturbations). The following question motivates this work: "Given an application, a high-performance computing (HPC) system, and both their characteristics and interplay, which DLS technique will achieve improved performance under unpredictable perturbations?" Existing work only considers perturbations caused by variations in the HPC system delivered computational speeds. However, perturbations in available network bandwidth or latency are inevitable on production HPC systems. Simulator in the loop (SiL) is introduced, herein, as a new control-theoretic inspired approach to dynamically select DLS techniques that improve the performance of applications on heterogeneous HPC systems under perturbations. The present work examines the performance of six applications on a heterogeneous system under all above system perturbations. The SiL proof of concept is evaluated using simulation. The performance results confirm the initial hypothesis that no single DLS technique can deliver best performance in all scenarios, while the SiL-based DLS selection delivered improved application performance in most experiments.


          Cost-Efficient Orchestration of Containers in Clouds: A Vision, Architectural Elements, and Future Directions. (arXiv:1807.03578v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Rajkumar Buyya, Maria A. Rodriguez, Adel Nadjaran Toosi, Jaeman Park

This paper proposes an architectural framework for the efficient orchestration of containers in cloud environments. It centres around resource scheduling and rescheduling policies as well as autoscaling algorithms that enable the creation of elastic virtual clusters. In this way, the proposed framework enables the sharing of a computing environment between differing client applications packaged in containers, including web services, offline analytics jobs, and backend pre-processing tasks. The devised resource management algorithms and policies will improve utilization of the available virtual resources to reduce operational cost for the provider while satisfying the resource needs of various types of applications. The proposed algorithms will take factors that are previously omitted by other solutions into consideration, including 1) the pricing models of the acquired resources, 2) and the fault-tolerability of the applications, and 3) the QoS requirements of the running applications, such as the latencies and throughputs of the web services and the deadline of the analytical and pre-processing jobs. The proposed solutions will be evaluated by developing a prototype platform based on one of the existing container orchestration platforms.


          Multi-D Kneser-Ney Smoothing Preserving the Original Marginal Distributions. (arXiv:1807.03583v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: András Dobó

Smoothing is an essential tool in many NLP tasks, therefore numerous techniques have been developed for this purpose in the past. One of the most widely used smoothing methods are the Kneser-Ney smoothing (KNS) and its variants, including the Modified Kneser-Ney smoothing (MKNS), which are widely considered to be among the best smoothing methods available. Although when creating the original KNS the intention of the authors was to develop such a smoothing method that preserves the marginal distributions of the original model, this property was not maintained when developing the MKNS.

In this article I would like to overcome this and propose such a refined version of the MKNS that preserves these marginal distributions while keeping the advantages of both previous versions. Beside its advantageous properties, this novel smoothing method is shown to achieve about the same results as the MKNS in a standard language modelling task.


          Two-Phase Dynamic Analysis of Message-Passing Go Programs based on Vector Clocks. (arXiv:1807.03585v1 [cs.PL])      Cache   Translate Page   Web Page Cache   

Authors: Martin Sulzmann, Kai Stadtmueller

Understanding the run-time behavior of concurrent programs is a challenging task. A popular approach is to establish a happens- before relation via vector clocks. Thus, we can identify bugs and per- formance bottlenecks, for example, by checking if two con icting events may happen concurrently. We employ a two-phase method to derive vector clock information for a wide range of concurrency features that includes all of the message-passing features in Go. The rst phase (instrumentation and tracing) yields a run-time trace that records all events related to message-passing concurrency that took place. The second phase (trace replay) is carried out o ine and replays the recorded traces to infer vector clock information. Trace replay operates on thread-local traces. Thus, we can observe behav- ior that might result from some alternative schedule. Our approach is not tied to any speci c language. We have built a prototype for the Go programming language and provide empirical evidence of the usefulness of our method.


          Difficulty Controllable Question Generation for Reading Comprehension. (arXiv:1807.03586v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Yifan Gao, Jianan Wang, Lidong Bing, Irwin King, Michael R. Lyu

Question generation aims to generate natural language questions from a range of data sources such as free text and image. In this paper, we investigate the difficulty levels of questions, and propose a new task called Difficulty Controllable Question Generation (Dico-QG). Taking as input a reading comprehension paragraph and some text fragments (i.e. answers) in the paragraph that we want to ask about, a Dico-QG method needs to generate questions each of which has a given text fragment as its answer and is associated with a difficulty label. To solve this task, we proposed a two-step approach. The first step estimates what difficulty level of question could be generated for a given answer. After that, in the generation step, the estimated difficulty is employed together with other information as input to generate a question. For evaluation, we prepared the first dataset of reading comprehension questions with difficulty labels. The results show that our approach not only generates questions of better quality under the metrics like BLEU, but also has the capability of difficulty awareness to generate questions complying with the difficulty label.


          Two-stage iterative Procrustes match algorithm and its application for VQ-based speaker verification. (arXiv:1807.03587v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Richeng Tan, Jing Li

In the past decades, Vector Quantization (VQ) model has been very popular across different pattern recognition areas, especially for feature-based tasks. However, the classification or regression performance of VQ-based systems always confronts the feature mismatch problem, which will heavily affect the performance of them. In this paper, we propose a two-stage iterative Procrustes algorithm (TIPM) to address the feature mismatch problem for VQ-based applications. At the first stage, the algorithm will remove mismatched feature vector pairs for a pair of input feature sets. Then, the second stage will collect those correct matched feature pairs that were discarded during the first stage. To evaluate the effectiveness of the proposed TIPM algorithm, speaker verification is used as the case study in this paper. The experiments were conducted on the TIMIT database and the results show that TIPM can improve VQ-based speaker verification performance clean condition and all noisy conditions.


          Social-Feature Enabled Communications among Devices towards Smart IoT Community. (arXiv:1807.03590v1 [cs.NI])      Cache   Translate Page   Web Page Cache   

Authors: Qinghe Du, Houbing Song, Xuejie Zhu

Future IoT is expected to get ubiquitous connection and access in a global scale. In the meantime, with the empowered communications capability for IoT devices, IoT will evolve to be highly autonomous, even under the help from infrastructure, and thus will gradually establish the smart IoT community. One of the major challenges imposed on the smart IoT communities is the socialization of IoT communications, because massive IoT accesses make centralized control very hard and also face the shortage of spectrum resources. Towards these issues, we in this article first present the overview and discussions on social features affecting connections among devices. Then, we motivate studies on the statistical characteristics of social features for connections among devices towards smart IoT. We further propose the queuing model under unified asymptotic analyses framework to characterize the statistical social features, with emphases on typical social metrics such as credit, reputation, centrality, etc. How to apply these features for network optimization is further suggested. Finally, we share our opinion on the open problems of social-aware design towards future smart IoT.


          Paired Comparison Sentiment Scores. (arXiv:1807.03591v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Christoph Dalitz, Jens Wilberg, Katrin E. Bednarek

The method of paired comparisons is an established method in psychology. In this article, it is applied to obtain continuous sentiment scores for words from comparisons made by test persons. We created an initial lexicon with $n=199$ German words from a two-fold all-pair comparison experiment with ten different test persons. From the probabilistic models taken into account, the logistic model showed the best agreement with the results of the comparison experiment. The initial lexicon can then be used in different ways. One is to create special purpose sentiment lexica through the addition of arbitrary words that are compared with some of the initial words by test persons. A cross-validation experiment suggests that only about 18 two-fold comparisons are necessary to estimate the score of a new, yet unknown word, provided these words are selected by a modification of a method by Silverstein & Farrell. Another application of the initial lexicon is the evaluation of automatically created corpus-based lexica. By such an evaluation, we compared the corpus-based lexica SentiWS, SenticNet, and SentiWordNet, of which SenticNet 4 performed best. This technical report is a corrected and extended version of a presentation made at the ICDM Sentire workshop in 2016.


          Efficient Evaluation of the Number of False Alarm Criterion. (arXiv:1807.03594v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Sylvie Le Hégarat-Mascle, Emanuel Aldea, Jennifer Vandoni

This paper proposes a method for computing efficiently the significance of a parametric pattern inside a binary image. On the one hand, a-contrario strategies avoid the user involvement for tuning detection thresholds, and allow one to account fairly for different pattern sizes. On the other hand, a-contrario criteria become intractable when the pattern complexity in terms of parametrization increases. In this work, we introduce a strategy which relies on the use of a cumulative space of reduced dimensionality, derived from the coupling of a classic (Hough) cumulative space with an integral histogram trick. This space allows us to store partial computations which are required by the a-contrario criterion, and to evaluate the significance with a lower computational cost than by following a straightforward approach. The method is illustrated on synthetic examples on patterns with various parametrizations up to five dimensions. In order to demonstrate how to apply this generic concept in a real scenario, we consider a difficult crack detection task in still images, which has been addressed in the literature with various local and global detection strategies. We model cracks as bounded segments, detected by the proposed a-contrario criterion, which allow us to introduce additional spatial constraints based on their relative alignment. On this application, the proposed strategy yields state-of the-art results, and underlines its potential for handling complex pattern detection tasks.


          Revisiting the Hierarchical Multiscale LSTM. (arXiv:1807.03595v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Ákos Kádár, Marc-Alexandre Côté, Grzegorz Chrupała, Afra Alishahi

Hierarchical Multiscale LSTM (Chung et al., 2016a) is a state-of-the-art language model that learns interpretable structure from character-level input. Such models can provide fertile ground for (cognitive) computational linguistics studies. However, the high complexity of the architecture, training procedure and implementations might hinder its applicability. We provide a detailed reproduction and ablation study of the architecture, shedding light on some of the potential caveats of re-purposing complex deep-learning architectures. We further show that simplifying certain aspects of the architecture can in fact improve its performance. We also investigate the linguistic units (segments) learned by various levels of the model, and argue that their quality does not correlate with the overall performance of the model on language modeling.


          Successive Cancellation List Decoding of BMERA Codes with Application to Higher-Order Modulation. (arXiv:1807.03601v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Tobias Prinz, Peihong Yuan

BMERA or convolutional polar codes are an extension of polar codes with a provably better error exponent than polar codes. A successive cancellation (SC) decoding algorithm for BMERA codes similar to SC polar decoders is introduced. A pseudocode description of the SC decoder that can be extended to SC list (SCL) decoding is provided. Simulation results with and without outer CRC codes under SC and SCL decoding are presented for QAM modulation over the AWGN channel to compare the performance of polar and BMERA codes. BMERA codes outperform polar codes by more than 0.5 dB under SCL decoding without outer CRC codes.


          Essential Tensor Learning for Multi-view Spectral Clustering. (arXiv:1807.03602v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Jianlong Wu, Zhouchen Lin, Hongbin Zha

Multi-view clustering attracts much attention recently, which aims to take advantage of multi-view information to improve the performance of clustering. However, most recent work mainly focus on self-representation based subspace clustering, which is of high computation complexity. In this paper, we focus on the Markov chain based spectral clustering method and propose a novel essential tensor learning method to explore the high order correlations for multi-view representation. We first construct a tensor based on multi-view transition probability matrices of the Markov chain. By incorporating the idea from robust principle component analysis, tensor singular value decomposition (t-SVD) based tensor nuclear norm is imposed to preserve the low-rank property of the essential tensor, which can well capture the principle information from multiple views. We also employ the tensor rotation operator for this task to better investigate the relationship among views as well as reduce the computation complexity. The proposed method can be efficiently optimized by the alternating direction method of multipliers~(ADMM). Extensive experiments on six real world datasets corresponding to five different applications show that our method achieves superior performance over other state-of-the-art methods.


          Computing Kernels in Parallel: Lower and Upper Bounds. (arXiv:1807.03604v1 [cs.CC])      Cache   Translate Page   Web Page Cache   

Authors: Max Bannach, Till Tantau

Parallel fixed-parameter tractability studies how parameterized problems can be solved in parallel. A surprisingly large number of parameterized problems admit a high level of parallelization, but this does not mean that we can also efficiently compute small problem kernels in parallel: known kernelization algorithms are typically highly sequential. In the present paper, we establish a number of upper and lower bounds concerning the sizes of kernels that can be computed in parallel. An intriguing finding is that there are complex trade-offs between kernel size and the depth of the circuits needed to compute them: For the vertex cover problem, an exponential kernel can be computed by AC$^0$-circuits, a quadratic kernel by TC$^0$-circuits, and a linear kernel by randomized NC-circuits with derandomization being possible only if it is also possible for the matching problem. Other natural problems for which similar (but quantitatively different) effects can be observed include tree decomposition problems parameterized by the vertex cover number, the undirected feedback vertex set problem, the matching problem, or the point line cover problem. We also present natural problems for which computing kernels is inherently sequential.


          Window Opening Model using Deep Learning Methods. (arXiv:1807.03610v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Romana Markovic, Eva Grintal, Daniel Wölki, Jérôme Frisch, Christoph van Treeck

Occupant behavior (OB) and in particular window openings need to be considered in building performance simulation (BPS), in order to realistically model the indoor climate and energy consumption for heating ventilation and air conditioning (HVAC). However, the proposed OB window opening models are often biased towards the over-represented class where windows remained closed. In addition, they require tuning for each occupant which can not be efficiently scaled to the increased number of occupants. This paper presents a window opening model for commercial buildings using deep learning methods. The model is trained using data from occupants from an office building in Germany. In total the model is evaluated using almost 20 mio. data points from 3 independent buildings, located in Aachen, Frankfurt and Philadelphia. Eventually, the results of 3100 core hours of model development are summarized, which makes this study the largest of its kind in window states modeling. Additionally, the practical potential of the proposed model was tested by incorporating it in the Modelica-based thermal building simulation. The resulting evaluation accuracy and F1 scores on the office buildings ranged between 86-89 % and 0.53-0.65 respectively. The performance dropped around 15 % points in case of sparse input data, while the F1 score remained high.


          Theoretical Model of Computation and Algorithms for FPGA-based Hardware Accelerators. (arXiv:1807.03611v1 [cs.DS])      Cache   Translate Page   Web Page Cache   

Authors: Martin Hora, Václav Končický, Jakub Tětek

While FPGAs have been used extensively as hardware accelerators in industrial computation, no theoretical model of computation has been devised for the study of FPGA-based accelerators. In this paper, we present a theoretical model of computation on a system with conventional CPU and an FPGA, based on word-RAM. We show several algorithms in this model which are asymptotically faster than their word-RAM counterparts. Specifically, we show an algorithm for sorting, evaluation of associative operation and general techniques for speeding up some recursive algorithms and some dynamic programs. We also derive lower bounds on the running times needed to solve some problems.


          Convolutional neural network based automatic plaque characterization from intracoronary optical coherence tomography images. (arXiv:1807.03613v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Shenghua He, Jie Zheng, Akiko Maehara, Gary Mintz, Dalin Tang, Mark Anastasio, Hua Li

Optical coherence tomography (OCT) can provide high-resolution cross-sectional images for analyzing superficial plaques in coronary arteries. Commonly, plaque characterization using intra-coronary OCT images is performed manually by expert observers. This manual analysis is time consuming and its accuracy heavily relies on the experience of human observers. Traditional machine learning based methods, such as the least squares support vector machine and random forest methods, have been recently employed to automatically characterize plaque regions in OCT images. Several processing steps, including feature extraction, informative feature selection, and final pixel classification, are commonly used in these traditional methods. Therefore, the final classification accuracy can be jeopardized by error or inaccuracy within each of these steps. In this study, we proposed a convolutional neural network (CNN) based method to automatically characterize plaques in OCT images. Unlike traditional methods, our method uses the image as a direct input and performs classification as a single-step process. The experiments on 269 OCT images showed that the average prediction accuracy of CNN-based method was 0.866, which indicated a great promise for clinical translation.


          Detecting Antagonistic and Allied Communities on Social Media. (arXiv:1807.03617v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Amin Salehi, Hasan Davulcu

Community detection on social media has attracted considerable attention for many years. However, existing methods do not reveal the relations between communities. Communities can form alliances or engage in antagonisms due to various factors, e.g., shared or conflicting goals and values. Uncovering such relations can provide better insights to understand communities and the structure of social media. According to social science findings, the attitudes that members from different communities express towards each other are largely shaped by their community membership. Hence, we hypothesize that inter-community attitudes expressed among users in social media have the potential to reflect their inter-community relations. Therefore, we first validate this hypothesis in the context of social media. Then, inspired by the hypothesis, we develop a framework to detect communities and their relations by jointly modeling users' attitudes and social interactions. We present experimental results using three real-world social media datasets to demonstrate the efficacy of our framework.


          Interferometry-based modal analysis with finite aperture effects. (arXiv:1807.03622v1 [physics.ins-det])      Cache   Translate Page   Web Page Cache   

Authors: Davood Mardani, Ayman F. Abouraddy, George K. Atia

We analyze the effects of aperture finiteness on interferograms recorded to unveil the modal content of optical beams in arbitrary basis using generalized interferometry. We develop a scheme for modal reconstruction from interferometric measurements that accounts for the ensuing clipping effects. Clipping-cognizant reconstruction is shown to yield significant performance gains over traditional schemes that overlook such effects that do arise in practice. Our work can inspire further research on reconstruction schemes and algorithms that account for practical hardware limitations in a variety of contexts.


          Foreign English Accent Adjustment by Learning Phonetic Patterns. (arXiv:1807.03625v1 [cs.SD])      Cache   Translate Page   Web Page Cache   

Authors: Fedor Kitashov, Elizaveta Svitanko, Debojyoti Dutta

State-of-the-art automatic speech recognition (ASR) systems struggle with the lack of data for rare accents. For sufficiently large datasets, neural engines tend to outshine statistical models in most natural language processing problems. However, a speech accent remains a challenge for both approaches. Phonologists manually create general rules describing a speaker's accent, but their results remain underutilized. In this paper, we propose a model that automatically retrieves phonological generalizations from a small dataset. This method leverages the difference in pronunciation between a particular dialect and General American English (GAE) and creates new accented samples of words. The proposed model is able to learn all generalizations that previously were manually obtained by phonologists. We use this statistical method to generate a million phonological variations of words from the CMU Pronouncing Dictionary and train a sequence-to-sequence RNN to recognize accented words with 59% accuracy.


          A note on the integrality gap of the configuration LP for restricted Santa Claus. (arXiv:1807.03626v1 [cs.DS])      Cache   Translate Page   Web Page Cache   

Authors: Klaus Jansen, Lars Rohwedder

In the restricted Santa Claus problem we are given resources $\mathcal R$ and players $\mathcal P$. Every resource $j\in\mathcal R$ has a value $v_j$ and every player $i$ desires a set $\mathcal R(i)$ of resources. We are interested in distributing the resources to players that desire them. The quality of a solution is measured by the least happy player, i.e., the lowest sum of resource values. This value should be maximized. The local search algorithm by Asadpour et al. and its connection to the configuration LP has proved itself to be a very influential technique for this and related problems. In the original proof, a local search was used to obtain a bound of $4$ for the ratio of the fractional to the integral optimum of the configuration LP (integrality gap). This bound is non-constructive since the local search has not been shown to terminate in polynomial time. On the negative side, the worst instance known has an integrality gap of $2$. Although much progress was made in this area, neither bound has been improved since. We present a better analysis that shows the integrality gap is not worse than $3 + 5/6 \approx 3.8333$.


          A Numerical Comparison of an Isogeometric and a Classical Higher-Order Approach to the Electric Field Integral Equation. (arXiv:1807.03628v1 [cs.CE])      Cache   Translate Page   Web Page Cache   

Authors: Jürgen Dölz, Stefan Kurz, Sebastian Schöps, Felix Wolf

In this paper, we advocate a novel spline-based isogeometric approach for boundary elements and its efficient implementation. We compare solutions obtained by both an isogeometric approach, and a classical parametric higher-order approach via Raviart-Thomas elements to the solution of the electric field integral equation; i.e., the solution to an electromagnetic scattering problem, promising high convergence orders w.r.t. pointwise error. We discuss both, the obtained accuracy per DOF, as well as the effort required to solve the corresponding system iteratively, on three numerical examples of varying complexity.


          The SAGE Project: a Storage Centric Approach for Exascale Computing. (arXiv:1807.03632v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Sai Narasimhamurthy, Nikita Danilov, Sining Wu, Ganesan Umanesan, Steven Wei-der Chien, Sergio Rivas-Gomez, Ivy Bo Peng, Erwin Laure, Shaun de Witt, Dirk Pleiter, Stefano Markidis

SAGE (Percipient StorAGe for Exascale Data Centric Computing) is a European Commission funded project towards the era of Exascale computing. Its goal is to design and implement a Big Data/Extreme Computing (BDEC) capable infrastructure with associated software stack. The SAGE system follows a "storage centric" approach as it is capable of storing and processing large data volumes at the Exascale regime.

SAGE addresses the convergence of Big Data Analysis and HPC in an era of next-generation data centric computing. This convergence is driven by the proliferation of massive data sources, such as large, dispersed scientific instruments and sensors where data needs to be processed, analyzed and integrated into simulations to derive scientific and innovative insights. A first prototype of the SAGE system has been been implemented and installed at the Julich Supercomputing Center. The SAGE storage system consists of multiple types of storage device technologies in a multi-tier I/O hierarchy, including flash, disk, and non-volatile memory technologies. The main SAGE software component is the Seagate Mero Object Storage that is accessible via the Clovis API and higher level interfaces. The SAGE project also includes scientific applications for the validation of the SAGE concepts.

The objective of this paper is to present the SAGE project concepts, the prototype of the SAGE platform and discuss the software architecture of the SAGE system.


          Interpretable Patient Mortality Prediction with Multi-value Rule Sets. (arXiv:1807.03633v1 [cs.AI])      Cache   Translate Page   Web Page Cache   

Authors: Tong Wang, Veerajalandhar Allareddy, Sankeerth Rampa, Veerasathpurush Allareddy

We propose a Multi-vAlue Rule Set (MRS) model for in-hospital predicting patient mortality. Compared to rule sets built from single-valued rules, MRS adopts a more generalized form of association rules that allows multiple values in a condition. Rules of this form are more concise than classical single-valued rules in capturing and describing patterns in data. Our formulation also pursues a higher efficiency of feature utilization, which reduces possible cost in data collection and storage. We propose a Bayesian framework for formulating a MRS model and propose an efficient inference method for learning a maximum \emph{a posteriori}, incorporating theoretically grounded bounds to iteratively reduce the search space and improve the search efficiency. Experiments show that our model was able to achieve better performance than baseline method including the current system used by the hospital.


          Study of Switched Max-Link Buffer-Aided Relay Selection for Cooperative MIMO Systems. (arXiv:1807.03642v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: F. L. Duarte, R. C. de Lamare

In this paper, we investigate relay selection for cooperative multiple-antenna systems that are equipped with buffers, which increase the reliability of wireless links. In particular, we present a novel relay selection technique based on switching and the Max-Link protocol that is named Switched Max-Link. We also introduce a novel relay selection criterion based on the maximum likelihood (ML) principle denoted maximum minimum distance that is incorporated into. Simulations are then employed to evaluate the performance of the proposed and existing techniques.


          Ontology-based multi-agent system to support business users and management. (arXiv:1807.03646v1 [cs.MA])      Cache   Translate Page   Web Page Cache   

Authors: Dejan Lavbič, Olegas Vasilecas, Rok Rupnik

For some decision processes a significant added value is achieved when enterprises' internal Data Warehouse (DW) can be integrated and combined with external data gained from web sites of competitors and other relevant Web sources. In this paper we discuss the agent-based integration approach using ontologies (DSS-MAS). In this approach data from internal DW and external sources are scanned by coordinated group of agents, while semantically integrated and relevant data is reported to business users according to business rules. After data from internal DW, Web sources and business rules are acquired, agents using these data and rules can infer new knowledge and therefore facilitate decision making process. Knowledge represented in enterprises' ontologies is acquired from business users without extensive technical knowledge using user friendly user interface based on constraints and predefined templates. The approach presented in the paper was verified using the case study from the domain of mobile communications with the emphasis on supply and demand of mobile phones.


          Rule- and context-based dynamic business process modelling and simulation. (arXiv:1807.03649v1 [cs.SE])      Cache   Translate Page   Web Page Cache   

Authors: Olegas Vasilecas, Diana Kalibatiene, Dejan Lavbič

The traditional approach used to implement a business process (BP) in today's information systems (IS) no longer covers the actual needs of the dynamically changing business. Therefore, a necessity for a new approach of dynamic business process (DBP) modelling and simulation has arisen. To date, existing approaches to DBP modelling and simulation have been incomplete, i.e. they lack theory or a case study or both. Furthermore, there is no commonly accepted definition of BDP. Current BP modelling tools are suitable almost solely for the modelling and simulation of a static BP that strictly prescribes which activities, and in which sequence, to execute. Usually, a DBP is not defined strictly at the beginning of its execution, and it changes under new conditions at runtime. In our paper, we propose six requirements of DBP and an approach for rule- and context-based DBP modelling and simulation. The approach is based on changing BP rules, BP actions and their sequences at process instance runtime, according to the new business system context. Based on the proposed approach, a reference architecture and prototype of a DBP simulation tool were developed. Modelling and simulation were carried out using this prototype, and the case study shows correspondence to the needs of dynamically changing business, as well as possibilities for modelling and simulating DBP.


          On a Class of Stochastic Multilayer Networks. (arXiv:1807.03650v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Bo Jiang, Philippe Nain, Don Towsley, Saikat Guha

In this paper, we introduce a new class of stochastic multilayer networks. A stochastic multilayer network is the aggregation of $M$ networks (one per layer) where each is a subgraph of a foundational network $G$. Each layer network is the result of probabilistically removing links and nodes from $G$. The resulting network includes any link that appears in at least $K$ layers. This model is an instance of a non-standard site-bond percolation model. Two sets of results are obtained: first, we derive the probability distribution that the $M$-layer network is in a given configuration for some particular graph structures (explicit results are provided for a line and an algorithm is provided for a tree), where a configuration is the collective state of all links (each either active or inactive). Next, we show that for appropriate scalings of the node and link selection processes in a layer, links are asymptotically independent as the number of layers goes to infinity, and follow Poisson distributions. Numerical results are provided to highlight the impact of having several layers on some metrics of interest (including expected size of the cluster a node belongs to in the case of the line). This model finds applications in wireless communication networks with multichannel radios, multiple social networks with overlapping memberships, transportation networks, and, more generally, in any scenario where a common set of nodes can be linked via co-existing means of connectivity.


          Towards Head Motion Compensation Using Multi-Scale Convolutional Neural Networks. (arXiv:1807.03651v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Omer Rajput, Nils Gessert, Martin Gromniak, Lars Matthäus, Alexander Schlaefer

Head pose estimation and tracking is useful in variety of medical applications. With the advent of RGBD cameras like Kinect, it has become feasible to do markerless tracking by estimating the head pose directly from the point clouds. One specific medical application is robot assisted transcranial magnetic stimulation (TMS) where any patient motion is compensated with the help of a robot. For increased patient comfort, it is important to track the head without markers. In this regard, we address the head pose estimation problem using two different approaches. In the first approach, we build upon the more traditional approach of model based head tracking, where a head model is morphed according to the particular head to be tracked and the morphed model is used to track the head in the point cloud streams. In the second approach, we propose a new multi-scale convolutional neural network architecture for more accurate pose regression. Additionally, we outline a systematic data set acquisition strategy using a head phantom mounted on the robot and ground-truth labels generated using a highly accurate tracking system.


          Handling Incomplete Heterogeneous Data using VAEs. (arXiv:1807.03653v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Alfredo Nazabal, Pablo M. Olmos, Zoubin Ghahramani, Isabel Valera

Variational autoencoders (VAEs), as well as other generative models, have been shown to be efficient and accurate to capture the latent structure of vast amounts of complex high-dimensional data. However, existing VAEs can still not directly handle data that are heterogenous (mixed continuous and discrete) or incomplete (with missing data at random), which is indeed common in real-world applications.

In this paper, we propose a general framework to design VAEs, suitable for fitting incomplete heterogenous data. The proposed HI-VAE includes likelihood models for real-valued, positive real valued, interval, categorical, ordinal and count data, and allows to estimate (and potentially impute) missing data accurately. Furthermore, HI-VAE presents competitive predictive performance in supervised tasks, outperforming supervised models when trained on incomplete data.


          Linguistic Characteristics of Censorable Language on SinaWeibo. (arXiv:1807.03654v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Kei Yin Ng, Anna Feldman, Jing Peng, Chris Leberknight

This paper investigates censorship from a linguistic perspective. We collect a corpus of censored and uncensored posts on a number of topics, build a classifier that predicts censorship decisions independent of discussion topics. Our investigation reveals that the strongest linguistic indicator of censored content of our corpus is its readability.


          Computing Height Persistence and Homology Generators in $\mathbb{R}^3$ Efficiently. (arXiv:1807.03655v1 [cs.CG])      Cache   Translate Page   Web Page Cache   

Authors: Tamal K. Dey

Recently it has been shown that computing the dimension of the first homology group $H_1(K)$ of a simplicial $2$-complex $K$ embedded linearly in $\mathbb{R}^4$ is as hard as computing the rank of a sparse $0-1$ matrix. This puts a major roadblock to computing persistence and a homology basis (generators) for complexes embedded in $\mathbb{R}^4$ and beyond in less than quadratic or even near-quadratic time. But, what about dimension three? It is known that persistence for piecewise linear functions on a complex $K$ with $n$ simplices can be computed in $O(n\log n)$ time and a set of generators of total size $k$ can be computed in $O(n+k)$ time when $K$ is a graph or a surface linearly embedded in $\mathbb{R}^3$. But, the question for general simplicial complexes $K$ linearly embedded in $\mathbb{R}^3$ is not completely settled. No algorithm with a complexity better than that of the matrix multiplication is known for this important case. We show that the persistence for {\em height functions} on such complexes, hence called {\em height persistence}, can be computed in $O(n\log n)$ time. This allows us to compute a basis (generators) of $H_i(K)$, $i=1,2$, in $O(n\log n+k)$ time where $k$ is the size of the output. This improves significantly the current best bound of $O(n^{\omega})$, $\omega$ being the matrix multiplication exponent. We achieve these improved bounds by leveraging recent results on zigzag persistence in computational topology, new observations about Reeb graphs, and some efficient geometric data structures.


          Enriching Knowledge Bases with Counting Quantifiers. (arXiv:1807.03656v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Paramita Mirza, Simon Razniewski, Fariz Darari, Gerhard Weikum

Information extraction traditionally focuses on extracting relations between identifiable entities, such as <Monterey, locatedIn, California>. Yet, texts often also contain Counting information, stating that a subject is in a specific relation with a number of objects, without mentioning the objects themselves, for example, "California is divided into 58 counties". Such counting quantifiers can help in a variety of tasks such as query answering or knowledge base curation, but are neglected by prior work. This paper develops the first full-fledged system for extracting counting information from text, called CINEX. We employ distant supervision using fact counts from a knowledge base as training seeds, and develop novel techniques for dealing with several challenges: (i) non-maximal training seeds due to the incompleteness of knowledge bases, (ii) sparse and skewed observations in text sources, and (iii) high diversity of linguistic patterns. Experiments with five human-evaluated relations show that CINEX can achieve 60% average precision for extracting counting information. In a large-scale experiment, we demonstrate the potential for knowledge base enrichment by applying CINEX to 2,474 frequent relations in Wikidata. CINEX can assert the existence of 2.5M facts for 110 distinct relations, which is 28% more than the existing Wikidata facts for these relations.


          Video Captioning with Boundary-aware Hierarchical Language Decoding and Joint Video Prediction. (arXiv:1807.03658v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Xiangxi Shi, Jianfei Cai, Jiuxiang Gu, Shafiq Joty

The explosion of video data on the internet requires effective and efficient technology to generate captions automatically for people who are not able to watch the videos. Despite the great progress of video captioning research, particularly on video feature encoding, the language decoder is still largely based on the prevailing RNN decoder such as LSTM, which tends to prefer the frequent word that aligns with the video. In this paper, we propose a boundary-aware hierarchical language decoder for video captioning, which consists of a high-level GRU based language decoder, working as a global (caption-level) language model, and a low-level GRU based language decoder, working as a local (phrase-level) language model. Most importantly, we introduce a binary gate into the low-level GRU language decoder to detect the language boundaries. Together with other advanced components including joint video prediction, shared soft attention, and boundary-aware video encoding, our integrated video captioning framework can discover hierarchical language information and distinguish the subject and the object in a sentence, which are usually confusing during the language generation. Extensive experiments on two widely-used video captioning datasets, MSR-Video-to-Text (MSR-VTT) \cite{xu2016msr} and YouTube-to-Text (MSVD) \cite{chen2011collecting} show that our method is highly competitive, compared with the state-of-the-art methods.


          Threshold $q$-voter model. (arXiv:1807.03661v1 [physics.soc-ph])      Cache   Translate Page   Web Page Cache   

Authors: Allan R. Vieira, Celia Anteneodo

We introduce the threshold $q$-voter opinion dynamics where an agent, facing a binary choice, can change its mind when at least $q_0$ amongst $q$ neighbors share the opposite opinion. Otherwise, the agent can still change its mind with a certain probability $\varepsilon$. This threshold dynamics contemplates the possibility of persuasion by an influence group even when there is not full agreement among its members. In fact, individuals can follow their peers not only when there is unanimity ($q_0=q$) in the lobby group, as assumed in the $q$-voter model, but, depending on the circumstances, also when there is simple majority ($q_0>q/2$), Byzantine consensus ($q_0>2q/3$), or any minimal number $q_0$ amongst $q$. This realistic threshold gives place to emerging collective states and phase transitions which are not observed in the standard $q$-voter. The threshold $q_0$, together with the stochasticity introduced by $\varepsilon$, yields a phenomenology that mimics as particular cases the $q$-voter with stochastic drivings such as nonconformity and independence. In particular, nonconsensus majority states are possible, as well as mixed phases. Continuous and discontinuous phase transitions can occur, but also transitions from fluctuating phases into absorbing states.


          TrialChain: A Blockchain-Based Platform to Validate Data Integrity in Large, Biomedical Research Studies. (arXiv:1807.03662v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Hao Dai, H Patrick Young, Thomas JS Durant, Guannan Gong, Mingming Kang, Harlan M Krumholz, Wade L Schulz, Lixin Jiang

The governance of data used for biomedical research and clinical trials is an important requirement for generating accurate results. To improve the visibility of data quality and analysis, we developed TrialChain, a blockchain-based platform that can be used to validate data integrity from large, biomedical research studies. We implemented a private blockchain using the MultiChain platform and integrated it with a data science platform deployed within a large research center. An administrative web application was built with Python to manage the platform, which was built with a microservice architecture using Docker. The TrialChain platform was integrated during data acquisition into our existing data science platform. Using NiFi, data were hashed and logged within the local blockchain infrastructure. To provide public validation, the local blockchain state was periodically synchronized to the public Ethereum network. The use of a combined private/public blockchain platform allows for both public validation of results while maintaining additional security and lower cost for blockchain transactions. Original data and modifications due to downstream analysis can be logged within TrialChain and data assets or results can be rapidly validated when needed using API calls to the platform. The TrialChain platform provides a data governance solution to audit the acquisition and analysis of biomedical research data. The platform provides cryptographic assurance of data authenticity and can also be used to document data analysis.


          Orbits of monomials and factorization into products of linear forms. (arXiv:1807.03663v1 [cs.CC])      Cache   Translate Page   Web Page Cache   

Authors: Pascal Koiran (LIP), Nicolas Ressayre (ICJ)

This paper is devoted to the factorization of multivariate polynomials into products of linear forms, a problem which has applications to differential algebra, to the resolution of systems of polynomial equations and to Waring decomposition (i.e., decomposition in sums of d-th powers of linear forms; this problem is also known as symmetric tensor decomposition). We provide three black box algorithms for this problem. Our main contribution is an algorithm motivated by the application to Waring decomposition. This algorithm reduces the corresponding factorization problem to simultaenous matrix diagonalization, a standard task in linear algebra. The algorithm relies on ideas from invariant theory, and more specifically on Lie algebras. Our second algorithm reconstructs a factorization from several bi-variate projections. Our third algorithm reconstructs it from the determination of the zero set of the input polynomial, which is a union of hyperplanes.


          Deep-Reinforcement-Learning for Gliding and Perching Bodies. (arXiv:1807.03671v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Guido Novati, Lakshminarayanan Mahadevan, Petros Koumoutsakos

Controlled gliding is one of the most energetically efficient modes of transportation for natural and human powered fliers. Here we demonstrate that gliding and landing strategies with different optimality criteria can be identified through deep reinforcement learning without explicit knowledge of the underlying physics. We combine a two dimensional model of a controlled elliptical body with deep reinforcement learning (D-RL) to achieve gliding with either minimum energy expenditure, or fastest time of arrival, at a predetermined location. In both cases the gliding trajectories are smooth, although energy/time optimal strategies are distinguished by small/high frequency actuations. We examine the effects of the ellipse's shape and weight on the optimal policies for controlled gliding. Surprisingly, we find that the model-free reinforcement learning leads to more robust gliding than model-based optimal control strategies with a modest additional computational cost. We also demonstrate that the gliders with D-RL can generalize their strategies to reach the target location from previously unseen starting positions. The model-free character and robustness of D-RL suggests a promising framework for developing mechanical devices capable of exploiting complex flow environments.


          IAM at CLEF eHealth 2018: Concept Annotation and Coding in French Death Certificates. (arXiv:1807.03674v1 [cs.CL])      Cache   Translate Page   Web Page Cache   

Authors: Sébastien Cossin, Vianney Jouhet, Fleur Mougin, Gayo Diallo, Frantz Thiessard

In this paper, we describe the approach and results for our participation in the task 1 (multilingual information extraction) of the CLEF eHealth 2018 challenge. We addressed the task of automatically assigning ICD-10 codes to French death certificates. We used a dictionary-based approach using materials provided by the task organizers. The terms of the ICD-10 terminology were normalized, tokenized and stored in a tree data structure. The Levenshtein distance was used to detect typos. Frequent abbreviations were detected by manually creating a small set of them. Our system achieved an F-score of 0.786 (precision: 0.794, recall: 0.779). These scores were substantially higher than the average score of the systems that participated in the challenge.


          Event Detection and Retrieval on Social Media. (arXiv:1807.03675v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Manos Schinas, Symeon Papadopoulos, Yiannis Kompatsiaris, Pericles Mitkas

In the recent years, we have witnessed the rapid adoption of social media platforms, such as Twitter, Facebook and YouTube, and their use as part of the everyday life of billions of people worldwide. Given the habit of people to use these platforms to share thoughts, daily activities and experiences it is not surprising that the amount of user generated content has reached unprecedented levels, with a substantial part of that content being related to real-world events, i.e. actions or occurrences taking place at a certain time and location. Given the key role of events in our life, the task of annotating and organizing social media content around them is of crucial importance for ensuring real-time and future access to multimedia content about an event of interest. In this chapter, we present several research efforts from recent years that tackle two main problems: a) event detection and b) event-based media retrieval and summarization. Given archived collections or live streams of social media items, the purpose of event detection methods is to identify previously unknown events in the form of sets of items that describe them. In general, the events could be of any type, but there are also approaches aiming at events of specific type. Given a target event the goal of event summarization is first to identify relevant content and then to represent it in a concise way, selecting the most appealing and representative content.


          On the choice of weight functions for linear representations of persistence diagrams. (arXiv:1807.03678v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Divol Vincent, Polonik Wolfgang

Persistence diagrams are efficient descriptors of the topology of a point cloud. As they do not naturally belong to a Hilbert space, standard statistical methods cannot be directly applied to them. Instead, feature maps (or representations) are commonly used for the analysis. A large class of feature maps, which we call linear, depends on some weight functions, the choice of which is a critical issue. An important criterion to choose a weight function is to ensure stability of the feature maps with respect to Wasserstein distances on diagrams. We improve known results on the stability of such maps, and extend it to general weight functions. We also address the choice of the weight function by considering an asymptotic setting; assume that $\mathbb{X}_n$ is an i.i.d. sample from a density on $[0,1]^d$. For the \v{C}ech and Rips filtrations, we characterize the weight functions for which the corresponding feature maps converge as $n$ approaches infinity, and by doing so, we prove laws of large numbers for the total persistences of such diagrams. Both approaches lead to the same simple heuristic for tuning weight functions: if the data lies near a $d$-dimensional manifold, then a sensible choice of weight function is the persistence to the power $\alpha$ with $\alpha \geq d$.


          Polynomial bounds for centered colorings on proper minor-closed graph classes. (arXiv:1807.03683v1 [cs.DM])      Cache   Translate Page   Web Page Cache   

Authors: Michał Pilipczuk, Sebastian Siebertz

For $p\in \mathbb{N}$, a coloring $\lambda$ of the vertices of a graph $G$ is {\em{$p$-centered}} if for every connected subgraph~$H$ of $G$, either $H$ receives more than $p$ colors under $\lambda$ or there is a color that appears exactly once in $H$. In this paper, we prove that every $K_t$-minor-free graph admits a $p$-centered coloring with $\mathcal{O}(p^{g(t)})$ colors for some function $g$. In the special case that the graph is embeddable in a fixed surface $\Sigma$ we show that it admits a $p$-centered coloring with $\mathcal{O}(p^{19})$ colors, with the degree of the polynomial independent of the genus of $\Sigma$. This provides the first polynomial upper bounds on the number of colors needed in $p$-centered colorings of graphs drawn from proper minor-closed classes, which answers an open problem posed by Dvo\v{r}{\'a}k.

As an algorithmic application, we use our main result to prove that if $\mathcal{C}$ is a fixed proper minor-closed class of graphs, then given graphs $H$ and $G$, on $p$ and $n$ vertices, respectively, where $G\in \mathcal{C}$, it can be decided whether $H$ is a subgraph of $G$ in time $2^{\mathcal{O}(p\log p)}\cdot n^{\mathcal{O}(1)}$ and space $n^{\mathcal{O}(1)}$.


          Inside the Right-Leaning Echo Chambers: Characterizing Gab, an Unmoderated Social System. (arXiv:1807.03688v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Lucas Lima, Julio C. S. Reis, Philipe Melo, Fabricio Murai, Leandro Araújo, Pantelis Vikatos, Fabrício Benevenuto

The moderation of content in many social media systems, such as Twitter and Facebook, motivated the emergence of a new social network system that promotes free speech, named Gab. Soon after that, Gab has been removed from Google Play Store for violating the company's hate speech policy and it has been rejected by Apple for similar reasons. In this paper we characterize Gab, aiming at understanding who are the users who joined it and what kind of content they share in this system. Our findings show that Gab is a very politically oriented system that hosts banned users from other social networks, some of them due to possible cases of hate speech and association with extremism. We provide the first measurement of news dissemination inside a right-leaning echo chamber, investigating a social media where readers are rarely exposed to content that cuts across ideological lines, but rather are fed with content that reinforces their current political or social views.


          Sparse Representation and Non-Negative Matrix Factorization for image denoise. (arXiv:1807.03694v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: R. M. Farouk, M. E. Abd El-aziz, A. M. Adam

Recently, the problem of blind image separation has been widely investigated, especially the medical image denoise which is the main step in medical diag-nosis. Removing the noise without affecting relevant features of the image is the main goal. Sparse decomposition over redundant dictionaries become of the most used approaches to solve this problem. NMF codes naturally favor sparse, parts-based representations. In sparse representation, signals represented as a linear combination of a redundant dictionary atoms. In this paper, we propose an algorithm based on sparse representation over the redundant dictionary and Non-Negative Matrix Factorization (N-NMF). The algorithm initializes a dic-tionary based on training samples constructed from noised image, then it searches for the best representation for the source by using the approximate matching pursuit (AMP). The proposed N-NMF gives a better reconstruction of an image from denoised one. We have compared our numerical results with different image denoising techniques and we have found the performance of the proposed technique is promising. Keywords: Image denoising, sparse representation, dictionary learning, matching pursuit, non-negative matrix factorization.


          Deep Learning on Low-Resource Datasets. (arXiv:1807.03697v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Veronica Morfi, Dan Stowell

In training a deep learning system to perform audio transcription, two practical problems may arise. Firstly, most datasets are weakly labelled, having only a list of events present in each recording without any temporal information for training. Secondly, deep neural networks need a very large amount of labelled training data to achieve good quality performance, yet in practice it is difficult to collect enough samples for most classes of interest. In this paper, we propose factorising the final task of audio transcription into multiple intermediate tasks in order to improve the training performance when dealing with this kind of low-resource datasets. We evaluate three data-efficient approaches of training a stacked convolutional and recurrent neural network for the intermediate tasks. Our results show that different methods of training have different advantages and disadvantages.


          Competitive Parallelism: Getting Your Priorities Right. (arXiv:1807.03703v1 [cs.PL])      Cache   Translate Page   Web Page Cache   

Authors: Stefan K. Muller, Umut A. Acar, Robert Harper

Multi-threaded programs have traditionally fallen into one of two domains: cooperative and competitive. These two domains have traditionally remained mostly disjoint, with cooperative threading used for increasing throughput in compute-intensive applications such as scientific workloads and cooperative threading used for increasing responsiveness in interactive applications such as GUIs and games. As multicore hardware becomes increasingly mainstream, there is a need for bridging these two disjoint worlds, because many applications mix interaction and computation and would benefit from both cooperative and competitive threading.

In this paper, we present techniques for programming and reasoning about parallel interactive applications that can use both cooperative and competitive threading. Our techniques enable the programmer to write rich parallel interactive programs by creating and synchronizing with threads as needed, and by assigning threads user-defined and partially ordered priorities. To ensure important responsiveness properties, we present a modal type system analogous to S4 modal logic that precludes low-priority threads from delaying high-priority threads, thereby statically preventing a crucial set of priority-inversion bugs. We then present a cost model that allows reasoning about responsiveness and completion time of well-typed programs. The cost model extends the traditional work-span model for cooperative threading to account for competitive scheduling decisions needed to ensure responsiveness. Finally, we show that our proposed techniques are realistic by implementing them as an extension to the Standard ML language.


          Generalized deterministic policy gradient algorithms. (arXiv:1807.03708v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Qingpeng Cai, Ling Pan, Pingzhong Tang

We study a setting of reinforcement learning, where the state transition is a convex combination of a stochastic continuous function and a deterministic discontinuous function. Such a setting include as a special case the stochastic state transition setting, namely the setting of deterministic policy gradient (DPG).

We introduce a theoretical technique to prove the existence of the policy gradient in this generalized setting. Using this technique, we prove that the deterministic policy gradient indeed exists for a certain set of discount factors, and further prove two conditions that guarantee the existence for all discount factors. We then derive a closed form of the policy gradient whenever exists. Interestingly, the form of the policy gradient in such setting is equivalent to that in DPG. Furthermore, to overcome the challenge of high sample complexity of DPG in this setting, we propose the Generalized Deterministic Policy Gradient (GDPG) algorithm. The main innovation of the algorithm is to optimize a weighted objective of the original Markov decision process (MDP) and an augmented MDP that simplifies the original one, and serves as its lower bound. To solve the augmented MDP, we make use of the model-based methods which enable fast convergence. We finally conduct extensive experiments comparing GDPG with state-of-the-art methods on several standard benchmarks. Results demonstrate that GDPG substantially outperforms other baselines in terms of both convergence and long-term rewards.


          Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis. (arXiv:1807.03710v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Timothy Wong, Zhiyuan Luo

Recurrent auto-encoder model summarises sequential data through an encoder structure into a fixed-length vector and then reconstructs the original sequence through the decoder structure. The summarised vector can be used to represent time series features. In this paper, we propose relaxing the dimensionality of the decoder output so that it performs partial reconstruction. The fixed-length vector therefore represents features in the selected dimensions only. In addition, we propose using rolling fixed window approach to generate training samples from unbounded time series data. The change of time series features over time can be summarised as a smooth trajectory path. The fixed-length vectors are further analysed using additional visualisation and unsupervised clustering techniques. The proposed method can be applied in large-scale industrial processes for sensors signal analysis purpose, where clusters of the vector representations can reflect the operating states of the industrial system.


          Geometric Generalization Based Zero-Shot Learning Dataset Infinite World: Simple Yet Powerful. (arXiv:1807.03711v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Rajesh Chidambaram, Michael Kampffmeyer, Willie Neiswanger, Xiaodan Liang, Thomas Lachmann, Eric Xing

Raven's Progressive Matrices are one of the widely used tests in evaluating the human test taker's fluid intelligence. Analogously, this paper introduces geometric generalization based zero-shot learning tests to measure the rapid learning ability and the internal consistency of deep generative models. Our empirical research analysis on state-of-the-art generative models discern their ability to generalize concepts across classes. In the process, we introduce Infinit World, an evaluable, scalable, multi-modal, light-weight dataset and Zero-Shot Intelligence Metric ZSI. The proposed tests condenses human-level spatial and numerical reasoning tasks to its simplistic geometric forms. The dataset is scalable to a theoretical limit of infinity, in numerical features of the generated geometric figures, image size and in quantity. We systematically analyze state-of-the-art model's internal consistency, identify their bottlenecks and propose a pro-active optimization method for few-shot and zero-shot learning.


          DialPlate: Enhancing the Detection of Smooth Pursuits Eye Movements Using Linear Regression. (arXiv:1807.03713v1 [cs.HC])      Cache   Translate Page   Web Page Cache   

Authors: Heiko Drewes, Mohamed Khamis, Florian Alt

We introduce and evaluate a novel approach for detecting smooth pursuit eye movements that increases the number of distinguishable targets and is more robust against false positives. Being natural and calibration-free, Pursuits has been gaining popularity in the past years. At the same time, current implementations show poor performance when more than eight on-screen targets are being used, thus limiting its applicability. Our approach (1) leverages the slope of a regression line, and (2) introduces a minimum signal duration that improves both the new and the traditional detection method. After introducing the approach as well as the implementation, we compare it to the traditional correlation-based Pursuits detection method. We tested the approach up to 24 targets and show that, if accepting a similar error rate, nearly twice as many targets can be distinguished compared to state of the art. For fewer targets, accuracy increases significantly. We believe our approach will enable more robust pursuit-based user interfaces, thus making it valuable for both researchers and practitioners.


          Improved Space-Time Tradeoffs for kSUM. (arXiv:1807.03718v1 [cs.DS])      Cache   Translate Page   Web Page Cache   

Authors: Isaac Goldstein, Moshe Lewenstein, Ely Porat

In the kSUM problem we are given an array of numbers $a_1,a_2,...,a_n$ and we are required to determine if there are $k$ different elements in this array such that their sum is 0. This problem is a parameterized version of the well-studied SUBSET-SUM problem, and a special case is the 3SUM problem that is extensively used for proving conditional hardness. Several works investigated the interplay between time and space in the context of SUBSET-SUM. Recently, improved time-space tradeoffs were proven for kSUM using both randomized and deterministic algorithms.

In this paper we obtain an improvement over the best known results for the time-space tradeoff for kSUM. A major ingredient in achieving these results is a general self-reduction from kSUM to mSUM where $m<k$, and several useful observations that enable this reduction and its implications. The main results we prove in this paper include the following: (i) The best known Las Vegas solution to kSUM running in approximately $O(n^{k-\delta\sqrt{2k}})$ time and using $O(n^{\delta})$ space, for $0 \leq \delta \leq 1$. (ii) The best known deterministic solution to kSUM running in approximately $O(n^{k-\delta\sqrt{k}})$ time and using $O(n^{\delta})$ space, for $0 \leq \delta \leq 1$. (iii) A space-time tradeoff for solving kSUM using $O(n^{\delta})$ space, for $\delta>1$. (iv) An algorithm for 6SUM running in $O(n^4)$ time using just $O(n^{2/3})$ space. (v) A solution to 3SUM on random input using $O(n^2)$ time and $O(n^{1/3})$ space, under the assumption of a random read-only access to random bits.


          Peerus Review: a tool for scientific experts finding. (arXiv:1807.03719v1 [cs.IR])      Cache   Translate Page   Web Page Cache   

Authors: Robin Brochier, Adrien Guille (ERIC), Julien Velcin (ERIC), Benjamin Rothan, Di Cioccio

We propose a tool for experts finding applied to academic data generated by the start-up DSRT in the context of its application Peerus. A user may submit the title, the abstract and optionnally the authors and the journal of publication of a scientific article and the application then returns a list of experts, potential reviewers of the submitted article. The retrieval algorithm is a voting system based on a language modeling technique trained on several millions of scientific papers.


          Asynchronous Verifiable Secret-Sharing Protocols on a Good Day. (arXiv:1807.03720v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Soumya Basu, Alin Tomescu, Mike Reiter, Dahlia Malkhi

Asynchronous verifiable secret sharing (AVSS) is a cornerstone primitive in secure multi-party computation and Byzantine fault tolerance. AVSS requires a dealer to share a secret with a set of replicas, of which some may be faulty. In prior AVSS schemes, the dealer paid for the possibility of replica failures up front, thus incurring quadratic or worse communication complexity. However, in practice, there would typically be at most a few replica failures in each sharing. This paper introduces an optimistic AVSS protocol that only pays for the number of failures that actually occur, rather than the maximum allowed number of failures. By doing so, we bring the cost of AVSS down to typically linear on a good day, specifically with only linear communication cost for the dealer.


          On the complexity of the (approximate) nearest colored node problem. (arXiv:1807.03721v1 [cs.DS])      Cache   Translate Page   Web Page Cache   

Authors: Maximilian Probst

Given a graph $G=(V,E)$ where each vertex is assigned a color from the set $C=\{c_1, c_2, .., c_\sigma\}$. In the (approximate) nearest colored node problem, we want to query, given $v \in V$ and $c \in C$, for the (approximate) distance $\widehat{\mathbf{dist}}(v, c)$ from $v$ to the nearest node of color $c$. For any integer $1 \leq k \leq \log n$, we present a Color Distance Oracle (also often referred to as Vertex-label Distance Oracle) of stretch $4k-5$ using space $O(kn\sigma^{1/k})$ and query time $O(\log{k})$. This improves the query time from $O(k)$ to $O(\log{k})$ over the best known Color Distance Oracle by Chechik \cite{DBLP:journals/corr/abs-1109-3114}. We then prove a lower bound in the cell probe model showing that our query time is optimal in regard to space up to constant factors. We also investigate dynamic settings of the problem and find new upper and lower bounds.


          Understanding VAEs in Fisher-Shannon Plane. (arXiv:1807.03723v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Huangjie Zheng, Jiangchao Yao, Ya Zhang, Ivor W. Tsang

In information theory, Fisher information and Shannon information (entropy) are respectively used to measure the ability in parameter estimation and the uncertainty among variables. The uncertainty principle asserts a fundamental relationship between Fisher information and Shannon information, i.e., the more Fisher information we get, the less Shannon information we gain, and vice versa. This enlightens us about the essence of the encoding/decoding procedure in \emph{variational auto-encoders} (VAEs) and motivates us to investigate VAEs in the Fisher-Shannon plane. Our studies show that the performance of the latent representation learning and the log-likelihood estimation are intrinsically influenced by the trade-off between Fisher information and Shannon information. To flexibly adjust the trade-off, we further propose a variant of VAEs that can explicitly control Fisher information in encoding/decoding mechanism, termed as Fisher auto-encoder (FAE). Through qualitative and quantitative experiments, we show the complementary properties of Fisher information and Shannon information, and give a guide for Fisher information conditioning to achieve high resolution reconstruction, disentangle feature learning, over-fitting/over-regularization resistance, etc.


          Medical Technologies and Challenges of Robot Assisted Minimally Invasive Intervention and Diagnostics. (arXiv:1807.03731v1 [cs.RO])      Cache   Translate Page   Web Page Cache   

Authors: Nabil Simaan, Rashid M. Yasin, Long Wang

Emerging paradigms furthering the reach of medical technology deeper into human anatomy present unique modeling, control and sensing problems. This paper discusses a brief history of medical robotics leading to the current trend of minimally invasive intervention and diagnostics in confined spaces. Robotics for natural orifice and single port access surgery, capsule and magnetically actuated robotics and microrobotics are discussed with the aim of elucidating the state of the art. Works on modeling, sensing and control of mechanical architectures of robots for natural orifice and single port access surgery are discussed, followed by a presentation of works on magnetic actuation, sensing and localization for capsule robotics and microrobotics. Finally challenges and open problems in each one of these areas are presented.


          Proceedings of the 7th Workshop on Mathematically Structured Functional Programming. (arXiv:1807.03732v1 [cs.PL])      Cache   Translate Page   Web Page Cache   

Authors: Robert Atkey (University of Strathclyde), Sam Lindley (University of Edinburgh)

The seventh workshop on Mathematically Structured Functional Programming is devoted to the derivation of functionality from structure. It is a celebration of the direct impact of Theoretical Computer Science on programs as we write them today. Modern programming languages, and in particular functional languages, support the direct expression of mathematical structures, equipping programmers with tools of remarkable power and abstraction. Where would Haskell be without monads? Functional reactive programming without arrows? Call-by-push-value without adjunctions? The list goes on. This workshop is a forum for researchers who seek to reflect mathematical phenomena in data and control.

The seventh workshop on Mathematically Structured Functional Programming was held on 8th July 2018 affiliated with FSCD 2018 as part of FLoC 2018 in Oxford, UK.

There were two invited talks. In addition four full papers and two extended abstracts were selected by the programme committee for presentation.


          Network Classification in Temporal Networks Using Motifs. (arXiv:1807.03733v1 [cs.SI])      Cache   Translate Page   Web Page Cache   

Authors: Kun Tu, Jian Li, Don Towsley, Dave Braines, Liam D. Turner

Network classification has a variety of applications, such as detecting communities within networks and finding similarities between those representing different aspects of the real world. However, most existing work in this area focus on examining static undirected networks without considering directed edges or temporality. In this paper, we propose a new methodology that utilizes feature representation for network classification based on the temporal motif distribution of the network and a null model for comparing against random graphs. Experimental results show that our method improves accuracy by up $10\%$ compared to the state-of-the-art embedding method in network classification, for tasks such as classifying network type, identifying communities in email exchange network, and identifying users given their app-switching behaviors.


          Constructing Concrete Hard Instances of the Maximum Independent Set Problem. (arXiv:1807.03739v1 [cs.DS])      Cache   Translate Page   Web Page Cache   

Authors: Naoto Shiraishi, Jun Takahashi

We provide a deterministic construction of hard instances for the maximum independent set problem (MIS). The constructed hard instances form an infinite graph sequence with increasing size, which possesses similar characteristics to sparse random graphs and in which MIS cannot be solved efficiently. We analytically and numerically show that all algorithms employing cycle-chain refutation, which is a general refutation method we introduce for capturing the ability of many known algorithms, cannot upper bound the size of the maximum independent set tightly.


          On the Performance of NOMA with Hybrid ARQ. (arXiv:1807.03745v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Donghong Cai, Zhiguo Ding, Pingzhi Fan, Zheng Yang

In this paper, we investigate the outage performance of hybrid automatic repeat request with chase combining (HARQ-CC) assisted downlink non-orthogonal multiple access (NOMA) systems. A closed-form expression of the individual outage probability and the diversity gain are obtained firstly. Based on the developed analytical outage probability, a tradeoff between the minimum number of retransmissions and the transmit power allocation coefficient is then provided for a given target rate. The provided simulation results demonstrate the accuracy of the developed analytical results. Moreover, it is shown that NOMA combined with the HARQ-CC can achieve a significant advantage when only average channel state information is known at the transmitter. Particularly, the performance of the user with less transmit power in NOMA systems can be efficiently improved by utilizing HARQ-CC.


          Scalable Sparse Subspace Clustering via Ordered Weighted $\ell_1$ Regression. (arXiv:1807.03746v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Urvashi Oswal, Robert Nowak

The main contribution of the paper is a new approach to subspace clustering that is significantly more computationally efficient and scalable than existing state-of-the-art methods. The central idea is to modify the regression technique in sparse subspace clustering (SSC) by replacing the $\ell_1$ minimization with a generalization called Ordered Weighted $\ell_1$ (OWL) minimization which performs simultaneous regression and clustering of correlated variables. Using random geometric graph theory, we prove that OWL regression selects more points within each subspace, resulting in better clustering results. This allows for accurate subspace clustering based on regression solutions for only a small subset of the total dataset, significantly reducing the computational complexity compared to SSC. In experiments, we find that our OWL approach can achieve a speedup of 20$\times$ to 30$\times$ for synthetic problems and 4$\times$ to 8$\times$ on real data problems.


          Representation Learning with Contrastive Predictive Coding. (arXiv:1807.03748v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Aaron van den Oord, Yazhe Li, Oriol Vinyals

While supervised learning has enabled great progress in many applications, unsupervised learning has not seen such widespread adoption, and remains an important and challenging endeavor for artificial intelligence. In this work, we propose a universal unsupervised learning approach to extract useful representations from high-dimensional data, which we call Contrastive Predictive Coding. The key insight of our model is to learn such representations by predicting the future in latent space by using powerful autoregressive models. We use a probabilistic contrastive loss which induces the latent space to capture information that is maximally useful to predict future samples. It also makes the model tractable by using negative sampling. While most prior work has focused on evaluating representations for a particular modality, we demonstrate that our approach is able to learn useful representations achieving strong performance on four distinct domains: speech, images, text and reinforcement learning in 3D environments.


          Navigating Diverse Data Science Learning: Critical Reflections Towards Future Practice. (arXiv:1807.03750v1 [cs.GL])      Cache   Translate Page   Web Page Cache   

Authors: Yehia Elkhatib

Data Science is currently a popular field of science attracting expertise from very diverse backgrounds. Current learning practices need to acknowledge this and adapt to it. This paper summarises some experiences relating to such learning approaches from teaching a postgraduate Data Science module, and draws some learned lessons that are of relevance to others teaching Data Science.


          Dynamic Allocation of Serverless Functionsin IoT Environments. (arXiv:1807.03755v1 [cs.DC])      Cache   Translate Page   Web Page Cache   

Authors: Duarte Pinto, João Pedro Dias, Hugo Sereno Ferreira

The IoT area has grown significantly in the last few years and is expected to reach a gigantic amount of 50 billion devices by 2020. The appearance of serverless architectures, specifically highlighting FaaS, raises the question of the of using such in IoT environments. Combining IoT with a serverless architectural design can be effective when trying to make use of the local processing power that exists in a local network of IoT devices and creating a fog layer that leverages computational capabilities that are closer to the end-user. In this approach, which is placed between the device and the serverless function, when a device requests for the execution of a serverless function will decide based on previous metrics of execution if the serverless function should be executed locally, in the fog layer of a local network of IoT devices, or if it should be executed remotely, in one of the available cloud servers. Therefore, this approach allows to dynamically allocating functions to the most suitable layer.


          Latent Alignment and Variational Attention. (arXiv:1807.03756v1 [stat.ML])      Cache   Translate Page   Web Page Cache   

Authors: Yuntian Deng, Yoon Kim, Justin Chiu, Demi Guo, Alexander M. Rush

Neural attention has become central to many state-of-the-art models in natural language processing and related domains. Attention networks are an easy-to-train and effective method for softly simulating alignment; however, the approach does not marginalize over latent alignments in a probabilistic sense. This property makes it difficult to compare attention to other alignment approaches, to compose it with probabilistic models, and to perform posterior inference conditioned on observed data. A related latent approach, hard attention, fixes these issues, but is generally harder to train and less accurate. This work considers variational attention networks, alternatives to soft and hard attention for learning latent variable alignment models, with tighter approximation bounds based on amortized variational inference. We further propose methods for reducing the variance of gradients to make these approaches computationally feasible. Experiments show that for machine translation and visual question answering, inefficient exact latent variable models outperform standard neural attention, but these gains go away when using hard attention based training. On the other hand, variational attention retains most of the performance gain but with training speed comparable to neural attention.


          Speculative Buffer Overflows: Attacks and Defenses. (arXiv:1807.03757v1 [cs.CR])      Cache   Translate Page   Web Page Cache   

Authors: Vladimir Kiriansky, Carl Waldspurger

Practical attacks that exploit speculative execution can leak confidential information via microarchitectural side channels. The recently-demonstrated Spectre attacks leverage speculative loads which circumvent access checks to read memory-resident secrets, transmitting them to an attacker using cache timing or other covert communication channels.

We introduce Spectre1.1, a new Spectre-v1 variant that leverages speculative stores to create speculative buffer overflows. Much like classic buffer overflows, speculative out-of-bounds stores can modify data and code pointers. Data-value attacks can bypass some Spectre-v1 mitigations, either directly or by redirecting control flow. Control-flow attacks enable arbitrary speculative code execution, which can bypass fence instructions and all other software mitigations for previous speculative-execution attacks. It is easy to construct return-oriented-programming (ROP) gadgets that can be used to build alternative attack payloads.

We also present Spectre1.2: on CPUs that do not enforce read/write protections, speculative stores can overwrite read-only data and code pointers to breach sandboxes.

We highlight new risks posed by these vulnerabilities, discuss possible software mitigations, and sketch microarchitectural mechanisms that could serve as hardware defenses. We have not yet evaluated the performance impact of our proposed software and hardware mitigations. We describe the salient vulnerability features and additional hypothetical attack scenarios only to the detail necessary to guide hardware and software vendors in threat analysis and mitigations. We advise users to refer to more user-friendly vendor recommendations for mitigations against speculative buffer overflows or available patches.


          SimArch: A Multi-agent System For Human Path Simulation In Architecture Design. (arXiv:1807.03760v1 [cs.AI])      Cache   Translate Page   Web Page Cache   

Authors: Yen-Chia Hsu

Human moving path is an important feature in architecture design. By studying the path, architects know where to arrange the basic elements (e.g. structures, glasses, furniture, etc.) in the space. This paper presents SimArch, a multi-agent system for human moving path simulation. It involves a behavior model built by using a Markov Decision Process. The model simulates human mental states, target range detection, and collision prediction when agents are on the floor, in a particular small gallery, looking at an exhibit, or leaving the floor. It also models different kinds of human characteristics by assigning different transition probabilities. A modified weighted A* search algorithm quickly plans the sub-optimal path of the agents. In an experiment, SimArch takes a series of preprocessed floorplans as inputs, simulates the moving path, and outputs a density map for evaluation. The density map provides the prediction that how likely a person will occur in a location. A following discussion illustrates how architects can use the density map to improve their floorplan design.


          Suburban Fixed Wireless Access Channel Measurements and Models at 28 GHz for 90% Outdoor Coverage. (arXiv:1807.03763v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Jinfeng Du, Dmitry Chizhik, Rodolfo Feick, Mauricio Rodriguez, Guillermo Castro, Reinaldo. A. Valenzuela

Achieving adequate coverage with high gain antennas is key to realizing the full promise of the wide bandwidth available at mm/cm bands. We report extensive outdoor measurements at 28 GHz in suburban residential areas in New Jersey and Chile, with over 2000 links measured for same-street links (vegetation blocked LOS) from 13 streets and other-street links (true NLOS) from 7 streets, using a specialized narrowband channel sounder at ranges reaching 200 m. The measurements, applicable to fixed wireless access, involved a 55-deg transmit antenna placed on the exterior of a street-facing window and a 10-deg receive horn antenna spinning on top of a van mast at 3 m height, emulating a lamppost-mounted base station. Measured path gain-distance dependence is well represented by power-law models, and azimuth gains at the base are degraded through scattering by more than 4.3 dB for 10% of links. It was found that, with 51 dBm EIRP at the FWA base station and 11 dBi antenna at CPE, 1 Gbps downlink rate can be delivered to an outdoor mounted CPE for up to 100 m from a base station deployed in the same street with 90% coverage guarantee.


          Is Q-learning Provably Efficient?. (arXiv:1807.03765v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Chi Jin, Zeyuan Allen-Zhu, Sebastien Bubeck, Michael I. Jordan

Model-free reinforcement learning (RL) algorithms, such as Q-learning, directly parameterize and update value functions or policies without explicitly modeling the environment. They are typically simpler, more flexible to use, and thus more prevalent in modern deep RL than model-based approaches. However, empirical work has suggested that model-free algorithms may require more samples to learn [Deisenroth and Rasmussen 2011, Schulman et al. 2015]. The theoretical question of "whether model-free algorithms can be made sample efficient" is one of the most fundamental questions in RL, and remains unsolved even in the basic scenario with finitely many states and actions.

We prove that, in an episodic MDP setting, Q-learning with UCB exploration achieves regret $\tilde{O}(\sqrt{H^3 SAT})$, where $S$ and $A$ are the numbers of states and actions, $H$ is the number of steps per episode, and $T$ is the total number of steps. This sample efficiency matches the optimal regret that can be achieved by any model-based approach, up to a single $\sqrt{H}$ factor. To the best of our knowledge, this is the first analysis in the model-free setting that establishes $\sqrt{T}$ regret without requiring access to a "simulator."


          Efficient Decoding Algorithms for Polar Codes based on $2\times2$ Non-Binary Kernels. (arXiv:1807.03767v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Peihong Yuan, Fabian Steiner

Polar codes based on $2\times2$ non-binary kernels are discussed in this work. The kernel over $\text{GF}(q)$ is selected by maximizing the polarization effect and using Monte-Carlo simulation. Belief propagation (BP) and successive cancellation (SC) based decoding algorithms are extended to non-binary codes. Additionally, a successive cancellation list (SCL) decoding with a pruned tree is proposed. Simulation results show that the proposed decoder performs very close to a conventional SCL decoder with significantly lower complexity.


          Kernel-Based Learning for Smart Inverter Control. (arXiv:1807.03769v1 [math.OC])      Cache   Translate Page   Web Page Cache   

Authors: Aditie Garg, Mana Jalali, Vassilis Kekatos, Nikolaos Gatsis

Distribution grids are currently challenged by frequent voltage excursions induced by intermittent solar generation. Smart inverters have been advocated as a fast-responding means to regulate voltage and minimize ohmic losses. Since optimal inverter coordination may be computationally challenging and preset local control rules are subpar, the approach of customized control rules designed in a quasi-static fashion features as a golden middle. Departing from affine control rules, this work puts forth non-linear inverter control policies. Drawing analogies to multi-task learning, reactive control is posed as a kernel-based regression task. Leveraging a linearized grid model and given anticipated data scenarios, inverter rules are jointly designed at the feeder level to minimize a convex combination of voltage deviations and ohmic losses via a linearly-constrained quadratic program. Numerical tests using real-world data on a benchmark feeder demonstrate that nonlinear control rules driven also by a few non-local readings can attain near-optimal performance.


          Efficient identification, localization and quantification of grapevine inflorescences in unprepared field images using Fully Convolutional Networks. (arXiv:1807.03770v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Robert Rudolph, Katja Herzog, Reinhard Töpfer, Volker Steinhage

Yield and its prediction is one of the most important tasks in grapevine breeding purposes and vineyard management. Commonly, this trait is estimated manually right before harvest by extrapolation, which mostly is labor-intensive, destructive and inaccurate. In the present study an automated image-based workflow was developed quantifying inflorescences and single flowers in unprepared field images of grapevines, i.e. no artificial background or light was applied. It is a novel approach for non-invasive, inexpensive and objective phenotyping with high-throughput.

First, image regions depicting inflorescences were identified and localized. This was done by segmenting the images into the classes "inflorescence" and "non-inflorescence" using a Fully Convolutional Network (FCN). Efficient image segmentation hereby is the most challenging step regarding the small geometry and dense distribution of flowers (several hundred flowers per inflorescence), similar color of all plant organs in the fore- and background as well as the circumstance that only approximately 5% of an image show inflorescences. The trained FCN achieved a mean Intersection Over Union (IOU) of 87.6% on the test data set. Finally, individual flowers were extracted from the "inflorescence"-areas using Circular Hough Transform. The flower extraction achieved a recall of 80.3% and a precision of 70.7% using the segmentation derived by the trained FCN model.

Summarized, the presented approach is a promising strategy in order to predict yield potential automatically in the earliest stage of grapevine development which is applicable for objective monitoring and evaluations of breeding material, genetic repositories or commercial vineyards.


          EAST Real-Time VOD System Based on MDSplus. (arXiv:1807.03773v1 [cs.MM])      Cache   Translate Page   Web Page Cache   

Authors: J.Y. Xia, B.J. Xiao, Fei Yang, Dan Li

As with EAST (Experimental Advanced Superconducting Tokamak) experimental data analyzed by more and more collaborators, the experimental videos which directly reflect the real status of vacuum attract more and more researchers' attention. The real time VOD (Video On Demand) system based on MDSplus allows users reading the video frames in real time as same as the signal data which is also stored in the MDSplus database. User can display the plasma discharge videos and analyze videos frame by frame through jScope or our VOD web station. The system mainly includes the frames storing and frames displaying. The frames storing application accepts shot information by using socket TCP communication firstly, then reads video frames through disk mapping, finally stores them into MDSplus. The displaying process is implemented through B/S (Browser/Server) framework, it uses PHP and JavaScript to realize VOD function and read frames information from MDSplus. The system offers a unit way to access and backup experimental data and video during the EAST experiment, which is of great benefit to EAST experimenter than the formal VOD system in VOD function and real time performance.


          Improving information quality of Wikipedia articles with cooperative principle. (arXiv:1807.03774v1 [cs.CY])      Cache   Translate Page   Web Page Cache   

Authors: Miloš Fidler, Dejan Lavbič

Purpose: The purpose of this paper is to investigate the impact of cooperative principle on the information quality (IQ) by making objects more relevant for consumer needs, in particular case Wikipedia articles for students. Design/methodology/approach: The authors performed a quantitative study with participants being invited to complete an online survey. Each rater evaluated three selected and re-written articles from Wikipedia by four IQ dimensions (accuracy, completeness, objectivity, and representation). Grice's maxims and submaxims were used to re-write articles and make them more relevant for student cognitive needs. The results were analyzed with statistical methods of mean, standard deviation, Cronbach's alpha, and ICC (two-way random model of single measure). Findings: The study demonstrates that Wikipedia articles can be made more relevant for student needs by using cooperative principle with increase in IQ and also achieving higher consistency of students' scores as recent research. In particular, students in the research perceived the abstract, constructed with cooperative principle, more objective and complete as reported in recent research. Practical implications: The work can benefit encyclopedia editors to improve IQ of existing articles as well as consumers that would obtain more relevant information in less reading time. Originality/value: This is one of the first attempts to empirically investigate the application of cooperate principle to make objects more relevant for consumer needs and impact of this on IQ. IQ improvement evidence is provided and impacts on IQ dimensions such as objectivity, completeness, accuracy, and representation for research community to validate and compare results.


          CIRL: Controllable Imitative Reinforcement Learning for Vision-based Self-driving. (arXiv:1807.03776v1 [cs.CV])      Cache   Translate Page   Web Page Cache   

Authors: Xiaodan Liang, Tairui Wang, Luona Yang, Eric Xing

Autonomous urban driving navigation with complex multi-agent dynamics is under-explored due to the difficulty of learning an optimal driving policy. The traditional modular pipeline heavily relies on hand-designed rules and the pre-processing perception system while the supervised learning-based models are limited by the accessibility of extensive human experience. We present a general and principled Controllable Imitative Reinforcement Learning (CIRL) approach which successfully makes the driving agent achieve higher success rates based on only vision inputs in a high-fidelity car simulator. To alleviate the low exploration efficiency for large continuous action space that often prohibits the use of classical RL on challenging real tasks, our CIRL explores over a reasonably constrained action space guided by encoded experiences that imitate human demonstrations, building upon Deep Deterministic Policy Gradient (DDPG). Moreover, we propose to specialize adaptive policies and steering-angle reward designs for different control signals (i.e. follow, straight, turn right, turn left) based on the shared representations to improve the model capability in tackling with diverse cases. Extensive experiments on CARLA driving benchmark demonstrate that CIRL substantially outperforms all previous methods in terms of the percentage of successfully completed episodes on a variety of goal-directed driving tasks. We also show its superior generalization capability in unseen environments. To our knowledge, this is the first successful case of the learned driving policy through reinforcement learning in the high-fidelity simulator, which performs better-than supervised imitation learning.


          Datalog-based Scalable Semantic Diffing of Concurrent Programs. (arXiv:1807.03777v1 [cs.SE])      Cache   Translate Page   Web Page Cache   

Authors: Chungha Sung, Shuvendu Lahiri, Constantin Enea, Chao Wang

When an evolving program is modified to address issues related to thread synchronization, there is a need to confirm the change is correct, i.e., it does not introduce unexpected behavior. However, manually comparing two programs to identify the semantic difference is labor intensive and error prone, whereas techniques based on model checking are computationally expensive. To fill the gap, we develop a fast and approximate static analysis for computing synchronization differences of two programs. The method is fast because, instead of relying on heavy-weight model checking techniques, it leverages a polynomial-time Datalog-based program analysis framework to compute differentiating data-flow edges, i.e., edges allowed by one program but not the other. Although approximation is used our method is sufficiently accurate due to careful design of the Datalog inference rules and iterative increase of the required data-flow edges for representing a difference. We have implemented our method and evaluated it on a large number of multithreaded C programs to confirm its ability to produce, often within seconds, the same differences obtained by human; in contrast, prior techniques based on model checking take minutes or even hours and thus can be 10x to 1000x slower.


          Identity Testing for Constant-Width, and Any-Order, Read-Once Oblivious Arithmetic Branching Programs. (arXiv:1601.08031v2 [cs.CC] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Rohit Gurjar, Arpita Korwar, Nitin Saxena

We give improved hitting sets for two special cases of Read-once Oblivious Arithmetic Branching Programs (ROABP). First is the case of an ROABP with known order of the variables. The best previously known hitting set for this case had size $(nw)^{O(\log n)}$ where $n$ is the number of variables and $w$ is the width of the ROABP. Even for a constant-width ROABP, nothing better than a quasi-polynomial bound was known. We improve the hitting-set size for the known-order case to $n^{O(\log w)}$. In particular, this gives the first polynomial-size hitting set for constant-width ROABP (known-order). However, our hitting set only works when the characteristic of the field is zero or large enough. To construct the hitting set, we use the concept of the rank of the partial derivative matrix. Unlike previous approaches which build up from mapping variables to monomials, we map variables to polynomials directly.

The second case we consider is that of polynomials computable by width-$w$ ROABPs in any order of the variables. The best previously known hitting set for this case had size $d^{O(\log w)}(nw)^{O(\log \log w)}$, where $d$ is the individual degree. We improve the hitting-set size to $(ndw)^{O(\log \log w)}$.


          GuStL - An Experimental Guarded States Language. (arXiv:1612.06749v2 [cs.DC] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Oskar Schirmer

Programming a parallel computing system that consists of several thousands or even up to a million message passing processing units may ask for a language that supports waiting for and sending messages over hardware channels. As programs are looked upon as state machines, the language provides syntax to implement a main event driven loop. The language presented herewith surely will not serve as a generic programming language for any arbitrary task. Its main purpose is to allow for a prototypical implementation of a dynamic software system as a proof of concept.


          Constructing Effective Personalized Policies Using Counterfactual Inference from Biased Data Sets with Many Features. (arXiv:1612.08082v3 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Onur Atan, William R. Zame, Qiaojun Feng, Mihaela van der Schaar

This paper proposes a novel approach for constructing effective personalized policies when the observed data lacks counter-factual information, is biased and possesses many features. The approach is applicable in a wide variety of settings from healthcare to advertising to education to finance. These settings have in common that the decision maker can observe, for each previous instance, an array of features of the instance, the action taken in that instance, and the reward realized -- but not the rewards of actions that were not taken: the counterfactual information. Learning in such settings is made even more difficult because the observed data is typically biased by the existing policy (that generated the data) and because the array of features that might affect the reward in a particular instance -- and hence should be taken into account in deciding on an action in each particular instance -- is often vast. The approach presented here estimates propensity scores for the observed data, infers counterfactuals, identifies a (relatively small) number of features that are (most) relevant for each possible action and instance, and prescribes a policy to be followed. Comparison of the proposed algorithm against the state-of-art algorithm on actual datasets demonstrates that the proposed algorithm achieves a significant improvement in performance.


          Intrinsic Grassmann Averages for Online Linear, Robust and Nonlinear Subspace Learning. (arXiv:1702.01005v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Rudrasis Chakraborty, Søren Hauberg, Baba C. Vemuri

Principal Component Analysis (PCA) and Kernel Principal Component Analysis (KPCA) are fundamental methods in machine learning for dimensionality reduction. The former is a technique for finding this approximation in finite dimensions and the latter is often in an infinite dimensional Reproducing Kernel Hilbert-space (RKHS). In this paper, we present a geometric framework for computing the principal linear subspaces in both situations as well as for the robust PCA case, that amounts to computing the intrinsic average on the space of all subspaces: the Grassmann manifold. Points on this manifold are defined as the subspaces spanned by $K$-tuples of observations. The intrinsic Grassmann average of these subspaces are shown to coincide with the principal components of the observations when they are drawn from a Gaussian distribution. We show similar results in the RKHS case and provide an efficient algorithm for computing the projection onto the this average subspace. The result is a method akin to KPCA which is substantially faster. Further, we present a novel online version of the KPCA using our geometric framework. Competitive performance of all our algorithms are demonstrated on a variety of real and synthetic data sets.


          Compact Neighborhood Index for Subgraph Queries in Massive Graphs. (arXiv:1703.05547v4 [cs.DB] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: C. Nabti, T. Mecharnia, S. E. Boukhetta, H. Seba, K. Amrouche

Subgraph queries also known as subgraph isomorphism search is a fundamental problem in querying graph-like structured data. It consists to enumerate the subgraphs of a data graph that match a query graph. This problem arises in many real-world applications related to query processing or pattern recognition such as computer vision, social network analysis, bioinformatic and big data analytic. Subgraph isomorphism search knows a lot of investigations and solutions mainly because of its importance and use but also because of its NP-completeness. Existing solutions use filtering mechanisms and optimise the order within witch the query vertices are matched on the data vertices to obtain acceptable processing times. However, existing approaches are iterative and generate several intermediate results. They also require that the data graph is loaded in main memory and consequently are not adapted to large graphs that do not fit into memory or are accessed by streams. To tackle this problem, we propose a new approach based on concepts widely different from existing works. Our approach distills the semantic and topological information that surround a vertex into a simple integer. This simple vertex encoding that can be computed and updated incrementally reduces considerably intermediate results and avoid to load the entire data graph into main memory. We evaluate our approach on several real-word datasets. The experimental results show that our approach is efficient and scalable.


          Utility of General and Specific Word Embeddings for Classifying Translational Stages of Research. (arXiv:1705.06262v2 [cs.CL] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Vincent Major, Alisa Surkis, Yindalon Aphinyanaphongs

Conventional text classification models make a bag-of-words assumption reducing text into word occurrence counts per document. Recent algorithms such as word2vec are capable of learning semantic meaning and similarity between words in an entirely unsupervised manner using a contextual window and doing so much faster than previous methods. Each word is projected into vector space such that similar meaning words such as "strong" and "powerful" are projected into the same general Euclidean space. Open questions about these embeddings include their utility across classification tasks and the optimal properties and source of documents to construct broadly functional embeddings. In this work, we demonstrate the usefulness of pre-trained embeddings for classification in our task and demonstrate that custom word embeddings, built in the domain and for the tasks, can improve performance over word embeddings learnt on more general data including news articles or Wikipedia.


          First-spike based visual categorization using reward-modulated STDP. (arXiv:1705.09132v3 [q-bio.NC] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Milad Mozafari, Saeed Reza Kheradpisheh, Timothée Masquelier, Abbas Nowzari-Dalini, Mohammad Ganjtabesh

Reinforcement learning (RL) has recently regained popularity, with major achievements such as beating the European game of Go champion. Here, for the first time, we show that RL can be used efficiently to train a spiking neural network (SNN) to perform object recognition in natural images without using an external classifier. We used a feedforward convolutional SNN and a temporal coding scheme where the most strongly activated neurons fire first, while less activated ones fire later, or not at all. In the highest layers, each neuron was assigned to an object category, and it was assumed that the stimulus category was the category of the first neuron to fire. If this assumption was correct, the neuron was rewarded, i.e. spike-timing-dependent plasticity (STDP) was applied, which reinforced the neuron's selectivity. Otherwise, anti-STDP was applied, which encouraged the neuron to learn something else. As demonstrated on various image datasets (Caltech, ETH-80, and NORB), this reward modulated STDP (R-STDP) approach extracted particularly discriminative visual features, whereas classic unsupervised STDP extracts any feature that consistently repeats. As a result, R-STDP outperformed STDP on these datasets. Furthermore, R-STDP is suitable for online learning, and can adapt to drastic changes such as label permutations. Finally, it is worth mentioning that both feature extraction and classification were done with spikes, using at most one spike per neuron. Thus the network is hardware friendly and energy efficient.


          Weighted counting of integer points in a subspace. (arXiv:1706.05423v3 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Alexander Barvinok, Guus Regts

Given complex numbers $w_1, \ldots, w_n$, we define the weight $w(X)$ of a set $X$ of non-negative integer $n$-vectors as the sum of $w_1^{x_1} \cdots w_n^{x_n}$ over all vectors $(x_1, \ldots, x_n)$ in $X$. We present an algorithm, which for a set $X$ of 0-1 vectors defined by a system of homogeneous linear equations with at most $r$ variables per equation and at most $c$ equations per variable, computes $w(X)$ within a relative error $\epsilon >0$ in $(rc)^{O(\ln n-\ln \epsilon)}$ time provided $|w_j| \leq \beta (r \sqrt{c})^{-1}$ for an absolute constant $\beta >0$ and all $j=1, \ldots, n$. A similar algorithm is constructed for computing the weight of a set of non-negative integer vectors satisfying linear constraints and the weight of a linear code over ${\Bbb F}_p$. Applications include counting weighted perfect matchings in hypergraphs, counting weighted graph homomorphisms, computing weight enumerators of linear codes with sparse code generating matrices and computing the partition function of the ferromagnetic Potts model at low temperatures.


          Control Synthesis for Permutation-Symmetric High-Dimensional Systems With Counting Constraints. (arXiv:1706.07863v2 [cs.SY] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Petter Nilsson, Necmiye Ozay

General purpose correct-by-construction synthesis methods are limited to systems with low dimensionality or simple specifications. In this work we consider highly symmetrical counting problems and exploit the symmetry to synthesize provably correct controllers for systems with tens of thousands of states. The key ingredients of the solution are an aggregate abstraction procedure for mildly heterogeneous systems and a formulation of counting constraints as linear inequalities.


          Auto-Conditioned Recurrent Networks for Extended Complex Human Motion Synthesis. (arXiv:1707.05363v5 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Zimo Li, Yi Zhou, Shuangjiu Xiao, Chong He, Zeng Huang, Hao Li

We present a real-time method for synthesizing highly complex human motions using a novel training regime we call the auto-conditioned Recurrent Neural Network (acRNN). Recently, researchers have attempted to synthesize new motion by using autoregressive techniques, but existing methods tend to freeze or diverge after a couple of seconds due to an accumulation of errors that are fed back into the network. Furthermore, such methods have only been shown to be reliable for relatively simple human motions, such as walking or running. In contrast, our approach can synthesize arbitrary motions with highly complex styles, including dances or martial arts in addition to locomotion. The acRNN is able to accomplish this by explicitly accommodating for autoregressive noise accumulation during training. Our work is the first to our knowledge that demonstrates the ability to generate over 18,000 continuous frames (300 seconds) of new complex human motion w.r.t. different styles.


          On the Convergence of the TTL Approximation for an LRU Cache under Independent Stationary Request Processes. (arXiv:1707.06204v4 [cs.PF] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Bo Jiang, Philippe Nain, Don Towsley

The modeling and analysis of an LRU cache is extremely challenging as exact results for the main performance metrics (e.g. hit rate) are either lacking or cannot be used because of their high computational complexity for large caches. As a result, various approximations have been proposed. The state-of-the-art method is the so-called TTL approximation, first proposed and shown to be asymptotically exact for IRM requests by Fagin. It has been applied to various other workload models and numerically demonstrated to be accurate but without theoretical justification. In this paper we provide theoretical justification for the approximation in the case where distinct contents are described by independent stationary and ergodic processes. We show that this approximation is exact as the cache size and the number of contents go to infinity. This extends earlier results for the independent reference model. Moreover, we establish results not only for the aggregate cache hit probability but also for every individual content. Last, we obtain bounds on the rate of convergence.


          Searching Data: A Review of Observational Data Retrieval Practices in Selected Disciplines. (arXiv:1707.06937v2 [cs.DL] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Kathleen Gregory, Paul Groth, Helena Cousijn, Andrea Scharnhorst, Sally Wyatt

A cross-disciplinary examination of the user behaviours involved in seeking and evaluating data is surprisingly absent from the research data discussion. This review explores the data retrieval literature to identify commonalities in how users search for and evaluate observational research data. Two analytical frameworks rooted in information retrieval and science technology studies are used to identify key similarities in practices as a first step toward developing a model describing data retrieval.


          An OpenGL and C++ based function library for curve and surface modeling in a large class of extended Chebyshev spaces. (arXiv:1708.04440v2 [cs.MS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ágoston Róth

We propose a platform-independent multi-threaded function library that provides data structures to generate, differentiate and render both the ordinary basis and the normalized B-basis of a user-specified extended Chebyshev (EC) space that comprises the constants and can be identified with the solution space of a constant-coefficient homogeneous linear differential equation defined on a sufficiently small interval. Using the obtained normalized B-bases, our library can also generate, (partially) differentiate, modify and visualize a large family of so-called B-curves and tensor product B-surfaces. Moreover, the library also implements methods that can be used to perform dimension elevation, to subdivide B-curves and B-surfaces by means of de Casteljau-like B-algorithms, and to generate basis transformations for the B-representation of arbitrary integral curves and surfaces that are described in traditional parametric form by means of the ordinary bases of the underlying EC spaces. Independently of the algebraic, exponential, trigonometric or mixed type of the applied EC space, the proposed library is numerically stable and efficient up to a reasonable dimension number and may be useful for academics and engineers in the fields of Approximation Theory, Computer Aided Geometric Design, Computer Graphics, Isogeometric and Numerical Analysis.


          Edge Caching in Dense Heterogeneous Cellular Networks with Massive MIMO Aided Self-backhaul. (arXiv:1709.00957v3 [cs.NI] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lifeng Wang, Kai-Kit Wong, Sangarapillai Lambotharan, Arumugam Nallanathan, Maged Elkashlan

This paper focuses on edge caching in dense heterogeneous cellular networks (HetNets), in which small base stations (SBSs) with limited cache size store the popular contents, and massive multiple-input multiple-output (MIMO) aided macro base stations provide wireless self-backhaul when SBSs require the non-cached contents. Our aim is to address the effects of cell load and hit probability on the successful content delivery (SCD), and present the minimum required base station density for avoiding the access overload in an arbitrary small cell and backhaul overload in an arbitrary macrocell. The massive MIMO backhaul achievable rate without downlink channel estimation is derived to calculate the backhaul time, and the latency is also evaluated in such networks. The analytical results confirm that hit probability needs to be appropriately selected, in order to achieve SCD. The interplay between cache size and SCD is explicitly quantified. It is theoretically demonstrated that when non-cached contents are requested, the average delay of the non-cached content delivery could be comparable to the cached content delivery with the help of massive MIMO aided self-backhaul, if the average access rate of cached content delivery is lower than that of self-backhauled content delivery. Simulation results are presented to validate our analysis.


          Curriculum Learning of Visual Attribute Clusters for Multi-Task Classification. (arXiv:1709.06664v3 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Nikolaos Sarafianos, Theodore Giannakopoulos, Christophoros Nikou, Ioannis A. Kakadiaris

Visual attributes, from simple objects (e.g., backpacks, hats) to soft-biometrics (e.g., gender, height, clothing) have proven to be a powerful representational approach for many applications such as image description and human identification. In this paper, we introduce a novel method to combine the advantages of both multi-task and curriculum learning in a visual attribute classification framework. Individual tasks are grouped after performing hierarchical clustering based on their correlation. The clusters of tasks are learned in a curriculum learning setup by transferring knowledge between clusters. The learning process within each cluster is performed in a multi-task classification setup. By leveraging the acquired knowledge, we speed-up the process and improve performance. We demonstrate the effectiveness of our method via ablation studies and a detailed analysis of the covariates, on a variety of publicly available datasets of humans standing with their full-body visible. Extensive experimentation has proven that the proposed approach boosts the performance by 4% to 10%.


          PriFi: A Low-Latency Local-Area Anonymous Communication Network. (arXiv:1710.10237v4 [cs.CR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ludovic Barman, Italo Dacosta, Mahdi Zamani, Ennan Zhai, Bryan Ford, Jean-Pierre Hubaux, Joan Feigenbaum

Organizational networks are highly vulnerable to traffic-analysis attacks that can infer information from their communications even if they are encrypted. We present PriFi, an anonymous communication protocol that is provably secure against traffic-analysis attacks, has low communication latency, and is application agnostic. PriFi builds on Dining Cryptographers networks and solves several issues of existing such networks. The communication latency is reduced via a client/relay/server architecture, where a set of servers assists the anonymization process without adding latency. Unlike mix networks and other DC-nets systems, client's packets remain on their usual network path, without additional hop. PriFi protects clients against equivocation attacks with minimal latency overhead, without requiring communication between clients. PriFi also detects disruption (jamming) attacks without costly consensus among servers. We evaluate the practicality of PriFi in the context of a large, at-risk organization. Our results show that the system can be used with minimal latency overhead ($\approx100$ms for $100$ clients) and is compatible with delay-sensitive applications such as VoIP. In short, PriFi provides organizations with robust traffic-analysis resistance and maintains the Quality of Service of the communications.


          Convolutional Normalizing Flows. (arXiv:1711.02255v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Guoqing Zheng, Yiming Yang, Jaime Carbonell

Bayesian posterior inference is prevalent in various machine learning problems. Variational inference provides one way to approximate the posterior distribution, however its expressive power is limited and so is the accuracy of resulting approximation. Recently, there has a trend of using neural networks to approximate the variational posterior distribution due to the flexibility of neural network architecture. One way to construct flexible variational distribution is to warp a simple density into a complex by normalizing flows, where the resulting density can be analytically evaluated. However, there is a trade-off between the flexibility of normalizing flow and computation cost for efficient transformation. In this paper, we propose a simple yet effective architecture of normalizing flows, ConvFlow, based on convolution over the dimensions of random input vector. Experiments on synthetic and real world posterior inference problems demonstrate the effectiveness and efficiency of the proposed method.


          Efficient Destination Prediction Based on Route Choices with Transition Matrix Optimization. (arXiv:1711.04595v2 [cs.DB] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Zhou Yang, Heli Sun, Jianbin Huang, Xiaolin Jia, Ziyu Guan, Zhongmeng Zhao

Destination prediction is an essential task in a variety of mobile applications. In this paper, we optimize the matrix operation and adapt a semi-lazy framework to improve the prediction accuracy and efficiency of a state-of-the-art approach. To this end, we employ efficient dynamic-programming by devising several data constructs including Efficient Transition Probability and Transition Probabilities with Detours that are capable of pinpointing the minimum amount of computation. We prove that our method achieves one order of cut in both time and space complexity. The experimental results on real-world and synthetic datasets have shown that our solution consistently outperforms its state-of-the-art counterparts in terms of both efficiency (approximately over 100 times faster) and accuracy (above 30% increase).


          XGAN: Unsupervised Image-to-Image Translation for Many-to-Many Mappings. (arXiv:1711.05139v6 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Amélie Royer, Konstantinos Bousmalis, Stephan Gouws, Fred Bertsch, Inbar Mosseri, Forrester Cole, Kevin Murphy

Style transfer usually refers to the task of applying color and texture information from a specific style image to a given content image while preserving the structure of the latter. Here we tackle the more generic problem of semantic style transfer: given two unpaired collections of images, we aim to learn a mapping between the corpus-level style of each collection, while preserving semantic content shared across the two domains. We introduce XGAN ("Cross-GAN"), a dual adversarial autoencoder, which captures a shared representation of the common domain semantic content in an unsupervised way, while jointly learning the domain-to-domain image translations in both directions. We exploit ideas from the domain adaptation literature and define a semantic consistency loss which encourages the model to preserve semantics in the learned embedding space. We report promising qualitative results for the task of face-to-cartoon translation. The cartoon dataset, CartoonSet, we collected for this purpose is publicly available at google.github.io/cartoonset/ as a new benchmark for semantic style transfer.


          Asymmetric Variational Autoencoders. (arXiv:1711.08352v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Guoqing Zheng, Yiming Yang, Jaime Carbonell

Variational inference for latent variable models is prevalent in various machine learning problems, typically solved by maximizing the Evidence Lower Bound (ELBO) of the true data likelihood with respect to a variational distribution. However, freely enriching the family of variational distribution is challenging since the ELBO requires variational likelihood evaluations of the latent variables. In this paper, we propose a novel framework to enrich the variational family by incorporating auxiliary variables to the variational family. The resulting inference network doesn't require density evaluations for the auxiliary variables and thus complex implicit densities over the auxiliary variables can be constructed by neural networks. It can be shown that the actual variational posterior of the proposed approach is essentially modeling a rich probabilistic mixture of simple variational posterior indexed by auxiliary variables, thus a flexible inference model can be built. Empirical evaluations on several density estimation tasks demonstrates the effectiveness of the proposed method.


          Composition-Aided Face Photo-Sketch Synthesis. (arXiv:1712.00899v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jun Yu, Shengjie Shi, Fei Gao, Dacheng Tao, Qingming Huang

Face photo-sketch synthesis aims at generating a facial sketch (or photo) conditioned on a given photo (or sketch). It is of wide applications including digital entertainment and law enforcement. Despite the great progress achieved by existing methods, they mostly yield blurred effects and great deformation over various facial components. In order to tackle this challenge, we propose to use the facial composition information to help the synthesis of face sketch/photo. Specially, we propose a novel composition-aided generative adversarial network (CA-GAN) for face photo-sketch synthesis. First, we utilize paired inputs including a face photo/sketch and the corresponding pixel-wise face labels for generating the sketch/photo. Second, we propose an improved pixel loss, termed compositional loss, to focus training on hard-generated components and delicate facial structures. Moreover, we use stacked CA-GANs (SCA-GAN) to further rectify defects and add compelling details. Experimental results show that our method is capable of generating identity-preserving and visually comfortable sketches and photos over a wide range of challenging data. Besides, cross-dataset photo-sketch synthesis evaluations demonstrate that the proposed method is of considerable generalization ability.


          A family of constacyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ and its application to quantum codes. (arXiv:1712.02081v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Yongsheng Tang, Ting Yao, Shixin Zhu, Xiaoshan Kai

We introduce a Gray map from $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ to $\mathbb{F}_{2}^{2m}$ and study $(1+u)$-constacyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}},$ where $u^{2}=0.$ It is proved that the image of a $(1+u)$-constacyclic code length $n$ over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ under the Gray map is a distance-invariant quasi-cyclic code of index $m$ and length $2mn$ over $\mathbb{F}_{2}.$ We also prove that every code of length $2mn$ which is the Gray image of cyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ of length $n$ is permutation equivalent to a binary quasi-cyclic code of index $m.$ Furthermore, a family of quantum error-correcting codes obtained from the Calderbank-Shor-Steane (CSS) construction applied to $(1+u)$-constacyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}.$


          LocNet: Global localization in 3D point clouds for mobile vehicles. (arXiv:1712.02165v2 [cs.RO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Huan Yin, Li Tang, Xiaqing Ding, Yue Wang, Rong Xiong

Global localization in 3D point clouds is a challenging problem of estimating the pose of vehicles without any prior knowledge. In this paper, a solution to this problem is presented by achieving place recognition and metric pose estimation in the global prior map. Specifically, we present a semi-handcrafted representation learning method for LiDAR point clouds using siamese LocNets, which states the place recognition problem to a similarity modeling problem. With the final learned representations by LocNet, a global localization framework with range-only observations is proposed. To demonstrate the performance and effectiveness of our global localization system, KITTI dataset is employed for comparison with other algorithms, and also on our long-time multi-session datasets for evaluation. The result shows that our system can achieve high accuracy.


          A wavelet Plancherel theory with application to sparse continuous wavelet transform. (arXiv:1712.02770v6 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ron Levie, Nir Sochen

We introduce a framework for calculating greedy sparse approximations to signals based on elements of continuous wavelet systems. The method is based on an extension of the continuous wavelet theory. In the new theory, the signal space is embedded in larger abstract signal space, which we call the window-signal space. There is a canonical extension of the wavelet transform on the window-signal space, which is an isometric isomorphism from the window-signal space to a space of functions on phase space. Hence, the new framework is called a wavelet Plancherel theory, and the extended wavelet transform is called the wavelet-Plancherel transform. Since the wavelet-Plancherel transform is an isometric isomorphism, any operation on phase space can be pulled-back to an operation in the window-signal space. Using this pull-back property, it is possible to pull back a search for big wavelet coefficients to the window-signal space. We can thus avoid inefficient calculations on phase space, performing all calculations entirely in the window-signal space. We consider in this paper a matching pursuit algorithm based on this coefficient search approach. Our method has lower computational complexity than matching pursuit algorithms based on a naive coefficient search in continuous wavelet systems. Moreover, our method has comparable computational complexity to greedy discrete wavelet methods, while the resolution in phase space of our method is squared in comparison to discrete methods.


          Adaptive Stochastic Dual Coordinate Ascent for Conditional Random Fields. (arXiv:1712.08577v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Rémi Le Priol, Alexandre Piché, Simon Lacoste-Julien

This work investigates the training of conditional random fields (CRFs) via the stochastic dual coordinate ascent (SDCA) algorithm of Shalev-Shwartz and Zhang (2016). SDCA enjoys a linear convergence rate and a strong empirical performance for binary classification problems. However, it has never been used to train CRFs. Yet it benefits from an `exact' line search with a single marginalization oracle call, unlike previous approaches. In this paper, we adapt SDCA to train CRFs, and we enhance it with an adaptive non-uniform sampling strategy based on block duality gaps. We perform experiments on four standard sequence prediction tasks. SDCA demonstrates performances on par with the state of the art, and improves over it on three of the four datasets, which have in common the use of sparse features.


          Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning. (arXiv:1801.02265v4 [cs.CR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Payap Sirinam, Mohsen Imani, Marc Juarez, Matthew Wright

Website fingerprinting enables a local eavesdropper to determine which websites a user is visiting over an encrypted connection. State-of-the-art website fingerprinting attacks have been shown to be effective even against Tor. Recently, lightweight website fingerprinting defenses for Tor have been proposed that substantially degrade existing attacks: WTF-PAD and Walkie-Talkie. In this work, we present Deep Fingerprinting (DF), a new website fingerprinting attack against Tor that leverages a type of deep learning called convolution neural networks (CNN) with a sophisticated architecture design, and we evaluate this attack against WTF-PAD and Walkie-Talkie. The DF attack attains over 98% accuracy on Tor traffic without defenses, better than all prior attacks, and it is also the only attack that is effective against WTF-PAD with over 90% accuracy. Walkie-Talkie remains effective, holding the attack to just 49.7% accuracy. In the more realistic open-world setting, our attack remains effective, with 0.99 precision and 0.94 recall on undefended traffic. Against traffic defended with WTF-PAD in this setting, the attack still can get 0.96 precision and 0.68 recall. These findings highlight the need for effective defenses that protect against this new attack and that could be deployed in Tor.


          Latent Factor Analysis of Gaussian Distributions under Graphical Constraints. (arXiv:1801.03481v4 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Md Mahmudul Hasan, Shuangqing Wei, Ali Moharrer

In this paper, we explore the algebraic structures of solution spaces for Gaussian latent factor analysis when the population covariance matrix $\Sigma_x$ has an additional latent graphical constraint, namely, a latent star topology. In particular, we give sufficient and necessary conditions under which the solutions to constrained minimum trace factor analysis (CMTFA) is still star. We further show that the solution to CMTFA under the star constraint can only have two cases, i.e. the number of latent variable can be only one (star) or $n-1$ where $n$ is the dimension of the observable vector, and characterize the solution for both the cases.


          Towards Arbitrary Noise Augmentation - Deep Learning for Sampling from Arbitrary Probability Distributions. (arXiv:1801.04211v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Felix Horger, Tobias Würfl, Vincent Christlein, Andreas Maier

Accurate noise modelling is important for training of deep learning reconstruction algorithms. While noise models are well known for traditional imaging techniques, the noise distribution of a novel sensor may be difficult to determine a priori. Therefore, we propose learning arbitrary noise distributions. To do so, this paper proposes a fully connected neural network model to map samples from a uniform distribution to samples of any explicitly known probability density function. During the training, the Jensen-Shannon divergence between the distribution of the model's output and the target distribution is minimized. We experimentally demonstrate that our model converges towards the desired state. It provides an alternative to existing sampling methods such as inversion sampling, rejection sampling, Gaussian mixture models and Markov-Chain-Monte-Carlo. Our model has high sampling efficiency and is easily applied to any probability distribution, without the need of further analytical or numerical calculations.


          Detecting Changes in Fully Polarimetric SAR Imagery with Statistical Information Theory. (arXiv:1801.08901v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Abraão D. C. Nascimento, Alejandro C. Frery, Renato J. Cintra

Images obtained from coherent illumination processes are contaminated with speckle. A prominent example of such imagery systems is the polarimetric synthetic aperture radar (PolSAR). For such remote sensing tool the speckle interference pattern appears in the form of a positive definite Hermitian matrix, which requires specialized models and makes change detection a hard task. The scaled complex Wishart distribution is a widely used model for PolSAR images. Such distribution is defined by two parameters: the number of looks and the complex covariance matrix. The last parameter contains all the necessary information to characterize the backscattered data and, thus, identifying changes in a sequence of images can be formulated as a problem of verifying whether the complex covariance matrices differ at two or more takes. This paper proposes a comparison between a classical change detection method based on the likelihood ratio and three statistical methods that depend on information-theoretic measures: the Kullback-Leibler distance and two entropies. The performance of these four tests was quantified in terms of their sample test powers and sizes using simulated data. The tests are then applied to actual PolSAR data. The results provide evidence that tests based on entropies may outperform those based on the Kullback-Leibler distance and likelihood ratio statistics.


          Block4Forensic: An Integrated Lightweight Blockchain Framework for Forensics Applications of Connected Vehicles. (arXiv:1802.00561v2 [cs.CR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Mumin Cebe, Enes Erdin, Kemal Akkaya, Hidayet Aksu, Selcuk Uluagac

Today's vehicles are becoming cyber-physical systems that do not only communicate with other vehicles but also gather various information from hundreds of sensors within them. These developments help create smart and connected (e.g., self-driving) vehicles that will introduce significant information to drivers, manufacturers, insurance companies and maintenance service providers for various applications. One such application that is becoming crucial with the introduction of self-driving cars is the forensic analysis for traffic accidents. The utilization of vehicle-related data can be instrumental in post-accident scenarios to find out the faulty party, particularly for self-driving vehicles. With the opportunity of being able to access various information on the cars, we propose a permissioned blockchain framework among the various elements involved to manage the collected vehicle-related data. Specifically, we first integrate Vehicular Public Key Management (VPKI) to the proposed blockchain to provide membership establishment and privacy. Next, we design a fragmented ledger that will store detailed data related to vehicle such as maintenance information/history, car diagnosis reports, etc. The proposed forensic framework enables trustless, traceable and privacy-aware post-accident analysis with minimal storage and processing overhead.


          Learning Adversarially Fair and Transferable Representations. (arXiv:1802.06309v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: David Madras, Elliot Creager, Toniann Pitassi, Richard Zemel

In this paper, we advocate for representation learning as the key to mitigating unfair prediction outcomes downstream. Motivated by a scenario where learned representations are used by third parties with unknown objectives, we propose and explore adversarial representation learning as a natural method of ensuring those parties act fairly. We connect group fairness (demographic parity, equalized odds, and equal opportunity) to different adversarial objectives. Through worst-case theoretical guarantees and experimental validation, we show that the choice of this objective is crucial to fair prediction. Furthermore, we present the first in-depth experimental demonstration of fair transfer learning and demonstrate empirically that our learned representations admit fair predictions on new tasks while maintaining utility, an essential goal of fair representation learning.


          Data-Driven Forecasting of High-Dimensional Chaotic Systems with Long Short-Term Memory Networks. (arXiv:1802.07486v4 [physics.comp-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Pantelis R. Vlachas, Wonmin Byeon, Zhong Y. Wan, Themistoklis P. Sapsis, Petros Koumoutsakos

We introduce a data-driven forecasting method for high-dimensional chaotic systems using long short-term memory (LSTM) recurrent neural networks. The proposed LSTM neural networks perform inference of high-dimensional dynamical systems in their reduced order space and are shown to be an effective set of nonlinear approximators of their attractor. We demonstrate the forecasting performance of the LSTM and compare it with Gaussian processes (GPs) in time series obtained from the Lorenz 96 system, the Kuramoto-Sivashinsky equation and a prototype climate model. The LSTM networks outperform the GPs in short-term forecasting accuracy in all applications considered. A hybrid architecture, extending the LSTM with a mean stochastic model (MSM-LSTM), is proposed to ensure convergence to the invariant measure. This novel hybrid method is fully data-driven and extends the forecasting capabilities of LSTM networks.


          Solving $k$-center Clustering (with Outliers) in MapReduce and Streaming, almost as Accurately as Sequentially. (arXiv:1802.09205v3 [cs.DC] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Matteo Ceccarello, Andrea Pietracaprina, Geppino Pucci

Center-based clustering is a fundamental primitive for data analysis and becomes very challenging for large datasets. In this paper, we focus on the popular $k$-center variant which, given a set $S$ of points from some metric space and a parameter $k<|S|$, requires to identify a subset of $k$ centers in $S$ minimizing the maximum distance of any point of $S$ from its closest center. A more general formulation, introduced to deal with noisy datasets, features a further parameter $z$ and allows up to $z$ points of $S$ (outliers) to be disregarded when computing the maximum distance from the centers. We present coreset-based 2-round MapReduce algorithms for the above two formulations of the problem, and a 1-pass Streaming algorithm for the case with outliers. For any fixed $\epsilon>0$, the algorithms yield solutions whose approximation ratios are a mere additive term $\epsilon$ away from those achievable by the best known polynomial-time sequential algorithms, a result that substantially improves upon the state of the art. Our algorithms are rather simple and adapt to the intrinsic complexity of the dataset, captured by the doubling dimension $D$ of the metric space. Specifically, our analysis shows that the algorithms become very space-efficient for the important case of small (constant) $D$. These theoretical results are complemented with a set of experiments on real-world and synthetic datasets of up to over a billion points, which show that our approach is able to yield better quality solutions over the state of the art while featuring excellent scalability.


          Treedepth Bounds in Linear Colorings. (arXiv:1802.09665v3 [cs.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jeremy Kun, Michael P. O'Brien, Blair D. Sullivan

Low-treedepth colorings are an important tool for algorithms that exploit structure in classes of bounded expansion; they guarantee subgraphs that use few colors are guaranteed to have bounded treedepth. These colorings have an implicit tradeoff between the total number of colors used and the treedepth bound, and prior empirical work suggests that the former dominates the run time of existing algorithms in practice. We introduce $p$-linear colorings as an alternative to the commonly used $p$-centered colorings. They can be efficiently computed in bounded expansion classes and use at most as many colors as $p$-centered colorings. Although a set of $k<p$ colors from a $p$-centered coloring induces a subgraph of treedepth at most $k$, the same number of colors from a $p$-linear coloring may induce subgraphs of larger treedepth. A simple analysis of this treedepth bound shows it cannot exceed $2^k$, but no graph class is known to have treedepth more than $2k$. We establish polynomial upper bounds via constructive coloring algorithms in trees and intervals graphs, and conjecture that a polynomial relationship is in fact the worst case in general graphs. We also give a co-NP-completeness reduction for recognizing $p$-linear colorings and discuss ways to overcome this limitation in practice.


          On Generation of Adversarial Examples using Convex Programming. (arXiv:1803.03607v3 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Emilio Rafael Balda, Arash Behboodi, Rudolf Mathar

It has been observed that deep learning architectures tend to make erroneous decisions with high reliability for particularly designed adversarial instances. In this work, we show that the perturbation analysis of these architectures provides a framework for generating adversarial instances by convex programming which, for classification tasks, is able to recover variants of existing non-adaptive adversarial methods. The proposed framework can be used for the design of adversarial noise under various desirable constraints and different types of networks. Moreover, this framework is capable of explaining various existing adversarial methods and can be used to derive new algorithms as well. Furthermore, we make use of these results to obtain novel algorithms. Experiments show the competitive performance of the obtained solutions, in terms of fooling ratio, when benchmarked with well-known adversarial methods.


          Generic Zero-Cost Reuse for Dependent Types. (arXiv:1803.08150v3 [cs.PL] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Larry Diehl, Denis Firsov, Aaron Stump

Dependently typed languages are well known for having a problem with code reuse. Traditional non-indexed algebraic datatypes (e.g. lists) appear alongside a plethora of indexed variations (e.g. vectors). Functions are often rewritten for both non-indexed and indexed versions of essentially the same datatype, which is a source of code duplication.

We work in a Curry-style dependent type theory, where the same untyped term may be classified as both the non-indexed and indexed versions of a datatype. Many solutions have been proposed for the problem of dependently typed reuse, but we exploit Curry-style type theory in our solution to not only reuse data and programs, but do so at zero-cost (without a runtime penalty). Our work is an exercise in dependently typed generic programming, and internalizes the process of zero-cost reuse as the identity function in a Curry-style theory.


          Datasheets for Datasets. (arXiv:1803.09010v3 [cs.DB] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daumeé III, Kate Crawford

Currently there is no standard way to identify how a dataset was created, and what characteristics, motivations, and potential skews it represents. To begin to address this issue, we propose the concept of a datasheet for datasets, a short document to accompany public datasets, commercial APIs, and pretrained models. The goal of this proposal is to enable better communication between dataset creators and users, and help the AI community move toward greater transparency and accountability. By analogy, in computer hardware, it has become industry standard to accompany everything from the simplest components (e.g., resistors), to the most complex microprocessor chips, with datasheets detailing standard operating characteristics, test results, recommended usage, and other information. We outline some of the questions a datasheet for datasets should answer. These questions focus on when, where, and how the training data was gathered, its recommended use cases, and, in the case of human-centric datasets, information regarding the subjects' demographics and consent as applicable. We develop prototypes of datasheets for two well-known datasets: Labeled Faces in The Wild and the Pang \& Lee Polarity Dataset.


          A Multi-Discriminator CycleGAN for Unsupervised Non-Parallel Speech Domain Adaptation. (arXiv:1804.00522v4 [cs.CL] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ehsan Hosseini-Asl, Yingbo Zhou, Caiming Xiong, Richard Socher

Domain adaptation plays an important role for speech recognition models, in particular, for domains that have low resources. We propose a novel generative model based on cyclic-consistent generative adversarial network (CycleGAN) for unsupervised non-parallel speech domain adaptation. The proposed model employs multiple independent discriminators on the power spectrogram, each in charge of different frequency bands. As a result we have 1) better discriminators that focus on fine-grained details of the frequency features, and 2) a generator that is capable of generating more realistic domain-adapted spectrogram. We demonstrate the effectiveness of our method on speech recognition with gender adaptation, where the model only has access to supervised data from one gender during training, but is evaluated on the other at test time. Our model is able to achieve an average of $7.41\%$ on phoneme error rate, and $11.10\%$ word error rate relative performance improvement as compared to the baseline, on TIMIT and WSJ dataset, respectively. Qualitatively, our model also generates more natural sounding speech, when conditioned on data from the other domain.


          Verifier Non-Locality in Interactive Proofs. (arXiv:1804.02724v2 [quant-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Claude Crépeau, Nan Yang

In multi-prover interactive proofs, the verifier interrogates the provers and attempts to steal their knowledge. Other than that, the verifier's role has not been studied. Augmentation of the provers with non-local resources results in classes of languages that may not be NEXP. We have discovered that the verifier plays a much more important role than previously thought. Simply put, the verifier has the capability of providing non-local resources for the provers intrinsically. Therefore, standard MIPs may already contain protocols equivalent to one in which the prover is augmented non-locally. Existing MIPs' proofs of soundness implicitly depend on the fact that the verifier is not a non-local resource provider. The verifier's non-locality is a new unused tool and liability for protocol design and analysis. Great care should have been taken when claiming that ZKMIP=MIP. We show specific issues with existing protocols and revisit the proof of this statement. For this purpose, we also define a new model of multi-prover interactive proofs which we call "correlational confinement form".


          Whale swarm algorithm with the mechanism of identifying and escaping from extreme point for multimodal function optimization. (arXiv:1804.02851v2 [cs.NE] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Bing Zeng, Xinyu Li, Liang Gao, Yuyan Zhang, Haozhen Dong

Most real-world optimization problems often come with multiple global optima or local optima. Therefore, increasing niching metaheuristic algorithms, which devote to finding multiple optima in a single run, are developed to solve these multimodal optimization problems. However, there are two difficulties urgently to be solved for most existing niching metaheuristic algorithms: how to set the optimal values of niching parameters for different optimization problems, and how to jump out of the local optima efficiently. These two difficulties limited their practicality largely. Based on Whale Swarm Algorithm (WSA) we proposed previously, this paper presents a new multimodal optimizer named WSA with Iterative Counter (WSA-IC) to address these two difficulties. In the one hand, WSA-IC improves the iteration rule of the original WSA for multimodal optimization, which removes the need of specifying different values of attenuation coefficient for different problems to form multiple subpopulations, without introducing any niching parameter. In the other hand, WSA-IC enables the identification of extreme point during iterations relying on two new parameters (i.e., stability threshold Ts and fitness threshold Tf), to jump out of the located extreme point. Moreover, the convergence of WSA-IC is proved. Finally, the proposed WSA-IC is compared with several niching metaheuristic algorithms on CEC2015 niching benchmark test functions and five additional classical multimodal functions with high dimensions. The experimental results demonstrate that WSA-IC statistically outperforms other niching metaheuristic algorithms on most test functions.


          Attention-based Group Recommendation. (arXiv:1804.04327v3 [cs.AI] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Tran Dang Quang Vinh, Tuan-Anh Nguyen Pham, Gao Cong, Xiao-Li Li

Group recommendation aims to recommend items for a group of users, e.g., recommending a restaurant for a group of colleagues. The group recommendation problem is challenging, in that a good model should understand the group decision making process appropriately: users are likely to follow decisions of only a few users, who are group's leaders or experts. To address this challenge, we propose using an attention mechanism to capture the impact of each user in a group. Specifically, our model learns the influence weight of each user in a group and recommends items to the group based on its members' weighted preferences. Moreover, our model can dynamically adjust the weight of each user across the groups; thus, the model provides a new and flexible method to model the complicated group decision making process, which differentiates us from other existing solutions. Through extensive experiments, it has demonstrated that our model significantly outperforms baseline methods for the group recommendation problem.


          A Compact Network Learning Model for Distribution Regression. (arXiv:1804.04775v3 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Connie Kou, Hwee Kuan Lee, Teck Khim Ng

Despite the superior performance of deep learning in many applications, challenges remain in the area of regression on function spaces. In particular, neural networks are unable to encode function inputs compactly as each node encodes just a real value. We propose a novel idea to address this shortcoming: to encode an entire function in a single network node. To that end, we design a compact network representation that encodes and propagates functions in single nodes for the distribution regression task. Our proposed Distribution Regression Network (DRN) achieves higher prediction accuracies while being much more compact and uses fewer parameters than traditional neural networks.


          PAMPC: Perception-Aware Model Predictive Control for Quadrotors. (arXiv:1804.04811v2 [cs.RO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Davide Falanga, Philipp Foehn, Peng Lu, Davide Scaramuzza

We present the first perception-aware model predictive control framework for quadrotors that unifies control and planning with respect to action and perception objectives. Our framework leverages numerical optimization to compute trajectories that satisfy the system dynamics and require control inputs within the limits of the platform. Simultaneously, it optimizes perception objectives for robust and reliable sens- ing by maximizing the visibility of a point of interest and minimizing its velocity in the image plane. Considering both perception and action objectives for motion planning and control is challenging due to the possible conflicts arising from their respective requirements. For example, for a quadrotor to track a reference trajectory, it needs to rotate to align its thrust with the direction of the desired acceleration. However, the perception objective might require to minimize such rotation to maximize the visibility of a point of interest. A model-based optimization framework, able to consider both perception and action objectives and couple them through the system dynamics, is therefore necessary. Our perception-aware model predictive control framework works in a receding-horizon fashion by iteratively solving a non-linear optimization problem. It is capable of running in real-time, fully onboard our lightweight, small-scale quadrotor using a low-power ARM computer, to- gether with a visual-inertial odometry pipeline. We validate our approach in experiments demonstrating (I) the contradiction between perception and action objectives, and (II) improved behavior in extremely challenging lighting conditions.


          Better Fixed-Arity Unbiased Black-Box Algorithms. (arXiv:1804.05443v2 [cs.NE] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Nina Bulanova, Maxim Buzdalov

In their GECCO'12 paper, Doerr and Doerr proved that the $k$-ary unbiased black-box complexity of OneMax on $n$ bits is $O(n/k)$ for $2\le k\le O(\log n)$. We propose an alternative strategy for achieving this unbiased black-box complexity when $3\le k\le\log_2 n$. While it is based on the same idea of block-wise optimization, it uses $k$-ary unbiased operators in a different way.

For each block of size $2^{k-1}-1$ we set up, in $O(k)$ queries, a virtual coordinate system, which enables us to use an arbitrary unrestricted algorithm to optimize this block. This is possible because this coordinate system introduces a bijection between unrestricted queries and a subset of $k$-ary unbiased operators. We note that this technique does not depend on OneMax being solved and can be used in more general contexts.

This together constitutes an algorithm which is conceptually simpler than the one by Doerr and Doerr, and at the same time achieves better constant factors in the asymptotic notation. Our algorithm works in $(2+o(1))\cdot n/(k-1)$, where $o(1)$ relates to $k$. Our experimental evaluation of this algorithm shows its efficiency already for $3\le k\le6$.


          A time- and space-optimal algorithm for the many-visits TSP. (arXiv:1804.06361v2 [cs.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Andre Berger, Laszlo Kozma, Matthias Mnich, Roland Vincze

The many-visits traveling salesperson problem (MV-TSP) asks for an optimal tour of $n$ cities that visits each city $c$ a prescribed number $k_c$ of times. Travel costs may not be symmetric, and visiting a city twice in a row may incur a non-zero cost. The MV-TSP problem finds applications in scheduling, geometric approximation, and Hamiltonicity of certain graph families.

The fastest known algorithm for MV-TSP is due to Cosmadakis and Papadimitriou (SICOMP, 1984). It runs in time $n^{O(n)} + O(n^3 \log \sum_c k_c )$ and requires $n^{\Omega(n)}$ space.

The interesting feature of the Cosmadakis-Papadimitriou algorithm is its \emph{logarithmic} dependence on the total length $\sum_c k_c$ of the tour, allowing the algorithm to handle instances with very long tours, beyond what is tractable in the standard TSP setting. However, the \emph{superexponential} dependence on the number of cities in both its time and space complexity renders the algorithm impractical for all but the narrowest range of this parameter.

In this paper we significantly improve on the Cosmadakis-Papadimitriou algorithm, giving an MV-TSP algorithm that runs in \emph{single-exponential} time with \emph{polynomial} space. More precisely, we obtain the running time $2^{O(n)} + O(n^3 \log{\sum_c k_c})$, with $O(n^2 \log{\sum_c k_c})$ space. Assuming the Exponential-time Hypothesis (ETH), both the time and space requirements of our algorithm are optimal.

Our algorithm is deterministic, and arguably both simpler and easier to analyse than the original approach of Cosmadakis and Papadimitriou. It involves an optimization over oriented spanning trees of a graph and employs a recursive, centroid-based decomposition of trees.


          Simulation-based Adversarial Test Generation for Autonomous Vehicles with Machine Learning Components. (arXiv:1804.06760v2 [cs.SY] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Cumhur Erkan Tuncali, Georgios Fainekos, Hisahiro Ito, James Kapinski

Many organizations are developing autonomous driving systems, which are expected to be deployed at a large scale in the near future. Despite this, there is a lack of agreement on appropriate methods to test, debug, and certify the performance of these systems. One of the main challenges is that many autonomous driving systems have machine learning components, such as deep neural networks, for which formal properties are difficult to characterize. We present a testing framework that is compatible with test case generation and automatic falsification methods, which are used to evaluate cyber-physical systems. We demonstrate how the framework can be used to evaluate closed-loop properties of an autonomous driving system model that includes the ML components, all within a virtual environment. We demonstrate how to use test case generation methods, such as covering arrays, as well as requirement falsification methods to automatically identify problematic test scenarios. The resulting framework can be used to increase the reliability of autonomous driving systems.


          Fixed-PSNR Lossy Compression for Scientific Data. (arXiv:1805.07384v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Dingwen Tao, Sheng Di, Xin Liang, Zizhong Chen, Franck Cappello

Error-controlled lossy compression has been studied for years because of extremely large volumes of data being produced by today's scientific simulations. None of existing lossy compressors, however, allow users to fix the peak signal-to-noise ratio (PSNR) during compression, although PSNR has been considered as one of the most significant indicators to assess compression quality. In this paper, we propose a novel technique providing a fixed-PSNR lossy compression for scientific data sets. We implement our proposed method based on the SZ lossy compression framework and release the code as an open-source toolkit. We evaluate our fixed-PSNR compressor on three real-world high-performance computing data sets. Experiments show that our solution has a high accuracy in controlling PSNR, with an average deviation of 0.1 ~ 5.0 dB on the tested data sets.


          Learning Real-World Robot Policies by Dreaming. (arXiv:1805.07813v2 [cs.RO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: AJ Piergiovanni, Alan Wu, Michael S. Ryoo

Learning to control robots directly based on images is a primary challenge in robotics. However, many existing reinforcement learning approaches require iteratively obtaining millions of samples to learn a policy which can take significant time. In this paper, we focus on the problem of learning real-world robot action policies solely based on a few random off-policy samples. We learn a realistic dreaming model that can emulate samples equivalent to a sequence of images from the actual environment, and make the agent learn action policies by interacting with the dreaming model rather than the real world. We experimentally confirm that our dreaming model can learn realistic policies that transfer to the real-world.


          A Neurobiological Cross-domain Evaluation Metric for Predictive Coding Networks. (arXiv:1805.10726v3 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Nathaniel Blanchard, Jeffery Kinnison, Brandon RichardWebster, Pouya Bashivan, Walter J. Scheirer

Achieving a good measure of model generalization remains a challenge within machine learning. One of the highest-performing learning models is the biological brain, which has unparalleled generalization capabilities. In this work, we propose and evaluate a human-model similarity metric for determining model correspondence to the human brain, as inspired by representational similarity analysis. We evaluate this metric on unsupervised predictive coding networks. These models are designed to mimic the phenomenon of residual error propagation in the visual cortex, implying their potential for biological fidelity. The human-model similarity metric is calculated by measuring the similarity between human brain fMRI activations and predictive coding network activations over a shared set of stimuli. In order to study our metric in relation to standard performance evaluations on cross-domain tasks, we train a multitude of predictive coding models across various conditions. Each unsupervised model is trained on next frame prediction in video and evaluated using three metrics: 1) mean squared error of next frame prediction, 2) object matching accuracy, and 3) our human-model similarity metric. Through this evaluation, we show that models with higher human-model similarity are more likely to generalize to cross-domain tasks. We also show that our metric facilitates a substantial decrease in model search time because the similarity metric stabilizes quickly --- in as few as 10 epochs. We propose that this metric could be deployed in model search to quickly identify and eliminate weaker models.


          A Unified Particle-Optimization Framework for Scalable Bayesian Sampling. (arXiv:1805.11659v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Changyou Chen, Ruiyi Zhang, Wenlin Wang, Bai Li, Liqun Chen

There has been recent interest in developing scalable Bayesian sampling methods such as stochastic gradient MCMC (SG-MCMC) and Stein variational gradient descent (SVGD) for big-data analysis. A standard SG-MCMC algorithm simulates samples from a discrete-time Markov chain to approximate a target distribution, thus samples could be highly correlated, an undesired property for SG-MCMC. In contrary, SVGD directly optimizes a set of particles to approximate a target distribution, and thus is able to obtain good approximations with relatively much fewer samples. In this paper, we propose a principle particle-optimization framework based on Wasserstein gradient flows to unify SG-MCMC and SVGD, and to allow new algorithms to be developed. Our framework interprets SG-MCMC as particle optimization on the space of probability measures, revealing a strong connection between SG-MCMC and SVGD. The key component of our framework is several particle-approximate techniques to efficiently solve the original partial differential equations on the space of probability measures. Extensive experiments on both synthetic data and deep neural networks demonstrate the effectiveness and efficiency of our framework for scalable Bayesian sampling.


          Private Streaming with Convolutional Codes. (arXiv:1806.00239v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lukas Holzbaur, Ragnar Freij-Hollanti, Antonia Wachter-Zeh, Camilla Hollanti

Recently, information-theoretic private information retrieval (PIR) from coded storage systems has gained a lot of attention, and a general star product PIR scheme was proposed. In this paper, the star product scheme is adopted, with appropriate modifications, to the case of private (e.g., video) streaming. It is assumed that the files to be streamed are stored on $n$ servers in a coded form, and the streaming is carried out via a convolutional code. The star product is defined for this special case, and various properties are analyzed in the baseline case, with colluding servers, as well as with straggling and byzantine servers. The achievable PIR rates are derived for the given models.


          Explainable Social Contextual Image Recommendation with Hierarchical Attention. (arXiv:1806.00723v2 [cs.SI] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Le Wu, Lei Chen, Richang Hong, Yanjie Fu, Xing Xie, Meng Wang

Image based social networks are among the most popular social networking services in recent years. With tremendous images uploaded everyday, understanding users' preferences to the user-generated images and recommending them to users have become an urgent need. However, this is a challenging task. On one hand, we have to overcome the extremely data sparsity issue in image recommendation. On the other hand, we have to model the complex aspects that influence users' preferences to these highly subjective content from the heterogeneous data. In this paper, we develop an explainable social contextual image recommendation model to simultaneously explain and predict users' preferences to images. Specifically, in addition to user interest modeling in the standard recommendation, we identify three key aspects that affect each user's preference on the social platform, where each aspect summarizes a contextual representation from the complex relationships between users and images. We design a hierarchical attention model in recommendation process given the three contextual aspects. Particularly, the bottom layered attention networks learn to select informative elements of each aspect from heterogeneous data, and the top layered attention network learns to score the aspect importance of the three identified aspects for each user. In this way, we could overcome the data sparsity issue by leveraging the social contextual aspects from heterogeneous data, and explain the underlying reasons for each user's behavior with the learned hierarchial attention scores. Extensive experimental results on real-world datasets clearly show the superiority of our proposed model.


          Novel Compliant omnicrawler-wheel transforming module. (arXiv:1806.00765v2 [cs.RO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Akash Singh, Vinay Rodrigues, Enna Sachdeva, Sai Hanisha, Madhava Krishna

This paper presents a novel design of a crawler robot which is capable of transforming its chassis from an Omni crawler mode to a large-sized wheel mode using a novel mechanism. The transformation occurs without any additional actuators. Interestingly the robot can transform into a large diameter and small width wheel which enhances its maneuverability like small turning radius and fast/efficient locomotion. This paper contributes on improving the locomotion mode of previously developed hybrid compliant omnicrawler robot CObRaSO. In addition to legged and tracked mechanism, CObRaSO can now display large wheel mode which contributes to its locomotion capabilities. Mechanical design of the robot has been explained in a detailed manner in this paper and also the transforming experiment and torque analysis has been shown clearly


          Data-Driven Participation Factors for Nonlinear Systems Based on Koopman Mode Decomposition. (arXiv:1806.01344v3 [cs.SY] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Marcos Netto, Yoshihiko Susuki, Lamine Mili

This paper develops a novel data-driven technique to compute the participation factors for nonlinear systems based on the Koopman operator-theoretic framework. Provided that certain conditions are satisfied, it is shown that the proposed approach generalizes the original definition of the linear mode-in-state participation factors. Two numerical examples are used, one relying on a canonical nonlinear dynamical system and the other one based on the two-area four-machine system, to demonstrate the performance of our approach. The Koopman mode decomposition is generally applicable to any dynamical system, thereby making our approach able to cope with any nonlinearity while being fast to compute and compatible with real-time applications in power systems.


          Semi-Supervised Clustering with Neural Networks. (arXiv:1806.01547v2 [cs.LG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ankita Shukla, Gullal Singh Cheema, Saket Anand

Clustering using neural networks has recently demonstrated promising performance in machine learning and computer vision applications. However, the performance of current approaches is limited either by unsupervised learning or their dependence on large set of labeled data samples. In this paper, we propose ClusterNet that uses pairwise semantic constraints from very few labeled data samples (<5% of total data) and exploits the abundant unlabeled data to drive the clustering approach. We define a new loss function that uses pairwise semantic similarity between objects combined with constrained k-means clustering to efficiently utilize both labeled and unlabeled data in the same framework. The proposed network uses convolution autoencoder to learn a latent representation that groups data into k specified clusters, while also learning the cluster centers simultaneously. We evaluate and compare the performance of ClusterNet on several datasets and state of the art deep clustering approaches.


          Manifold Mixup: Encouraging Meaningful On-Manifold Interpolation as a Regularizer. (arXiv:1806.05236v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Vikas Verma, Alex Lamb, Christopher Beckham, Aaron Courville, Ioannis Mitliagkas, Yoshua Bengio

Deep networks often perform well on the data manifold on which they are trained, yet give incorrect (and often very confident) answers when evaluated on points from off of the training distribution. This is exemplified by the adversarial examples phenomenon but can also be seen in terms of model generalization and domain shift. We propose Manifold Mixup which encourages the network to produce more reasonable and less confident predictions at points with combinations of attributes not seen in the training set. This is accomplished by training on convex combinations of the hidden state representations of data samples. Using this method, we demonstrate improved semi-supervised learning, learning with limited labeled data, and robustness to adversarial examples. Manifold Mixup requires no (significant) additional computation. Analytical experiments on both real data and synthetic data directly support our hypothesis for why the Manifold Mixup method improves results.


          Bounds on the localization number. (arXiv:1806.05286v2 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Anthony Bonato, William B. Kinnersley

We consider the localization game played on graphs, wherein a set of cops attempt to determine the exact location of an invisible robber by exploiting distance probes. The corresponding optimization parameter for a graph $G$ is called the localization number and is written $\zeta (G)$. We settle a conjecture of \cite{nisse1} by providing an upper bound on the localization number as a function of the chromatic number. In particular, we show that every graph with $\zeta (G) \le k$ has degeneracy less than $3^k$ and, consequently, satisfies $\chi(G) \le 3^{\zeta (G)}$. We show further that this degeneracy bound is tight. We also prove that the localization number is at most 2 in outerplanar graphs, and we determine, up to an additive constant, the localization number of hypercubes.


          Dynamical Isometry and a Mean Field Theory of CNNs: How to Train 10,000-Layer Vanilla Convolutional Neural Networks. (arXiv:1806.05393v2 [stat.ML] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lechao Xiao, Yasaman Bahri, Jascha Sohl-Dickstein, Samuel S. Schoenholz, Jeffrey Pennington

In recent years, state-of-the-art methods in computer vision have utilized increasingly deep convolutional neural network architectures (CNNs), with some of the most successful models employing hundreds or even thousands of layers. A variety of pathologies such as vanishing/exploding gradients make training such deep networks challenging. While residual connections and batch normalization do enable training at these depths, it has remained unclear whether such specialized architecture designs are truly necessary to train deep CNNs. In this work, we demonstrate that it is possible to train vanilla CNNs with ten thousand layers or more simply by using an appropriate initialization scheme. We derive this initialization scheme theoretically by developing a mean field theory for signal propagation and by characterizing the conditions for dynamical isometry, the equilibration of singular values of the input-output Jacobian matrix. These conditions require that the convolution operator be an orthogonal transformation in the sense that it is norm-preserving. We present an algorithm for generating such random initial orthogonal convolution kernels and demonstrate empirically that they enable efficient training of extremely deep architectures.


          Agent-Mediated Social Choice. (arXiv:1806.07199v2 [cs.AI] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Umberto Grandi

Direct democracy is often proposed as a possible solution to the 21st-century problems of democracy. However, this suggestion clashes with the size and complexity of 21st-century societies, entailing an excessive cognitive burden on voters, who would have to submit informed opinions on an excessive number of issues. In this paper I argue for the development of voting avatars, autonomous agents debating and voting on behalf of each citizen. Theoretical research from artificial intelligence, and in particular multiagent systems and computational social choice, proposes 21st-century techniques for this purpose, from the compact representation of a voter's preferences and values, to the development of voting procedures for autonomous agents use only.


          Bayesian Sequential Joint Detection and Estimation. (arXiv:1807.03234v1 [eess.SP] CROSS LISTED)      Cache   Translate Page   Web Page Cache   

Authors: Dominik Reinhard, Michael Fauss, Abdelhak M. Zoubir

Joint detection and estimation refers to deciding between two or more hypotheses and, depending on the test outcome, simultaneously estimating the unknown parameters of the underlying distribution. This problem is investigated in a sequential framework under mild assumptions on the underlying random process. We formulate an unconstrained sequential decision problem, whose cost function is the weighted sum of the expected run-length and the detection/estimation errors. Then, a strong connection between the derivatives of the cost function with respect to the weights, which can be interpreted as Lagrange multipliers, and the detection/estimation errors of the underlying scheme is shown. This property is used to characterize the solution of a closely related sequential decision problem, whose objective function is the expected run-length under constraints on the average detection/estimation errors. We show that the solution of the constrained problem coincides with the solution of the unconstrained problem with suitably chosen weights. These weights are characterized as the solution of a linear program, which can be solved using efficient off-the-shelf solvers. The theoretical results are illustrated with two example problems, for which optimal sequential schemes are designed numerically and whose performance is validated via Monte Carlo simulations.


          Bookends 13.1.1 - Reference management and bibliography software. (Shareware)      Cache   Translate Page   Web Page Cache   

Bookends is a full-featured bibliography/reference and information-management system for students and professionals.

  • Bookends uses the cloud to sync reference libraries on all the Macs you use. Access the power of Bookends directly from Mellel, Nisus Writer Pro, or MS Word (including Word 2016): Bookends allows you to scan your existing word-processor files and automatically generate finished manuscripts with properly formatted bibliographies. You can also scan Apple Pages '08, '09, and 5, Manuscripts.app, and LibreOffice/OpenOffice 4 files, or RTF files saved from any word processor.
  • Bookends allows you to share your references over the Internet with anyone, on any platform. And with Bookends, you can directly search and import references from numerous sources:
    • PubMed
    • Web of Science
    • JSTOR
    • Google Scholar
    • Amazon
    • Library of Congress
    • arXiv
    • and hundreds of other online sources
    Or use a built-in browser to download references with PDF's and/or Web pages. Also, with automatic searches of PubMed, you can discover articles as soon as they're published. Bookends allows for powerful group-based searches, with static, smart, virtual groups, and smart folders as well as tag clouds that make hierarchical searches easy.
  • Bookends also offers a robust assortment of file attachment features:
    • Attach any file (such as a PDF) to a reference and view or open it instantly.
    • Automatically rename and organize PDF files on-the-fly.
    • Automatically download and attach the PDF of an article from the Internet if you have access permission.
    • Automatically locate and attach PDF's on your hard drive.
    • Annotate and markup PDFs and have the information instantly accessible in notecards.
    Easily migrate references and attachments from other reference managers to Bookends.
  • Sync your library with Bookends for iOS on your iOS devices, so that you have your references and PDF's with you wherever you are.


Version 13.1.1:
  • Get PDF from arXiv works even if the reference only has the URL for the arXiv abstract, not the PDF
  • PDFs automatically imported from the watch folder will be attached to an existing reference if the DOI, JSTOR stable URL, or the arXiv ID matches
    • Proofreading Word documents preserves quoted text and cited pages in the temporary citations
    • The minimum database cache has been increased to 20 MB
    • More accented characters were added to the BibTeX conversion table
    • Display both citation and bibliography styles in the formatted display pane:
    • The pop-up menu that holds the names of the enabled formats when you "view formatted" has an option to show the bibliography output only (default) or the citation and the bibliography outputs. You can also switch between these options with a right-click in the view formatted display pane itself. The citation output will be shown first, then the bibliography output. This is most useful for displaying custom citations (e.g. Chicago, Turabian, etc.). Superscripted numbers (e.g. Nature format) will be shown without the superscript.
    • Move references from one static group to another with drag and drop:
      • If you drag and drop from one static group to another with the Option key held down, Bookends will remove it from the original and add it to the destination (without the Option key the reference would have been copied and exist in both groups). This may be useful in cases where a reference's status changes and you want to move it between mutually exclusive groups, such as Read vs. Unread or In Preparation vs. Published.
    Bug fixes:
    • Fixed an error message that could be thrown if Bookends Browser couldn't parse a web page. Fixed a crash that could occur when autofilling a reference from Amazon and downloading the associated jpg. Fixed a bug that prevented the "Find in PDF" keyboard shortcut (Option-Shift-Command-F) from working. Fixed a bug in Bookends Browser that could cause a spurious error message to be shown. Fixed a rare bug that could cause a blank error dialog to appers when opening preferences. Fixed a error that was generated if the identifying information in the quick add dialog contained spaces. Fixed a bug where scanning a BibTeX file with an empty citation caused the scan to terminate at that point.


    • OS X 10.9 or later



    More information

    Download Now
          New multiplicative perturbation bounds for the generalized polar decomposition. (arXiv:1807.03298v1 [math.FA])      Cache   Translate Page   Web Page Cache   

Authors: Na Liu, Wei Luo, Qingxiang Xu

Some new Frobenius norm bounds of the unique solution to certain structured Sylvester equation are derived. Based on the derived norm upper bounds, new multiplicative perturbation bounds are provided both for subunitary polar factors and positive semi-definite polar factors. Some previous results are then improved.


          Rapoport-Zink Spaces For Local P-Shtukas and Their Local Models. (arXiv:1807.03301v1 [math.NT])      Cache   Translate Page   Web Page Cache   

Authors: Esmail Arasteh Rad

We discuss the analogy between Shimura varieties (resp. Rapoport-Zink spaces) and moduli stacks for global G-shtukas (resp. Rapooprt Zink spaces for local P-shtukas). Along the way we also study some local properties of Rapoport-Zink spaces for local P-shtukas. This is done by constructing local models for them.


          Gauge-Invariant Variables Reveal the Quantum Geometry of Fractional Quantum Hall States. (arXiv:1807.03306v1 [cond-mat.str-el])      Cache   Translate Page   Web Page Cache   

Authors: YingKang Chen, Rudro R. Biswas

Herein, we introduce the framework of gauge invariant variables to describe fractional quantum Hall (FQH) states, and prove that the wavefunction can be represented by a unique holomorphic multi-variable complex function. Within this framework, we derive the guiding center Schr\"{o}dinger's equation governing FQH states; it has a novel structure. Our framework applies to \emph{all} Landau levels. As a special case, it yields the well-known holomorphic function representation of wavefunctions inside the lowest Landau level. Our formulation is apt for incorporating a new combination of techniques, from symmetric functions, Galois theory and complex analysis, to accurately predict the physics of FQH states.


          Growth of quantum 6j-symbols and applications to the Volume Conjecture. (arXiv:1807.03327v1 [math.GT])      Cache   Translate Page   Web Page Cache   

Authors: Giulio Belletti, Renaud Detcherry, Efstratia Kalfagianni, Tian Yang

We prove the Turaev-Viro invariants volume conjecture for complements of fundamental shadow links: an infinite family of hyperbolic link complements in connected sums of copies of $S^1\times S^2$. The main step of the proof is to find a sharp upper bound on the growth rate of the quantum $6j-$symbol evaluated at $e^{\frac{2\pi i}{r}}.$ As an application of the main result, we show that the volume of any hyperbolic 3-manifold with empty or toroidal boundary can be estimated in terms of the Turaev-Viro invariants of an appropriate link contained in it. We also build additional evidence for a conjecture of Andersen, Masbaum and Ueno (AMU conjecture) about the geometric properties of surface mapping class groups detected by the quantum representations.


          Some applications of differential subordination for certain starlike functions. (arXiv:1807.03328v1 [math.CV])      Cache   Translate Page   Web Page Cache   

Authors: R. Kargar, L. Trojnar-Spelina

We consider the class $\mathcal{S}^*(q_c)$ of normalized starlike functions $f$ analytic in the open unit disk $|z|<1$ that satisfying the inequality \begin{equation*}

\left|\left(\frac{zf'(z)}{f(z)}\right)^2-1\right|<c \quad

(0<c\leq1). \end{equation*} In this article, we present some subordination relations and these relations are then used to obtain some corollaries for some subclass of analytic functions.


          An introduction to the SYK model. (arXiv:1807.03334v1 [hep-th])      Cache   Translate Page   Web Page Cache   

Authors: Vladimir Rosenhaus

These notes are a short introduction to the Sachdev-Ye-Kitaev model. We discuss: SYK and tensor models as a new class of large N quantum field theories, the near-conformal invariance in the infrared, the computation of correlation functions, generalizations of SYK, and applications to AdS/CFT and strange metals.


          Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing. (arXiv:1807.03337v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Behrooz Tahmasebi, Mohammad Ali Maddah-Ali, Saeedeh Parsaeefard, Babak Hossein Khalaj

In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal end-to-end transmission delay. In addition, we show that using such technique, we can significantly reduce the transmission delay as compared to the conventional approach. In some scenarios, such reduction can even scale with the size of the network. More precisely, by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the end-to-end delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upper-bounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches.


          A Three-by-Three matrix representation of a generalized Tribonacci sequence. (arXiv:1807.03340v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Gamaliel Cerda-Morales

The Tribonacci sequence is a well-known example of third order recurrence sequence, which belongs to a particular class of recursive sequences. In this article, other generalized Tribonacci sequence is introduced and defined by $H_{n+2}=H_{n+1}+H_{n}+H_{n-1}\ \ (n\geq 1)$, where $H_{0}=3$, $H_{1}=0$ and $H_{2}=2$. Also $n$-th power of the generating matrix for this generalized Tribonacci sequence is established and some basic properties of this sequence are obtained by matrix methods. There are many elementary formulae relating the various $H_{n}$, most of which, since the sequence is defined inductively, are themselves usually proved by induction.


          Detailed analytic study of the compact pairwise model for SIS epidemic propagation on networks. (arXiv:1807.03344v1 [math.DS])      Cache   Translate Page   Web Page Cache   

Authors: Noémi Nagy, Péter L. Simon

The global behaviour of the compact pairwise approximation of SIS epidemic propagation on networks is studied. It is shown that the system can be reduced to two equations enabling us to carry out a detailed study of the dynamic properties of the solutions. It is proved that transcritical bifurcation occurs in the system at $\tau = \tau _c = \frac{\gamma n}{\langle n^{2}\rangle-n}$, where $\tau$ and $\gamma$ are infection and recovery rates, respectively, $n$ is the average degree of the network and $\langle n^{2}\rangle$ is the second moment of the degree distribution. For subcritical values of $\tau$ the disease-free steady state is stable, while for supercritical values a unique stable endemic equilibrium appears. We also prove that for subcritical values of $\tau$ the disease-free steady state is globally stable under certain assumptions on the graph that cover a wide class of networks.


          The Hilbert Property for integral points of affine smooth cubic surfaces. (arXiv:1807.03349v1 [math.NT])      Cache   Translate Page   Web Page Cache   

Authors: Simone Coccia

In this paper we prove that the set of $S$-integral points of the smooth cubic surfaces in $\mathbb{A}^3$ over a number field $k$ is not thin, for suitable $k$ and $S$. As a corollary, we obtain results on the complement in $\mathbb{P}^2$ of a smooth cubic curve, improving on Beukers' proof that the $S$-integral points are Zariski dense, for suitable $S$ and $k$. With our method we reprove Zariski density, but our result is more powerful since it is a stronger form of Zariski density. We moreover prove that the rational integer points on the Fermat cubic surface $x^3+y^3+z^3=1$ form a non-thin set and we link our methods to previous results of Lehmer, Miller-Woollett and Mordell.


          Reddening sequences for Banff quivers and the class $\mathcal{P}$. (arXiv:1807.03359v1 [math.AC])      Cache   Translate Page   Web Page Cache   

Authors: Eric Bucher, John Machacek

We show that a reddening sequence exists for any quiver which is Banff or in the class $\mathcal{P}$. Our proofs are combinatorial and rely on the direct sum construction for quivers. The other facts needed are that the existence of a reddening sequence is mutation invariant and passes to induced subquivers. Banff quivers define locally acyclic cluster algebras which are known to coincide with their upper cluster algebras. The existence of reddening sequences for these quivers is consistent with a conjectural relationship between the existence of either a maximal green or reddening sequence and a cluster algebra's equality with its upper cluster algebra. Moreover, this completes a verification of the conjecture for Banff quivers. We also prove that a certain subclass of quivers within the class $\mathcal{P}$ define locally acyclic cluster algebras.


          On strongly norm attaining Lipschitz operators. (arXiv:1807.03363v1 [math.FA])      Cache   Translate Page   Web Page Cache   

Authors: Bernardo Cascales, Rafa Chiclana, Luis García-Lirola, Miguel Martín, Abraham Rueda Zoca

We study the set $\SA(M,Y)$ of those Lipschitz operators from a (complete pointed) metric space $M$ to a Banach space $Y$ which (strongly) attain their Lipschitz norm (i.e.\ the supremum defining the Lipschitz norm is a maximum). Extending previous results, we prove that this set is not norm dense when $M$ is length (or local) or when $M$ is a closed subset of $\R$ with positive Lebesgue measure, providing new example which have very different topological properties than the previously known ones. On the other hand, we study the linear properties which are sufficient to get Lindenstrauss property A for the Lipschitz-free space $\mathcal{F}(M)$ over $M$, and show that all of them actually provide the norm density of $\SA(M,Y)$ in the space of all Lipschitz operators from $M$ to any Banach space $Y$. Next, we prove that $\SA(M,\R)$ is weak sequentially dense in the space of all Lipschitz functions for all metric spaces $M$. Finally, we show that the norm of the bidual space to $\mathcal{F}(M)$ is octahedral provided the metric space $M$ is discrete but not uniformly discrete or $M'$ is infinite.


          Affine representability results in A^1-homotopy theory III: finite fields and complements. (arXiv:1807.03365v1 [math.AG])      Cache   Translate Page   Web Page Cache   

Authors: Aravind Asok, Marc Hoyois, Matthias Wendt

We give a streamlined proof of ${\mathbb A}^1$-representability for $G$-torsors under "isotropic" reductive groups, extending previous results in this sequence of papers to finite fields. We then analyze a collection of group homomorphisms that yield fiber sequences in ${\mathbb A}^1$-homotopy theory, and identify the final examples of motivic spheres that arise as homogeneous spaces for reductive groups.


          n-metrics for multiple graph alignment. (arXiv:1807.03368v1 [cs.DM])      Cache   Translate Page   Web Page Cache   

Authors: Sam Safavi, Jose Bento

The work of Ioannidis et al. 2018 introduces a family of distances between two graphs that provides tractable graph alignment strategies. Importantly, the alignment scores produced by this family satisfy the properties of metrics, which is very useful in several learning tasks. In this paper, we generalize this work to compare n graphs by introducing a family of distances, which is an n-metric, i.e., an extension of a metric to n elements that includes a generalization of the triangle inequality. Our new family of distances, includes the ones in the work of Ioannidis et al. 2018 as a special case, and can produce tractable alignments between multiple graphs.


          Approximating tau-functions by theta-functions. (arXiv:1807.03377v1 [math-ph])      Cache   Translate Page   Web Page Cache   

Authors: Boris Dubrovin

We prove that the logarithm of an arbitrary tau-function of the KdV hierarchy can be approximated, in the topology of graded formal series by the logarithmic expansions of hyperelliptic theta-functions of finite genus, up to at most quadratic terms. As an example we consider theta-functional approximations of the Witten--Kontsevich tau-function.


          Axioms for shifted tableau crystals. (arXiv:1807.03384v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Maria Gillespie, Jake Levinson

We give local axioms that uniquely characterize the crystal-like structure on shifted tableaux developed in a previous paper by Gillespie, Levinson, and Purbhoo. These axioms closely resemble those developed by Stembridge for type A tableau crystals. This axiomatic characterization gives rise to a new method for proving and understanding Schur $Q$-positive expansions in symmetric function theory, just as the Stembridge axiomatic structure provides for ordinary Schur positivity.


          Essential norm of the differential operator. (arXiv:1807.03389v1 [math.FA])      Cache   Translate Page   Web Page Cache   

Authors: Tesfa Mengestie

This paper is a follow-up contribution to our work [10] where we studied some spectral properties of the differential operator $D$ acting between generalized Fock spaces $\mathcal{F}_{(m,p)}$ and $\mathcal{F}_{(m,q)}$ when both exponents $p$ and $q$ are finite. In this note we continue to study the properties for the case when at least one of the spaces is growth type. We also estimate the essential norm of $D: \mathcal{F}_{(m,p)}\to \mathcal{F}_{(m,q)}$ for all $1\leq p, q\leq \infty$, and showed that if the operator fails to be compact, then its essential norm is comparable to the operator norm and $\|D\|_e \simeq \big|m^{2+p}-m^{1+p}\big|^{\frac{1}{p}}\simeq \|D\|.$


          Continuous-stage Runge-Kutta-Nystr\"Om methods. (arXiv:1807.03393v1 [math.NA])      Cache   Translate Page   Web Page Cache   

Authors: Wensheng Tang

We develop continuous-stage Runge-Kutta-Nystr\"Om (csRKN) methods in this paper. By leading weight function into the formalism of csRKN methods and modifying the original pattern of continuous-stage methods, we establish a new and larger framework for csRKN methods and it enables us to derive more effective RKN-type methods. Particularly, a variety of classical weighted orthogonal polynomials can be used in the construction of RKN-type methods. As an important application, new families of symmetric and symplectic integrators can be easily acquired in such framework. Numerical experiments have verified the effectiveness of the new integrators presented in this paper.


          Integral, differential and multiplication operators on generalized Fock spaces. (arXiv:1807.03394v1 [math.FA])      Cache   Translate Page   Web Page Cache   

Authors: Tesfa Mengestie, Sei-Ichiro Ueki

Volterra companion integral and multiplication operators with holomorphic symbols are studied for a large class of generalized Fock spaces on the complex plane $\CC$. The weights defining these spaces are radial and subject to a mild smoothness condition. In addition, we assumed that the weights decay faster than the classical Gaussian weight. One of our main results show that there exists no nontrivial holomorphic symbols $g$ which induce bounded Volterra companion integral $I_g$ and multiplication operators $M_g$ acting between the weighted spaces. We also describe the bounded and compact Volterra-type integral operators $V_g$ acting between $\mathcal{F}_q^\psi$ and $\mathcal{F}_p^\psi$ when at least one of the exponents $p$ or $q$ is infinite, and extend results of Constantin and Pel\'{a}ez for finite exponent cases. Furthermore, we showed that the differential operator $D$ acts in unbounded fashion on these and the classical Fock spaces.


          Necklaces count polynomial parametric osculants. (arXiv:1807.03408v1 [math.AG])      Cache   Translate Page   Web Page Cache   

Authors: Taylor Brysiewicz

We consider the problem of geometrically approximating a complex analytic curve in the plane by the image of a polynomial parametrization $t \mapsto (x_1(t),x_2(t))$ of bidegree $(d_1,d_2)$. We show the number of such curves is the number of primitive necklaces on $d_1$ white beads and $d_2$ black beads. We show that this number is odd when $d_1=d_2$ is squarefree and use this to give a partial solution to a conjecture by Rababah. Our results naturally extend to a generalization regarding hypersurfaces in higher dimensions. There, the number of parametrized curves of multidegree $(d_1,\ldots,d_n)$ which optimally osculate a given hypersurface are counted by the number of primitive necklaces with $d_i$ beads of color $i$.


          Graphon Control of Large-scale Networks of Linear Systems. (arXiv:1807.03412v1 [math.OC])      Cache   Translate Page   Web Page Cache   

Authors: Shuang Gao, Peter E. Caines

To achieve control objectives for extremely complex and very large scale networks using standard methods is essentially intractable. In this work, we propose and develop a methodology for the approximate control of complex network systems by the use of graphon theory and the theory of infinite dimensional systems.

First, the graphon dynamical system models are formulated in an appropriate infinite dimensional space in order to represent arbitrary-size networks of linear dynamical systems, and to define the convergence of sequences of network systems with limits in the space. The exact controllability and the approximate controllability of graphon dynamical systems are then investigated.

Second, the minimum energy state-to-state control problem and the linear quadratic regulator (LQR) problem for systems on complex networks are considered. The control problem for the graphon limit system is solved in each case and the respective control laws are then approximated to obtain control laws for the finite network system. In each of the two cases, the convergence properties of the approximation schemes are established.

Finally, numerical examples of complex networks with randomly sampled weightings are presented to illustrate the effectiveness of the graphon control methodology.


          A JSJ-type decomposition theorem for symplectic fillings. (arXiv:1807.03420v1 [math.SG])      Cache   Translate Page   Web Page Cache   

Authors: Michael Menke

Let $(M,\xi)$ be a contact 3-manifold and $T^2 \subset (M,\xi)$ a convex torus of a special type called a mixed torus. We prove a JSJ-type decomposition theorem for strong and exact symplectic fillings of $(M,\xi)$ when $(M,\xi)$ is cut along $T^2$. As an application we show the uniqueness of exact fillings when $(M,\xi)$ is obtained by Legendrian surgery on a knot in $(S^3,\xi_{std})$ when the knot is stabilized both positively and negatively.


          Capacity of Two-Way Channels with Symmetry Properties. (arXiv:1807.03422v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Jian-Jia Weng, Lin Song, Fady Alajaji, Tamás Linder

In this paper, we make use of channel symmetry properties to determine the capacity region of three types of two-way networks: (a) two-user memoryless two-way channels (TWCs), (b) two-user TWCs with memory, and (c) three-user multiaccess/degraded broadcast (MA/DB) TWCs. For each network, symmetry conditions under which Shannon's random coding inner bound is tight are given. For two-user memoryless TWCs, prior results are substantially generalized by viewing a TWC as two interacting state-dependent one-way channels. The capacity of symmetric TWCs with memory, whose outputs are functions of the inputs and independent stationary and ergodic noise processes, is also obtained. Moreover, various channel symmetry properties under which Shannon's inner bound is tight are identified for three-user MA/DB TWCs. The results not only enlarge the class of symmetric TWCs whose capacity region can be exactly determined but also imply that adaptive coding, not improving capacity, is unnecessary for such channels.


          Maximal subgroup growth of some metabelian groups. (arXiv:1807.03423v1 [math.GR])      Cache   Translate Page   Web Page Cache   

Authors: Andrew James Kelley

Let $m_n(G)$ denote the number of maximal subgroups of $G$ of index $n$. An upper bound is given for the degree of maximal subgroup growth of all polycyclic metabelian groups $G$ (i.e., for $\limsup \frac{\log m_n(G)}{\log n}$, the degree of polynomial growth of $m_n(G)$). A condition is given for when this upper bound is attained.

For $G = \mathbb{Z}^k \rtimes \mathbb{Z}$, where $A \in GL(k,\mathbb{Z})$, it is shown that $m_n(G)$ grows like a polynomial of degree equal to the number of blocks in the rational canonical form of $A$. The leading term of this polynomial is the number of distinct roots (in $\mathbb{C}$) of the characteristic polynomial of the smallest block.


          Quasi-compact group schemes, Hopf sheaves, and their representations. (arXiv:1807.03428v1 [math.AG])      Cache   Translate Page   Web Page Cache   

Authors: Alvaro Rittatore, Pedro Luis del Angel, Walter Ferrer Santos

We develop a representation theory for quasi-compact K-group schemes that are extensions of an Abelian variety by an affine group scheme. We characterize the categories that arise as such a representation theory, generalizing in this way the classical theory of Tannaka Duality established for affine group schemes. We also prove the existence of a (contra-variant) equivalence between the category of affine extensions of an Abelian variety A by an affine group scheme and the category of Hopf sheaves over A, generalizing in this manner the well-known equivalence between the categories of affine group schemes and commutative Hopf algebras. If G is a quasi-compact K-group scheme and $\mathcal H_G$ its corresponding Hopf sheaf, we prove that the representation theory of G is equivalent to the category of $\mathcal H_G$-comodules.


          Homotopical and topological rigidity of hypersurfaces of spherical space forms. (arXiv:1807.03429v1 [math.GT])      Cache   Translate Page   Web Page Cache   

Authors: Pedro Zühlke

The first main result is a topological rigidity theorem for complete immersed hypersurfaces of spherical space forms which extends similar results due to do Carmo/Warner, Wang/Xia and Longa/Ripoll. Under certain sharp conditions on the principal curvatures of such a hypersurface $ f \colon N^n \to M^{n+1} $ ($ n\ge 2 $), it asserts that the universal cover of $ N $ must be diffeomorphic to the $ n $-sphere $ \mathbb{S}^n $, and provides an upper bound for the order of the fundamental group of $ N $ in terms of that of $ M $. In particular, if $ M = \mathbb{S}^{n+1} $, then $ N $ is diffeomorphic to $ \mathbb{S}^n $ and either $ f $ or its Gauss map is an embedding.

Let $ J \subset (0,\pi) $ be any interval of length less than $ \frac{\pi}{2} $. The second main result constructs a weak homotopy equivalence between the space of all complete immersed hypersurfaces of $ M $ with principal curvatures in $ \cot (J) $ and the twisted product of $ \big( \Gamma\backslash \mathrm{SO}_{n+2} \big) $ and $ \mathrm{Diff}_+(\mathbb{S}^n) $ by $ \mathrm{SO}_{n+1} $, where $ \Gamma $ is the fundamental group of $ M $ regarded as a subgroup of $ \mathrm{SO}_{n+2} $.

Relying on another rigidity criterion due to Wang/Xia, the third main result constructs homotopy equivalences, in both directions, between the space of all complete immersed hypersurfaces of $ \mathbb{S}^{n+1} $ whose Gauss maps have image contained in a strictly convex ball and the same twisted product, with $ \Gamma $ the trivial group.


          Using Block Designs in Crossing Number Bounds. (arXiv:1807.03430v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: John Asplund, Eva Czabarka, Gregory Clark, Garner Cochran, Arran Hamm, Gwen Spencer, Laszlo Szekely, Libby Taylor, Zhiyu Wang

The crossing number ${\mbox {cr}}(G)$ of a graph $G=(V,E)$ is the smallest number of edge crossings over all drawings of $G$ in the plane. For any $k\ge 1$, the $k$-planar crossing number of $G$, ${\mbox {cr}}_k(G)$, is defined as the minimum of ${\mbox {cr}}(G_1)+{\mbox {cr}}(G_2)+\ldots+{\mbox {cr}}(G_{k})$ over all graphs $G_1, G_2,\ldots, G_{k}$ with $\cup_{i=1}^{k}G_i=G$. Pach et al. [\emph{Computational Geometry: Theory and Applications} {\bf 68} 2--6, (2018)] showed that for every $k\ge 1$, we have ${\mbox {cr}}_k(G)\le \left(\frac{2}{k^2}-\frac1{k^3}\right){\mbox {cr}}(G)$ and that this bound does not remain true if we replace the constant $\frac{2}{k^2}-\frac1{k^3}$ by any number smaller than $\frac1{k^2}$. We improve the upper bound to $\frac{1}{k^2}(1+o(1))$ as $k\rightarrow \infty$. For the class of bipartite graphs, we show that the best constant is exactly $\frac{1}{k^2}$ for every $k$. The results extend to the rectilinear variant of the $k$-planar crossing number.


          On the Uniqueness for One-Dimensional Constrained Hamilton-Jacobi Equations. (arXiv:1807.03432v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Yeoneung Kim

The goal of this paper is to study uniqueness of a one-dimensional Hamilton-Jacobi equation \begin{equation*}

\begin{cases}

u_t=|u_x|^2+R(x,I(t)) &\text{in }\mathbb{R} \times (0,\infty),

\max_{\mathbb{R}} u(\cdot,t)=0 &\text{on }[0,\infty),

\end{cases} \end{equation*} with an initial condition $u_0(x,0)=u_0(x)$ on $\mathbb{R}$. A reaction term $R(x,I(t))$ is given while $I(t)$ is an unknown constraint (Lagrange multiplier) that forces maximum of $u$ to be always zero. In the paper, we prove uniqueness of a pair of unknowns (u,I) using dynamic programming principle in one dimensional space for some particular class of nonseparable reaction $R(x,I(t))$.


          Ground states for a linearly coupled system of Schr\"odinger equations on $\mathbb{R}^{N}$. (arXiv:1807.03436v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: João Marcos do Ó, José Carlos de Albuquerque

We study the following class of linearly coupled Schr\"{o}dinger elliptic systems

$$

\left\{

\begin{array}{lr}

-\Delta u+V_{1}(x)u=\mu|u|^{p-2}u+\lambda(x)v, & \quad x\in\mathbb{R}^{N},

-\Delta v+V_{2}(x)v=|v|^{q-2}v+\lambda(x)u, & x\in\mathbb{R}^{N},

\end{array}

\right.

$$

where $N\geq3$, $2<p\leq q\leq 2^{*}=2N/(N-2)$ and $\mu\geq0$. We consider nonnegative potentials periodic or asymptotically periodic which are related with the coupling term $\lambda(x)$ by the assumption $|\lambda(x)|\leq\delta\sqrt{V_{1}(x)V_{2}(x)}$, for some $0<\delta<1$. We deal with three cases: Firstly, we study the subcritical case, $2<p\leq q<2^{*}$, and we prove the existence of positive ground state for all parameter $\mu\geq0$. Secondly, we consider the critical case, $2<p<q=2^{*}$, and we prove that there exists $\mu_{0}>0$ such that the coupled system possesses positive ground state solution for all $\mu\geq\mu_{0}$. In these cases, we use a minimization method based on Nehari manifold. Finally, we consider the case $p=q=2^{*}$, and we prove that the coupled system has no positive solutions. For that matter, we use a Pohozaev identity type.


          Fast Algorithms for Displacement and Low-Rank Structured Matrices. (arXiv:1807.03437v1 [math.NA])      Cache   Translate Page   Web Page Cache   

Authors: Shivkumar Chandrasekaran, Nithin Govindarajan, Abhejit Rajagopal

This tutorial provides an introduction to the development of fast matrix algorithms based on the notions of displacement and various low-rank structures.


          Bayesian Linear Regression for Multivariate Responses Under Group Sparsity. (arXiv:1807.03439v1 [math.ST])      Cache   Translate Page   Web Page Cache   

Authors: Bo Ning, Subhashis Ghosal

We study the frequentist properties of a Bayesian high-dimensional multivariate linear regression model with correlated responses. Two features of the model are unique: (i) group sparsity is imposed on the predictors. (ii) the covariance matrix is unknown and its dimensions can be high. We choose a product of independent spike-and-slab priors on the regression coefficients and a Wishart prior with increasing dimension on the inverse of the covariance matrix. Each spike-and-slab prior is a mixture of a point mass at zero and a multivariate density involving a $\ell_2/\ell_1$-norm. We first obtain the posterior contraction rate, the bounds on the effective dimension of the model with high posterior probabilities. We then show that the multivariate regression coefficients can be recovered under certain compatibility conditions. Finally, we quantify the uncertainty for the regression coefficients with frequentist validity through a Bernstein-von Mises type theorem. The result leads to selection consistency for the Bayesian method. We derive the posterior contraction rate using the general theory through constructing a suitable test from the first principle by bounding moments of likelihood ratio statistics around points in the alternative. This leads to the posterior concentrates around the truth with respect to the average log-affinity. The technique of obtaining the posterior contraction rate could be useful in many other problems.


          A convex combinatorial property of compact sets in the plane and its roots in lattice theory. (arXiv:1807.03443v1 [math.MG])      Cache   Translate Page   Web Page Cache   

Authors: Gábor Czédli, Árpád Kurusa

K. Adaricheva and M. Bolat have recently proved that if $U_0$ and $U_1$ are circles in a triangle with vertices $A_0,A_1,A_2$, then there exist $j\in \{0,1,2\}$ and $k\in\{0,1\}$ such that $U_{1-k}$ is included in the convex hull of $U_k\cup(\{A_0,A_1, A_2\}\setminus\{A_j\})$. One could say disks instead of circles. Here we prove the existence of such a $j$ and $k$ for the more general case where $U_0$ and $U_1$ are compact sets in the plane such that $U_1$ is obtained from $U_0$ by a positive homothety or by a translation. Also, we give a short survey to show how lattice theoretical antecedents, including a series of papers on planar semimodular lattices by G. Gratzer and E. Knapp, lead to our result.


          Approximation of Beta-Jacobi ensembles by Beta-Laguerre ensembles. (arXiv:1807.03446v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Yutao Ma, Xinmei Shen

Let $\lambda$ and $\mu$ be beta-Jacobi and beta-Laguerre ensembles with joint density function $f_{\beta, m, a_1, a_2}$ and $f_{\beta, m, a_1}$, respectively. Here $\beta>0$ and $a_1, a_2$ and $m$ satisfying . $a_1, a_2>\frac{\beta}{2}(m-1).$ In this paper, we consider the distance between $2(a_1+a_2)\lambda$ and $\mu$ in terms of total variation distance and Kullback-Leibler distance. Following the idea in \cite{JM2017}, we are able to prove that both the two distances go to zero once $a_1m=o(a_2)$ and not so if $\lim_{a_2\to\infty}a_1m/a_2=\sigma>0.$


          Asymptotic behavior of extremals for fractional Sobolev inequalities associated with singular problems. (arXiv:1807.03449v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Grey Ercole, Gilberto Assis Pereira, Rémy Sanchis

Let $\Omega$ be a smooth, bounded domain of $\mathbb{R}^{N}$, $\omega$ be a positive, $L^{1}$-normalized function, and $0<s<1<p.$ We study the asymptotic behavior, as $p\rightarrow\infty,$ of the pair $\left( \sqrt[p]{\Lambda_{p}% },u_{p}\right) ,$ where $\Lambda_{p}$ is the best constant $C$ in the Sobolev type inequality \[ C\exp\left( \int_{\Omega}(\log\left\vert u\right\vert ^{p})\omega \mathrm{d}x\right) \leq\left[ u\right] _{s,p}^{p}\quad\forall\,u\in W_{0}^{s,p}(\Omega) \] and $u_{p}$ is the positive, suitably normalized extremal function corresponding to $\Lambda_{p}$. We show that the limit pairs are closely related to the problem of minimizing the quotient $\left\vert u\right\vert _{s}/\exp\left( \int_{\Omega}(\log\left\vert u\right\vert )\omega \mathrm{d}x\right) ,$ where $\left\vert u\right\vert _{s}$ denotes the $s$-H\"{o}lder seminorm of a function $u\in C_{0}^{0,s}(\overline{\Omega}).$


          Symplectic groupoids for cluster manifolds. (arXiv:1807.03450v1 [math.SG])      Cache   Translate Page   Web Page Cache   

Authors: Songhao Li, Dylan Rupel

We construct symplectic groupoids integrating log-canonical Poisson structures on cluster varieties of type $\mathcal{A}$ and $\mathcal{X}$ over both the real and complex numbers. Extensions of these groupoids to the completions of the cluster varieties where cluster variables are allowed to vanish are also considered. In the real case, we construct source-simply-connected groupoids for the cluster charts via the Poisson spray technique of Crainic and M\u{a}rcu\c{t}. These groupoid charts and their analogues for the symplectic double and blow-up groupoids are glued by lifting the cluster mutations to groupoid comorphisms whose formulas are motivated by the Hamiltonian perspective of cluster mutations introduced by Fock and Goncharov.


          On a diffusive SIS epidemic model with mass action mechanism and birth-death effect: Analysis, simulations and comparison with other mechanisms. (arXiv:1807.03451v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Huicong Li, Rui Peng, Zhi-An Wang

In the present paper, we are concerned with an SIS epidemic reaction-diffusion model governed by mass action infection mechanism and linear birth-death growth with no flux boundary condition. By performing qualitative analysis, we study the stability of the disease-free equilibrium, uniform persistence property in terms of the basic reproduction number and the global stability of the endemic equilibrium in homogeneous environment, and investigate the asymptotic profile of endemic equilibria (when exist) in heterogeneous environment as one of the movement rate of the susceptible and infected populations is small. Our results, together with those in previous works on three other closely related modeling systems, suggest that the factors such as infection mechanism, variation of total population and population movement play vital but subtle roles in the transmission dynamics of diseases and hence provide useful insights into the strategies designed for disease control and prevention.


          Plumbing Constructions and the Domain of Outer Communication for 5-Dimensional Stationary Black Holes. (arXiv:1807.03452v1 [gr-qc])      Cache   Translate Page   Web Page Cache   

Authors: Marcus Khuri, Yukio Matsumoto, Gilbert Weinstein, Sumio Yamada

The topology of the domain of outer communication for 5-dimensional stationary bi-axisymmetric black holes is classified in terms of disc bundles over the 2-sphere and plumbing constructions. In particular we find an algorithmic bijective correspondence between the plumbing of disc bundles and the rod structure formalism for such spacetimes. Furthermore, we describe a canonical fill-in for the black hole region and cap for the asymptotic region. The resulting compactified domain of outer communication is then shown to be homeomorphic to $S^4$, a connected sum of $S^2\times S^2$'s, or a connected sum of complex projective planes $\mathbb{CP}^2$. Combined with recent existence results, it is shown that all such topological types are realized by vacuum solutions. In addition, our methods treat all possible types of asymptotic ends, including spacetimes which are asymptotically flat, asymptotically Kaluza-Klein, or asymptotically locally Euclidean.


          The Kannan-Lov\'asz-Simonovits Conjecture. (arXiv:1807.03465v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Yin Tat Lee, Santosh S. Vempala

The Kannan-Lov\'asz-Simonovits conjecture says that the Cheeger constant of any logconcave density is achieved to within a universal, dimension-independent constant factor by a hyperplane-induced subset. Here we survey the origin and consequences of the conjecture (in geometry, probability, information theory and algorithms) as well as recent progress resulting in the current best bounds. The conjecture has lead to several techniques of general interest.


          Pairwise Covariates-adjusted Block Model for Community Detection. (arXiv:1807.03469v1 [stat.ME])      Cache   Translate Page   Web Page Cache   

Authors: Sihan Huang, Yang Feng

One of the most fundamental problems in network study is community detection. The stochastic block model (SBM) is one widely used model for network data with different estimation methods developed with their community detection consistency results unveiled. However, the SBM is restricted by the strong assumption that all nodes in the same community are stochastically equivalent, which may not be suitable for practical applications. We introduce pairwise covariates-adjusted stochastic block model (PCABM), a generalization of SBM that incorporates pairwise covariate information. We study the maximum likelihood estimates of the coefficients for the covariates as well as the community assignments. It is shown that both the coefficient estimates of the covariates and the community assignments are consistent under suitable sparsity conditions. Spectral clustering with adjustment (SCWA) is introduced to efficiently solve PCABM. Under certain conditions, we derive the error bound of community estimation under SCWA and show that it is community detection consistent. PCABM compares favorably with the SBM or degree-corrected stochastic block model (DCBM) under a wide range of simulated and real networks when covariate information is accessible.


          The Closed Extensions of a Closed Operator. (arXiv:1807.03471v1 [math.FA])      Cache   Translate Page   Web Page Cache   

Authors: Christoph Fischbacher

Given a densely defined and closed operator $A$ acting on a complex Hilbert space $\mathcal{H}$, we establish a one-to-one correspondence between its closed extensions and subspaces $\mathfrak{M}\subset\mathcal{D}(A^*)$, that are closed with respect to the graph norm of $A^*$ and satisfy certain conditions. In particular, this will allow us to characterize all densely defined and closed restrictions of $A^*$. After this, we will express our results using the language of Gel'fand triples generalizing the well-known results for the selfadjoint case.

As applications we construct: (i) a sequence of densely defined operators that converge in the generalized sense to a non-densely defined operator, (ii) a non-closable extension of a symmetric operator and (iii) selfadjoint extensions of Laplacians with a generalized boundary condition.


          On Controller Design for Systems on Manifolds in Euclidean Space. (arXiv:1807.03475v1 [math.OC])      Cache   Translate Page   Web Page Cache   

Authors: Dong Eui Chang

A new method is developed to design controllers in Euclidean space for systems defined on manifolds. The idea is to embed the state-space manifold $M$ of a given control system into some Euclidean space $\mathbb R^n$, extend the system from $M$ to the ambient space $\mathbb R^n$, and modify it outside $M$ to add transversal stability to $M$ in the final dynamics in $\mathbb R^n$. Controllers are designed for the final system in the ambient space $\mathbb R^n$. Then, their restriction to $M$ produces controllers for the original system on $M$. This method has the merit that only one single global Cartesian coordinate system in the ambient space $\mathbb R^n$ is used for controller synthesis, and any controller design method in $\mathbb R^n$, such as the linearization method, can be globally applied for the controller synthesis. The proposed method is successfully applied to the tracking problem for the following two benchmark systems: the fully actuated rigid body system and the quadcopter drone system.


          Shape analysis of framed space curves. (arXiv:1807.03477v1 [math.DG])      Cache   Translate Page   Web Page Cache   

Authors: Tom Needham

In the elastic shape analysis approach to shape matching and object classification, plane curves are represented as points in an infinite-dimensional Riemannian manifold, wherein shape dissimilarity is measured by geodesic distance. A remarkable result of Younes, Michor, Shah and Mumford says that the space of closed planar shapes, endowed with a natural metric, is isometric to an infinite-dimensional Grassmann manifold via the so-called square root transform. This result facilitates efficient shape comparison by virtue of explicit descriptions of Grassmannian geodesics. In this paper, we extend this shape analysis framework to treat shapes of framed space curves. By considering framed curves, we are able to generalize the square root transform by using quaternionic arithmetic and properties of the Hopf fibration. Under our coordinate transformation, the space of closed framed curves corresponds to an infinite-dimensional complex Grassmannian. This allows us to describe geodesics in framed curve space explicitly. We are also able to produce explicit geodesics between closed, unframed space curves by studying the action of the loop group of the circle on the Grassmann manifold. Averages of collections of plane and space curves are computed via a novel algorithm utilizing flag means.


          Generalized uncertain theory: concepts and fundamental principles. (arXiv:1807.03482v1 [math.OC])      Cache   Translate Page   Web Page Cache   

Authors: Xingguang Chen

Although there are many mathematical theories to address uncertain phenomena however, these theories are presented under implicit presupposition that uncertainty of objects is accurately measurable while not considering that the measure of uncertainty itself may be inaccurate. Considering this evident but critical overlook, on the basis of reviewing and commenting several widely used mathematical theories of uncertainty, the fundamental concepts and axiomatic system of generalized uncertain theory (GUT)are proposed for the purpose of describing and analyzing that imprecision of objects has inaccurate attributes. We show that current main stream theories of studying uncertain phenomena, such as probability theory, fuzzy mathematics, etc., are the special cases of generalized uncertain theory. So the generalized uncertain theory could cover previous main stream theories of studying uncertainty. Further research directions and possible application realms are discussed. It may be a beneficial endeavor for enriching and developing current uncertainty mathematical theories.


          On entropy stable temporal fluxes. (arXiv:1807.03483v1 [math.NA])      Cache   Translate Page   Web Page Cache   

Authors: Ayoub Gouasmi, Karthik Duraisamy, Scott Murman

Entropy-stable (ES) schemes have gained considerable attention over the last decade, especially in the context of turbulent flow simulations using high-order methods. While promising because of their nonlinear stability properties, ES schemes have to address a number of issues to become practical. One of them is how much entropy should be produced by the scheme at a certain level of under-resolution. This problem has been so far been studied by considering different ES interfaces fluxes in the spatial discretization only because they can be tuned to generate a certain amount of entropy. In this note, we point out that, in the context of space-time discretizations, the same applies to ES interface fluxes in the temporal direction.


          Unique solvability and stability analysis for incompressible smoothed particle hydrodynamics method. (arXiv:1807.03496v1 [math.NA])      Cache   Translate Page   Web Page Cache   

Authors: Y. Imoto

The incompressible smoothed particle hydrodynamics method (ISPH) is a numerical method widely used for accurately and efficiently solving flow problems with free surface effects. However, to date there has been little mathematical investigation of properties such as stability or convergence for this method. In this paper, unique solvability and stability are mathematically analyzed for implicit and semi-implicit schemes in the ISPH method. Three key conditions for unique solvability and stability are introduced: a connectivity condition with respect to particle distribution and smoothing length, a regularity condition for particle distribution, and a time step condition. The unique solvability of both the implicit and semi-implicit schemes in two- and three-dimensional spaces is established with the connectivity condition. The stability of the implicit scheme in two-dimensional space is established with the connectivity and regularity conditions. Moreover, with the addition of the time step condition, the stability of the semi-implicit scheme in two-dimensional space is established. As an application of these results, modified schemes are developed by redefining discrete parameters to automatically satisfy parts of these conditions.


          Finsler Hardy-Kato's inequality. (arXiv:1807.03497v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Angelo Alvino, Adele Ferone, Anna Mercaldo, Futoshi Takahashi, Roberta Volpicelli

We prove an improved version of the trace-Hardy inequality, so-called Kato's inequality, on the half-space in Finsler context. The resulting inequality extends the former one obtained by \cite{AFV} in Euclidean context. Also we discuss the validity of the same type of inequalities on open cones.


          Recurrence and winding number for a revolving random walk. (arXiv:1807.03498v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Gianluca Bosi, Yiping Hu, Yuval Peres

We consider simple random walks on two partially directed square lattices. One common feature of these walks is that they are bound to revolve clockwise; however they exhibit different recurrence/transience behaviors. Our main result is indeed a proof of recurrence for one of the graphs, solving a conjecture of Menshikov et al. ('17). For the other one, we analyze the asymptotics of the return probabilities, providing a new proof of its transience. Furthermore, we study the limiting laws of the winding number around the origin for these walks.


          On the Beloshapka's rigidity conjecture for real submanifolds in complex space. (arXiv:1807.03502v1 [math.CV])      Cache   Translate Page   Web Page Cache   

Authors: Jan Gregorovic

A well known Conjecture due to Beloshapka asserts that all totally nondegenerate polynomial models with the length $l\geq 3$ of their Levi-Tanaka algebra are {\em rigid}, that is, any point preserving automorphism of them is completely determined by the restriction of its differential at the fixed point onto the complex tangent space. For the length $l=3$, Beloshapka's Conjecture was proved by Gammel and Kossovskiy in 2006. In this paper, we prove the Conjecture for arbitrary length $l\geq 3$.

As another application of our method, we construct polynomial models of length $l\geq 3$, which are not totally nondegenerate and admit large groups of point preserving nonlinear automorphisms.


          La cuadratura gaussiana seg\'un Gauss. (arXiv:1807.03506v1 [math.HO])      Cache   Translate Page   Web Page Cache   

Authors: J. M. Sanz-Serna

This article is an abridged and commented translation into Spanish of the 1815 memoir where Gauss introduced the quadrature rules now associated with his name. Gauss' work does not resemble at all the stardard text-book treatment of Gaussian quadrature. The original memoir is an example of mathematical virtuosity, based on a superb use of series, where the problem is reformulated as a problem in functional approximation that is solved by means of continued fractions.


          Farthest points on flat surfaces. (arXiv:1807.03507v1 [math.MG])      Cache   Translate Page   Web Page Cache   

Authors: Joël Rouyer, Costin Vîlcu

We consider the distance function from an arbitrary point $x$ on a flat surface, and determine the set $F_{x}$ of all \emph{farthest points} (i.e., points at maximal distance) from $x$.


          RC-positive metrics on rationally connected manifolds. (arXiv:1807.03510v1 [math.AG])      Cache   Translate Page   Web Page Cache   

Authors: Xiaokui Yang

In this paper, we prove that if a compact K\"ahler manifold $X$ has a smooth Hermitian metric (resp. a complex Finsler metric) $\mathfrak F$ such that $(T_X,\mathfrak F)$ is uniformly RC-positive, then $X$ is projective and rationally connected. Conversely, we show that, if a projective manifold $X$ is rationally connected, then the tautological line bundle $\mathscr{O}_{T_X^*}(-1)$ is uniformly RC-positive (which is equivalent to the existence of some RC-positive complex Finlser metric on $X$). As an application, we prove that if $(X,\omega)$ is a compact K\"ahler manifold with certain quasi-positive holomorphic sectional curvature, then $X$ is projective and rationally connected.


          Parallel Gaussian Channels Corrupted by Independent States With a State-Cognitive Helper. (arXiv:1807.03518v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Michael Dikshtein, Ruchen Duan, Yingbin Liang, Shlomo Shamai (Shitz)

We consider a state-dependent parallel Gaussian channel with independent states and a common cognitive helper, in which two transmitters wish to send independent information to their corresponding receivers over two parallel subchannels. Each channel is corrupted by independent additive Gaussian state. The states are not known to the transmitters nor to the receivers, but known to a helper in a noncausal manner. The helper's goal is to assist a reliable communication by mitigating the state. Outer and inner bounds are derived and segments of the capacity region is characterized for various channel parameters.


          A comparison between pro-$p$-Iwahori Hecke modules and mod $p$ representations. (arXiv:1807.03519v1 [math.RT])      Cache   Translate Page   Web Page Cache   

Authors: Noriyuki Abe

We give an equivalence of categories between certain subcategories of modules of pro-$p$-Iwahori Hecke algebras and modulo $p$ representations.


          On the minimum weights of binary linear complementary dual codes. (arXiv:1807.03525v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Makoto Araya, Masaaki Harada

Linear complementary dual codes (or codes with complementary duals) are codes whose intersections with their dual codes are trivial. We study the largest minimum weight $d(n,k)$ among all binary linear complementary dual $[n,k]$ codes. We determine $d(n,4)$ for $n \equiv 2,3,4,5,6,9,10,13 \pmod{15}$, and $d(n,5)$ for $n \equiv 3,4,5,7,11,19,20,22,26 \pmod{31}$. Combined with known results, the values $d(n,k)$ are also determined for $n \le 24$.


          Algebraic Equivalence of Linear Structural Equation Models. (arXiv:1807.03527v1 [math.ST])      Cache   Translate Page   Web Page Cache   

Authors: Thijs van Ommen, Joris M. Mooij

Despite their popularity, many questions about the algebraic constraints imposed by linear structural equation models remain open problems. For causal discovery, two of these problems are especially important: the enumeration of the constraints imposed by a model, and deciding whether two graphs define the same statistical model. We show how the half-trek criterion can be used to make progress in both of these problems. We apply our theoretical results to a small-scale model selection problem, and find that taking the additional algebraic constraints into account may lead to significant improvements in model selection accuracy.


          Globally realizable components of local deformation rings. (arXiv:1807.03529v1 [math.NT])      Cache   Translate Page   Web Page Cache   

Authors: Frank Calegari, Matthew Emerton, Toby Gee

Let n be either 2, or an odd integer greater than 1, and fix a prime p > 2(n + 1). Under standard "adequate image" assumptions, we show that the set of components of n-dimensional p-adic potentially semistable local Galois deformation rings that are seen by potentially automorphic compatible systems of polarizable Galois representations over some CM field is independent of the particular global situation. We also (under the same assumption on n) improve on the main potential automorphy result of [BLGGT14b], replacing "potentially diagonalizable" by "potentially globally realizable".


          An elliptic Harnack inequality for random walk in balanced environments. (arXiv:1807.03531v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Noam Berger, Moran Cohen, Jean-Dominique Deuschel, Xiaoqin Guo

We prove a Harnack inequality for the solutions of a difference equation with non-elliptic balanced i.i.d. coefficients. Along the way we prove a (weak) quantitative homogenisation result, which we believe is of some interest too.


          Remarks on the Sibony functions and pseudometrics. (arXiv:1807.03532v1 [math.CV])      Cache   Translate Page   Web Page Cache   

Authors: Marek Jarnicki, Peter Pflug

We discuss some basic properties of the Sibony functions and pseudometrics.


          On the second-order tangent bundle with deformed 2-nd lift metric. (arXiv:1807.03533v1 [math.DG])      Cache   Translate Page   Web Page Cache   

Authors: Abdullah Magden, Kubra Karaca, Aydin Gezer

Let (M,g) be a pseudo-Riemannian manifold and $T^2M$ be its the second-order tangent bundle equipped with the deformed 2-nd lift metric g which obtained from the 2-nd lift metric by deforming the horizontal part with a symmetric (0,2)-tensor field c. In the present paper, we first compute the Levi-Civita connection and its Riemannian curvature tensor field of $(T^2M,g)$. We give necessary and sufficient conditions for $(T^2M,g)$ to be semi-symmetric. Secondly, we show that $(T^2M,g)$ is a plural-holomorphic B-manifold with the natural integrable nilpotent structure. Finally, we get the conditions under which $(T^2M,g)$ with the 2-nd lift of an almost complex structure is an anti-K\"ahler manifold


          A finite element method for the Monge--Amp\`ere equation with transport boundary conditions. (arXiv:1807.03535v1 [math.NA])      Cache   Translate Page   Web Page Cache   

Authors: Ellya Kawecki, Omar Lakkis, Tristan Pryer

We address the numerical solution via Galerkin type methods of the Monge--Amp\`ere equation with transport boundary conditions arising in optimal mass transport, geometric optics and computational mesh or grid movement techniques. This fully nonlinear elliptic problem admits a linearisation via a Newton--Raphson iteration, which leads to an oblique derivative boundary value problem for elliptic equations in nondivergence form. We discretise these by employing the nonvariational finite element method, which lead to empirically observed optimal convergence rates, provided recovery techinques are used to approximate the gradient and the Hessian of the unknown functions. We provide extensive numerical testing to illustrate the strengths of our approach and the potential applications in optics and mesh movement.


          Borel-de Siebenthal theory for affine reflection systems. (arXiv:1807.03536v1 [math.RA])      Cache   Translate Page   Web Page Cache   

Authors: Deniz Kus, R. Venkatesh

We develop a Borel-de Siebenthal theory for affine reflection systems by classifying their maximal closed subroot systems. Affine reflection systems (introduced by Loos and Neher) provide a unifying framework for root systems of finite-dimensional semi-simple Lie algebras, affine and toroidal Lie algebras, and extended affine Lie algebras. In the special case of nullity $k$ toroidal Lie algebras, we obtain a one-to-one correspondence between maximal closed subroot systems with full gradient and triples $(q,(b_i),H)$, where $q$ is a prime number, $(b_i)$ is a $n$-tuple of integers in the interval $[0,q-1]$ and $H$ is a $(k\times k)$ Hermite normal form matrix with determinant $q$. This generalizes the $k=1$ result of Dyer and Lehrer in the setting of affine Lie algebras.


          Multiuser One-Bit Massive MIMO Precoding Under MPSK Signaling. (arXiv:1807.03548v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Mingjie Shao, Qiang Li, Yatao Liu, Wing-Kin Ma

Most recently, there has been a flurry of research activities on studying how massive MIMO precoding should be designed when the digital-to-analog conversion at the transmitter side is operated by cheap one-bit digital-to-analog converters (DACs). Such research is motivated by the desire to substantially cut down the hardware cost and power consumption of the radio-frequency chain, which is unaffordable in massive MIMO if high-resolution DACs are still used. One-bit MIMO precoding design problems are much harder to solve than their high-resolution DAC counterparts. In our previous work, we developed a minimum symbol-error probability (SEP) design for one-bit precoding under the multiuser MISO downlink scenario and under quadrature amplitude modulation signaling. Leveraging on the previous work, this work shows how the minimum SEP design is applied to M-ary phase shift keying (MPSK) signaling. Simulation results show that our minimum SEP design delivers significantly better bit-error rate (BER) performance than the other designs for higher-order PSK such as 8-PSK and 16-PSK. As a minor, but useful, side contribution, we also tackle an MPSK SEP characterization problem which was only intuitively treated in the prior arts.


          On the structure of simple bounded weight modules of $\mathfrak{sl}(\infty)$, $\mathfrak{o}(\infty)$, $\mathfrak{sp}(\infty)$. (arXiv:1807.03549v1 [math.RT])      Cache   Translate Page   Web Page Cache   

Authors: Lucas Calixto

We study the structure of bounded simple weight $\mathfrak{sl}(\infty)$-, $\mathfrak{o}(\infty)$-, $\mathfrak{sp}(\infty)$-modules, which have been recently classified in [GP18]. Given a splitting parabolic subalgebra $\mathfrak{p}$ of $\mathfrak{sl}(\infty)$, $\mathfrak{o}(\infty)$, $\mathfrak{sp}(\infty)$, we introduce the concepts of $\mathfrak{p}$-aligned and pseudo $\mathfrak{p}$-aligned $\mathfrak{sl}(\infty)$-, $\mathfrak{o}(\infty)$-, $\mathfrak{sp}(\infty)$-modules, and give necessary and sufficient conditions for bounded simple weight modules to be $\mathfrak{p}$-aligned or pseudo $\mathfrak{p}$-aligned. The existence of pseudo $\mathfrak{p}$-aligned modules is a consequence of the fact that the Lie algebras considered have infinite rank.


          Conjugacy classes, characters and products of elements. (arXiv:1807.03550v1 [math.GR])      Cache   Translate Page   Web Page Cache   

Authors: Robert M. Guralnick, Alexander Moretó

Recently, Baumslag and Wiegold proved that a finite group $G$ is nilpotent if and only if $o(xy)=o(x)o(y)$ for every $x,y\in G$ of coprime order. Motivated by this result, we study the groups with the property that $(xy)^G=x^Gy^G$ and those with the property that $\chi(xy)=\chi(x)\chi(y)$ for every complex irreducible character $\chi$ of $G$ and every nontrivial $x, y \in G$ of pairwise coprime order. We also consider several ways of weakening the hypothesis on $x$ and $y$. While the result of Baumslag and Wiegold is completely elementary, some of our arguments here depend on (parts of) the classification of finite simple groups.


          Algebraic and qualitative remarks about the family $yy'= (\alpha x^{m+k-1} + \beta x^{m-k-1})y + \gamma x^{2m-2k-1}$. (arXiv:1807.03551v1 [math.DS])      Cache   Translate Page   Web Page Cache   

Authors: B Primitivo, Acosta-Humánez, Alberto Reyes-Linero, Jorge Rodríguez-Contreras

The aim of this paper is the analysis, from algebraic and qualitative point of view, of the 5-parametric family of differential equations \begin{equation*}\label{folpz} yy'=(\alpha x^{m+k-1}+\beta x^{m-k-1})y+\gamma x^{2m-2k-1}, \quad y'=\frac{dy}{dx} \end{equation*} where $a,b,c\in \mathbb{C}$, $m,k\in \mathbb{Z}$ and $$\alpha=a(2m+k) \quad \beta=b(2m-k), \quad \gamma=-(a^2mx^{4k}+cx^{2k}+b^2m).$$ This family is very important because include Van Der Pol equation. Moreover, this family seems to appear as exercise in the celebrated book of Polyanin and Zaitsev. Unfortunately, the exercise presented a typo which does not allow to solve correctly it. We present the corrected exercise, which corresponds to the title of this paper. We solve the exercise and afterwards we make algebraic and qualitative studies to this family of differential equations.


          An adaptive IGA-BEM with hierarchical B-splines based on quasi-interpolation quadrature schemes. (arXiv:1807.03563v1 [math.NA])      Cache   Translate Page   Web Page Cache   

Authors: Antonella Falini, Carlotta Giannelli, Tadej Kanduc, Maria Lucia Sampoli, Alessandra Sestini

The isogeometric formulation of Boundary Element Method (BEM) is investigated within the adaptivity framework. Suitable weighted quadrature rules to evaluate integrals appearing in the Galerkin BEM formulation of 2D Laplace model problems are introduced. The new quadrature schemes are based on a spline quasi-interpolant (QI) operator and properly framed in the hierarchical setting. The local nature of the QI perfectly fits with hierarchical spline constructions and leads to an efficient and accurate numerical scheme. An automatic adaptive refinement strategy is driven by a residual based error estimator. Numerical examples show that the optimal convergence rate of the BEM solution is recovered by the proposed adaptive method.


          Around a singular solution of a nonlocal nonlinear heat equation. (arXiv:1807.03567v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Piotr Biler, Dominika Pilarczyk

We study the existence of global-in-time solutions for a nonlinear heat equation with nonlocal diffusion, power nonlinearity and suitably small data (either compared pointwisely to the singular solution or in the norm of a critical Morrey space). Then, asymptotics of subcritical solutions is determined. These results are compared with conditions on the initial data leading to a finite time blowup.


          On the ergodicity of certain Markov chains in random environments. (arXiv:1807.03568v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Balazs Gerencser, Miklos Rasonyi

We study the ergodic behaviour of a discrete-time process $X$ which is a Markov chain in a stationary random environment. The laws of $X_t$ are shown to converge to a limiting law in (weighted) total variation distance as $t\to\infty$. Convergence speed is estimated and an ergodic theorem is established for functionals of $X$.

Our hypotheses on $X$ combine the standard "small set" and "drift" conditions for geometrically ergodic Markov chains with conditions on the growth rate of a certain "maximal process" of the random environment. We are able to cover a wide range of models that have heretofore been untractable. In particular, our results are pertinent to difference equations modulated by a stationary Gaussian process. Such equations arise in applications, for example, in discretized stochastic volatility models of mathematical finance.


          Blowup of solutions for nonlinear nonlocal heat equations. (arXiv:1807.03569v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Piotr Biler

Blowup analysis for solutions of a general evolution equation with nonlocal diffusion and localized source is performed. By comparison with recent results on global-in-time solutions, a dichotomy result is obtained.


          Power Network Dynamics on Graphons. (arXiv:1807.03573v1 [math.DS])      Cache   Translate Page   Web Page Cache   

Authors: Christian Kuehn, Sebastian Throm

Power grids are undergoing major changes from a few large producers to smart grids build upon renewable energies. Mathematical models for power grid dynamics have to be adapted to capture, when dynamic nodes can achieve synchronization to a common grid frequency on complex network topologies. In this paper we study a second-order rotator model in the large network limit. We merge the recent theory of random graph limits for complex small-world networks with approaches to first-order systems on graphons. We prove that there exists a well-posed continuum limit integral equation approximating the large finite-dimensional case power grid network dynamics. Then we analyse the linear stability of synchronized solutions and prove linear stability. However, on small-world networks we demonstrate that there are topological parameters moving the spectrum arbitrarily close to the imaginary axis leading to potential instability on finite time scales.


          Strong renewal theorems and local large deviations for multivariate random walks and renewals. (arXiv:1807.03575v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Quentin Berger

We study a random walk $\mathbf{S}_n$ on $\mathbb{Z}^d$ ($d\geq 1$), in the domain of attraction of an operator-stable distribution with index $\boldsymbol{\alpha}=(\alpha_1,\ldots,\alpha_d) \in (0,2]^d$: in particular, we allow the scalings to be different along the different coordinates. We prove a strong renewal theorem, $i.e.$ a sharp asymptotic of the Green function $G(\mathbf{0},\mathbf{x})$ as $\|\mathbf{x}\|\to +\infty$, along the "favorite direction or scaling": (i) if $\sum_{i=1}^d \alpha_i^{-1} < 2$ (reminiscent of Garcia-Lamperti's condition when $d=1$ [Comm. Math. Helv. $\mathbf{37}$, 1963]); (ii) if a certain $local$ condition holds (reminiscent of Doney's condition [Probab. Theory Relat. Fields $\mathbf{107}$, 1997] when $d=1$). We also provide uniform bounds on the Green function $G(\mathbf{0},\mathbf{x})$, sharpening estimates when $\mathbf{x}$ is away from this favorite direction or scaling. These results improve significantly the existing literature, which was mostly concerned with the case $\alpha_i\equiv \alpha$, in the favorite scaling, and has even left aside the case $\alpha\in[1,2)$ with non-zero mean. Most of our estimates rely on new general (multivariate) local large deviations results, that were missing in the literature and that are of interest on their own.


          Type B Gaussian Statistics as Noncommutative Central Limits. (arXiv:1807.03580v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Natasha Blitvić, Wiktor Ejsmont

We show that the noncommutative central limit theorem of Speicher can be adapted to produce the Gaussian statistics associated to Coxeter groups of type B, in the sense of Bo\.zejko, Ejsmont, and Hasebe. Specifically, we show how type B Gaussian statistics naturally arise in systems of 'mixed spins', providing a new application of Speicher's argument and paving the way for the transfer of known results from the bosonic/fermionic settings to such broader contexts.


          On quantum computation of Kloosterman sums. (arXiv:1807.03600v1 [quant-ph])      Cache   Translate Page   Web Page Cache   

Authors: Peter Bruin

We give two quantum algorithms for computing Kloosterman sums attached to a finite field $\mathbf{F}$ of $q$ elements. The first algorithm computes a quantum state containing, as its coefficients with respect to the standard basis, all Kloosterman sums for $\mathbf{F}$, and runs in time polynomial in $\log q$; it also handles Kloosterman sums twisted by a given multiplicative character of $\mathbf{F}$. The second algorithm computes a single Kloosterman sum to a prescribed precision, and runs in time quasi-linear in $\sqrt{q}$.


          Successive Cancellation List Decoding of BMERA Codes with Application to Higher-Order Modulation. (arXiv:1807.03601v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Tobias Prinz, Peihong Yuan

BMERA or convolutional polar codes are an extension of polar codes with a provably better error exponent than polar codes. A successive cancellation (SC) decoding algorithm for BMERA codes similar to SC polar decoders is introduced. A pseudocode description of the SC decoder that can be extended to SC list (SCL) decoding is provided. Simulation results with and without outer CRC codes under SC and SCL decoding are presented for QAM modulation over the AWGN channel to compare the performance of polar and BMERA codes. BMERA codes outperform polar codes by more than 0.5 dB under SCL decoding without outer CRC codes.


          Uniqueness of Billiard Coding in Polygons. (arXiv:1807.03606v1 [math.DS])      Cache   Translate Page   Web Page Cache   

Authors: Yunzhe Li

We consider polygonal billiards and we generalise a theorem on the uniqueness of coding of non periodic billiard trajectories to a wider class of polygons, which consists of non simply connected polygons with holes having non zero minimal diameter.


          A mod p variant of the Andr\'e-Oort conjecture. (arXiv:1807.03607v1 [math.NT])      Cache   Translate Page   Web Page Cache   

Authors: Bas Edixhoven, Rodolphe Richard

We state and prove a variant of the Andr\'e-Oort conjecture for the product of 2 modular curves in positive characteristic, assuming GRH for quadratic fields.


          Non-Convex Multi-species Hopfield models. (arXiv:1807.03609v1 [cond-mat.dis-nn])      Cache   Translate Page   Web Page Cache   

Authors: Elena Agliari, Danila Migliozzi, Daniele Tantari

In this work we introduce a multi-species generalization of the Hopfield model for associative memory, where neurons are divided into groups and both inter-groups and intra-groups pair-wise interactions are considered, with different intensities. Thus, this system contains two of the main ingredients of modern Deep neural network architectures: Hebbian interactions to store patterns of information and multiple layers coding different levels of correlations. The model is completely solvable in the low-load regime with a suitable generalization of the Hamilton-Jacobi technique, despite the Hamiltonian can be a non-definite quadratic form of the magnetizations. The family of multi-species Hopfield model includes, as special cases, the 3-layers Restricted Boltzmann Machine (RBM) with Gaussian hidden layer and the Bidirectional Associative Memory (BAM) model.


          Conic support measures. (arXiv:1807.03614v1 [math.MG])      Cache   Translate Page   Web Page Cache   

Authors: Rolf Schneider

The conic support measures localize the conic intrinsic volumes of closed convex cones in the same way as the support measures of convex bodies localize the intrinsic volumes of convex bodies. In this note, we extend the `Master Steiner formula' of McCoy and Tropp, which involves conic intrinsic volumes, to conic support measures. Then we prove H\"{o}lder continuity of the conic support measures with respect to the angular Hausdorff metric on convex cones and a metric on conic support measures which metrizes the weak convergence.


          Interferometry-based modal analysis with finite aperture effects. (arXiv:1807.03622v1 [physics.ins-det])      Cache   Translate Page   Web Page Cache   

Authors: Davood Mardani, Ayman F. Abouraddy, George K. Atia

We analyze the effects of aperture finiteness on interferograms recorded to unveil the modal content of optical beams in arbitrary basis using generalized interferometry. We develop a scheme for modal reconstruction from interferometric measurements that accounts for the ensuing clipping effects. Clipping-cognizant reconstruction is shown to yield significant performance gains over traditional schemes that overlook such effects that do arise in practice. Our work can inspire further research on reconstruction schemes and algorithms that account for practical hardware limitations in a variety of contexts.


          A square root of Hurwitz numbers. (arXiv:1807.03631v1 [math.AG])      Cache   Translate Page   Web Page Cache   

Authors: Junho Lee

We show that a generating function of spin Hurwitz numbers analogous to (disconnected) double Hurwitz numbers is a tau function of the two-component BKP (2-BKP) hierarchy such that it is a square root of a tau function of the two-component KP (2-KP) hierarchy defined by related Hurwitz numbers.


          On homogenization of the first initial-boundary value problem for periodic hyperbolic systems. (arXiv:1807.03634v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Yulia Meshkova

Let $\mathcal{O}\subset\mathbb{R}^d$ a bounded domain of class $C^{1,1}$. In $L_2(\mathcal{O};\mathbb{C}^n)$, we consider a self-adjoint matrix strongly elliptic second order differential operator $B_{D,\varepsilon}$, $0<\varepsilon \leqslant 1$, with the Dirichlet boundary condition. The coefficients of the operator $B_{D,\varepsilon}$ are periodic and depend on $\mathbf{x}/\varepsilon$. We are interested in the behavior of the operators $\cos(tB_{D,\varepsilon}^{1/2})$ and $B_{D,\varepsilon} ^{-1/2}\sin (t B_{D,\varepsilon} ^{1/2})$, $t\in\mathbb{R}$, in the small period limit. For these operators, approximations in the norm of operators acting from some subspace $\mathcal{H}$ of the Sobolev space $H^4(\mathcal{O};\mathbb{C}^n)$ to $L_2(\mathcal{O};\mathbb{C}^n)$ are found. Moreover, for $B_{D,\varepsilon} ^{-1/2}\sin (t B_{D,\varepsilon} ^{1/2})$, the approximation with the corrector in the norm of operators acting from $\mathcal{H}\subset H^4(\mathcal{O};\mathbb{C}^n)$ to $H^1(\mathcal{O};\mathbb{C}^n)$ is obtained. The results are applied to homogenization for the solution of the first initial-boundary value problem for the hyperbolic equation $\partial ^2_t \mathbf{u}_\varepsilon =-B_{D,\varepsilon} \mathbf{u}_\varepsilon $.


          Stochastic evolution of genealogies of spatial populations: state description, characterization of dynamics and properties. (arXiv:1807.03637v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Andrej Depperschmidt, Andreas Greven

We survey results on the description of stochastically evolving genealogies of populations and marked genealogies of multitype populations or spatial populations via tree-valued Markov processes on (marked) ultrametric measure spaces. In particular we explain the choice of state spaces and their topologies, describe the dynamics of genealogical Fleming-Viot and branching models by well-posed martingale problems, and formulate the typical results on the longtime behaviour. Furthermore we discuss the basic techniques of proofs and sketch as two key tools of analysis the different forms of duality and the Girsanov transformation.


          Representations and derivations of Hom-Lie conformal superalgebras. (arXiv:1807.03638v1 [math.RA])      Cache   Translate Page   Web Page Cache   

Authors: Shuangjian Guo, Lihong Dong, Shengxiang Wang

In this paper, we introduce a representation theory of Hom-Lie conformal superalgebras and discuss the cases of adjoint representations. Furthermore, we develop cohomology theory of Hom-Lie conformal superalgebras and discuss some applications to the study of deformations of regular Hom-Lie conformal superalgebras. Finally, we introduce derivations of multiplicative Hom-Lie conformal superalgebras and study their properties.


          Double-Layer Potentials for a Generalized Bi-Axially Symmetric Helmholtz Equation II. (arXiv:1807.03639v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Abdumauvlen Berdyshev, Anvar Hasanov, Tuhtasin Ergashev

The double-layer potential plays an important role in solving boundary value problems for elliptic equations. All the fundamental solutions of the generalized bi-axially symmetric Helmholtz equation were known, and only for the first one was constructed the theory of potential. Here, in this paper, we aim at constructing theory of double-layer potentials corresponding to the next fundamental solution. By using some properties of one of Appell's hypergeometric functions in two variables, we prove limiting theorems and derive integral equations concerning a denseness of double-layer potentials.


          Representation of Hamilton-Jacobi equation in optimal control theory with unbounded control set. (arXiv:1807.03640v1 [math.OC])      Cache   Translate Page   Web Page Cache   

Authors: Arkadiusz Misztela

In this paper we study the existence of sufficiently regular representations of Hamilton-Jacobi equations in the optimal control theory with unbounded control set. We use a new method to construct representations for a wide class of Hamiltonians. This class is wider than any constructed before, because we do not require Legendre-Fenchel conjugates of Hamiltonians to be bounded. However, in this case we obtain representations with unbounded control set. We apply the obtained results to study regularities of value functions and the invariance property for tubes.


          Study of Switched Max-Link Buffer-Aided Relay Selection for Cooperative MIMO Systems. (arXiv:1807.03642v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: F. L. Duarte, R. C. de Lamare

In this paper, we investigate relay selection for cooperative multiple-antenna systems that are equipped with buffers, which increase the reliability of wireless links. In particular, we present a novel relay selection technique based on switching and the Max-Link protocol that is named Switched Max-Link. We also introduce a novel relay selection criterion based on the maximum likelihood (ML) principle denoted maximum minimum distance that is incorporated into. Simulations are then employed to evaluate the performance of the proposed and existing techniques.


          A compactness result in $GSBV^p$ and applications to $\Gamma$-convergence for free discontinuity problems. (arXiv:1807.03647v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Manuel Friedrich

We present a compactness result in the space $GSBV^p$ which extends the classical statement due to Ambrosio to problems without a priori bounds on the deformations. As an application, we revisit the $\Gamma$-convergence results for free discontinuity functionals established recently by Cagnetti, Dal Maso, Scardia, and Zeppieri. We investigate sequences of boundary value problems and show convergence of minimum values and minimizers.


          On the timescale at which statistical stability breaks down. (arXiv:1807.03652v1 [math.DS])      Cache   Translate Page   Web Page Cache   

Authors: Neil Dobbs, Alexey Korepanov

In dynamical systems, understanding statistical properties shared by most orbits and how these properties depend on the system are basic and important questions. Statistical properties may persist as one perturbs the system (\emph{statistical stability} is said to hold), or may vary wildly. The latter case is our subject of interest, and we ask at what timescale does statistical stability break down. This is the time needed to observe, with a certain probability, a substantial difference in the statistical properties as described by (large but finite time) Birkhoff averages.

The quadratic (or logistic) family is a natural and fundamental example where statistical stability does not hold. We study this family. When the base parameter is of Misiurewicz type, we show, sharply, that if the parameter changes by $t$, it is necessary and sufficient to observe the system for a time at least of the order of $|t|^{-1}$ to see the lack of statistical stability.


          Domain-wall boundaries through non-diagonal twists in the six-vertex model. (arXiv:1807.03659v1 [math-ph])      Cache   Translate Page   Web Page Cache   

Authors: W. Galleas

In this work we elaborate on a previous result relating the partition function of the six-vertex model with domain-wall boundary conditions to eigenvalues of a transfer matrix. More precisely, we express the aforementioned partition function as a determinant of a matrix with entries being eigenvalues of the anti-periodic six-vertex model's transfer matrix.


          Orbits of monomials and factorization into products of linear forms. (arXiv:1807.03663v1 [cs.CC])      Cache   Translate Page   Web Page Cache   

Authors: Pascal Koiran (LIP), Nicolas Ressayre (ICJ)

This paper is devoted to the factorization of multivariate polynomials into products of linear forms, a problem which has applications to differential algebra, to the resolution of systems of polynomial equations and to Waring decomposition (i.e., decomposition in sums of d-th powers of linear forms; this problem is also known as symmetric tensor decomposition). We provide three black box algorithms for this problem. Our main contribution is an algorithm motivated by the application to Waring decomposition. This algorithm reduces the corresponding factorization problem to simultaenous matrix diagonalization, a standard task in linear algebra. The algorithm relies on ideas from invariant theory, and more specifically on Lie algebras. Our second algorithm reconstructs a factorization from several bi-variate projections. Our third algorithm reconstructs it from the determination of the zero set of the input polynomial, which is a union of hyperplanes.


          Demailly's notion of algebraic hyperbolicity: geometricity, boundedness, moduli of maps. (arXiv:1807.03665v1 [math.AG])      Cache   Translate Page   Web Page Cache   

Authors: Ariyan Javanpeykar, Ljudmila Kamenova

Demailly's conjecture, which is a consequence of the Green-Griffiths-Lang conjecture on varieties of general type, states that an algebraically hyperbolic complex projective variety is Kobayashi hyperbolic. Our aim is to provide evidence for Demailly's conjecture by verifying several predictions it makes. We first define what an algebraically hyperbolic projective variety is, extending Demailly's definition to (not necessarily smooth) projective varieties over an arbitrary algebraically closed field of characteristic zero, and we prove that this property is stable under extensions of algebraically closed fields. Furthermore, we show that the set of (not necessarily surjective) morphisms from a projective variety $Y$ to a projective algebraically hyperbolic variety $X$ that map a fixed closed subvariety of $Y$ onto a fixed closed subvariety of $X$ is finite. As an application, we obtain that Aut$(X)$ is finite and that every surjective endomorphism of $X$ is an automorphism. Finally, we explore "weaker" notions of hyperbolicity related to boundedness of moduli spaces of maps, and verify similar predictions made by the Green-Griffiths-Lang conjecture on hyperbolic projective varieties.


          Routh reduction for first-order field theories. (arXiv:1807.03668v1 [math-ph])      Cache   Translate Page   Web Page Cache   

Authors: S. Capriotti, E. García-Toraño Andrés

We present a reduction theory for first order Lagrangian field theories which takes into account the conservation of momenta. The relation between the solutions of the original problem with a prescribed value of the momentum and the solutions of the reduced problem is established. An illustrative example is discussed in detail.


          Remarks on the nonlocal Dirichlet problem. (arXiv:1807.03676v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Tomasz Grzywny, Moritz Kassmann, Łukasz Leżaj

We study translation-invariant integrodifferential operators that generate L\'{e}vy processes. First, we investigate different notions of what a solution to a nonlocal Dirichlet problem is and we provide the classical representation formula for distributional solutions. Second, we study the question under which assumptions distributional solutions are twice differentiable in the classical sense. Sufficient conditions and counterexamples are provided.


          On the Dehn functions of K\"ahler groups. (arXiv:1807.03677v1 [math.GT])      Cache   Translate Page   Web Page Cache   

Authors: Claudio Llosa Isenrich, Romain Tessera

We address the problem of which functions can arise as Dehn functions of K\"ahler groups. We explain why there are examples of K\"ahler groups with linear, quadratic, and exponential Dehn function. We then proceed to show that there is an example of a K\"ahler group which has Dehn function bounded below by a cubic function and above by $n^6$. As a consequence we obtain that for a compact K\"ahler manifold having non-positive holomorphic bisectional curvature does not imply having quadratic Dehn function.


          On the choice of weight functions for linear representations of persistence diagrams. (arXiv:1807.03678v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Divol Vincent, Polonik Wolfgang

Persistence diagrams are efficient descriptors of the topology of a point cloud. As they do not naturally belong to a Hilbert space, standard statistical methods cannot be directly applied to them. Instead, feature maps (or representations) are commonly used for the analysis. A large class of feature maps, which we call linear, depends on some weight functions, the choice of which is a critical issue. An important criterion to choose a weight function is to ensure stability of the feature maps with respect to Wasserstein distances on diagrams. We improve known results on the stability of such maps, and extend it to general weight functions. We also address the choice of the weight function by considering an asymptotic setting; assume that $\mathbb{X}_n$ is an i.i.d. sample from a density on $[0,1]^d$. For the \v{C}ech and Rips filtrations, we characterize the weight functions for which the corresponding feature maps converge as $n$ approaches infinity, and by doing so, we prove laws of large numbers for the total persistences of such diagrams. Both approaches lead to the same simple heuristic for tuning weight functions: if the data lies near a $d$-dimensional manifold, then a sensible choice of weight function is the persistence to the power $\alpha$ with $\alpha \geq d$.


          Steady free surface potential flow of an ideal fluid due to a singular sink on the flat bottom. (arXiv:1807.03679v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Anastasia A. Mestnikova, Victor N. Starovoitov

A two-dimensional steady problem of a potential free-surface flow of an ideal incompressible fluid caused by a singular sink is considered. The sink is placed at the horizontal bottom of the fluid layer. With the help of the Levi-Civita technique, the problem is rewritten as an operator equation in a Hilbert space. It is proven that there exists a unique solution of the problem provided that the Froude number is greater than some particular value. The free boundary corresponding to this solution is investigated. It has a cusp over the sink and decreases monotonically when going from infinity to the sink point. The free boundary is an analytic curve everywhere except at the cusp point. It is established that the inclination angle of the free boundary is less than $\pi/2$ everywhere except at the cusp point, where this angle is equal to $\pi/2$. The asymptotics of the free boundary near the cusp point is investigated.


          On the s-injectivity of the X-ray transform on manifolds with hyperbolic trapped set. (arXiv:1807.03680v1 [math.AP])      Cache   Translate Page   Web Page Cache   

Authors: Thibault Lefeuvre

For smooth compact connected manifolds with strictly convex boundary, no conjugate points and a hyperbolic trapped set, we prove an equivalence principle concerning the injectivity of the X-ray transform $I_m$ on symmetric solenoidal tensors and the surjectivity of on a operator ${\pi_m}_*$ on the set of solenoidal tensors. This allows us to establish the injectivity of the X-ray transform on solenoidal tensors of any order in the case of a surface satisfying these assumptions.


          Polynomial bounds for centered colorings on proper minor-closed graph classes. (arXiv:1807.03683v1 [cs.DM])      Cache   Translate Page   Web Page Cache   

Authors: Michał Pilipczuk, Sebastian Siebertz

For $p\in \mathbb{N}$, a coloring $\lambda$ of the vertices of a graph $G$ is {\em{$p$-centered}} if for every connected subgraph~$H$ of $G$, either $H$ receives more than $p$ colors under $\lambda$ or there is a color that appears exactly once in $H$. In this paper, we prove that every $K_t$-minor-free graph admits a $p$-centered coloring with $\mathcal{O}(p^{g(t)})$ colors for some function $g$. In the special case that the graph is embeddable in a fixed surface $\Sigma$ we show that it admits a $p$-centered coloring with $\mathcal{O}(p^{19})$ colors, with the degree of the polynomial independent of the genus of $\Sigma$. This provides the first polynomial upper bounds on the number of colors needed in $p$-centered colorings of graphs drawn from proper minor-closed classes, which answers an open problem posed by Dvo\v{r}{\'a}k.

As an algorithmic application, we use our main result to prove that if $\mathcal{C}$ is a fixed proper minor-closed class of graphs, then given graphs $H$ and $G$, on $p$ and $n$ vertices, respectively, where $G\in \mathcal{C}$, it can be decided whether $H$ is a subgraph of $G$ in time $2^{\mathcal{O}(p\log p)}\cdot n^{\mathcal{O}(1)}$ and space $n^{\mathcal{O}(1)}$.


          Lie symmetries methods in boundary crossing problems for diffusion processes. (arXiv:1807.03700v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Dmitry Muravey

This paper deals with boundary crossing problems for diffusion processes. Using PDE and Lie symmetry group methods we extend known identities for diffusion processes. We derive connections between boundary crossing identities and Lie symmetries. For time-homogeneous diffusion we present necessary and sufficient conditions of identities' existence. For the general case we prove that if Lie symmetry exists then boundary crossing identity also exists. Obtained identity is represented explicitly only in terms of symmetry' parameters.


          Decision making under uncertainty using imprecise probabilities. (arXiv:1807.03705v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Matthias C. M. Troffaes

Various ways for decision making with imprecise probabilities (admissibility, maximal expected utility, maximality, E-admissibility, $\Gamma$-maximax, $\Gamma$-maximin, all of which are well-known from the literature) are discussed and compared. We generalize a well-known sufficient condition for existence of optimal decisions. A simple numerical example shows how these criteria can work in practice, and demonstrates their differences. Finally, we suggest an efficient approach to calculate optimal decisions under these decision criteria.


          H\"older Conditions of Local Times and Exact Moduli of non-differentiability for Spherical Gaussian fields. (arXiv:1807.03706v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Xiaohong Lan, Yimin Xiao

This paper investigate the local times and modulus of nondifferentiability of the spherical Gaussian random fields. We extend the methods for studying the local times of Gaussian to the spherical setting. The new main ingredient is the property of strong local nondeterminism established recently in Lan et al (2018).


          Certified dimension reduction in nonlinear Bayesian inverse problems. (arXiv:1807.03712v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Olivier Zahm, Tiangang Cui, Kody Law, Alessio Spantini, Youssef Marzouk

We propose a dimension reduction technique for Bayesian inverse problems with nonlinear forward operators, non-Gaussian priors, and non-Gaussian observation noise. The likelihood function is approximated by a ridge function, i.e., a map which depends non-trivially only on a few linear combinations of the parameters. We build this ridge approximation by minimizing an upper bound on the Kullback--Leibler divergence between the posterior distribution and its approximation. This bound, obtained via logarithmic Sobolev inequalities, allows one to certify the error of the posterior approximation. Computing the bound requires computing the second moment matrix of the gradient of the log-likelihood function. In practice, a sample-based approximation of the upper bound is then required. We provide an analysis that enables control of the posterior approximation error due to this sampling. Numerical and theoretical comparisons with existing methods illustrate the benefits of the proposed methodology.


          Counting fixed points free vector fields on $\mathbb{B}^{2}$. (arXiv:1807.03714v1 [math.GT])      Cache   Translate Page   Web Page Cache   

Authors: Simeon T. Stefanov

The number of diagrams of stationary points free vector fields in the 2-disk $\mathbb{B}^{2}$ is counted in the article. It is shown that the number of such diagrams with $2k$ exceptional points on the boundary $\mathbb{S}^{1}$ equals $3^{k-2}(C_{k}+2C_{k-1})$, where $C_{k}$ is the corresponding Catalan number. An algorithm for finding all such diagrams is discussed.


          Unit distance graphs and algebraic integers. (arXiv:1807.03726v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Danylo Radchenko

We answer a question of Brass about vertex degrees in unit distance graphs of finitely generated additive subgroups of $\mathbb{R}^2$.


          Geometric realization of the almost-extreme Khovanov homology of semiadequate links. (arXiv:1807.03727v1 [math.GT])      Cache   Translate Page   Web Page Cache   

Authors: Józef H. Przytycki, Marithania Silvero

We introduce the notion of partial presimplicial set and construct its geometric realization. We show that any semiadequate diagram yields a partial presimplicial set leading to a geometric realization of the almost-extreme Khovanov homology of the diagram. We give a concrete formula for the homotopy type of this geometric realization, involving wedge of spheres and a suspension of the projective plane.


          A second-order asymptotic-preserving and positivity-preserving exponential Runge-Kutta method for a class of stiff kinetic equations. (arXiv:1807.03728v1 [math.NA])      Cache   Translate Page   Web Page Cache   

Authors: Jingwei Hu, Ruiwen Shu

We introduce a second-order time discretization method for stiff kinetic equations. The method is asymptotic-preserving (AP) -- can capture the Euler limit without numerically resolving the small Knudsen number; and positivity-preserving -- can preserve the non-negativity of the solution which is a probability density function for arbitrary Knudsen numbers. The method is based on a new formulation of the exponential Runge-Kutta method and can be applied to a large class of stiff kinetic equations including the BGK equation (relaxation type), the Fokker-Planck equation (diffusion type), and even the full Boltzmann equation (nonlinear integral type). Furthermore, we show that when coupled with suitable spatial discretizations the fully discrete scheme satisfies an entropy-decay property. Various numerical results are provided to demonstrate the theoretical properties of the method.


          Commutative cocycles and stable bundles over surfaces. (arXiv:1807.03736v1 [math.AT])      Cache   Translate Page   Web Page Cache   

Authors: Daniel A. Ramras, Bernardo Villarreal

Commutative K-theory, a cohomology theory built from spaces of commuting matrices, has been explored in recent work of Adem, G\'{o}mez, Gritschacher, Lind, and Tillman. In this article, we use unstable methods to construct explicit representatives for the real commutative K-theory classes on surfaces. These classes arise from commutative O(2)-valued cocycles, and are analyzed via the point-wise inversion operation on commutative cocycles.


          The Omega spectrum for Pengelley's BoP. (arXiv:1807.03738v1 [math.AT])      Cache   Translate Page   Web Page Cache   

Authors: W. Stephen Wilson

We compute the homology of the spaces in the Omega spectrum for $BoP$. There is no torsion in $H_*(\underline{BoP}_{\; i})$ for $i \ge 2$, and things are only slightly more complicated for $i < 2$. We find the complete homotopy type of $\underline{BoP}_{\; i}$ for $i \le 6$ and conjecture the homotopy type for $i > 6$.


          The explicit geometric constructions of cobordism of Milnor hypersurface $H_{1,n}$ and $\mathbb{C} P^1\times \mathbb{C} P^{n-1}$. (arXiv:1807.03742v1 [math.AT])      Cache   Translate Page   Web Page Cache   

Authors: Grigory Solomadin

In the present paper we construct two new explicit complex cobordisms between any two projective bundles over $\mathbb{C} P^1$ of the same complex dimension, including the Milnor hypersurface $H_{1,n}$ and $\mathbb{C} P^1\times \mathbb{C} P^{n-1}$. These constructions reduce the cobordism problem to the null-cobordism of some projective bundle over $\mathbb{C} P^1$ with the non-standard stably complex structure.


          Algebraic Voting Theory & Representations of $S_m \wr S_n$. (arXiv:1807.03743v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Hélène Barcelo, Megan Bernstein, Sarah Bockting-Conrad, Erin McNicholas, Kathryn Nyman, Shira Viel

We consider the problem of selecting an $n$-member committee made up of one of $m$ candidates from each of $n$ distinct departments. Using an algebraic approach, we analyze positional voting procedures, including the Borda count, as $\mathbb{Q}S_m \wr S_n$-module homomorphisms. In particular, we decompose the spaces of voter preferences and election results into simple $\mathbb{Q}S_m \wr S_n$-submodules and apply Schur's Lemma to determine the structure of the information lost in the voting process. We conclude with a voting paradox result, showing that for sufficiently different weighting vectors, applying the associated positional voting procedures to the same set of votes can yield arbitrarily different election outcomes.


          Enhanced Diffusivity in Perturbed Senile Reinforced Random Walk Models. (arXiv:1807.03744v1 [math.PR])      Cache   Translate Page   Web Page Cache   

Authors: Thu Dinh, Jack Xin

We consider diffusivity of random walks with transition probabilities depending on the number of consecutive traversals of the last traversed edge, the so called senile reinforced random walk (SeRW). In one dimension, the walk is known to be sub-diffusive with identity reinforcement function. We perturb the model by introducing a small probability $\delta$ of escaping the last traversed edge at each step. The perturbed SeRW model is diffusive for any $\delta >0 $, with enhanced diffusivity ($\gg O(\delta^2)$) in the small $\delta$ regime. We further study stochastically perturbed SeRW models by having the last edge escape probability of the form $\delta\, \xi_n$ with $\xi_n$'s being independent random variables. Enhanced diffusivity in such models are logarithmically close to the so called residual diffusivity (positive in the zero $\delta$ limit), with diffusivity between $O\left(\frac{1}{|\log\delta |}\right)$ and $O\left(\frac{1}{\log|\log\delta|}\right)$. Finally, we generalize our results to higher dimensions where the unperturbed model is already diffusive. The enhanced diffusivity can be as much as $O(\log^{-2}\delta)$.


          On the Performance of NOMA with Hybrid ARQ. (arXiv:1807.03745v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Donghong Cai, Zhiguo Ding, Pingzhi Fan, Zheng Yang

In this paper, we investigate the outage performance of hybrid automatic repeat request with chase combining (HARQ-CC) assisted downlink non-orthogonal multiple access (NOMA) systems. A closed-form expression of the individual outage probability and the diversity gain are obtained firstly. Based on the developed analytical outage probability, a tradeoff between the minimum number of retransmissions and the transmit power allocation coefficient is then provided for a given target rate. The provided simulation results demonstrate the accuracy of the developed analytical results. Moreover, it is shown that NOMA combined with the HARQ-CC can achieve a significant advantage when only average channel state information is known at the transmitter. Particularly, the performance of the user with less transmit power in NOMA systems can be efficiently improved by utilizing HARQ-CC.


          The second moment of the number of integral points on elliptic curves is bounded. (arXiv:1807.03761v1 [math.NT])      Cache   Translate Page   Web Page Cache   

Authors: Levent Alpoge, Wei Ho

In this paper, we show that the second moment of the number of integral points on elliptic curves over $\mathbb{Q}$ is bounded. In particular, we prove that, for any $0 < s < \log_2 5 = 2.3219 \ldots$, the $s$-th moment of the number of integral points is bounded for many families of elliptic curves --- e.g., for the family of all integral short Weierstrass curves ordered by naive height, for the family of only minimal such Weierstrass curves, for the family of semistable curves, or for subfamilies thereof defined by finitely many congruence conditions. For certain other families of elliptic curves, such as those with a marked point or a marked $2$-torsion point, the same methods show that for $0 < s < \log_2 3 = 1.5850\ldots$, the $s$-th moment of the number of integral points is bounded.

The main new ingredient in our proof is an upper bound on the number of integral points on an affine integral Weierstrass model of an elliptic curve depending only on the rank of the curve and the number of square divisors of the discriminant. We obtain the bound by studying a bijection first observed by Mordell between integral points on these curves and certain types of binary quartic forms. The theorems on moments then follow from H\"older's inequality, analytic techniques, and results on bounds on the average sizes of Selmer groups in the families.


          Suburban Fixed Wireless Access Channel Measurements and Models at 28 GHz for 90% Outdoor Coverage. (arXiv:1807.03763v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Jinfeng Du, Dmitry Chizhik, Rodolfo Feick, Mauricio Rodriguez, Guillermo Castro, Reinaldo. A. Valenzuela

Achieving adequate coverage with high gain antennas is key to realizing the full promise of the wide bandwidth available at mm/cm bands. We report extensive outdoor measurements at 28 GHz in suburban residential areas in New Jersey and Chile, with over 2000 links measured for same-street links (vegetation blocked LOS) from 13 streets and other-street links (true NLOS) from 7 streets, using a specialized narrowband channel sounder at ranges reaching 200 m. The measurements, applicable to fixed wireless access, involved a 55-deg transmit antenna placed on the exterior of a street-facing window and a 10-deg receive horn antenna spinning on top of a van mast at 3 m height, emulating a lamppost-mounted base station. Measured path gain-distance dependence is well represented by power-law models, and azimuth gains at the base are degraded through scattering by more than 4.3 dB for 10% of links. It was found that, with 51 dBm EIRP at the FWA base station and 11 dBi antenna at CPE, 1 Gbps downlink rate can be delivered to an outdoor mounted CPE for up to 100 m from a base station deployed in the same street with 90% coverage guarantee.


          Tower Diagrams and Pieri's Rule. (arXiv:1807.03764v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Olcay Coşkun, Müge Taşkın

We introduce an algorithm to describe Pieri's Rule for multiplication of Schubert polynomials. The algorithm uses tower diagrams introduced by the authors and another new algorithm that describes Monk's Rule. Our result is different from the well-known descriptions (and proofs) of the rule by Bergeron-Billey and Kogan-Kumar and uses Sottile's version of Pieri's Rule.


          Is Q-learning Provably Efficient?. (arXiv:1807.03765v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Chi Jin, Zeyuan Allen-Zhu, Sebastien Bubeck, Michael I. Jordan

Model-free reinforcement learning (RL) algorithms, such as Q-learning, directly parameterize and update value functions or policies without explicitly modeling the environment. They are typically simpler, more flexible to use, and thus more prevalent in modern deep RL than model-based approaches. However, empirical work has suggested that model-free algorithms may require more samples to learn [Deisenroth and Rasmussen 2011, Schulman et al. 2015]. The theoretical question of "whether model-free algorithms can be made sample efficient" is one of the most fundamental questions in RL, and remains unsolved even in the basic scenario with finitely many states and actions.

We prove that, in an episodic MDP setting, Q-learning with UCB exploration achieves regret $\tilde{O}(\sqrt{H^3 SAT})$, where $S$ and $A$ are the numbers of states and actions, $H$ is the number of steps per episode, and $T$ is the total number of steps. This sample efficiency matches the optimal regret that can be achieved by any model-based approach, up to a single $\sqrt{H}$ factor. To the best of our knowledge, this is the first analysis in the model-free setting that establishes $\sqrt{T}$ regret without requiring access to a "simulator."


          Nilpotence varieties. (arXiv:1807.03766v1 [hep-th])      Cache   Translate Page   Web Page Cache   

Authors: Richard Eager, Ingmar Saberi, Johannes Walcher

We consider algebraic varieties canonically associated to any Lie superalgebra, and study them in detail for super-Poincar\'e algebras of physical interest. They are the locus of nilpotent elements in (the projectivized parity reversal of) the odd part of the algebra. Most of these varieties have appeared in various guises in previous literature, but we study them systematically here, from a new perspective: as the natural moduli spaces parameterizing twists of a super-Poincar\'e-invariant physical theory. We obtain a classification of all possible twists, as well as a systematic analysis of unbroken symmetry in twisted theories. The natural stratification of the varieties, the identification of strata with twists, and the action of Lorentz and $R$-symmetry on the varieties are emphasized. We also include a short and unconventional exposition of the pure-spinor superfield formalism, from the perspective of twisting, and demonstrate that it can be applied to construct familiar multiplets in four-dimensional minimally supersymmetric theories; in all dimensions and with any amount of supersymmetry, this technique produces BRST or BV complexes of supersymmetric theories from the Koszul complex of the cone point over the coordinate ring of the nilpotence variety, possibly tensored with a module over that coordinate ring. In addition, we remark on a natural emergence of nilpotence varieties in the Chevalley-Eilenberg cohomology of supertranslations, and give two applications related to these ideas: a calculation of Chevalley-Eilenberg cohomology for the six-dimensional $\mathcal{N}=(2,0)$ supertranslation algebra, and a BV complex matching the field content of type IIB supergravity from the coordinate ring of the corresponding nilpotence variety.


          Efficient Decoding Algorithms for Polar Codes based on $2\times2$ Non-Binary Kernels. (arXiv:1807.03767v1 [cs.IT])      Cache   Translate Page   Web Page Cache   

Authors: Peihong Yuan, Fabian Steiner

Polar codes based on $2\times2$ non-binary kernels are discussed in this work. The kernel over $\text{GF}(q)$ is selected by maximizing the polarization effect and using Monte-Carlo simulation. Belief propagation (BP) and successive cancellation (SC) based decoding algorithms are extended to non-binary codes. Additionally, a successive cancellation list (SCL) decoding with a pruned tree is proposed. Simulation results show that the proposed decoder performs very close to a conventional SCL decoder with significantly lower complexity.


          Induced subgraphs of graphs with large chromatic number. XIII. New brooms. (arXiv:1807.03768v1 [math.CO])      Cache   Translate Page   Web Page Cache   

Authors: Alex Scott, Paul Seymour

Gy\'arf\'as and Sumner independently conjectured that for every tree $T$, the class of graphs not containing $T$ as an induced subgraph is $\chi$-bounded, that is, the chromatic numbers of graphs in this class are bounded above by a function of their clique numbers. This remains open for general trees $T$, but has been proved for some particular trees. For $k\ge 1$, let us say a broom of length $k$ is a tree obtained from a $k$-edge path with ends $a,b$ by adding some number of leaves adjacent to $b$, and we call $a$ its handle. A tree obtained from brooms of lengths $k_1,...,k_n$ by identifying their handles is a $(k_1,...,k_n)$-multibroom. Kierstead and Penrice proved that every $(1,...,1)$-multibroom $T$ satisfies the Gy\'arf\'as-Sumner conjecture, and Kierstead and Zhu proved the same for $(2,...,2)$-multibrooms. In this paper give a common generalization: we prove that every $(1,...,1,2,...,2)$-multibroom satisfies the Gy\'arf\'as-Sumner conjecture.


          Kernel-Based Learning for Smart Inverter Control. (arXiv:1807.03769v1 [math.OC])      Cache   Translate Page   Web Page Cache   

Authors: Aditie Garg, Mana Jalali, Vassilis Kekatos, Nikolaos Gatsis

Distribution grids are currently challenged by frequent voltage excursions induced by intermittent solar generation. Smart inverters have been advocated as a fast-responding means to regulate voltage and minimize ohmic losses. Since optimal inverter coordination may be computationally challenging and preset local control rules are subpar, the approach of customized control rules designed in a quasi-static fashion features as a golden middle. Departing from affine control rules, this work puts forth non-linear inverter control policies. Drawing analogies to multi-task learning, reactive control is posed as a kernel-based regression task. Leveraging a linearized grid model and given anticipated data scenarios, inverter rules are jointly designed at the feeder level to minimize a convex combination of voltage deviations and ohmic losses via a linearly-constrained quadratic program. Numerical tests using real-world data on a benchmark feeder demonstrate that nonlinear control rules driven also by a few non-local readings can attain near-optimal performance.


          Correlation between the algebraic length of words in a Fuchsian fundamental group and the geometric length of their corresponding closed geodesics. (arXiv:1807.03775v1 [math.GT])      Cache   Translate Page   Web Page Cache   

Authors: Peter S. Park

Let $S=\Gamma\backslash \mathbb{H}$ be a hyperbolic surface of finite topological type, such that the Fuchsian group $\Gamma \le \operatorname{PSL}_2(\mathbb{R})$ is non-elementary. We prove that there exists a generating set $\mathfrak S$ of $\Gamma$ such that when sampling length-$n$ words built from the elements of $\mathfrak S$ as $n\to \infty$, the subset of this sampled set comprised of words that are hyperbolic in $\pi_1(S)\cong \Gamma$ approaches full measure, and the distribution of geometric lengths of the closed geodesics corresponding to words in this subset converges (when normalized) to a Gaussian. In addition to this Central Limit Theorem, we also show a Law of Large Numbers, Law of the Iterated Logarithm, Large Deviations Principle, and Local Limit Theorem for this distribution.


          Tiling spaces are Cantor set fiber bundles. (arXiv:math/0105125v2 [math.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lorenzo Sadun, R. F. Williams

We prove that fairly general spaces of tilings of R^d are fiber bundles over the torus T^d, with totally disconnected fiber. This was conjectured (in a weaker form) in [W3], and proved in certain cases. In fact, we show that each such space is homeomorphic to the d-fold suspension of a Z^d subshift (or equivalently, a tiling space whose tiles are marked unit d-cubes). The only restrictions on our tiling spaces are that 1) the tiles are assumed to be polygons (polyhedra if d>2) that meet full-edge to full-edge (or full-face to full-face), 2) only a finite number of tile types are allowed, and 3) each tile type appears in only a finite number of orientations. The proof is constructive, and we illustrate it by constructing a `square' version of the Penrose tiling system.


          When size matters: subshifts and their related tiling spaces. (arXiv:math/0201152v2 [math.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Alex Clark, Lorenzo Sadun

We investigate the dynamics of substitution subshifts and their associated tiling spaces. For a given subshift, the associated tiling spaces are all homeomorphic, but their dynamical properties may differ. We give criteria for such a tiling space to be weakly mixing, and for the dynamics of two such spaces to be topologically conjugate.


          Uniqueness and Symmetry in Problems of Optimally Dense Packings. (arXiv:math/0302056v2 [math.MG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lewis Bowen, Charles Holton, Charles Radin, Lorenzo Sadun

We analyze the general problem of determining optimally dense packings, in a Euclidean or hyperbolic space, of congruent copies of some fixed finite set of bodies. We are strongly guided by examples of aperiodic tilings in Euclidean space and a detailed analysis of a new family of examples in the hyperbolic plane. Our goal is to understand qualitative features of such optimum density problems, in particular the appropriate meaning of the uniqueness of solutions, and the role of symmetry in classfying optimally dense packings.


          When Shape Matters: Deformations of Tiling Spaces. (arXiv:math/0306214v2 [math.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Alex Clark, Lorenzo Sadun

We investigate the dynamics of tiling dynamical systems and their deformations. If two tiling systems have identical combinatorics, then the tiling spaces are homeomorphic, but their dynamical properties may differ. There is a natural map ${\mathcal I}$ from the parameter space of possible shapes of tiles to $H^1$ of a model tiling space, with values in ${\mathbb R}^d$. Two tiling spaces that have the same image under ${\mathcal I}$ are mutually locally derivable (MLD). When the difference of the images is `asymptotically negligible', then the tiling dynamics are topologically conjugate, but generally not MLD. For substitution tilings, we give a simple test for a cohomology class to be asymptotically negligible, and show that infinitesimal deformations of shape result in topologically conjugate dynamics only when the change in the image of ${\mathcal I}$ is asymptotically negligible. Finally, we give criteria for a (deformed) substitution tiling space to be topologically weakly mixing.


          A Simple Geometric Representative for $\mu$ of a Point. (arXiv:dg-ga/9501003v2 UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lorenzo Sadun

For $SU(2)$ (or $SO(3)$) Donaldson theory on a 4-manifold $X$, we construct a simple geometric representative for $\mu$ of a point. Let $p$ be a generic point in $X$. Then the set $\{ [A] | F_A^-(p) $ is reducible $\}$, with coefficient -1/4 and appropriate orientation, is our desired geometric representative.


          On 2-generator subgroups of SO(3). (arXiv:math/9706203v2 [math.GR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Charles Radin, Lorenzo Sadun

We classify all subgroups of $SO(3)$ that are generated by two elements, each a rotation of finite order, about axes separated by an angle that is a rational multiple of $\pi$. In all cases we give a presentation of the subgroup. In most cases the subgroup is the free product, or the amalgamated free product, of cyclic groups or dihedral groups. The relations between the generators are all simple consequences of standard facts about rotations by $\pi$ and $\pi/2$. Embedded in the subgroups are explicit free groups on 2 generators, as used in the Banach-Tarski paradox.


          Waldhausen Additivity: Classical and Quasicategorical. (arXiv:1207.6613v4 [math.AT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Thomas M. Fiore, Malte Pieper

We use a simplicial product version of Quillen's Theorem A to prove classical Waldhausen Additivity of wS., which says that the "subobject" and "quotient" functors of cofiber sequences induce a weak equivalence wS.E(A,C,B)--> wS.A x wS.B . A consequence is Additivity for the Waldhausen K-theory spectrum of the associated split exact sequence, namely a stable equivalence of spectra K(A)vK(B)--> K(E(A,C,B)). This paper is dedicated to transferring these proofs to the quasicategorical setting and developing Waldhausen quasicategories and their sequences. We also give sufficient conditions for a split exact sequence to be equivalent to a standard one. These conditions are always satisfied by stable quasicategories, so Waldhausen K-theory sends any split exact sequence of pointed stable quasicategories to a split cofiber sequence. Presentability is not needed. In an effort to make the article self-contained, we recall all the necessary results from the theory of quasicategories, and prove a few quasicategorical results that are not in the literature.


          The Newton polygon of a planar singular curve and its subdivision. (arXiv:1306.4688v7 [math.AG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Nikita Kalinin

Let a planar algebraic curve $C$ be defined over a valuation field by an equation $F(x,y)=0$. Valuations of the coefficients of $F$ define a subdivision of the Newton polygon $\Delta$ of the curve $C$.

If a given point $p$ is of multiplicity $m$ for $C$, then the coefficients of $F$ are subject to certain linear constraints. These constraints can be visualized on the above subdivision of $\Delta$. Namely, we find a distinguished collection of faces of the above subdivision, with total area at least $\frac{3}{8}m^2$. In a sense, the union of these faces in "the region of influence" of the singular point $p$ on the subdivision of $\Delta$. Also, we discuss three different definitions of a tropical point of multiplicity $m$.


          A $q$-Queens Problem. III. Nonattacking Partial Queens. (arXiv:1402.4886v4 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Seth Chaiken, Christopher R. H. Hanusa, Thomas Zaslavsky

We apply our geometrical theory for counting placements of $q$ nonattacking on an $n\times n$ chessboard, from Parts~I and II, to partial queens: that is, chess pieces with any combination of horizontal, vertical, and $45^\circ$-diagonal moves. Parts~I and II showed that for any rider (a piece with moves of unlimited length) the answer will be a quasipolynomial function of $n$ in which the coefficients are essentially polynomials in $q$. Those general results gave the three highest-order coefficients of the counting quasipolynomial and formulas for counting placements of two nonattacking pieces and the combinatorially distinct types of such placements.

By contrast, the unified framework we present here for partial queens allows us to explicitly compute the four highest-order coefficients of the counting quasipolynomial, show that the five highest-order coefficients are constant (independent of $n$), and find the period of the next coefficient (which depends upon the exact set of moves). Furthermore, for three nonattacking partial queens we are able to prove formulas for the total number of nonattacking placements and for the number of their combinatorially distinct types.

The method of proof, as in the previous parts, is by detailed analysis of the lattice of subspaces of an inside-out polytope.


          A perturbation and generic smoothness of the Vafa-Witten moduli spaces on closed symplectic four-manifolds. (arXiv:1410.1691v2 [math.DG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Yuuji Tanaka

We prove a Freed-Uhlenbeck style generic smoothness theorem for the moduli space of solutions to the Vafa--Witten equations on a closed symplectic four-manifold by using a method developed by Feehan for the study of the $PU(2)$-monopole equations on smooth closed four-manifolds. We introduce a set of perturbation terms to the Vafa--Witten equations, and prove that the moduli space of solutions to the perturbed Vafa-Witten equations on a closed symplectic four-manifold for the structure group $SU(2)$ or $SO(3)$ is a smooth manifold of dimension zero for a generic choice of the perturbation parameters.


          A relational description of higher commutators in Mal'cev varieties. (arXiv:1412.5776v2 [math.RA] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jakub Opršal

We give a relational description of higher commutator operators, which were introduced by Bulatov, in varieties with a Mal'cev term. Furthermore, we use this result to prove that for every algebra with a Mal'cev term there exists a largest clone on the same underlying set containing the Mal'cev operation and having the same congruence lattice and the same higher commutator operators as the original algebra. A local variant of this theorem is given.


          Volume conjectures for the Reshetikhin-Turaev and the Turaev-Viro invariants. (arXiv:1503.02547v4 [math.GT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Qingtao Chen, Tian Yang

We consider the asymptotics of the Turaev-Viro and the Reshetikhin-Turaev invariants of a hyperbolic $3$-manifold, evaluated at the root of unity $\exp({2\pi\sqrt{-1}}/{r})$ instead of the standard $\exp({\pi\sqrt{-1}}/{r})$. We present evidence that, as $r$ tends to $\infty$, these invariants grow exponentially with growth rates respectively given by the hyperbolic and the complex volume of the manifold. This reveals an asymptotic behavior that is different from that of Witten's Asymptotic Expansion Conjecture, which predicts polynomial growth of these invariants when evaluated at the standard root of unity. This new phenomenon suggests that the Reshetikhin-Turaev invariants may have a geometric interpretation other than the original one via $SU(2)$ Chern-Simons gauge theory.


          Analytic extension of exceptional constant mean curvature one catenoids in de Sitter 3-space. (arXiv:1507.06695v2 [math.DG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Shoichi Fujimori, Yu Kawakami, Masatoshi Kokubu, Wayne Rossman, Masaaki Umehara, Kotaro Yamada

Catenoids in de Sitter $3$-space $S^3_1$ belong to a certain class of space-like constant mean curvature one surfaces. In a previous work, the authors classified such catenoids, and found that two different classes of countably many exceptional elliptic catenoids are not realized as closed subsets in $S^3_1$. Here we show that such exceptional catenoids have closed analytic extensions in $S^3_1$ with interesting properties.


          Supercongruences for truncated hypergeometric series and p-adic gamma function. (arXiv:1507.07391v5 [math.NT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Rupam Barman, Neelam Saikia

We prove three more general supercongruences between truncated hypergeometric series and $p$-adic Gamma function from which some known supercongruences follow. A supercongruence conjectured by Rodriguez-Villegas and proved by E. Mortenson using the theory of finite field hypergeometric series follows from one of our more general supercongruences. We also prove a supercongruence for ${_7}F_6$ truncated hypergeometric series which is similar to a supercongruence proved by L. Long and R. Ramakrishna.


          A guide to tropical modifications. (arXiv:1509.03443v4 [math.AG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Nikita Kalinin

This paper surveys tropical modifications, which have already become folklore in tropical geometry. Tropical modifications are used in tropical intersection theory and in a study of singularities. They admit interpretations in various contexts such as hyperbolic geometry, Berkovich spaces, and non-standard analysis.

Our main goal is to mention different points of view, to give references, and to demonstrate the abilities of tropical modifications. We assume that the reader had already met "tropical modifications" somewhere and wants to understand them better.

There are novelties here: a new obstruction (Theorem 2.29) for realizability of non-transversal intersections is found and a tropical version of Weil's reciprocity law (Theorem 2.10) is proven via tropical Menelaus Theorem. A generalization of tropical momentum is given in Section 2.6.


          The Strong Suslin Reciprocity Law. (arXiv:1511.00520v2 [math.KT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Daniil Rudenko

We prove the strong Suslin reciprocity law conjectured by A. Goncharov. The Suslin reciprocity law is a generalization of the Weil reciprocity law to higher Milnor $K-$theory. The Milnor $K-$theory groups can be identified with the top cohomology groups of the polylogarithmic motivic complexes and Goncharov's conjecture predicts the existence of a contracting homotopy underlying Suslin reciprocity. The main ingredient of the proof is a homotopy invariance theorem for the cohomology of the polylogarithmic motivic complexes in the "next to Milnor" degree.


          Pruned double Hurwitz numbers. (arXiv:1512.01598v2 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Marvin Anas Hahn

Hurwitz numbers count ramified genus $g$, degree $d$ coverings of the projective line with with fixed branch locus and fixed ramification data. Double Hurwitz numbers count such covers, where we fix two special profiles over $0$ and $\infty$ and only simple ramification else. These objects feature insteresting structural behaviour and connections to geometry. In this paper, we introduce the notion of pruned double Hurwitz numbers, generalizing the notion of pruned simple Hurwitz numbers in \cite{DN13}. We show that pruned double Hurwitz numbers, similar to usual double Hurwitz numbers, satisfy a cut-and-join recursion and are piecewise polynomial with respect to the entries of the two special ramification profiles. Furthermore double Hurwitz numbers can be computed from pruned double Hurwitz numbers. To sum up, it can be said that pruned double Hurwitz numbers count a relevant subset of covers, leading to considerably smaller numbers and computations, but still featuring the important properties we can observe for double Hurwitz numbers.


          Random walk on unipotent matrix groups. (arXiv:1512.06304v3 [math.PR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Persi Diaconis, Bob Hough

We introduce a new method for proving central limit theorems for random walk on nilpotent groups. The method is illustrated in a local central limit theorem on the Heisenberg group, weakening the necessary conditions on the driving measure. As a second illustration, the method is used to study walks on the $n\times n$ uni-upper triangular group with entries taken modulo $p$. The method allows sharp answers to the behavior of individual coordinates: coordinates immediately above the diagonal require order $p^2$ steps for randomness, coordinates on the second diagonal require order $p$ steps; coordinates on the $k$th diagonal require order $p^{\frac{2}{k}}$ steps.


          A heuristic for boundedness of ranks of elliptic curves. (arXiv:1602.01431v3 [math.NT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jennifer Park, Bjorn Poonen, John Voight, Melanie Matchett Wood

We present a heuristic that suggests that ranks of elliptic curves over the rationals are bounded. In fact, it suggests that there are only finitely many elliptic curves of rank greater than 21. Our heuristic is based on modeling the ranks and Shafarevich-Tate groups of elliptic curves simultaneously, and relies on a theorem counting alternating integer matrices of specified rank. We also discuss analogues for elliptic curves over other global fields.


          Towards computing the rational homology and assembly maps of generalised Thompson groups. (arXiv:1605.00840v2 [math.GR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Conchita Martínez-Pérez, Brita Nucinkis

Let $V_r(\Sigma)$ be the generalised Thompson group defined as the automorphism group of a valid, bounded, and complete Cantor algebra. We show that that for every $n>0$ there is a $k>n,$ such that there exists a $k$-dimensional $n$-connected simplicial complex $K$ such that $V_r(\Sigma)$ acts on $K$ with finite stabilisers. We also determine the number of conjugacy classes of finite cyclic subgroups of a given order $m$ in Brin-Thompson groups. We apply our computations to the rationalised Farrell-Jones assembly map in algebraic $K$-theory.


          Fluctuations of Rectangular Young Diagrams of Interlacing Wigner Eigenvalues. (arXiv:1608.05163v4 [math.PR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: László Erdős, Dominik Schröder

We prove a new CLT for the difference of linear eigenvalue statistics of a Wigner random matrix $H$ and its minor $\hat H$ and find that the fluctuation is much smaller than the fluctuations of the individual linear statistics, as a consequence of the strong correlation between the eigenvalues of $H$ and $\hat H$. In particular our theorem identifies the fluctuation of Kerov's rectangular Young diagrams, defined by the interlacing eigenvalues of $H$ and $\hat H$, around their asymptotic shape, the Vershik-Kerov-Logan-Shepp curve. This result demonstrates yet another aspect of the close connection between random matrix theory and Young diagrams equipped with the Plancherel measure known from representation theory. For the latter a CLT has been obtained in [18] which is structurally similar to our result but the variance is different, indicating that the analogy between the two models has its limitations. Moreover, our theorem shows that Borodin's result [7] on the convergence of the spectral distribution of Wigner matrices to a Gaussian free field also holds in derivative sense.


          Stability results for graphs with a critical edge. (arXiv:1610.08389v2 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Alexander Roberts, Alex Scott

The classical stability theorem of Erd\H{o}s and Simonovits states that, for any fixed graph with chromatic number $k+1 \ge 3$, the following holds: every $n$-vertex graph that is $H$-free and has within $o(n^2)$ of the maximal possible number of edges can be made into the $k$-partite Tur\'{a}n graph by adding and deleting $o(n^2)$ edges. In this paper, we prove sharper quantitative results for graphs $H$ with a critical edge, both for the Erd\H{o}s-Simonovits Theorem (distance to the Tur\'{a}n graph) and for the closely related question of how close an $H$-free graph is to being $k$-partite. In many cases, these results are optimal to within a constant factor.


          A Log PSS morphism with applications to Lagrangian embeddings. (arXiv:1611.06849v2 [math.SG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Sheel Ganatra, Daniel Pomerleano

Let $M$ be a smooth projective variety and $\mathbf{D}$ an ample normal crossings divisor. From topological data associated to the pair $(M, \mathbf{D})$, we construct, under assumptions on Gromov-Witten invariants, a series of distinguished classes in symplectic cohomology of the complement $X = M \backslash \mathbf{D}$. Under further "topological" assumptions on the pair, these classes can be organized into a Log(arithmic) PSS morphism, from a vector space which we term the logarithmic cohomology of $(M, \mathbf{D})$ to symplectic cohomology. Turning to applications, we show that these methods and some knowledge of Gromov-Witten invariants can be used to produce dilations and quasi-dilations (in the sense of Seidel-Solomon [SS]) in examples such as conic bundles and open parts of isotropic Grassmannians. In turn, the existence of such elements imposes strong restrictions on exact Lagrangian embeddings, especially in dimension 3. For instance, we prove that any exact Lagrangian in a complex 3-dimensional conic bundle over $(\mathbb{C}^*)^2$ must be diffeomorphic to $T^3$ or a connect sum $\#^n S^1 \times S^2$.


          Frobenius Stratification of Moduli Spaces of Rank $3$ Vector Bundles in Characteristic $3$, I. (arXiv:1612.08213v3 [math.AG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lingguang Li

Let $X$ be a smooth projective curve of genus $g\geq 2$ over an algebraically closed field $k$ of characteristic $p>0$, $F_X:X\rightarrow X$ the absolute Frobenius morphism. Let $\M^s_X(r,d)$ be the moduli space of stable vector bundles of rank $r$ and degree $d$ on $X$. We study the Frobenius stratification of $\M^s_X(3,0)$ in terms of Harder-Narasimhan polygons of Frobenius pull backs of stable vector bundles and obtain the irreducibility and dimension of each non-empty Frobenius stratum in the case $(p,g)=(3,2)$.


          Statistical inference for misspecified ergodic L\'evy driven stochastic differential equation models. (arXiv:1702.00908v3 [math.ST] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Yuma Uehara

This paper deals with the estimation problem of misspecified ergodic L\'evy driven stochastic differential equation models based on high-frequency samples. We utilize the widely applicable and tractable Gaussian quasi-likelihood approach which focuses on (conditional) mean and variance structure. It is shown that the corresponding Gaussian quasi-likelihood estimators of drift and scale parameters satisfy tail probability estimates and asymptotic normality at the same rate as correctly specified case. In this process, extended Poisson equation for time-homogeneous Feller Markov processes plays an important role to handle misspecification effect. Our result confirms the practical usefulness of the Gaussian quasi-likelihood approach for SDE models, more firmly.


          Weyl calculus with respect to the Gaussian measure and restricted $L^p$-$L^q$ boundedness of the Ornstein-Uhlenbeck semigroup in complex time. (arXiv:1702.03602v4 [math.FA] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jan van Neerven, Pierre Portal

In this paper, we introduce a Weyl functional calculus $a \mapsto a(Q,P)$ for the position and momentum operators $Q$ and $P$ associated with the Ornstein-Uhlenbeck operator $ L = -\Delta + x\cdot \nabla$, and give a simple criterion for restricted $L^p$-$L^q$ boundedness of operators in this functional calculus. The analysis of this non-commutative functional calculus is simpler than the analysis of the functional calculus of $L$. It allows us to recover, unify, and extend, old and new results concerning the boundedness of $\exp(-zL)$ as an operator from $L^p(\mathbb{R}^d,\gamma_{\alpha})$ to $L^q(\mathbb{R}^d,\gamma_{\beta})$ for suitable values of $z\in \mathbb{C}$ with $\Re z>0$, $p,q\in [1,\infty)$, and $\alpha,\beta>0$. Here, $\gamma_\tau$ denotes the centred Gaussian measure on $\mathbb{R}^d$ with density $(2\pi\tau)^{-d/2}\exp(-|x|^2/2\tau)$.


          $HD(M\setminus L)>0.353$. (arXiv:1703.04302v3 [math.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Carlos Matheus, Carlos Gustavo Moreira

The complement $M\setminus L$ of the Lagrange spectrum $L$ in the Markov spectrum $M$ was studied by many authors (including Freiman, Berstein, Cusick and Flahive). After their works, we disposed of a countable collection of points in $M\setminus L$.

In this article, we describe the structure of $M\setminus L$ near a non-isolated point $\alpha_{\infty}$ found by Freiman in 1973, and we use this description to exhibit a concrete Cantor set $X$ whose Hausdorff dimension coincides with the Hausdorff dimension of $M\setminus L$ near $\alpha_{\infty}$.

A consequence of our results is the lower bound $HD(M\setminus L)>0.353$ on the Hausdorff dimension $HD(M\setminus L)$ of $M\setminus L$. Another by-product of our analysis is the explicit construction of new elements of $M\setminus L$, including its largest known member $c\in M\setminus L$ (surpassing the former largest known number $\alpha_4\in M\setminus L$ obtained by Cusick and Flahive in 1989).


          Renormalization group in super-renormalizable quantum gravity. (arXiv:1704.03988v2 [hep-th] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Leonardo Modesto, Leslaw Rachwal, Ilya L. Shapiro

One of the main advantages of super-renormalizable higher derivative quantum gravity models is the possibility to derive exact beta functions, by making perturbative one-loop calculations. We perform such a calculation for the Newton constant by using the Barvinsky-Vilkovisky trace technology. The result is well-defined in a large class of models of gravity in the sense that the renormalization group beta functions do not depend on the gauge-fixing condition. Finally, we discuss the possibility to apply the results to a large class of nonlocal gravitational theories which are free of massive ghost-like states at the tree-level.


          The COM-negative binomial distribution: modeling overdispersion and ultrahigh zero-inflated count data. (arXiv:1704.05050v2 [math.ST] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Huiming Zhang, Kai Tan, Bo Li

In this paper, we focus on the COM-type negative binomial distribution with three parameters, which belongs to COM-type $(a,b,0)$ class distributions and family of equilibrium distributions of arbitrary birth-death process. Besides, we show abundant distributional properties such as overdispersion and underdispersion, log-concavity, log-convexity (infinite divisibility), pseudo compound Poisson, stochastic ordering and asymptotic approximation. Some characterizations including sum of equicorrelated geometrically distributed random variables, conditional distribution, limit distribution of COM-negative hypergeometric distribution, and Stein's identity are given for theoretical properties. COM-negative binomial distribution was applied to overdispersion and ultrahigh zero-inflated data sets. With the aid of ratio regression, we employ maximum likelihood method to estimate the parameters and the goodness-of-fit are evaluated by the discrete Kolmogorov-Smirnov test.


          Optimal Tauberian constant in Ingham's theorem for Laplace transforms. (arXiv:1705.00667v3 [math.CA] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Gregory Debruyne, Jasson Vindas

It is well known that there is an absolute constant $\mathfrak{C}>0$ such that if the Laplace transform $G(s)=\int_{0}^{\infty}\rho(x)e^{-s x}\:\mathrm{d}x$ of a bounded function $\rho$ has analytic continuation through every point of the segment $(-i\lambda ,i\lambda )$ of the imaginary axis, then $$ \limsup_{x\to\infty} \left|\int_{0}^{x}\rho(u)\:\mathrm{d}u - G(0)\right|\leq \frac{ \mathfrak{C}}{\lambda} \: \limsup_{x\to\infty} |\rho(x)|. $$ The best known value of the constant $\mathfrak{C}$ was so far $\mathfrak{C}=2$. In this article we show that the inequality holds with $\mathfrak{C}=\pi/2$ and that this value is best possible. We also sharpen Tauberian constants in finite forms of other related complex Tauberian theorems for Laplace transforms.


          Edges not in any monochromatic copy of a fixed graph. (arXiv:1705.01997v3 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Hong Liu, Oleg Pikhurko, Maryam Sharifzadeh

For a sequence $(H_i)_{i=1}^k$ of graphs, let $\textrm{nim}(n;H_1,\ldots, H_k)$ denote the maximum number of edges not contained in any monochromatic copy of $H_i$ in colour $i$, for any colour $i$, over all $k$-edge-colourings of~$K_n$.

When each $H_i$ is connected and non-bipartite, we introduce a variant of Ramsey number that determines the limit of $\textrm{nim}(n;H_1,\ldots, H_k)/{n\choose 2}$ as $n\to\infty$ and prove the corresponding stability result. Furthermore, if each $H_i$ is what we call \emph{homomorphism-critical} (in particular if each $H_i$ is a clique), then we determine $\textrm{nim}(n;H_1,\ldots, H_k)$ exactly for all sufficiently large~$n$. The special case $\textrm{nim}(n;K_3,K_3,K_3)$ of our result answers a question of Ma.

For bipartite graphs, we mainly concentrate on the two-colour symmetric case (i.e., when $k=2$ and $H_1=H_2$). It is trivial to see that $\textrm{nim}(n;H,H)$ is at least $\textrm{ex}(n,H)$, the maximum size of an $H$-free graph on $n$ vertices. Keevash and Sudakov showed that equality holds if $H$ is the $4$-cycle and $n$ is large; recently Ma extended their result to an infinite family of bipartite graphs. We provide a larger family of bipartite graphs for which $\textrm{nim}(n;H,H)=\textrm{ex}(n,H)$. For a general bipartite graph $H$, we show that $\textrm{nim}(n;H,H)$ is always within a constant additive error from $\textrm{ex}(n,H)$, i.e.,~$\textrm{nim}(n;H,H)= \textrm{ex}(n,H)+O_H(1)$.


          Generalized multiple summing multilinear operators on Banach spaces. (arXiv:1705.07259v2 [math.FA] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Joilson Ribeiro, Fabrício Santos

In this paper we provide an abstract aproach to the study of classes of multiple summing multilinear operators between Banach spaces. The main purpose is unify the study of several known classes and results, for example multiple $(p, q_1,\dots, q_n)$-summing operators, multiple mixing $(s, q, p)$-summing operators and multiple strong $(s, q, p)$-mixing summing operators. We also define new class of multiple summing multilinear operator that are particular cases of our construction and, therefore, satisfy the results proved in the paper.


          Heine's method and $A_n$ to $A_m$ transformation formulas. (arXiv:1705.10095v2 [math.CA] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Gaurav Bhatnagar

We apply Heine's method---the key idea Heine used in 1846 to derive his famous transformation formula for $_2\phi_1$ series---to multiple basic series over the root system of type $A$. In the classical case, this leads to a bibasic extension of Heine's formula, which was implicit in a paper of Andrews which he wrote in 1966. As special cases, we recover extensions of many of Ramanujan's $_2\phi_1$ transformations. In addition, we extend previous work of the author regarding a bibasic extension of Andrews' $q$-Lauricella function, and show how to obtain very general transformation formulas of this type. The results obtained include transformations of an $n$-fold sum into an $m$-fold sum.


          Semialgebraic decomposition of real binary forms of a given degree's space. (arXiv:1706.04207v3 [math.AG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Macarena Ansola, Antonio Díaz-Cano, M.Angeles Zurro

The Waring Problem over polynomial rings asks for how to decompose an homogeneous polynomial of degree $d$ as a finite sum of $d^{th}$ powers of linear forms.

First, we give a constructive method to obtain a real Waring decomposition of any given real binary form with length at most its degree. Secondly, we adapt the Sylvester's Algorithm to the real case in order to determine a Waring decomposition with minimal length and then we establish its real rank. We use bezoutian matrices to achieve a minimal decomposition.

We consider all real binary forms of a given degree and we decompose this space as a finite union of semialgebraic sets according to their real rank. Some examples are included.


          Weighted counting of integer points in a subspace. (arXiv:1706.05423v3 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Alexander Barvinok, Guus Regts

Given complex numbers $w_1, \ldots, w_n$, we define the weight $w(X)$ of a set $X$ of non-negative integer $n$-vectors as the sum of $w_1^{x_1} \cdots w_n^{x_n}$ over all vectors $(x_1, \ldots, x_n)$ in $X$. We present an algorithm, which for a set $X$ of 0-1 vectors defined by a system of homogeneous linear equations with at most $r$ variables per equation and at most $c$ equations per variable, computes $w(X)$ within a relative error $\epsilon >0$ in $(rc)^{O(\ln n-\ln \epsilon)}$ time provided $|w_j| \leq \beta (r \sqrt{c})^{-1}$ for an absolute constant $\beta >0$ and all $j=1, \ldots, n$. A similar algorithm is constructed for computing the weight of a set of non-negative integer vectors satisfying linear constraints and the weight of a linear code over ${\Bbb F}_p$. Applications include counting weighted perfect matchings in hypergraphs, counting weighted graph homomorphisms, computing weight enumerators of linear codes with sparse code generating matrices and computing the partition function of the ferromagnetic Potts model at low temperatures.


          Character varieties of odd classical pretzel knots. (arXiv:1706.06385v4 [math.GT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Haimiao Chen

We determine the ${\rm SL}(2,\mathbb{C})$-character variety for each odd classical pretzel knot $P(2k_1+1,2k_2+1,2k_3+1)$, and present a method for computing its A-polynomial.


          Control Synthesis for Permutation-Symmetric High-Dimensional Systems With Counting Constraints. (arXiv:1706.07863v2 [cs.SY] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Petter Nilsson, Necmiye Ozay

General purpose correct-by-construction synthesis methods are limited to systems with low dimensionality or simple specifications. In this work we consider highly symmetrical counting problems and exploit the symmetry to synthesize provably correct controllers for systems with tens of thousands of states. The key ingredients of the solution are an aggregate abstraction procedure for mildly heterogeneous systems and a formulation of counting constraints as linear inequalities.


          A restriction isomorphism for zero-cycles with coefficients in Milnor K-theory. (arXiv:1706.10222v3 [math.AG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Morten Lüders

We prove a restriction isomorphism for Chow groups of zero-cycles with coefficients in Milnor K-theory for smooth projective schemes over excellent henselian discrete valuation rings. Furthermore, we study torsion subgroups of these groups over local and finite fields.


          Translation-modulation invariant Banach spaces of ultradistributions. (arXiv:1707.01320v2 [math.FA] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Pavel Dimovski, Stevan Pilipovic, Bojan Prangoski, Jasson Vindas

We introduce and study a new class of translation-modulation invariant Banach spaces of ultradistributions. These spaces show stability under Fourier transform and tensor products; furthermore, they have a natural Banach convolution module structure over a certain associated Beurling algebra, as well as a Banach multiplication module structure over an associated Wiener-Beurling algebra. We also investigate a new class of modulation spaces, the Banach spaces of ultradistributions $\mathcal{M}^F$ on $\mathbb{R}^{d}$, associated to translation-modulation invariant Banach spaces of ultradistributions $F$ on $\mathbb{R}^{2d}$.


          Geometrostatic Manifolds of Small ADM Mass. (arXiv:1707.03008v2 [math.DG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Christina Sormani, Iva Stavrov Allen

We bound the locations of outermost minimal surfaces in geometrostatic manifolds whose ADM mass is small relative to the separation between the black holes and prove the Intrinsic Flat Stability of the Positive Mass Theorem in this setting.


          Time in classical and quantum mechanics. (arXiv:1707.03651v3 [math-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: J. Muñoz-Díaz, R. J. Alonso-Blanco

In this article we study the nature of time in Mechanics. The fundamental principle, according to which a mechanical system evolves governed by a second order differential equation, implies the existence of an absolute time-duration in the sense of Newton. There is a second notion of time for conservative systems which makes the Hamiltonian action evolve at a constant rate. In Quantum Mechanics the absolute time loses its sense as it does the notion of trajectory.

Then, we propose two different ways to reach the time dependent Schr\"odinger equation. One way consists of considering a "time constraint" on a free system. The other way is based on the point of view of Hertz, by considering the system as a projection of a free system. In the later manner, the "time" appearing in the Schr\"odinger equation is a linear combination of the time-duration with the "time" quotient of the action by the energy on each solution of the Hamilton-Jacobi equation. Both of them are based on a rule of quantization that we explain in Section 4.


          Higher dimensional Steinhaus and Slater problems via homogeneous dynamics. (arXiv:1707.04094v2 [math.NT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Alan Haynes, Jens Marklof

The three gap theorem, also known as the Steinhaus conjecture or three distance theorem, states that the gaps in the fractional parts of $\alpha,2\alpha,\ldots, N\alpha$ take at most three distinct values. Motivated by a question of Erd\H{o}s, Geelen and Simpson, we explore a higher-dimensional variant, which asks for the number of gaps between the fractional parts of a linear form. Using the ergodic properties of the diagonal action on the space of lattices, we prove that for almost all parameter values the number of distinct gaps in the higher dimensional problem is unbounded. Our results in particular improve earlier work by Boshernitzan, Dyson and Bleher et al. We furthermore discuss a close link with the Littlewood conjecture in multiplicative Diophantine approximation. Finally, we also demonstrate how our methods can be adapted to obtain similar results for gaps between return times of translations to shrinking regions on higher dimensional tori.


          Induced Good Gradings of Structural Matrix Rings. (arXiv:1707.06270v2 [math.RA] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: John Dewitt, Kenneth L. Price

Our approach to structural matrix rings defines them over preordered directed graphs. A grading of a structural matrix ring is called a good grading if its standard unit matrices are homogeneous. For a group $G$, a $G$ -grading set is a set of arrows with the property that any assignment of these arrows to elements of $G$ uniquely determines an induced good grading. One of our main results is that a $G$-grading set exists for any transitive directed graph if $G$ is a group of prime order. This extends a result of Kelarev. However, an example of Molli Jones shows there are directed graphs which do not have $G$-grading sets for any cyclic group $G$ of even order greater than 2. Finally, we count the number of nonequivalent elementary gradings by a finite group of a full matrix ring over an arbitrary field.


          The Tu--Deng Conjecture holds almost surely. (arXiv:1707.07945v2 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lukas Spiegelhofer, Michael Wallner

The Tu--Deng Conjecture is concerned with the sum of digits $w(n)$ of $n$ in base~$2$ (the Hamming weight of the binary expansion of $n$) and states the following: assume that $k$ is a positive integer and $1\leq t<2^k-1$. Then \[\Bigl \lvert\Bigl\{(a,b)\in\bigl\{0,\ldots,2^k-2\bigr\}^2:a+b\equiv t\bmod 2^k-1, w(a)+w(b)<k\Bigr\}\Bigr \rvert\leq 2^{k-1}.\]

We prove that the Tu--Deng Conjecture holds almost surely in the following sense: the proportion of $t\in[1,2^k-2]$ such that the above inequality holds approaches $1$ as $k\rightarrow\infty$.

Moreover, we prove that the Tu--Deng Conjecture implies a conjecture due to T.~W.~Cusick concerning the sum of digits of $n$ and $n+t$.


          On Hilbert's 8th Problem. (arXiv:1708.02653v15 [math.GM] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Nicholas G. Polson

A Hadamard factorisation of the Riemann X-function is constructed to characterise the zeros of the Riemann zeta function


          An OpenGL and C++ based function library for curve and surface modeling in a large class of extended Chebyshev spaces. (arXiv:1708.04440v2 [cs.MS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ágoston Róth

We propose a platform-independent multi-threaded function library that provides data structures to generate, differentiate and render both the ordinary basis and the normalized B-basis of a user-specified extended Chebyshev (EC) space that comprises the constants and can be identified with the solution space of a constant-coefficient homogeneous linear differential equation defined on a sufficiently small interval. Using the obtained normalized B-bases, our library can also generate, (partially) differentiate, modify and visualize a large family of so-called B-curves and tensor product B-surfaces. Moreover, the library also implements methods that can be used to perform dimension elevation, to subdivide B-curves and B-surfaces by means of de Casteljau-like B-algorithms, and to generate basis transformations for the B-representation of arbitrary integral curves and surfaces that are described in traditional parametric form by means of the ordinary bases of the underlying EC spaces. Independently of the algebraic, exponential, trigonometric or mixed type of the applied EC space, the proposed library is numerically stable and efficient up to a reasonable dimension number and may be useful for academics and engineers in the fields of Approximation Theory, Computer Aided Geometric Design, Computer Graphics, Isogeometric and Numerical Analysis.


          Edge Preserving Maps of the Nonseparating Curve Graphs, Curve Graphs and Rectangle Preserving Maps of the Hatcher-Thurston Graphs. (arXiv:1708.05290v2 [math.GT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Elmas Irmak

Let $R$ be a compact, connected, orientable surface of genus $g$ with $n$ boundary components with $g \geq 2$, $n \geq 0$. Let $\mathcal{N}(R)$ be the nonseparating curve graph, $\mathcal{C}(R)$ be the curve graph and $\mathcal{HT}(R)$ be the Hatcher-Thurston graph of $R$. We prove that if $\lambda : \mathcal{N}(R) \rightarrow\mathcal{N}(R)$ is an edge preserving map, then $\lambda$ is induced by a homeomorphism of $R$. We prove that if $\theta : \mathcal{C}(R) \rightarrow \mathcal{C}(R)$ is an edge preserving map, then $\theta$ is induced by a homeomorphism of $R$. We prove that if $\tau: \mathcal{HT}(R) \rightarrow\mathcal{HT}(R)$ is a rectangle preserving map, then $\tau$ is induced by a homeomorphism of $R$. We also prove that these homeomorphisms are unique up to isotopy when $(g, n) \neq (2, 0)$.


          Edge Caching in Dense Heterogeneous Cellular Networks with Massive MIMO Aided Self-backhaul. (arXiv:1709.00957v3 [cs.NI] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Lifeng Wang, Kai-Kit Wong, Sangarapillai Lambotharan, Arumugam Nallanathan, Maged Elkashlan

This paper focuses on edge caching in dense heterogeneous cellular networks (HetNets), in which small base stations (SBSs) with limited cache size store the popular contents, and massive multiple-input multiple-output (MIMO) aided macro base stations provide wireless self-backhaul when SBSs require the non-cached contents. Our aim is to address the effects of cell load and hit probability on the successful content delivery (SCD), and present the minimum required base station density for avoiding the access overload in an arbitrary small cell and backhaul overload in an arbitrary macrocell. The massive MIMO backhaul achievable rate without downlink channel estimation is derived to calculate the backhaul time, and the latency is also evaluated in such networks. The analytical results confirm that hit probability needs to be appropriately selected, in order to achieve SCD. The interplay between cache size and SCD is explicitly quantified. It is theoretically demonstrated that when non-cached contents are requested, the average delay of the non-cached content delivery could be comparable to the cached content delivery with the help of massive MIMO aided self-backhaul, if the average access rate of cached content delivery is lower than that of self-backhauled content delivery. Simulation results are presented to validate our analysis.


          List-edge-colouring planar graphs with precoloured edges. (arXiv:1709.04027v3 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Joshua Harrelson, Jessica McDonald, Gregory J. Puleo

Let $G$ be a simple planar graph of maximum degree $\Delta$, let $t$ be a positive integer, and let $L$ be an edge list assignment on $G$ with $|L(e)| \geq \Delta+t$ for all $e \in E(G)$. We prove that if $H$ is a subgraph of $G$ that has been $L$-edge-coloured, then the edge-precolouring can be extended to an $L$-edge-colouring of $G$, provided that $H$ has maximum degree $d\leq t$ and either $d \leq t-4$ or $\Delta$ is large enough ($\Delta \geq 16+d$ suffices). If $d>t$, there are examples for any choice of $\Delta$ where the extension is impossible.


          On sets with small sumset in the circle. (arXiv:1709.04501v2 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Pablo Candela, Anne de Roton

We prove results on the structure of a subset of the circle group having positive inner Haar measure and doubling constant close to the minimum. These results go toward a continuous analogue in the circle of Freiman's $3k-4$ theorem from the integer setting. An analogue of this theorem in $\mathbb{Z}_p$ has been pursued extensively, and we use some recent results in this direction. For instance, obtaining a continuous analogue of a result of Serra and Z\'emor, we prove that if a subset $A$ of the circle is not too large and has doubling constant at most $2+\varepsilon$ with $\varepsilon<10^{-4}$, then for some integer $n>0$ the dilate $n\cdot A$ is included in an interval in which it has density at least $1/(1+\varepsilon)$. Our arguments yield other variants of this result as well, notably a version for two sets which makes progress toward a conjecture of Bilu. We include two applications of these results. The first is a new upper bound on the size of $k$-sum-free sets in the circle and in $\mathbb{Z}_p$. The second gives structural information on subsets of $\mathbb{R}$ of doubling constant at most $3+\varepsilon$.


          Holomorphic differentials of Generalized Fermat curves. (arXiv:1710.01349v3 [math.AG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ruben A. Hidalgo

Let $K$ be an algebraically closed field, of characteristic $p \geq 2$, and let $k,n \geq 2$ be integers with $k$ relatively prime to $p$. A non-singular complete irreducible algebraic curve $F_{k,n}$, defined over $K$, is called a generalized Fermat curve of type $(k,n)$ if it admits a group $H \cong {\mathbb Z}_{k}^{n}$ of automorphisms such that $F_{k,n}/H$ is isomorphic to ${\mathbb P}_{K}^{1}$ and it has exactly $(n+1)$ cone points, each one of order $k$. The genus of $F_{k,n}$ is at least one if and only if $(k-1)(n-1) >1$. In such a situation, we construct an explicit basis, called an standard basis, of its space $H^{1,0}(F_{k,n})$ of holomorphic forms. Such a basis contains a subset of cardinality $n+1$ providing an embedding of $F_{k,n}$ into ${\mathbb P}_{K}^{n}$ whose image is the fiber product of $(n-1)$ classical Fermat curves of degree $k$. For $p=2$ (so $k \geq 3$ is odd), we describe the images, under the Cartier operator, of the elements of the standard basis in order to obtain a lower bound (sharp for $n=2,3$) for the dimension of the space of the exact ones. For $p=3$ and type $(2,4)$ (so of genus five), we compute the exact holomorphic forms.


          Quantum-classical correspondence on associated vector bundles over locally symmetric spaces. (arXiv:1710.04625v2 [math.SP] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Benjamin Küster, Tobias Weich

For a compact Riemannian locally symmetric space $\mathcal M$ of rank one and an associated vector bundle $\mathbf V_\tau$ over the unit cosphere bundle $S^\ast\mathcal M$, we give a precise description of those classical (Pollicott-Ruelle) resonant states on $\mathbf V_\tau$ that vanish under covariant derivatives in the Anosov-unstable directions of the chaotic geodesic flow on $S^\ast\mathcal M$. In particular, we show that they are isomorphically mapped by natural pushforwards into generalized common eigenspaces of the algebra of invariant differential operators $D(G,\sigma)$ on compatible associated vector bundles $\mathbf W_\sigma$ over $\mathcal M$. As a consequence of this description, we obtain an exact band structure of the Pollicott-Ruelle spectrum. Further, under some mild assumptions on the representations $\tau$ and $\sigma$ defining the bundles $\mathbf V_\tau$ and $\mathbf W_\sigma$, we obtain a very explicit description of the generalized common eigenspaces. This allows us to relate classical Pollicott-Ruelle resonances to quantum eigenvalues of a Laplacian in a suitable Hilbert space of sections of $\mathbf W_\sigma$. Our methods of proof are based on representation theory and Lie theory.


          Small data well-posedness for derivative nonlinear Schr\"odinger equations. (arXiv:1710.07415v2 [math.AP] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Donlapark Pornnopparath

We study the generalized derivative nonlinear Schr\"odinger equation $i\partial_t u+\Delta u = P(u,\overline{u},\partial_x u,\partial_x \overline{u})$, where $P$ is a polynomial, in Sobolev spaces. It turns out that when $\text{deg } P\geq 3$, the equation is locally well-posed in $H^{\frac{1}{2}}$ when each term in $P$ contains only one derivative, otherwise we have a local well-posedness in $H^{\frac{3}{2}}$. If $\text{deg } P \geq 5$, the solution can be extended globally. By restricting to equations of the form $i\partial_t u+\Delta u = \partial_x P(u,\overline{u})$ with $\text{deg } P\geq5$, we were able to obtain the global well-posedness in the critical Sobolev space.


          Sharp estimate of the mean exit time of a bounded domain in the zero white noise limit. (arXiv:1710.07510v5 [math.AP] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Boris Nectoux

We prove a sharp asymptotic formula for the mean exit time from a bounded domain $D\subset \mathbb R^d$ for the overdamped Langevin dynamics $$d X_t = -\nabla f(X_t) d t + \sqrt{2\ve} \ d B_t$$ when $\ve \to 0$ and in the case when $D$ contains a unique non degenerate minimum of $f$ and $\pa_{\mbf n}f>0$ on $\pa D$. This formula was actually first derived in~\cite{matkowsky-schuss-77} using formal computations and we thus provide, in the reversible case, the first proof of it. As a direct consequence, we obtain when $\ve \to 0$, a sharp asymptotic estimate of the smallest eigenvalue of the operator $$L_{\ve}=-\ve \Delta +\nabla f\cdot \nabla$$ associated with Dirichlet boundary conditions on $\pa D$. The approach does not require $f|_{\partial D}$ to be a Morse function. The proof is based on results from~\cite{Day2,Day4} and a formula for the mean exit time from $D$ introduced in~\cite{BEGK, BGK}.


          Localization for MCMC: sampling high-dimensional posterior distributions with local structure. (arXiv:1710.07747v5 [stat.ME] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Matthias Morzfeld, Xin T. Tong, Youssef M. Marzouk

We investigate how ideas from covariance localization in numerical weather prediction can be used in Markov chain Monte Carlo (MCMC) sampling of high-dimensional posterior distributions arising in Bayesian inverse problems. To localize an inverse problem is to enforce an anticipated "local" structure by (i) neglecting small off-diagonal elements of the prior precision and covariance matrices; and (ii) restricting the influence of observations to their neighborhood. For linear problems we can specify the conditions under which posterior moments of the localized problem are close to those of the original problem. We explain physical interpretations of our assumptions about local structure and discuss the notion of high dimensionality in local problems, which is different from the usual notion of high dimensionality in function space MCMC. The Gibbs sampler is a natural choice of MCMC algorithm for localized inverse problems and we demonstrate that its convergence rate is independent of dimension for localized linear problems. Nonlinear problems can also be tackled efficiently by localization and, as a simple illustration of these ideas, we present a localized Metropolis-within-Gibbs sampler. Several linear and nonlinear numerical examples illustrate localization in the context of MCMC samplers for inverse problems.


          The Navier-slip thin-film equation for 3D fluid films: existence and uniqueness. (arXiv:1710.09903v4 [math.AP] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Manuel V. Gnann, Mircea Petrache

We consider the thin-film equation $\partial_t h + \nabla \cdot \left(h^2 \nabla \Delta h\right) = 0$ in physical space dimensions (i.e., one dimension in time $t$ and two lateral dimensions with $h$ denoting the height of the film in the third spatial dimension), which corresponds to the lubrication approximation of the Navier-Stokes equations of a three-dimensional viscous thin fluid film with Navier-slip at the substrate. This equation can have a free boundary (the contact line), moving with finite speed, at which we assume a zero contact angle condition (complete-wetting regime). Previous results have focused on the $1+1$-dimensional version, where it has been found that solutions are not smooth as a function of the distance to the free boundary. In particular, a well-posedness and regularity theory is more intricate than for the second-order counterpart, the porous-medium equation, or the thin-film equation with linear mobility (corresponding to Darcy dynamics in the Hele-Shaw cell). Here, we prove existence and uniqueness of classical solutions that are perturbations of an asymptotically stable traveling-wave profile. This leads to control on the free boundary and in particular its velocity.


          Von Neumann dimension, Hodge index theorem and geometric applications. (arXiv:1711.02571v2 [math.DG] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Francesco Bei

This note contains a reformulation of the Hodge index theorem within the framework of Atiyah's $L^2$-index theory. More precisely, given a compact K\"ahler manifold $(M,h)$ of even complex dimension $2m$, we prove that $$\sigma(M)=\sum_{p,q=0}^{2m}(-1)^ph_{(2),\Gamma}^{p,q}(M)$$ where $\sigma(M)$ is the signature of $M$ and $h_{(2),\Gamma}^{p,q}(M)$ are the $L^2$-Hodge numbers of $M$ with respect to a Galois covering having $\Gamma$ as group of Deck transformations. Likewise we also prove an $L^2$-version of the Fr\"olicher index theorem. Afterwards we give some applications of these two theorems and finally we conclude this paper by collecting other properties of the $L^2$-Hodge numbers.


          The circle transfer and cobordism categories. (arXiv:1711.09433v2 [math.AT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jeffrey Giansiracusa

The circle transfer $Q\Sigma (LX_{hS^1})_+ \to QLX_+$ has appeared in several contexts in topology. In this note we observe that this map admits a geometric re-interpretation as a morphism of cobordism categories of 0-manifolds and 1-cobordisms. Let $C_1(X)$ denote the 1-dimensional cobordism category and let $Circ(X) \subset C_1(X)$ denote the subcategory whose objects are disjoint unions of unparametrised circles in $\mathbb{R}^\infty$. Multiplication in $S^1$ induces a functor $Circ(X) \to Circ(LX)$, and the composition of this functor with the inclusion of $Circ(LX)$ into $C_1(LX)$ is homotopic to the circle transfer. As a corollary, we describe the inclusion of the subcategory of cylinders into the 2-dimensional cobordism category $C_2(X)$ and find that it is null-homotopic when $X$ is a point.


          A combinatorial model for tame frieze patterns. (arXiv:1711.09687v2 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Michael Cuntz

Let $R$ be an arbitrary subset of a commutative ring. We introduce a combinatorial model for the set of tame frieze patterns with entries in $R$ based on a notion of irreducibility of frieze patterns. When $R$ is a ring, then a frieze pattern is reducible if and only if it contains an entry (not on the border) which is $1$ or $-1$. To my knowledge, this model generalizes simultaneously all previously presented models for tame frieze patterns bounded by $0$'s and $1$'s.


          A family of constacyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ and its application to quantum codes. (arXiv:1712.02081v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Yongsheng Tang, Ting Yao, Shixin Zhu, Xiaoshan Kai

We introduce a Gray map from $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ to $\mathbb{F}_{2}^{2m}$ and study $(1+u)$-constacyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}},$ where $u^{2}=0.$ It is proved that the image of a $(1+u)$-constacyclic code length $n$ over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ under the Gray map is a distance-invariant quasi-cyclic code of index $m$ and length $2mn$ over $\mathbb{F}_{2}.$ We also prove that every code of length $2mn$ which is the Gray image of cyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}$ of length $n$ is permutation equivalent to a binary quasi-cyclic code of index $m.$ Furthermore, a family of quantum error-correcting codes obtained from the Calderbank-Shor-Steane (CSS) construction applied to $(1+u)$-constacyclic codes over $\mathbb{F}_{2^{m}}+u\mathbb{F}_{2^{m}}.$


          Positivity and causal localizability in higher spin quantum field theories. (arXiv:1712.02346v4 [math-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Bert Schroer

It is shown that the recently introduced positivity and causality preserving string-local quantum field theory (SLFT) resolves most No-Go situations in higher spin problems. This includes in particular the Velo-Zwanziger causality problem which gets in an interesting way related to the solution of zero mass Weinberg-Witten issue. In contrast to gauge theorie's indefinite metric and ghosts SLFT uses only physical degrees of freedom and in this way obtains a simpler and clearer view. This includes the important non-covariant lightcone gauge which becomes replaced by a fully covariant string field with a lightlike string directions which, different from gauge fixing parameters, participate in the in the Lorentz transformation. It reveals that neither the Mexican hat potential nor the Lie algebra structure of s=1 selfcouplings should be imposed but rather rather are consequences of the causality and positivity principle of Local Quantum Physics. As a consequence SLFT provides more profound explanations than those of Gauge Theory; this affects in particular the raison d'etre of the Higgs particle. The basic conceptual tool of SLFT is the S-matrix, which is used to convert the heuristic content of nonrenormalizable point-local interaction densities into their causality and positivity maintaining string-like counterpart.


          A wavelet Plancherel theory with application to sparse continuous wavelet transform. (arXiv:1712.02770v6 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ron Levie, Nir Sochen

We introduce a framework for calculating greedy sparse approximations to signals based on elements of continuous wavelet systems. The method is based on an extension of the continuous wavelet theory. In the new theory, the signal space is embedded in larger abstract signal space, which we call the window-signal space. There is a canonical extension of the wavelet transform on the window-signal space, which is an isometric isomorphism from the window-signal space to a space of functions on phase space. Hence, the new framework is called a wavelet Plancherel theory, and the extended wavelet transform is called the wavelet-Plancherel transform. Since the wavelet-Plancherel transform is an isometric isomorphism, any operation on phase space can be pulled-back to an operation in the window-signal space. Using this pull-back property, it is possible to pull back a search for big wavelet coefficients to the window-signal space. We can thus avoid inefficient calculations on phase space, performing all calculations entirely in the window-signal space. We consider in this paper a matching pursuit algorithm based on this coefficient search approach. Our method has lower computational complexity than matching pursuit algorithms based on a naive coefficient search in continuous wavelet systems. Moreover, our method has comparable computational complexity to greedy discrete wavelet methods, while the resolution in phase space of our method is squared in comparison to discrete methods.


          The constraint equations of Lovelock gravity theories: a new $\sigma_k$-Yamabe problem. (arXiv:1712.04528v2 [math-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Xavier Lachaume

This paper is devoted to the study of the constraint equations of the Lovelock gravity theories. In the case of an empty, compact, conformally flat, time-symmetric, and space-like manifold, we show that the Hamiltonian constraint equation becomes a generalisation of the $\sigma_k$-Yamabe problem. That is to say, the prescription of a linear combination of the $\sigma_k$-curvatures of the manifold. We search solutions in a conformal class for a compact manifold. Using the existing results on the $\sigma_k$-Yamabe problem, we describe some cases in which they can be extended to this new problem. This requires to study the concavity of some polynomial. We do it in two ways: regarding the concavity of an entire root of this polynomial, which is connected to algebraic properties of the polynomial; and seeking analytically a concavifying function. This gives several cases in which a conformal solution exists. At last we show an implicit function theorem in the case of a manifold with negative scalar curvature, and find a conformal solution when the Lovelock theories are close to General Relativity.


          Bi-Laplacians on graphs and networks. (arXiv:1712.07370v2 [math.AP] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Federica Gregorio, Delio Mugnolo

We study the differential operator $A=\frac{d^4}{dx^4}$ acting on a connected network $\mathcal{G}$ along with $\mathcal L^2$, the square of the discrete Laplacian acting on a connected combinatorial graph $\mathsf G$. For both operators we discuss well-posedness of the associated linear parabolic problems \[

\frac{\partial u}{\partial t}=-Au,\qquad\frac{df}{dt}=-\mathcal L^2 f, \] on $L^p(\mathcal{G})$ or $\ell^p(\mathsf V)$, respectively, for $1\leq p\leq\infty$. In view of the well-known lack of parabolic maximum principle for all elliptic differential operators of order $2N$ for $N>1$, our most surprising finding is that, after some transient time, the parabolic equations driven by $-A$ may display Markovian features, in dependence with the imposed transmission conditions in the vertices: analogous results seem to be unknown in the case of general domains and even bounded intervals. Our analysis is based on a detailed study of bi-harmonic functions complemented by simple combinatorial arguments. We elaborate on analogous issues for the discrete bi-Laplacian; a characterization of complete graphs in terms of the Markovian property of the semigroup generated by $-\mathcal L^2$ is also presented.


          A Pl\"unnecke-Ruzsa inequality in compact abelian groups. (arXiv:1712.07615v2 [math.CO] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Pablo Candela, Diego González-Sánchez, Anne de Roton

The Pl\"unnecke-Ruzsa inequality is a fundamental tool to control the growth of finite subsets of abelian groups under repeated addition and subtraction. Other tools to handle sumsets have gained applicability by being extended to more general subsets of more general groups. This motivates extending the Pl\"unnecke-Ruzsa inequality, in particular to measurable subsets of compact abelian groups by replacing the cardinality with the Haar probability measure. This objective is related to the question of the stability of classes of Haar measurable sets under addition. In this direction the class of analytic sets is a natural one to work with. We prove a Pl\"unnecke-Ruzsa inequality for K-analytic sets in general compact (Hausdorff) abelian groups. We also discuss further extensions, some of which raise questions of independent interest in descriptive topology.


          The number of quartic $D_4$-fields with monogenic cubic resolvent ordered by conductor. (arXiv:1712.08552v3 [math.NT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Cindy Tsang, Stanley Yao Xiao

In this paper, we consider maximal and irreducible quartic orders which arise from integral binary quartic forms, via the construction of Birch and Merriman, and whose field of fractions is a quartic $D_4$-field. By a theorem of M. Wood, such quartic orders may be regarded as quartic $D_4$-fields whose ring of integers has a monogenic cubic resolvent. We shall give the asymptotic number of such objects when ordered by conductor, as well as estimate the asymptotic number of such objects when ordered by discriminant.


          $\kappa$-Poincar\'e invariant quantum field theories with KMS weight. (arXiv:1801.02715v2 [hep-th] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: T. Poulain, J.-C. Wallet

A natural star product for 4-d $\kappa$-Minkowski space is used to investigate various classes of $\kappa$-Poincar\'e invariant scalar field theories with quartic interactions whose commutative limit coincides with the usual $\phi^4$ theory. $\kappa$-Poincar\'e invariance forces the integral involved in the actions to be a twisted trace, thus defining a KMS weight for the noncommutative (C*-)algebra modeling the $\kappa$-Minkowski space. The associated modular group and Tomita modular operator are characterized. In all the field theories, the twist generates different planar one-loop contributions to the 2-point function which are at most UV linearly diverging. Some of these theories are free of UV/IR mixing. In the others, UV/IR mixing shows up in non-planar contributions to the 2-point function as a polynomial singularity at exceptional zero external momenta while staying finite at non-zero external momenta. These results are discussed together with the possibility for the KMS weight relative to the quantum space algebra to trigger the appearance of KMS state on the algebra of observables.


          Latent Factor Analysis of Gaussian Distributions under Graphical Constraints. (arXiv:1801.03481v4 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Md Mahmudul Hasan, Shuangqing Wei, Ali Moharrer

In this paper, we explore the algebraic structures of solution spaces for Gaussian latent factor analysis when the population covariance matrix $\Sigma_x$ has an additional latent graphical constraint, namely, a latent star topology. In particular, we give sufficient and necessary conditions under which the solutions to constrained minimum trace factor analysis (CMTFA) is still star. We further show that the solution to CMTFA under the star constraint can only have two cases, i.e. the number of latent variable can be only one (star) or $n-1$ where $n$ is the dimension of the observable vector, and characterize the solution for both the cases.


          Douglas-Rachford Splitting and ADMM for Pathological Convex Optimization. (arXiv:1801.06618v2 [math.OC] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ernest K. Ryu, Yanli Liu, Wotao Yin

Despite the vast literature on DRS and ADMM, there had been very little work analyzing their behavior under pathologies. Most analyses assume a primal solution exists, a dual solution exists, and strong duality holds. When these assumptions are not met, i.e., under pathologies, the theory often breaks down and the empirical performance may degrade significantly. In this paper, we establish that DRS only requires strong duality to work, in the sense that asymptotically iterates are approximately feasible and approximately optimal. We then translate the pathological analyses for DRS to pathological analyses for ADMM.


          Counting conjugacy classes of fully irreducibles: double exponential growth. (arXiv:1801.07471v2 [math.GR] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Ilya Kapovich, Catherine Pfaff

Inspired by results of Eskin and Mirzakhani~\cite{EM11} counting closed geodesics of length $\le L$ in the moduli space of a closed surface $\Sigma_g$ of genus $g\ge 2$, we consider a similar question in the $Out(F_r)$ setting. Let $h=6g-6$. The Eskin-Mirzakhani result, giving the asymptotics of $\frac{e^{hL}}{hL}$, can be equivalently stated in terms of counting the number of $MCG(\Sigma_g)$-conjugacy classes of pseudo-Anosovs $\phi\in MCG(\Sigma_g)$ with dilatation $\lambda(\phi)$ satisfying $\log\lambda(\phi)\le L$. For $L\ge 0$ let $\mathfrak N_r(L)$ denote the number of $Out(F_r)$-conjugacy classes of fully irreducibles $\phi\in Out(F_r)$ with dilatation $\lambda(\phi)$ satisfying $\log\lambda(\phi)\le L$. We prove for $r\ge 3$ that as $L\to\infty$, the number $\mathfrak N_r(L)$ has \underline{double exponential} (in $L$) lower and upper bounds. These bounds reveal behavior not present in classic hyperbolic dynamical systems.


          Detecting Changes in Fully Polarimetric SAR Imagery with Statistical Information Theory. (arXiv:1801.08901v2 [cs.IT] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Abraão D. C. Nascimento, Alejandro C. Frery, Renato J. Cintra

Images obtained from coherent illumination processes are contaminated with speckle. A prominent example of such imagery systems is the polarimetric synthetic aperture radar (PolSAR). For such remote sensing tool the speckle interference pattern appears in the form of a positive definite Hermitian matrix, which requires specialized models and makes change detection a hard task. The scaled complex Wishart distribution is a widely used model for PolSAR images. Such distribution is defined by two parameters: the number of looks and the complex covariance matrix. The last parameter contains all the necessary information to characterize the backscattered data and, thus, identifying changes in a sequence of images can be formulated as a problem of verifying whether the complex covariance matrices differ at two or more takes. This paper proposes a comparison between a classical change detection method based on the likelihood ratio and three statistical methods that depend on information-theoretic measures: the Kullback-Leibler distance and two entropies. The performance of these four tests was quantified in terms of their sample test powers and sizes using simulated data. The tests are then applied to actual PolSAR data. The results provide evidence that tests based on entropies may outperform those based on the Kullback-Leibler distance and likelihood ratio statistics.


          Markov spectrum near Freiman's isolated points in $M\setminus L$. (arXiv:1802.02454v2 [math.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Carlos Matheus, Carlos Gustavo Moreira

Freiman proved in 1968 that the Lagrange and Markov spectra do not coincide by exhibiting a countable infinite collection $\mathcal{F}$ of isolated points of the Markov spectrum which do not belong the Lagrange spectrum.

In this paper, we describe the structure of the elements of the Markov spectrum in the largest interval $(c_{\infty}, C_{\infty})$ containing $\mathcal{F}$ and avoiding the Lagrange spectrum. In particular, we compute the smallest known element $f$ of $M\setminus L$, and we show that the Hausdorff dimension of the portion of the Markov spectrum between $c_{\infty}$ and $C_{\infty}$ is $> 0.2628$.


          Constrained BRST-BFV and BRST-BV Lagrangians for half-integer HS fields on $R^{1,d-1}$. (arXiv:1803.05173v3 [hep-th] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Alexander A. Reshetnyak

Gauge invariant Lagrangian descriptions of irreducible and reducible half-integer higher-spin mixed-symmetric massless and massive representations of the Poincare group with off-shell algebraic constraints are constructed within a metric-like formulation in a $d$-dimensional flat space-time on the basis of a suggested constrained BRST approach. A Lorentz-invariant resolution of the BRST complex within the constrained BRST formulations produces a gauge-invariant Fang-Fronsdal Lagrangian entirely in terms of the initial triple gamma-traceless spin-tensor field $\Psi_{(\mu)_{n}}$ with gamma-traceless gauge parameter. The triplet and quartet formulations are derived. The minimal (un)constrained BRST--BV actions for above formulations are obtained, from proposed constrained BRST--BV approach to be by appropriate tools to construct interacting constrained Lagrangians.


          Solutions of the $U_q(\widehat{\mathfrak{sl}}_N)$ reflection equations. (arXiv:1803.06491v2 [math-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Vidas Regelskis, Bart Vlaar

We find the complete set of invertible solutions of the untwisted and twisted reflection equations for the Bazhanov-Jimbo R-matrix of type ${\mathrm A}^{(1)}_{N-1}$. We also show that all invertible solutions can be obtained by an appropriate affinization procedure from solutions of the constant untwisted and twisted reflection equations.


          Harmonic measure and quantitative connectivity: geometric characterization of the $L^p$ solvability of the Dirichlet problem. Part II. (arXiv:1803.07975v3 [math.AP] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Jonas Azzam, Mihalis Mourgoglou, Xavier Tolsa

Let $\Omega\subset\mathbb R^{n+1}$ be an open set with $n$-AD-regular boundary. In this paper we prove that if the harmonic measure for $\Omega$ satisfies the so-called weak-$A_\infty$ condition, then $\Omega$ satisfies a suitable connectivity condition, namely the weak local John condition. Together with other previous results by Hofmann and Martell, this implies that the weak-$A_\infty$ condition for harmonic measure holds if and only if $\partial\Omega$ is uniformly $n$-rectifiable and the weak local John condition is satisfied. This yields the first geometric characterization of the weak-$A_\infty$ condition for harmonic measure, which is important because of its connection with the Dirichlet problem for the Laplace equation.


          Scattering Forms, Worldsheet Forms and Amplitudes from Subspaces. (arXiv:1803.11302v2 [hep-th] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Song He, Gongwang Yan, Chi Zhang, Yong Zhang

We present a general construction of two types of differential forms, based on any $(n{-}3)$-dimensional subspace in the kinematic space of $n$ massless particles. The first type is the so-called projective, scattering forms in kinematic space, while the second is defined in the moduli space of $n$-punctured Riemann spheres which we call worldsheet forms. We show that the pushforward of worldsheet forms, by summing over solutions of scattering equations, gives the corresponding scattering forms, which generalizes the results of [1711.09102]. The pullback of scattering forms to subspaces can have natural interpretations as amplitudes in terms of Bern-Carrasco-Johansson double-copy construction or Cachazo-He-Yuan formula. As an application of our formalism, we construct in this way a large class of $d\log$ scattering forms and worldsheet forms, which are in one-to-one correspondence with non-planar MHV leading singularities in ${\cal N}=4$ super-Yang-Mills. For every leading singularity function, we present a new determinant formula in moduli space, as well as a (combinatoric) polytope and associated scattering form in kinematic space. These include the so-called Cayley cases, where in each case the scattering form is the canonical forms of a convex polytope in the subspace, and scattering equations admit elegant rewritings as a map from the moduli space to the subspace.


          Verifier Non-Locality in Interactive Proofs. (arXiv:1804.02724v2 [quant-ph] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Claude Crépeau, Nan Yang

In multi-prover interactive proofs, the verifier interrogates the provers and attempts to steal their knowledge. Other than that, the verifier's role has not been studied. Augmentation of the provers with non-local resources results in classes of languages that may not be NEXP. We have discovered that the verifier plays a much more important role than previously thought. Simply put, the verifier has the capability of providing non-local resources for the provers intrinsically. Therefore, standard MIPs may already contain protocols equivalent to one in which the prover is augmented non-locally. Existing MIPs' proofs of soundness implicitly depend on the fact that the verifier is not