Diagnosing Heart Diseases with Deep Neural Networks Cache Translate Page  
The Second National Data Science Bowl, a data science competition where the goal was to automatically determine cardiac volumes from MRI scans, has just ended. We participated with a team of 4 members from Ghent University and finished 2nd! The team kunsthart (artificial heart in English) consisted of Ira Korshunova, Jeroen Burms, Jonas Degrave, 3 PhD students, and professor Joni Dambre. It’s also a followup of last year’s team ≋ Deep Sea ≋, which finished in first place for the First National Data Science Bowl. OverviewThis blog post is going to be long, here is a clickable overview of different sections.
IntroductionThe problemThe goal of this year’s Data Science Bowl was to estimate minimum (endsystolic) and maximum (enddiastolic) volumes of the left ventricle from a set of MRIimages taken over one heartbeat. These volumes are used by practitioners to compute an ejection fraction: fraction of outbound blood pumped from the heart with each heartbeat. This measurement can predict a wide range of cardiac problems. For a skilled cardiologist analysis of MRI scans can take up to 20 minutes, therefore, making this process automatic is obviously useful. Unlike the previous Data Science Bowl, which had very clean and voluminous data set, this year’s competition required a lot more focus on dealing with inconsistencies in the way the very limited number of data points were gathered. As a result, most of our efforts went to trying out different ways to preprocess and combine the different data sources. The dataThe dataset consisted of over a thousand patients. For each patient, we were given a number of 30frame MRI videos in the DICOM format, showing the heart during a single cardiac cycle (i.e. a single heartbeat). These videos were taken in different planes including the multiple shortaxis views (SAX), a 2chamber view (2Ch), and a 4chamber view (4Ch). The SAX views, whose planes are perpendicular to the long axis of the left ventricle, form a series of slices that (ideally) cover the entire heart. The number of SAX slices ranged from 1 to 23. Typically, the region of interest (ROI) is only a small part of the entire image. Below you can find a few of SAX slices and Ch2, Ch4 views from one of the patients. Red circles on the SAX images indicate the ROI’s center (later we will explain how to find it), for Ch2 and Ch4 they specify the location of SAX slices projected on the corresponding view.
The DICOM files also contained a bunch of metadata. Some of the metadata fields, like PixelSpacing and ImageOrientationm were absolutely invaluable to us. The metadata also specified patient’s age and sex. For each patient in the train set, two labels were provided: the systolic volume and the diastolic volume. From what we gathered (link), these were obtained by cardiologists by manually performing a segmentation on the SAX slices, and feeding these segmentations to a program that computes the minimal and maximal heart chamber volumes. The cardiologists didn’t use the 2Ch or 4Ch images to estimate the volumes, but for us they proved to be very useful. Combining these multiple data sources can be difficult, however for us dealing with inconsistencies in the data was more challenging. Some examples: the 4Ch slice not being provided for some patients, one patient with less than 30 frames per MRI video, couple of patients with only a handful of SAX slices, patients with SAX slices taken in weird locations and orientations. The evaluationGiven a patient’s data, we were asked to output a cumulative distribution function over the volume, ranging from 0 to 599 mL, for both systole and diastole. The models were scored by a Continuous Ranked Probability Score (CRPS) error metric, which computes the average squared distance between the predicted CDF and a Heaviside step function representing the real volume. An additional interesting novelty of this competition was the two stage process. In the first stage, we were given a training set of 500 patients with a public test set of 200 patients. In the final week we were required to submit our model and afterwards the organizers released the test data of 440 patients and labels for 200 patients from the public test set. We think the goal was to compensate for the small dataset and prevent people from optimizing against the test set through visual inspection of every part of their algorithm. Handlabeling in the first stage was allowed on the training dataset only, for the second stage it was also allowed for 200 validation patients. The solution: traditional image processing, convnets, and dealing with outliersIn our solution, we combined traditional image processing approaches, which find the region of interest (ROI) in each slice, with convolutional neural networks, which perform the mapping from the extracted image patches to the predicted volumes. Given the very limited number of training samples, we tried combat overfitting by restricting our models to combine the different data sources in predefined ways, as opposed to having them learn how to do the aggregation. Unlike many other contestants, we performed no handlabelling . Preprocessing and data augmentationThe provided images have varying sizes and resolutions, and do not only show the heart, but the entire torso of the patient. Our preprocessing pipeline made the images ready to be fed to a convolutional network by going through the following steps:
To find the correct zooming factor, we made use of the PixelSpacing metadata field, which specifies the image resolution. Further we will explain our approach to ROI detection and data augmentation. Detecting the Region Of Interest through image segmentation techniquesWe used classical computer vision techniques to find the left ventricle in the SAX slices. For each patient, the center and width of the ROI were determined by combining the information of all the SAX slices provided. The figure below shows an example of the result. ROI extraction steps
First, as was suggested in the Fourier based tutorial, we exploit the fact that each slice sequence captures one heartbeat and use Fourier analyses to extract an image that captures the maximal activity at the corresponding heartbeat frequency (same figure, second image). From these Fourier images, we then extracted the center of the left ventricle by combining the Hough circle transform with a custom kernelbased majority voting approach across all SAX slices. First, for each fourier image (resulting from a single sax slice), the highest scoring Hough circles for a range of radii were found, and from all of those, the highest scoring ones were retained. , and the range of radii are metaparameters that severely affect the robustness of the ROI detected and were optimised manually. The third image in the figure shows an example of the best circles for one slice. Finally, a ‘likelihood surface’ (rightmost image in figure above) was obtained by combining the centers and scores of the selected circles for all slices. Each circle center was used as the center for a Gaussian kernel, which was scaled with the circle score, and all these kernels were added. The maximum across this surface was selected as the center of the ROI. The width and height of the bounding box of all circles with centers within a maximal distance (another hyperparameter) of the ROI center were used as bounds for the ROI or to create an ellipsoidal mask as shown in the figure. Given these ROIs in the SAX slices, we were able to find the ROIs in the 2Ch and 4Ch slices by projecting the SAX ROI centers onto the 2Ch and 4Ch planes. Data augmentationAs always when using convnets on a problem with few training examples, we used tons of data augmentation. Some special precautions were needed, since we had to preserve the surface area. In terms of affine transformations, this means that only skewing, rotation and translation was allowed. We also added zooming, but we had to correct our volume labels when doing so! This helped to make the distirbution of labels more diverse. Another augmentation here came in the form of shifting the images over the time axis. While systole was often found in the beginning of a sequence, this was not always the case. Augmenting this, by rolling the image tensor over the time axis, made the resulting model more robust against this noise in the dataset, while providing even more augmentation of our data. Data augmentation was applied during the training phase to increase the number of training examples. We also applied the augmentations during the testing phase, and averaged predictions across the augmented versions of the same data sample. Network architecturesWe used convolutional neural networks to learn a mapping from the extracted image patches to systolic and diastolic volumes. During the competition, we played around a lot with both minor and major architectural changes. Our base architecture for most of our models was based on VGG16. As we already mentioned, we trained different models which can deal with different kinds of patients. There are roughly four different kinds of models we trained: single slice models, patient models, 2Ch models and 4Ch models. Single slice modelsSingle slice models are models that take a single SAX slice as an input, and try to predict the systolic and diastolic volumes directly from it. The 30 frames were fed to the network as 30 different input channels. The systolic and diastolic networks shared the convolutional layers, but the dense layers were separated. The output of the network could be either a 600way softmax (followed by a cumulative sum), or the mean and standard deviation of a Gaussian (followed by a layer computing the cdf of the Gaussian). Although these models obviously have too little information to make a decent volume estimation, they benefitted hugely from testtime augmentation (TTA). During TTA, the model gets slices with different augmentations, and the outputs are averaged across augmenations and slices for each patient. Although this way of aggregating over SAX slices is suboptimal, it proved to be very robust to the relative positioning of the SAX slices, and is as such applicable to all patients. Our single best single slice model achieved a local validation score of 0.0157 (after TTA), which was a reliable estimate for the public leaderboard score for these models. The approximate architecture of the slice models is shown on the following figure. 2Ch and 4Ch modelsThese models have a much more global view on the left ventricle of the heart than single SAX slice models. The 2Ch models also have the advantage of being applicable to every patient. Not every patient had a 4Ch slice. We used the same VGGinspired architecture for these models. Individually, they achieved a similar validation score (0.0156) as was achieved by averaging over multiple sax slices. By ensembling only single slice, 2Ch and 4Ch models, we were able to achieve a score of 0.0131 on the public leaderboard. Patient modelsAs opposed to single slice models, patient models try to make predictions based on the entire stack of (up to 25) SAX slices. In our first approaches to these models, we tried to process each slice separately using a VGGlike single slice network, followed by feeding the results to an overarching RNN in an ordered fashion. However, these models tended to overfit badly. Our solution to this problem consists of a clever way to merge predictions from multiple slices. Instead of having the network learn how to compute the volume based on the results of the individual slices, we designed a layer which combines the areas of consecutive crosssections of the heart using a truncated cone approximation. Basically, the slice models have to estimate the area (and standard deviation thereof) of the crosssection of the heart in a given slice . For each pair of consecutive slices and , we estimate the volume of the heart between them as , where is the distance between the slices. The total volume is then given by . Ordering the SAX slices and finding the distance between them was achieved through looking at the SliceLocation metadata fields, but this field was not very reliable in finding the distance between slices, neither was the SliceThickness. We looked for the two slices that were furthest apart, drew a line between them, and projected every other slice onto this line. This way, we estimated the distance between two slices ourselves. Our best single model achieved a local validation score of 0.0105 using this approach. This was no longer a good leaderboard estimation, since our local validation set contained relatively few outliers compared to the public leaderboard in the first round. The model had the following architecture:
* The first dimension is the batch size, i.e. the number of patients, the second dimension is the number of slices. If a patient had fewer slices, we padded the input and omitted the extra slices in the volume estimation. Oftentimes, we did not train patient models from scratch. We found that initializing patient models with single slice models helps against overfitting, and severely reduces training time of the patient model. The architecture we described above was one of the best for us. To diversify our models, some of the good things we tried include:
One downside of the patient model approach was that these models assume that SAX slices nicely range from one end of the heart to the other. This was trivially not true for patients with very few (< 5) slices, but it was harder to detect automatically for some other outlier cases as in figure below, where something is wrong with the images or the ROI algorithm fails.
Training and ensemblingError function. At the start of the competition, we experimented with various error functions, but we found optimising CRPS directly to work best. Training algorithm. To train the parameters of our models, we used the Adam update rule (Kingma and Ba). Initialization. We initialised all filters and dense layers orthogonally (Saxe et al.). Biases were initialized to small positive values to have more gradients at the lower layer in the beginning of the optimization. At the Gaussian output layers, we initialized the biases for mu and sigma such that initial predictions of the untrained network would fall in a sensible range. Regularization. Since we had a low number of patients, we needed considerable regularization to prevent our models from overfitting. Our main approach was to augment the data and to add a considerable amount of dropout. ValidationSince the trainset was already quite small, we kept the validation set small as well (83 patients). Despite this, our validation score remained pretty close to the leaderboard score. Also, in cases where it didn’t, it helped us identify issues in our models, namely problematic cases in the test set which were not represented in our validation set. We noticed for instance that quite some of our patient models had problems with patients with too few SAX slices (< 5). Selectively train and predictBy looking more closely at the validation scores, we observed that most of the accumulated error was obtained by wrongly predicting only a couple of such outlier cases. At some point, being able to handle only a handful of these meant the difference between a leaderboard score of 0.0148 and 0.0132! To mitigate such issues, we set up our framework such that each individual model could choose not to train on or predict a certain patient. For instance, models on patients’ SAX slices could choose not to predict patients with too few SAX slices, models which use the 4Ch slice would not predict for patients who don’t have this slice. We extended this idea further by developing expert models, which only trained and predicted for patients with either a small or a big heart (as determined by the ROI detection step). Further down the pipeline, our ensembling scripts would then take these nonpredictions into account. Ensembling and dealing with outliersWe ended up creating about 250 models throughout the competition. However, we knew that some of these models were not very robust to certain outliers or patients whose ROI we could not accurately detect. We came up with two different ensembling strategies that would deal with these kind of issues. Our first ensembling technique followed the following steps:
Our second way of ensembling involves comparing an ensemble that is suboptimal, but robust to outliers, to an ensemble that is not robust to them. This approach is especially interesting, since it does not need a validation set to predict the test patients. It follows the following steps:
Following this approach, we detected three outliers in the test set during phase one of the competition. Closer inspection revealed that for all of them either our ROI detection failed, or the SAX slices were not nicely distributed across the heart. Both ways of ensembling achieved similar scores on the public leaderboard. (0.0110) Second round submissionsFor the second round of the competition, we were allowed to retrain our models on the new labels (+ 200 patients). We were also allowed to plan two submissions. Of course, it was impossible to retrain all of our models during this single week. For this reason, we chose to only train our 44 best models, according to our ensembling scripts. For our first submission, we splitted of a new validation set. The resulting models were combined using our first ensembling strategy. For our second submission, we trained our models on the entire training set (i.e. there was no validation split). We assembled them using the second ensembling method. Since we had no validation set to optimise the weights of the ensemble, we computed the weights by training an ensemble on the models we trained with a validation split, and transferred them over. Software and hardwareWe used Lasagne, Python, Numpy and Theano to implement our solution, in combination with the cuDNN library. We also used PyCUDA for a few custom kernels. We made use of scikitimage for preprocessing and augmentation. We trained our models on the NVIDIA GPUs that we have in the lab, which include GTX TITAN X, GTX 980, GTX 680 and Tesla K40 cards. We would like to thank Frederick Godin and Elias Vansteenkiste for lending us a few extra GPUs in the last week of the competition. ConclusionIn this competition, we tried out different ways to preprocess data and combine information from different data sources, and thus, we learned a lot in this aspect. However, we feel that there is still a room for improvement. For example, we observed that most of our error still hails from a select group of patients. These include the ones for which our ROI extraction fails. In hindsight, handlabeling the training data and training a network to do the ROI extraction would be a better approach, but we wanted to sidestep doing a lot of this kind of manual effort as much as possible. In the end, labeling the data would probably have been less time intensive. UPDATE (March 23): the code is now available on GitHub: github.com/317070/kaggleheart  
Predicting epileptic seizures Cache Translate Page 
The American Epilepsy Society Seizure Prediction Challenge ended a few days ago, and I finished 10th out of 504 teams. In this post I will briefly outline the problem and my solution. The problemEpilepsy is one of the most commonly diagnosed neurological disorders. It is characterized by the occurrence of spontaneous seizures, and to make matters even worse nearly 30% of patients cannot control their seizures with medication. In such cases, seizure forecasting systems are vitally important. Their purpose is to trigger a warning when a probability of the forthcoming seizure exceeds a predefined threshold, so patients have time to plan their activities. As a primary challenge towards building a seizure prediction device is the ability to classify between preseizure and nonseizure states of the brain activity measured with the EEG. Further, we will use a term preictal to denote a preseizure state and interictal for a normal EEG data without any signs of seizure activity. Preictal state in our setting was defined to be one hour before the seizure onset with a 5minute horizon. An example of a preictal EEG record (3 channels out of 16, picture from Kaggle)
For each 10minute clip from preictal or interictal onehour sequence, we were asked to assign a probability that a given clip is preictal. In the training data the timing of each clip was known. However it wasn’t given for the test data clips, so we couldn’t use the timing information when building a classifier. The evaluation metric was the area under the ROC curve (AUC) calculated for seven available subjects as one big group. It implied an additional challenge since predictions from subjectspecific models in general were not well calibrated. Training a single classifier for all subject a priori could not work better because brain activity is a highly individual. The global AUC metric required additional robustness against the choice of the classification threshold, which is crucial in seizure forecasting systems. The solution: convnetsThe idea of using convnets for EEG was inspired by the research of Sander Dieleman. In his case, the audio signal was onedimensional, unlike the EEG signal, which had 1524 channels depending on the subject. Therefore, the information from different channels has to be combined in some way. I tried various convnets architectures, however, most success I could get when merging features from different channels in the very first layer. The input features itself were very simple and similar to those in Howbert et al., 2014: EEG signal was partitioned into nonoverlapping 1 min frames and transformed with DFT. The resulted amplitude spectrum was averaged within 6 frequency bands: delta (0.14 Hz), theta (48 Hz), alpha (812 Hz), beta (1230 Hz), lowgamma (3070 Hz) and highgamma (70180 Hz). Thus, the dimension of the data clip was equal to (channels frequency bands time frames). Additionally in some models I used standard deviation of the signal computed in the same time windows as DFT. An example of a convnet architecture
Its first layer (C1) performs convolution in a time dimension over all N channels and all 6 frequency bands, so the shape of its filters is . C1 has 16 feature maps each of shape . The second layer (C2) performs convolution with 32 filters of size . C2 is followed by a global temporal pooling layer GP3, which computes the following statistics: mean, maximum, minimum, variance, geometrical mean, norm over 9 values in each feature map from C2. GP3 is fully connected with 128 units in F4 layer. C1 and C2 layers were composed of ReLUs; tanh activation was used in the hidden layer. I used Python, Theano, NumPy and SciPy to implement the solution. Since I didn’t have a GPU, I trained everything on CPU, which usually took 26 hours to train all individual models for 175K gradient updates with ADADELTA. Model averagingAs a final model I used a geometric mean of the predictions (normalized to 01 range for each subject) obtained from 11 convnets with different hyperparameters: number of feature maps or hidden units in each layer, strides in convolutional layers, amount of dropout and weight decay, etc. Models were also trained on different data, for example, I could take DFT in 0.5 or 2 minute windows or change the frequency bands partition by dividing large gamma bands into two. To augment the training set I took the overlaps between consecutive clips in the same onehour sequence, regretfully I didn’t do it realtime. ResultsIn the middle of the competition organizers decided to allow use of the test data to calibrate the predictions. I used the simplest form of calibration: unitybased normalization of persubject predictions. This could improve the AUC on about 0.01. So the final ensemble, where each of 11 models was calibrated, obtained 0.81087 on public and 0.78354 on private datasets. Models averaging was essential to reduce the probability of an unpleasant surprise on the private LB. After the private scores had become available, I found out that some models with relatively high public scores had unexpectedly low private scores and vice versa. A possible explanation I will give in the next section. Pitfalls of the EEGIn this competition one could easily overfit to the public test set, which explains a large shake up between public and private leaderboard standings. Moreover, a tricky crossvalidation could track the test score with varying success, and simple validation wasn’t even supposed to work. So what is the reason for this phenomena? The problem lies in the properties of the EEG data: clips, which are close in time are more similar to one another than to the distant clips because brain activity constantly changes. This can be showed via tSNE. If we take all preprocessed data clips (train and test) from one subject, transform them with PCA into vectors with 50 components and take a few sequences it would look like the plot below. Here we can see three clusters of six 10minute clips (with some outliers), which correspond to different preictal EEG hours. tSNE visualization of the preictal clips from 3 onehour sequences.
Obviously, if the classifier is trained on 5 clips from a green sequence, it is easier to make a correct predictions for the 6th green clip rather than for yellow or red clip from another sequence. Sadly, but in many papers I’ve seen on seizure prediction, this fact is oftenly neglected. Many authors report crossvalidation or validation results, which are unlikely to be as optimistic at test time, when the device is actually implanted in one’s brain. ConclusionsThis competition outlined a lot of open questions in the field of seizure prediction. These problems are solvable, so epilepsy patients hopefully could get reliable seizure advisory systems in the nearest future. The competition was a basis for my thesis, which can be found in my GitHub repository along with its code. 
KAM Theory. Part II. Kolmogorov spaces. (arXiv:1809.03492v1 [math.DS]) Cache Translate Page 
Authors: Mauricio Garay, Duco van Straten This is part II of our book on KAM theory. We start by defining functorial analysis and then switch to the particular case of Kolmogorov spaces. We develop functional calculus based on the notion of local operators. This allows to define the exponential and therefore relation between Lie algebra and Lie group actions in the infinite dimensional context. Then we introduce a notion of finite dimensional reduction and use it to prove a fixed point theorem for Kolmogorov spaces. We conclude by proving general normal theorems. 
Decomposition of Augmented Cubes into Regular Connected Pancyclic Subgraphs. (arXiv:1809.03493v1 [math.CO]) Cache Translate Page 
Authors: S. A. Kandekar, Y. M. Borse, B. N. Waphare In this paper, we consider the problem of decomposing the augmented cube $AQ_n$ into two spanning, regular, connected and pancyclic subgraphs. We prove that for $ n \geq 4$ and $ 2n  1 = n_1 + n_2 $ with $ n_1, n_2 \geq 2,$ the augmented cube $ AQ_n$ can be decomposed into two spanning subgraphs $ H_1$ and $ H_2$ such that each $ H_i$ is $n_i$regular and $n_i$connected. Moreover, $H_i$ is $4$pancyclic if $ n_i \geq 3.$ 
Generalised modelindependent characterisation of strong gravitational lenses IV: formalismintrinsic degeneracies. (arXiv:1809.03505v1 [astroph.CO]) Cache Translate Page 
Authors: Jenny Wagner Based on the standard gravitational lensing formalism with its effective, projected lensing potential in a given background cosmology, we investigate under which transformations of the source position and of the deflection angle the observable properties of the multiple images, i.e. the time delay differences, the relative image positions, relative shapes, and magnification ratios, remain invariant. As these observables only constrain local lens properties, we derive general, local invariance transformations in the areas covered by the multiple images. We show that the known global invariance transformations, e.g. the mass sheet transformation or the source position transformation, are contained in our invariance transformations, when they are restricted to the areas covered by the multiple images and when lensmodelbased degeneracies are ignored, like the freedom to add or subtract masses in unconstrained regions without multiple images. Hence, we have identified the general class of invariance transformations that can occur, in particular in our modelindependent local characterisation of strong gravitational lenses. 
Arithmetic representations of fundamental groups II: finiteness. (arXiv:1809.03524v1 [math.AG]) Cache Translate Page 
Authors: Daniel Litt Let $X$ be a smooth curve over a finitely generated field $k$, and let $\ell$ be a prime different from the characteristic of $k$. We analyze the dynamics of the Galois action on the deformation rings of mod $\ell$ representations of the geometric fundamental group of $X$. Using this analysis, we prove analogues of the Shafarevich and FontaineMazur finiteness conjectures for function fields over algebraically closed fields in arbitrary characteristic, and a weak variant of the FreyMazur conjecture for function fields in characteristic zero. For example, we show that if $X$ is a normal, connected variety over $\mathbb{C}$, the (typically infinite) set of representations of $\pi_1(X^{\text{an}})$ into $GL_n(\overline{\mathbb{Q}_\ell})$, which come from geometry, has no limit points. As a corollary, we deduce that if $L$ is a finite extension of $\mathbb{Q}_\ell$, then the set of representations of $\pi_1(X^{\text{an}})$ into $GL_n(L)$, which arise from geometry, is finite. 
A weighted setting for the numerical approximation of the Poisson problem with singular sources. (arXiv:1809.03529v1 [math.NA]) Cache Translate Page 
Authors: Irene Drelichman, Ricardo Durán, Ignacio Ojea We consider the approximation of Poisson type problems where the source is given by a singular measure and the domain is a convex polygonal or polyhedral domain. First, we prove the wellposedness of the Poisson problem when the source belongs to the dual of a weighted Sobolev space where the weight belongs to the Muckenhoupt class. Second, we prove the stability in weighted norms for standard finite element approximations under the quasiuniformity assumption on the family of meshes. 
Signatures for finitedimensional representations of real reductive Lie groups. (arXiv:1809.03533v1 [math.RT]) Cache Translate Page 
Authors: Daniil Kalinov, David A. Vogan, Jr., Christopher Xu We present a closed formula, analogous to the Weyl dimension formula, for the signature of an invariant Hermitian form on any finitedimensional irreducible representation of a real reductive Lie group, assuming that such a form exists. The formula shows in a precise sense that the form must be very indefinite. For example, if an irreducible representation of $GL(n,R)$ admits an invariant form of signature $(p,q)$, then we show that $(pq)^2 \le p+q$. The proof is an application of Kostant's computation of the kernel of the Dirac operator. 
Poisson geometry of the moduli of local systems on smooth varieties. (arXiv:1809.03536v1 [math.AG]) Cache Translate Page 
Authors: Tony Pantev, Bertrand Toen We study the moduli of Glocal systems on smooth but not necessarily proper complex algebraic varieties. We show that, when suitably considered as derived algebraic stacks, they carry natural Poisson structures, generalizing the well known case of curves. We also construct symplectic leaves of this Poisson structure by fixing local monodromies at infinity, and show that a new feature, called strictness, appears as soon as the divisor at infinity has nontrivial crossings. 
The Kauffman bracket skein module of the projective space. (arXiv:1809.03540v1 [math.GT]) Cache Translate Page 
Authors: Boštjan Gabrovšek Khovanov homology, an invariant of links in $\R^3$, is a graded homology theory that categorifies the Jones polynomial in the sense that the graded Euler characteristic of the homology is the Jones polynomial. Asaeda, Przytycki and Sikora generalized this construction by defining a double graded homology theory that categorifies the Kauffman bracket skein module of links in $I$bundles over surfaces, except for the surface $\rp^2$, where the construction fails due to strange behaviour of links when projected to the nonorientable surface $\rp^2$. This paper categorifies the missing case of the twisted $I$bundle over $\rp^2$, $\rp^2 \widetilde{\times} I \approx \rpt \setminus \{\ast\}$, by redefining the differential in the Khovanov chain complex in a suitable manner. 
The moduli space of matroids. (arXiv:1809.03542v1 [math.AG]) Cache Translate Page 
Authors: Matthew Baker, Oliver Lorscheid In the first part of the paper, we clarify the connections between several algebraic objects appearing in matroid theory: both partial fields and hyperfields are fuzzy rings, fuzzy rings are tracts, and these relations are compatible with the respective matroid theories. Moreover, fuzzy rings are ordered blueprints and lie in the intersection of tracts with ordered blueprints; we call the objects of this intersection pastures. In the second part, we construct moduli spaces for matroids over pastures. We show that, for any nonempty finite set $E$, the functor taking a pasture $F$ to the set of isomorphism classes of rank$r$ $F$matroids on $E$ is representable by an ordered blue scheme $Mat(r,E)$, the moduli space of rank$r$ matroids on $E$. In the third part, we draw conclusions on matroid theory. A classical rank$r$ matroid $M$ on $E$ corresponds to a $\mathbb{K}$valued point of $Mat(r,E)$ where $\mathbb{K}$ is the Krasner hyperfield. Such a point defines a residue pasture $k_M$, which we call the universal pasture of $M$. We show that for every pasture $F$, morphisms $k_M\to F$ are canonically in bijection with $F$matroid structures on $M$. An analogous weak universal pasture $k_M^w$ classifies weak $F$matroid structures on $M$. The unit group of $k_M^w$ can be canonically identified with the Tutte group of $M$. We call the subpasture $k_M^f$ of $k_M^w$ generated by ``crossratios' the foundation of $M$,. It parametrizes rescaling classes of weak $F$matroid structures on $M$, and its unit group is coincides with the inner Tutte group of $M$. We show that a matroid $M$ is regular if and only if its foundation is the regular partial field, and a nonregular matroid $M$ is binary if and only if its foundation is the field with two elements. This yields a new proof of the fact that a matroid is regular if and only if it is both binary and orientable. 
A logSobolev inequality for the multislice, with applications. (arXiv:1809.03546v1 [math.PR]) Cache Translate Page 
Authors: Yuval Filmus, Ryan O'Donnell, Xinyu Wu Let $\kappa \in \mathbb{N}_+^\ell$ satisfy $\kappa_1 + \dots + \kappa_\ell = n$ and let $\mathcal{U}_\kappa$ denote the "multislice" of all strings $u$ in $[\ell]^n$ having exactly $\kappa_i$ coordinates equal to $i$, for all $i \in [\ell]$. Consider the Markov chain on $\mathcal{U}_\kappa$, where a step is a random transposition of two coordinates of $u$. We show that the logSobolev constant $\rho_\kappa$ for the chain satisfies $$(\rho_\kappa)^{1} \leq n \sum_{i=1}^{\ell} \tfrac{1}{2} \log_2(4n/\kappa_i),$$ which is sharp up to constants whenever $\ell$ is constant. From this, we derive some consequences for smallset expansion and isoperimetry in the multislice, including a KKL Theorem, a KruskalKatona Theorem for the multislice, a Friedgut Junta Theorem, and a NisanSzegedy Theorem. 
Pursuit of LowRank Models of TimeVarying Matrices Robust to Sparse and Measurement Noise. (arXiv:1809.03550v1 [math.OC]) Cache Translate Page 
Authors: Albert Akhriev, Jakub Marecek, Andrea Simonetto In tracking of timevarying lowrank models of timevarying matrices, we present a method robust to both uniformlydistributed measurement noise and arbitrarilydistributed "sparse" noise. In theory, we bound the tracking error. In practice, our use of randomised coordinate descent is scalable and allows for encouraging results on changedetection.net, a benchmark. 
Unicyclic Strong Permutations. (arXiv:1809.03551v1 [cs.CR]) Cache Translate Page 
Authors: Claude Gravel, Daniel Panario, David Thomson For positive integers $n$ and $k$ such that $0\leq k\leq n1$, we study some properties of a certain kind of permutations $\sigma_{k}$ over $\mathbb{F}_{2}^{n}$. The properties that hold simultaneously are related to: (1) the algebraic degree of the boolean output bits: all of the $\sigma_{k}$'s considered have algebraic degree $n1$; (2) the cycle structure: the permutations $\sigma_{k}$ are unicyclic; (3) the average number of terms to describe the algebraic normal form of the boolean output bits: the average number of terms for each $\sigma_{k}$ is $2^{n1}$. We also study the composition $\sigma_{n1}\cdots\sigma_{0}=\sigma$ and notice a dichotomy about the cycle structure of $\sigma$ between odd and even values of $n$; while there are unicyclic permutations for odd $n$, we could not find any unicyclic permutation for even values of $n\leq 30$. For the composition $\sigma$, we also study empirically the differential uniformity for all values of $n\leq 16$ and notice that it never exceeds $6$. For some specific cases of $n=17$ and $n=19$, we report counts of the number of equal entries of their difference table and linear approximation table. The number of bits to describe either the $\sigma_{k}$'s or the composition $\sigma$ is only $O(n)$, and outputs can be generated on the fly. The analysis of the cycle structure bears some analogies with the analysis of continued fraction over finite fields. 
Partial Recovery of Erd\H{o}sR\'{e}nyi Graph Alignment via $k$Core Alignment. (arXiv:1809.03553v1 [cs.IT]) Cache Translate Page 
Authors: Daniel Cullina, Negar Kiyavash, Prateek Mittal, H. Vincent Poor We determine information theoretic conditions under which it is possible to partially recover the alignment used to generate a pair of sparse, correlated Erd\H{o}sR\'{e}nyi graphs. To prove our achievability result, we introduce the $k$core alignment estimator. This estimator searches for an alignment in which the intersection of the correlated graphs using this alignment has a minimum degree of $k$. We prove a matching converse bound. As the number of vertices grows, recovery of the alignment for a fraction of the vertices tending to one is possible when the average degree of the intersection of the graph pair tends to infinity. It was previously known that exact alignment is possible when this average degree grows faster than the logarithm of the number of vertices. 
Stress of a spatially uniform dislocation density field. (arXiv:1809.03567v1 [physics.classph]) Cache Translate Page 
Authors: Amit Acharya It can be shown that the stress produced by a spatially uniform dislocation density field in a body comprising a linear elastic material under no loads vanishes. We prove that the same result does not hold in general in the geometrically nonlinear case. This problem of mechanics establishes the purely geometrical result that the $\curl$ of a sufficiently smooth twodimensional rotation field cannot be a nonvanishing constant on a domain. 
Malliavin Calculus and Density for Singular Stochastic Partial Differential Equations. (arXiv:1809.03570v1 [math.PR]) Cache Translate Page 
Authors: Philipp Schönbauer We study Malliavin differentiability of solutions to subcritical singular parabolic stochastic partial differential equations (SPDEs) and we prove the existence of densities for a class of singular SPDEs. Both of these results are implemented in the setting of regularity structures. For this we construct renormalized models in situations where some of the driving noises are replaced by deterministic CameronMartin functions, and we show Lipschitz continuity of these models with respect to the CameronMartin norm. In particular, in many interesting situations we obtain a convergence and stability result for lifts of $L^2$functions to models, which is of independent interest. The proof also involves two separate algebraic extensions of the regularity structure which are carried out in rather large generality. 
Spatial Models of VectorHost Epidemics with Directed Movement of Vectors Over Long Distances. (arXiv:1809.03581v1 [math.AP]) Cache Translate Page 
Authors: W.E. Fitzgibbon, J.J. Morgan, Glenn F. Webb, Yixiang Wu We investigate a timedependent spatial vectorhost epidemic model with noncoincident domains for the vector and host populations. The host population resides in small nonoverlapping subregions, while the vector population resides throughout a much larger region. The dynamics of the populations are modeled by a reactiondiffusionadvection compartmental system of partial differential equations. The disease is transmitted through vector and host populations in crisscross fashion. We establish global wellposedness and uniform a prior bounds as well as the longterm behavior. The model is applied to simulate the outbreak of bluetongue disease in sheep transmitted by midges infected with bluetongue virus. We show that the longrange directed movement of the midge population, due to windaided movement, enhances the transmission of the disease to sheep in distant sites. 
Conflictfree connection number of random graphs. (arXiv:1809.03582v1 [math.CO]) Cache Translate Page 
Authors: Ran Gu, Xueliang Li An edgecolored graph $G$ is conflictfree connected if any two of its vertices are connected by a path which contains a color used on exactly one of its edges. The conflictfree connection number of a connected graph $G$, denoted by $cfc(G)$, is the smallest number of colors needed in order to make $G$ conflictfree connected. In this paper, we show that almost all graphs have the conflictfree connection number 2. More precisely, let $G(n,p)$ denote the Erd\H{o}sR\'{e}nyi random graph model, in which each of the $\binom{n}{2}$ pairs of vertices appears as an edge with probability $p$ independent from other pairs. We prove that for sufficiently large $n$, $cfc(G(n,p))\le 2$ if $p\ge\frac{\log n +\alpha(n)}{n}$, where $\alpha(n)\rightarrow \infty$. This means that as soon as $G(n,p)$ becomes connected with high probability, $cfc(G(n,p))\le 2$. 
Wandering Singularities. (arXiv:1809.03585v1 [math.DG]) Cache Translate Page 
Authors: Tobias Holck Colding, William P. Minicozzi II Parabolic geometric flows are smoothing for short time however, over long time, singularities are typically unavoidable, can be very nasty and may be impossible to classify. The idea of [CM6] and here is that, by bringing in the dynamical properties of the flow, we obtain also smoothing for large time for generic initial conditions. When combined with [CM1], this shows, in an important special case, the singularities are the simplest possible. The question of the dynamics of a singularity has two parts. One is: What are the dynamics near a singularity? The second is: What is the long time behavior? That is, if the flow leaves a neighborhood of a singularity, can it return at a much later time? The first question was addressed in [CM6] and the second here. Combined with [CM1], [CM6], we show that all other closed singularities than the (round) sphere have a neighborhood where `nearly every' closed hypersurface leaves under the flow and never returns, even to a dilated, rotated or translated copy of the singularity. In other words, it wanders off. In contrast, by Huisken, any closed hypersurface near a sphere remains close to a dilated or translated copy of the sphere at each time. 
On some rigorous aspects of fragmented condensation. (arXiv:1809.03586v1 [condmat.quantgas]) Cache Translate Page 
Authors: Daniele Dimonte, Marco Falconi, Alessandro Olgiati In this paper we discuss some aspects of finite fragmented condensation from a mathematical perspective. Inspired by techniques of pseudodifferential calculus and semiclassical analysis in Bosonic Quantum Field Theory, we propose a simple way of identifying finite fragmentation, and we analyze the effects of pair interaction on finite fragmented states. In particular, we focus on the persistence of finite fragmented condensation when the gap between the degenerate ground state and the excited states of the corresponding noninteracting system is very large. 
Unconstraining graphconstrained group testing. (arXiv:1809.03589v1 [cs.IT]) Cache Translate Page 
Authors: Bruce Spang, Mary Wootters In network tomography, one goal is to identify a small set of failed links in a network, by sending a few packets through the network and seeing which reach their destination. This problem can be seen as a variant of combinatorial group testing, which has been studied before under the moniker "graphconstrained group testing." The main contribution of this work is to show that for most graphs, the "constraints" imposed by the underlying network topology are no constraint at all. That is, the number of tests required to identify the failed links in "graphconstrained" group testing is nearoptimal even for the corresponding group testing problem with no graph constraints. Our approach is based on a simple randomized construction of tests, to analyze our construction, we prove new results about the size of giant components in randomly sparsified graphs. Finally, we provide empirical results which suggest that our connectedsubgraph tests perform better not just in theory but also in practice, and in particular perform better on a realworld network topology. 
On Hydrodynamic Limits of Young Diagrams. (arXiv:1809.03592v1 [mathph]) Cache Translate Page 
Authors: Ibrahim Fatkullin, Sunder Sethuraman, Jianfei Xue We consider a family of stochastic models of evolving twodimensional Young diagrams, given in terms of certain energies, with Gibbs invariant measures. `Static' scaling limits of the shape functions, under these Gibbs measures, have been shown by several over the years. The purpose of this article is to study corresponding `dynamical' limits of which less is understood. We show that the hydrodynamic scaling limits of the diagram shape functions may be described by different types parabolic PDEs, depending on the energy structure. 
Hamiltonian Berge cycles in random hypergraphs. (arXiv:1809.03596v1 [math.CO]) Cache Translate Page 
Authors: Deepak Bal, Pat Devlin In this note, we study the emergence of Hamiltonian Berge cycles in random $r$uniform hypergraphs. In particular, we show that for $r \geq 3$, the $2$out random $r$graph almost surely has such a cycle, and we use this to determine (up to a multiplicative factor) the threshold probability for when the Erd\H{o}sR\'enyi random $r$graph is likely to have such a cycle. In particular, in the Erd\H{o}sR\'enyi model we show (up to a constant factor depending on $r$) the emergence of these cycles essentially coincides with the disappearance of vertices of degree at most $1$. 
NonAsymptotic Inference in Instrumental Variables Estimation. (arXiv:1809.03600v1 [econ.EM]) Cache Translate Page 
Authors: Joel L. Horowitz This paper presents a simple method for carrying out inference in a wide variety of possibly nonlinear IV models under weak assumptions. The method is nonasymptotic in the sense that it provides a finite sample bound on the difference between the true and nominal probabilities of rejecting a correct null hypothesis. The method is a nonStudentized version of the AndersonRubin test but is motivated and analyzed differently. In contrast to the conventional AndersonRubin test, the method proposed here does not require restrictive distributional assumptions, linearity of the estimated model, or simultaneous equations. Nor does it require knowledge of whether the instruments are strong or weak. It does not require testing or estimating the strength of the instruments. The method can be applied to quantile IV models that may be nonlinear and can be used to test a parametric IV model against a nonparametric alternative. The results presented here hold in finite samples, regardless of the strength of the instruments. 
Conformal Lie algebras via deformation theory. (arXiv:1809.03603v1 [hepth]) Cache Translate Page 
Authors: José M. FigueroaO'Farrill We discuss possible notions of conformal Lie algebras, paying particular attention to graded conformal Lie algebras with $d$dimensional space isotropy: namely, those with a $\mathfrak{co}(d)$ subalgebra acting in a prescribed way on the additional generators. We classify those Lie algebras up to isomorphism for all $d\geq 2$ following the same methodology used recently to classify kinematical Lie algebras, as deformations of the `most abelian' graded conformal algebra. We find 17 isomorphism classes of Lie algebras for $d\neq 3$ and 23 classes for $d=3$. Lie algebra contractions define a partial order in the set of isomorphism classes and this is illustrated via the corresponding Hesse diagram. The only metric graded conformal Lie algebras are the simple Lie algebras, isomorphic to either $\mathfrak{so}(d{+}1,2)$ or $\mathfrak{so}(d{+}2,1)$. We also work out the central extensions of the graded conformal algebras and study their invariant inner products. We find that central extensions of a Lie algebra in $d=3$ and two Lie algebras in $d=2$ are metric. We then discuss several other notions of conformal Lie algebras (generalised conformal, Schr\"odinger and Lifshitz Lie algebras) and we present some partial results on their classification. We end with some open problems suggested by our results. 
Towards Practical Software Stack Decoding of Polar Codes. (arXiv:1809.03606v1 [cs.IT]) Cache Translate Page 
Authors: Harsh Aurora, Warren J. Gross The successive cancellation list decoding algorithm for polar codes yields nearoptimal decoding performance at the cost of high implementation complexity. The successive cancellation stack algorithm has been shown to provide similar decoding performance at a much lower computational complexity, but software implementations report a subpar T/P performance. In this technical report, the benefits of the fast simplified successive cancellation list decoder are extended to the stack algorithm, resulting in a throughput increase by two orders of magnitude over the traditional stack decoder. 
Characterizations of TiltStable Minimizers in SecondOrder Cone Programming. (arXiv:1809.03607v1 [math.OC]) Cache Translate Page 
Authors: Matúš Benko, Helmut Gfrerer, Boris S. Mordukhovich This paper is devoted to the study of tilt stability of local minimizers, which plays an important role in both theoretical and numerical aspects of optimization. This notion has been comprehensively investigated in the unconstrained framework as well as for problems of nonlinear programming with $C^2$smooth data. Available results for nonpolyhedral conic programs were obtained only under strong constraint nondegeneracy assumptions. Here we develop an approach of secondorder variational analysis, which allows us to establish complete neighborhood and pointbased characterizations of tilt stability for problems of secondorder cone programming generated by the nonpolyhedral secondorder/Lorentz/icecream cone. These characterizations are established under the weakest metric subregularity constraint qualification condition. 
Optimal Strategies for Disjunctive Sensing and Control. (arXiv:1809.03608v1 [math.OC]) Cache Translate Page 
Authors: Richard L Sutherland, Ilya V Kolmanovsky, Anouck R Girard, Frederick A Leve, Christopher D Petersen A disjunctive sensing and actuation problem is considered in which the actuators and sensors are prevented from operating together over any given time step. This problem is motivated by practical applications in the area of spacecraft control. Assuming a linear system model with stochastic process disturbance and measurement noise, a procedure to construct a periodic sequence that ensures bounded states and estimation error covariance is described along with supporting analysis results. The procedure is also extended to ensure eventual satisfaction of probabilistic chance constraints on the state. The proposed scheme demonstrates good performance in simulations for spacecraft relative motion control. 
Decomposing Frobenius Heisenberg categories. (arXiv:1809.03613v1 [math.RT]) Cache Translate Page 
Authors: Raj Gandhi We give two alternate presentations of the Frobenius Heisenberg category, $\mathcal{Heis}_{F,k}$, defined by Savage, when the Frobenius algebra $F=F_1\oplus\dotsb\oplus F_n$ decomposes as a direct sum of Frobenius subalgebras. In these alternate presentations, the morphism spaces of $\mathcal{Heis}_{F,k}$ are given in terms of planar diagrams consisting of strands "colored" by integers $i=1,\dotsc,n$, where a strand of color $i$ carries tokens labelled by elements of $F_i.$ In addition, we prove that when $F$ decomposes this way, the tensor product of Frobenius Heisenberg categories, $\mathcal{Heis}_{F_1,k}\otimes\dotsb\otimes\mathcal{Heis}_{F_n,k},$ is equivalent to a certain subcategory of the Karoubi envelope of $\mathcal{Heis}_{F,k}$ that we call the $\textit{partial}$ Karoubi envelope of $\mathcal{Heis}_{F,k}$. 
On the Capacity Region for Secure Index Coding. (arXiv:1809.03615v1 [cs.IT]) Cache Translate Page 
Authors: Yuxin Liu, Badri N. Vellambi, YoungHan Kim, Parastoo Sadeghi We study the index coding problem in the presence of an eavesdropper, where the aim is to communicate without allowing the eavesdropper to learn any single message aside from the messages it may already know as side information. We establish an outer bound on the underlying secure capacity region of the index coding problem, which includes polymatroidal and security constraints, as well as the set of additional decoding constraints for legitimate receivers. We then propose a secure variant of the composite coding scheme, which yields an inner bound on the secure capacity region of the index coding problem. For the achievability of secure composite coding, a secret key with vanishingly small rate may be needed to ensure that each legitimate receiver who wants the same message as the eavesdropper, knows at least two more messages than the eavesdropper. For all securely feasible index coding problems with four or fewer messages, our numerical results establish the secure index coding capacity region. 
Social cognitive optimization with tent map for combined heat and power economic dispatch. (arXiv:1809.03616v1 [math.OC]) Cache Translate Page 
Combined heat and power economic dispatch (CHPED) problem is a sophisticated constrained nonlinear optimization problem in a heat and power production system for assigning heat and power production to minimize the production costs. To address this challenging problem, a novel social cognitive optimization algorithm with tent map (TSCO) is presented for solving the CHPED problem. To handle the equality constraints in heat and power balance constraints, adaptive constraints relaxing rule is adopted in constraint processing. The novelty of our work lies in the introduction of a new powerful TSCO algorithm to solve the CHPED issue. The effectiveness and superiority of the presented algorithm is validated by conducting 2 typical CHPED cases. The numerical results show that the proposed approach has better convergence speed and solution quality than all other existing stateoftheart algorithms. 
New Lower Bounds for the Number of Pseudoline Arrangements. (arXiv:1809.03619v1 [math.CO]) Cache Translate Page 
Authors: Adrian Dumitrescu, Ritankar Mandal Arrangements of lines and pseudolines are fundamental objects in discrete and computational geometry. They also appear in other areas of computer science, such as the study of sorting networks. Let $B_n$ be the number of arrangements of $n$ pseudolines and let $b_n=\log{B_n}$. The problem of estimating $B_n$ was posed by Knuth in 1992. Knuth conjectured that $b_n \leq {n \choose 2} + o(n^2)$ and also derived the first upper and lower bounds: $b_n \leq 0.7924 (n^2 +n)$ and $b_n \geq n^2/6 O(n)$. The upper bound underwent several improvements, $b_n \leq 0.6988 n^2$ (Felsner, 1997), and $b_n \leq 0.6571 n^2$ (Felsner and Valtr, 2011), for large $n$. Here we show that $b_n \geq cn^2 O(n \log{n})$ for some constant $c>0.2083$. In particular, $b_n \geq 0.2083 \, n^2$ for large $n$. This improves the previous best lower bound, $b_n \geq 0.1887 n^2$, due to Felsner and Valtr (2011). Our arguments are elementary and geometric in nature. Further, our constructions are likely to spur new developments and improved lower bounds for related problems, such as in topological graph drawings. 
Approximate abstractions of control systems with an application to aggregation. (arXiv:1809.03621v1 [math.OC]) Cache Translate Page 
Authors: Stanley W. Smith, Murat Arcak, Majid Zamani Previous approaches to constructing abstractions for control systems rely on geometric conditions or, in the case of an interconnected control system, a condition on the interconnection topology. Since these conditions are not always satisfiable, we relax the restrictions on the choice of abstractions, instead opting to select ones which nearly satisfy such conditions via optimizationbased approaches. To quantify the resulting effect on the error between the abstraction and concrete control system, we introduce the notions of practical simulation functions and practical storage functions. We show that our approach facilitates the procedure of aggregation, where one creates an abstraction by partitioning agents into aggregate areas. We demonstrate the results on an application where we regulate the temperature in three separate zones of a building. 
A KazhdanLusztig algorithm for Whittaker modules. (arXiv:1809.03622v1 [math.RT]) Cache Translate Page 
Authors: Anna Romanov We study a category of Whittaker modules over a complex semisimple Lie algebra by realizing it as a category of twisted Dmodules on the associated flag variety using BeilinsonBernstein localization. The main result of this paper is the development of a geometric algorithm for computing the composition multiplicities of standard Whittaker modules. This algorithm establishes that these multiplicities are determined by a collection of polynomials we refer to as Whittaker KazhdanLusztig polynomials. In the case of trivial nilpotent character, this algorithm specializes to the usual algorithm for computing multiplicities of composition factors of Verma modules using KazhdanLusztig polynomials. 
A Brief History of Persistence. (arXiv:1809.03624v1 [math.AT]) Cache Translate Page 
Authors: Jose A. Perea Persistent homology is currently one of the more widely known tools from computational topology and topological data analysis. We present in this note a brief survey on the evolution of the subject. The goal is to highlight the main ideas, starting from the subject's computational inception more than 20 years ago, to the more modern categorical and representationtheoretic point of view. 
Probabilistic Condition Number Estimates for Real Polynomial Systems II: Structure and Smoothed Analysis. (arXiv:1809.03626v1 [math.AG]) Cache Translate Page 
Authors: Alperen A. Ergür, Grigoris Paouris, J. Maurice Rojas We consider the sensitivity of real zeros of polynomial systems with respect to perturbation of the coefficients, and extend our earlier probabilistic estimates for the condition number in two directions: (1) We give refined bounds for the condition number of random structured polynomial systems, depending on a variant of sparsity and an intrinsic geometric quantity called dispersion. (2) Given any structured polynomial system $P$, we prove the existence of a nearby wellconditioned structured polynomial system $Q$, with explicit quantitative estimates. Our underlying notion of structure is to consider a linear subspace $E_i$ of the space $H_{d_i}$ of homogeneous $n$variate polynomials of degree $d_i$, let our polynomial system $P$ be an element of $E:=E_1\times \cdots \times E_{n1}$, and let $\dim(E):=\dim(E_1) +\cdots+\dim(E_{n1})$ be our measure of sparsity. The dispersion $\sigma(E)$ provides a rough measure of how suitable the tuple $E$ is for numerical solving. Part I of this series studied how to extend probabilistic estimates of a condition number defined by Cucker to a family of measures going beyond the weighted Gaussians often considered in the current literature. We continue at this level of generality, using tools from geometric functional analysis. 
Network Coded Handover in IEEE 802.11. (arXiv:1809.03629v1 [cs.IT]) Cache Translate Page 
Authors: Samah A. M. Ghanem We propose a network coded handover of a station moving between two IEEE 802.11 access points (AP). To address such novel proposed framework on a small cell WiFi to WiFi AP handoff, we propose a novel model for the Distributed Coordination Function (DCF) of the WiFi IEEE 802.11 with fixed average contention window. We provide a single packet tranmission model which has been extended to Npackets transmission models with and without fragmentation. We also model the Npacket transmission for the uncoded/coded packets broadcast in order to compare the IEEE 802.11 unreliable to reliable coded broadcast with ACK. We analyze the delay over all, unicast and broadcast transmissions, for the scenario considered with a topology with one WiFi AP before the handover. Capitalizing on the set of models and their corresponding mean completion times (delay), we analyze the performance of different mechanisms. Finally, we provide a novel formulation of the Network Coding on the Edge handover when the station is mobile allowing for the derivation of optimal transmission strategies that can define an optimal time, when to switch to the other AP. 
Whitney equisingularity in families of generically reduced curves. (arXiv:1809.03630v1 [math.CV]) Cache Translate Page 
Authors: O.N. Silva, J. Snoussi In this work we study equisingularity in a oneparameter flat family of generically reduced curves. We consider some equisingular criteria as topological triviality, Whitney equisingularity and strong simultaneous resolution. In this context, we prove that Whitney equisingularity is equivalent to strong simultaneous resolution and also is equivalent to the constancy of the Milnor number and the multiplicity of the fibers. These results are extensions to the case of flat deformations of generically reduced curves, of known results on reduced curves. When the family $(X,0)$ is topologically trivial, we also characterize Whitney equisingularity through CohenMacaulay property of a certain local ring associated to the parameter space of the family. 
Path prediction of aggregated $\alpha$stable moving averages using seminorm representations. (arXiv:1809.03631v1 [math.PR]) Cache Translate Page 
Authors: Sébastien Fries For $(X_t)$ a twosided $\alpha$stable moving average, this paper studies the conditional distribution of future paths given a piece of observed trajectory when the process is far from its central values. Under this framework, vectors of the form $\boldsymbol{X}_t=(X_{tm},\ldots,X_t,X_{t+1},\ldots,X_{t+h})$, $m\ge0$, $h\ge1$, are multivariate $\alpha$stable and the dependence between the past and future components is encoded in their spectral measures. A new representation of stable random vectors on unit cylinders sets $\{\boldsymbol{s}\in\mathbb{R}^{m+h+1}: \hspace{0.3cm} \\boldsymbol{s}\=1\}$ for $\\cdot\$ an adequate seminorm is proposed in order to describe the tail behaviour of vectors $\boldsymbol{X}_t$ when only the first $m+1$ components are assumed to be observed and large in norm. Not all stable vectors admit such a representation and $(X_t)$ will have to be <<anticipative enough>> for $\boldsymbol{X}_t$ to admit one. The conditional distribution of future paths can then be explicitly derived using the regularly varying tails property of stable vectors and has a natural interpretation in terms of pattern identification. The approach extends to processes resulting from the linear combination of stable moving averages and applied to several examples. 
Critical Percolation on Random Networks with Prescribed Degrees. (arXiv:1809.03634v1 [math.PR]) Cache Translate Page 
Authors: Souvik Dhara Random graphs have played an instrumental role in modelling realworld networks arising from the internet topology, social networks, or even proteininteraction networks within cells. Percolation, on the other hand, has been the fundamental model for understanding robustness and spread of epidemics on these networks. From a mathematical perspective, percolation is one of the simplest models that exhibits phase transition, and fascinating features are observed around the critical point. In this thesis, we prove limit theorems about structural properties of the connected components obtained from percolation on random graphs at criticality. The results are obtained for random graphs with general degree sequence, and we identify different universality classes for the critical behavior based on moment assumptions on the degree distribution. 
On the twosystole of real projective spaces. (arXiv:1809.03636v1 [math.DG]) Cache Translate Page 
Authors: Lucas Ambrozio, Rafael Montezuma In this short note, we establish an integralgeometric formula for minimal twospheres inside homogeneous threespheres, and use it to provide a characterisation of each homogeneous metric on the threedimensional real projective space as the unique metric with the largest possible twosystole among metrics with the same volume in its conformal class. 
On the width of unit volume threespheres. (arXiv:1809.03638v1 [math.DG]) Cache Translate Page 
Authors: Lucas Ambrozio, Rafael Montezuma How large can be the width of Riemannian threespheres of the same volume in the same conformal class? If a maximum value is attained, how does a maximising metric look like? What happens as the conformal class changes? In this paper, we investigate these and other related questions, focusing on the context of SimonSmith minmax theory. 
On cylindricity of submanifolds of nonnegative Ricci curvature in a Minkowski space. (arXiv:1809.03639v1 [math.DG]) Cache Translate Page 
Authors: A.Borisenko, Y.Nikolayevsky We consider Finsler submanifolds $M^n$ of nonnegative Ricci curvature in a Minkowski space $\mathbb{M}^{n+p}$ which contain a line or whose relative nullity index is positive. For hypersurfaces, submanifolds of codimension two or of dimension two, we prove that the submanifold is a cylinder, under a certain condition on the inertia of the pencil of the second fundamental forms. We give an example of a surface of positive flag curvature in a threedimensional Minkowski space which is not locally convex. 
On The Painleve Property For A Class Of Quasilinear Partial Differential Equations. (arXiv:1809.03640v1 [nlin.SI]) Cache Translate Page 
Authors: Stanislav Sobolevsky The last decades saw growing interest across multiple disciplines in nonlinear phenomena described by partial differential equations (PDE). Integrability of such equations is tightly related with the Painleve property  solutions being free from moveable critical singularities. The problem of Painleve classification of ordinary and partial nonlinear differential equations lasting since the end of XIX century saw significant advances for the equation of lower (mainly up to fourth with rare exceptions) order, however not that much for the equations of higher orders. Recent works of the author have completed the Painleve classification for several broad classes of ordinary differential equations of arbitrary order, advancing the methodology of the Panleve analysis. This paper transfers one of those results on a broad class of nonlinear partial differential equations  quasilinear equations of an arbitrary order three or higher, algebraic in the dependent variable and including only the highest order derivatives of it. Being a first advance in Painleve classification of broad classes of arbitrary order nonlinear PDE's known to the author, this work highlights the potential in building classifications of that kind going beyond specific equations of a limited order, as mainly considered so far. 
Model Risk Measurement under Wasserstein Distance. (arXiv:1809.03641v1 [qfin.MF]) Cache Translate Page 
Authors: Yu Feng, Erik Schlögl The paper proposes a new approach to model risk measurement based on the Wasserstein distance between two probability measures. It formulates the theoretical motivation resulting from the interpretation of fictitious adversary of robust risk management. The proposed approach accounts for all alternative models and incorporates the economic reality of the fictitious adversary. It provides practically feasible results that overcome the restriction and the integrability issue imposed by the nominal model. The Wasserstein approach suits for all types of model risk problems, ranging from the singleasset hedging risk problem to the multiasset allocation problem. The robust capital allocation line, accounting for the correlation risk, is not achievable with other nonparametric approaches. 
A measure of transcendence for singular points on conics. (arXiv:1809.03642v1 [math.NT]) Cache Translate Page 
Authors: Damien Roy A singular point on a plane conic defined over $\mathbb{Q}$ is a transcendental point of the curve which admits very good rational approximations, uniformly in terms of the height. Extremal numbers and Sturmian continued fractions are abscissa of such points on the parabola $y=x^2$. In this paper we provide a measure of transcendence for singular points on conics defined over $\mathbb{Q}$ which, in these two cases, improves on the measure obtained by Adamczewski et Bugeaud. The main tool is a quantitative version of Schmidt subspace theorem due to Evertse. 
Pseudocharacters of Classical Groups. (arXiv:1809.03644v1 [math.RT]) Cache Translate Page 
Authors: Matthew Weidner A $GL_d$pseudocharacter is a function from a group $\Gamma$ to a ring $k$ satisfying polynomial relations which make it "look like" the character of a representation. When $k$ is an algebraically closed field, Taylor proved that $GL_d$pseudocharacters of $\Gamma$ are the same as degree$d$ characters of $\Gamma$ with values in $k$, hence are in bijection with equivalence classes of semisimple representations $\Gamma \rightarrow GL_d(k)$. Recently, V. Lafforgue generalized this result by showing that, for any connected reductive group $H$ over an algebraically closed field $k$ of characteristic 0 and for any group $\Gamma$, there exists an infinite collection of functions and relations which are naturally in bijection with $H^0(k)$conjugacy classes of semisimple representations $\Gamma \rightarrow H(k)$. In this paper, we reformulate Lafforgue's result in terms of a new algebraic object called an FFGalgebra. We then define generating sets and generating relations for these objects and show that, for all $H$ as above, the corresponding FFGalgebra is finitely presented. Hence we can always define $H$pseudocharacters consisting of finitely many functions satisfying finitely many relations. Next, we use invariant theory to give explicit finite presentations of the FFGalgebras for (general) orthogonal groups, (general) symplectic groups, and special orthogonal groups. Finally, we use our pseudocharacters to answer questions about conjugacy vs. elementconjugacy of representations, following Larsen. 
SuperIsolated Abelian Varieties. (arXiv:1809.03649v1 [math.NT]) Cache Translate Page 
Authors: Travis Scholl We call an abelian variety over a finite field $\mathbb{F}_q$ superisolated if its ($\mathbb{F}_q$rational) isogeny class contains a single isomorphism class. In this paper, we use the HondaTate theorem to characterize superisolated ordinary simple abelian varieties by certain algebraic integers. Our main result is that for a fixed dimension $g \geq 3$, there are finitely many such varieties. 
Exploiting the structure effectively and efficiently in low rank matrix recovery. (arXiv:1809.03652v1 [math.NA]) Cache Translate Page 
Authors: JianFeng Cai, Ke Wei Low rank model arises from a wide range of applications, including machine learning, signal processing, computer algebra, computer vision, and imaging science. Low rank matrix recovery is about reconstructing a low rank matrix from incomplete measurements. In this survey we review recent developments on low rank matrix recovery, focusing on three typical scenarios: matrix sensing, matrix completion and phase retrieval. An overview of effective and efficient approaches for the problem is given, including nuclear norm minimization, projected gradient descent based on matrix factorization, and Riemannian optimization based on the embedded manifold of low rank matrices. Numerical recipes of different approaches are emphasized while accompanied by the corresponding theoretical recovery guarantees. 
Energyefficient Decision Fusion for Distributed Detection in Wireless Sensor Networks. (arXiv:1809.03653v1 [cs.IT]) Cache Translate Page 
Authors: N. Sriranga, K. G. Nagananda, R. S. Blum, A. Saucan, P. K. Varshney This paper proposes an energyefficient counting rule for distributed detection by ordering sensor transmissions in wireless sensor networks. In the counting rulebased detection in an $N$sensor network, the local sensors transmit binary decisions to the fusion center, where the number of all $N$ localsensor detections are counted and compared to a threshold. In the ordering scheme, sensors transmit their unquantized statistics to the fusion center in a sequential manner; highly informative sensors enjoy higher priority for transmission. When sufficient evidence is collected at the fusion center for decision making, the transmissions from the sensors are stopped. The ordering scheme achieves the same error probability as the optimum unconstrained energy approach (which requires observations from all the $N$ sensors) with far fewer sensor transmissions. The scheme proposed in this paper improves the energy efficiency of the counting rule detector by ordering the sensor transmissions: each sensor transmits at a time inversely proportional to a function of its observation. The resulting scheme combines the advantages offered by the counting rule (efficient utilization of the network's communication bandwidth, since the local decisions are transmitted in binary form to the fusion center) and ordering sensor transmissions (bandwidth efficiency, since the fusion center need not wait for all the $N$ sensors to transmit their local decisions), thereby leading to significant energy savings. As a concrete example, the problem of target detection in largescale wireless sensor networks is considered. Under certain conditions the orderingbased counting rule scheme achieves the same detection performance as that of the original counting rule detector with fewer than $N/2$ sensor transmissions; in some cases, the savings in transmission approaches $(N1)$. 
KahlerRicci flow on blowups along submanifolds. (arXiv:1809.03654v1 [math.DG]) Cache Translate Page 
Authors: Bin Guo In this short note, we study the behavior of KaherRicci flow on Kahler manifolds which contract divisors to smooth submanifolds. We show that the Kahler potentials are Holder continuous and the flow converges sequentially in GromovHausdorff topology to a compact metric space which is homeomorphic to the base manifold. 
Uplink Cooperative NOMA for CellularConnected UAV. (arXiv:1809.03657v1 [cs.IT]) Cache Translate Page 
Authors: Weidong Mei, Rui Zhang Aerialground interference mitigation is a challenging issue in the cellularconnected unmanned aerial vehicle (UAV) communications. Due to the strong lineofsight (LoS) airtoground (A2G) channels, the UAV may impose/suffer more severe uplink/downlink interference to/from the cellular base stations (BSs) than the ground users. To tackle this challenge, we propose to apply the nonorthogonal multiple access (NOMA) technique to the uplink communication from a UAV to cellular BSs, under spectrum sharing with the existing ground users. However, for our considered system, traditional NOMA with local interference cancellation (IC), termed noncooperative NOMA, may provide very limited gain compared to the OMA. This is because there are many cochannel BSs due to the LoS A2G channels and thus the UAV's rate performance is severely limited by the BS with the worst channel condition with the UAV. To improve the UAV's achievable rate, a new cooperative NOMA scheme is proposed by exploiting the backhaul links among BSs. Specifically, some BSs with better channel conditions are selected to decode the UAV's signals first, and then forward the decoded signals to their backhaulconnected BSs for IC. To investigate the optimal design of cooperative NOMA, we maximize the weighted sumrate of the UAV and ground users by jointly optimizing the UAV's rate and power allocations over multiple resource blocks. However, this problem is hard to be solved optimally. To obtain useful insights, we first consider two special cases with egoistic and altruistic transmission strategies of the UAV, respectively, and solve their corresponding problems optimally. Next, we consider the general case and propose an efficient suboptimal solution via the alternating optimization. Numerical results show that the proposed cooperative NOMA yields significant throughput gains than the OMA and the noncooperative NOMA benchmark. 
Algebraic Structure of Holomorphic Poisson Cohomology on Nilmanifolds. (arXiv:1809.03660v1 [math.AG]) Cache Translate Page 
Authors: Yat Sun Poon, John Simanyi It is proved that on nilmanifolds with abelian complex structure, there exists a canonically constructed nontrivial holomorphic Poisson structure. We identify the necessary and sufficient condition for its associated cohomology to be isomorphic to the cohomology associated to trivial (zero) holomorphic Poisson structure. We also identify a sufficient condition for this isomorphism to be at the level of Gerstenhaber algebras. 
Vorticity measures and the inviscid limit. (arXiv:1809.03661v1 [math.AP]) Cache Translate Page 
Authors: Peter Constantin, Milton Lopes Filho, Helena Nussenzveig Lopes, Vlad Vicol We consider a sequence of LerayHopf weak solutions of the 2D NavierStokes equations on a bounded domain, in the vanishing viscosity limit. We provide sufficient conditions on the associated vorticity measures, away from the boundary, which ensure that as the viscosity vanishes the sequence converges to a weak solution of the Euler equations. These assumptions are consistent with vortex sheet solutions of the Euler equations. 
Multiple list colouring trianglefree planar graphs. (arXiv:1809.03665v1 [math.CO]) Cache Translate Page 
Authors: Yiting Jiang, Xuding Zhu This paper proves that for each positive integer $m$, there is a trianglefree planar graph $G$ which is not $(3m+ \lceil \frac m{17} \rceil1, m)$choosable. 
Universal mixed sums of generalized $4$ and $8$gonal numbers. (arXiv:1809.03673v1 [math.NT]) Cache Translate Page 
Authors: Jangwon Ju, ByeongKweon Oh An integer of the form $P_m(x)= \frac{(m2)x^2(m4)x}{2}$ for an integer $x$, is called a generalized $m$gonal number. For positive integers $\alpha_1,\dots,\alpha_u$ and $\beta_1,\dots,\beta_v$, a mixed sum $\Phi=\alpha_1P_4(x_1)+\cdots+\alpha_uP_4(x_u)+\beta_1P_8(y_1)+\cdots+\beta_vP_8(y_v)$ of generalized $4$ and $8$gonal numbers is called universal if $\Phi=N$ has an integer solution for any nonnegative integer $N$. In this article, we prove that there are exactly 1271 proper universal mixed sums of generalized $4$ and $8$gonal numbers. Furthermore, the "$61$theorem" is proved, which states that an arbitrary mixed sum of generalized $4$ and $8$gonal numbers is universal if and only if it represents the integers $1$, $2$, $3$, $4$, $5$, $6$, $7$, $8$, $9$, $10$, $12$, $13$, $14$, $15$, $18$, $20$, $30$, $60$, and $61$. 
Central limit theorem near the critical temperature for the overlap in the 2spin spherical SK model. (arXiv:1809.03675v1 [math.PR]) Cache Translate Page 
Authors: Vu Lan Nguyen, Philippe Sosoe We prove a central limit theorem for the normalized overlap between two replicas in the spherical SK model in the high temperature phase. The convergence holds almost surely with respect to the disorder variables, and the inverse temperature can approach the criticial value at a polynomial rate with any exponent strictly greater than $1/3$. 
Equivariant cohomology of torus orbifolds. (arXiv:1809.03678v1 [math.AT]) Cache Translate Page 
Authors: Alastair Darby, Shintaro Kuroki, Jongbaek Song We calculate the integral equivariant cohomology, in terms of generators and relations, of locally standard torus orbifolds whose odd degree ordinary cohomology vanishes. We begin by studying GKMorbifolds, which are more general, before specialising to halfdimensional torus actions. 
CNNBased Signal Detection for Banded Linear Systems. (arXiv:1809.03682v1 [cs.IT]) Cache Translate Page 
Authors: Congmin Fan, Xiaojun Yuan, YingJun Angela Zhang Banded linear systems arise in many communication scenarios, e.g., those involving intercarrier interference and intersymbol interference. Motivated by recent advances in deep learning, we propose to design a highaccuracy lowcomplexity signal detector for banded linear systems based on convolutional neural networks (CNNs). We develop a novel CNNbased detector by utilizing the banded structure of the channel matrix. Specifically, the proposed CNNbased detector consists of three modules: the input preprocessing module, the CNN module, and the output postprocessing module. With such an architecture, the proposed CNNbased detector is adaptive to different system sizes, and can overcome the curse of dimensionality, which is a ubiquitous challenge in deep learning. Through extensive numerical experiments, we demonstrate that the proposed CNNbased detector outperforms conventional deep neural networks and existing modelbased detectors in both accuracy and computational time. Moreover, we show that CNN is flexible for systems with large sizes or wide bands. We also show that the proposed CNNbased detector can be easily extended to nearbanded systems such as doubly selective orthogonal frequency division multiplexing (OFDM) systems and 2D magnetic recording (TDMR) systems, in which the channel matrices do not have a strictly banded structure. 
Irreducible component of affine DeligneLusztig varieties. (arXiv:1809.03683v1 [math.AG]) Cache Translate Page 
Authors: Sian Nie By extending the method of semimodules developed by de Jong,Oort, Viehmann and Hamacher, we introduce a stratification for the affine DeligneLusztig variety (in the affine Grassmannian) attached to a basic element. As an application, we verify a conjecture, due to M. Chen and X. Zhu, on the irreducible components of the affine DeligneLusztig variety attached to a sum of dominant minuscule coweights. 
Addendum to 'The equivariant spectral function of an invariant elliptic operator'. (arXiv:1809.03687v1 [math.SP]) Cache Translate Page 
Authors: Pablo Ramacher Let $M$ be a compact boundaryless Riemannian manifold, carrying an effective and isometric action of a torus $T$, and $P_0$ an invariant elliptic classical pseudodifferential operator on $M$. In this note, we strengthen asymptotics for the equivariant (or reduced) spectral function of $P_0$ derived previously, which are already sharp in the eigenvalue aspect, to become almost sharp in the isotypic aspect. In particular, this leads to hybrid equivariant $L^p$bounds for eigenfunctions that are almost sharp in the eigenvalue and isotypic aspect. 
A classification of proper holomorphic mappings between generalized pseudoellipsoids of different dimensions. (arXiv:1809.03691v1 [math.CV]) Cache Translate Page 
Authors: Atsushi Hayashimoto We classify proper holomorphic mappings between generalized pseudoellipsoids of different dimensions. Those domains are parametrized by the exponents. The relations among them are also obtained. Main tool is the orthogonal decomposition of a CR bundle. Such a decomposition derives the `variablesplitting' of the mapping. 
Chaotic translations on weighted Orlicz spaces. (arXiv:1809.03694v1 [math.FA]) Cache Translate Page 
Authors: ChungChuan Chen, KuiYo Chen, Serap Öztop, Seyyed Mohammad Tabatabaie Let $G$ be a locally compact group, $w$ be a weight on $G$ and $\Phi$ be a Young function. We give some characterizations for translation operators to be topologically transitive and chaotic on the weighted Orlicz space $L_w^\Phi(G)$. In particular, transitivity is equivalent to the blowup/collapse property in our case. Moreover, the dense set of periodic elements implies transitivity automatically. 
The spectra of finite 3transposition groups. (arXiv:1809.03696v1 [math.GR]) Cache Translate Page 
Authors: Jonathan I. Hall, Sergey Shpectorov We calculate the spectrum of the diagram for each finite $3$transposition group. Such graphs with a given minimal eigenvalue have occurred in the context of compact Griess subalgebras of vertex operator algebras. 
CAPRL: Signal Recovery from Compressive Affine Phase Retrieval via Lifting. (arXiv:1809.03700v1 [math.OC]) Cache Translate Page 
Authors: Wengu Chen, Peng Li, Qiyu Sun In this paper, we consider compressive/sparse affine phase retrieval proposed in [B. Gao B, Q. Sun, Y. Wang and Z. Xu, Adv. in Appl. Math., 93(2018), 121141]. By the lift technique, and heuristic nuclear norm for convex relaxation of rank and $\ell$ one norm convex relaxation of sparsity, we establish convex models , which are called compressive affine phase retrieval via lifting (CAPRL). In order to compute these models, we develop inertial proximal ADMM for multiple separated operators and also give out its convergence analysis. Our numerical experiments via proposed algorithm show that sparse signal can be exactly and stably recovered via CAPRL. We also list some other applications of our proposed algorithm. 
Fold cobordisms and a PoincareHopf type theorem for the signature. (arXiv:1809.03703v1 [math.GT]) Cache Translate Page 
Authors: Boldizsar Kalmar We give complete geometric invariants of cobordisms of framed fold maps. These invariants consist of two types. We take the immersion of the fold singular set into the target manifold together with information about nontriviality of the normal bundle of the singular set in the source manifold. These invariants were introduced in the author's earlier works. Secondly we take the induced stable partial framing on the source manifold whose cobordisms were studied in general by Koschorke. We show that these invariants describe completely the cobordism groups of framed fold maps into R^n. Then we are looking for dependencies between these invariants and we study fold maps of 4kdimensional manifolds into R^2. We construct special fold maps which are representatives of the fold cobordism classes and we also compute cobordism groups. We obtain a PoincareHopf type formula, which connects local data of the singularities of a fold map of an oriented 4kdimensional manifold M to the signature of M. We also study the unoriented case analogously and prove a similar formula about the twisting of the normal bundle of the fold singular set. 
Robust Resource Allocation for UAV Systems with UAV Jittering and User Location Uncertainty. (arXiv:1809.03706v1 [cs.IT]) Cache Translate Page 
Authors: Dongfang Xu, Yan Sun, Derrick Wing Kwan Ng, Robert Schober In this paper, we investigate resource allocation algorithm design for multiuser unmanned aerial vehicle (UAV) communication systems in the presence of UAV jittering and user location uncertainty. In particular, we jointly optimize the twodimensional position and the downlink beamformer of a fixedaltitude UAV for minimization of the total UAV transmit power. The problem formulation takes into account the qualityofservice requirements of the users, the imperfect knowledge of the antenna array response (AAR) caused by UAV jittering, and the user location uncertainty. Despite the nonconvexity of the resulting problem, we solve the problem optimally employing a series of transformations and semidefinite programming relaxation. Our simulation results reveal the dramatic power savings enabled by the proposed robust scheme compared to two baseline schemes. Besides, the robustness of the proposed scheme with respect to imperfect AAR knowledge and user location uncertainty at the UAV is also confirmed. 
Some inequalities for intervalvalued functions on time scales. (arXiv:1809.03709v1 [math.CA]) Cache Translate Page 
Authors: Dafang Zhao, Guoju Ye, Wei Liu, Delfim F. M. Torres We introduce the interval Darboux delta integral (shortly, the $ID$ $\Delta$integral) and the interval Riemann delta integral (shortly, the $IR$ $\Delta$integral) for intervalvalued functions on time scales. Fundamental properties of $ID$ and $IR$ $\Delta$integrals and examples are given. Finally, we prove Jensen's, H\"{o}lder's and Minkowski's inequalities for the $IR$ $\Delta$integral. Also, some examples are given to illustrate our theorems. 
Orbifold products for higher Ktheory and motivic cohomology. (arXiv:1809.03710v1 [math.AG]) Cache Translate Page 
Authors: Lie Fu, Manh Toan Nguyen Due to the work of many authors in the last decades, given an algebraic orbifold (smooth proper DeligneMumford stack with trivial generic stabilizer), one can construct its orbifold Chow ring and orbifold Grothendieck ring, and relate them by the orbifold Chern character map, generalizing the fundamental work of ChenRuan on orbifold cohomology. In this paper, we extend this theory naturally to higher Chow groups and higher algebraic Ktheory, mainly following the work of JarvisKaufmannKimura and EdidinJarvisKimura. 
On nonformality of homogeneous spaces. (arXiv:1809.03711v1 [math.RT]) Cache Translate Page 
Authors: Zofia Stȩpień One of the interesting and important rational homotopy properties of a topological space $X$ is that of {\em formality}. In this paper we prove the nonformality property of some family homogeneous spaces. 
DGAModels of variations of mixed Hodge structures. (arXiv:1809.03716v1 [math.AG]) Cache Translate Page 
Authors: Hisashi Kasuya We define objects over Morgan's mixed Hodge diagrams which will be algebraic models of unipotent variations of mixed hodge structures over K\"ahler manifolds. As an analogue of HainZucker's equivalence between unipotent variations of mixed Hodge structures and mixed Hodge representations of the fundamental group with Hain's mixed hodge structure, we give an equivalence between the category of our VMHSlike objects and the category of mixed Hodge representations of the dual Lie algebra of Sullivan's minimal model with Morgan's mixed Hodge structure. By this result, we can put various (tannakian theoretical) nonabelian mixed Hodge structures on the category of our new objects like the taking fibers of variations of mixed Hodge structures at points. By certain modifications of the result, we also give models of nonunipotent variations of mixed Hodge structures. 
Countable Sofic Shifts with a Periodic Direction. (arXiv:1809.03717v1 [math.DS]) Cache Translate Page 
Authors: Ilkka Törmä As a variant of the equal entropy cover problem, we ask whether all multidimensional sofic shifts with countably many configurations have SFT covers with countably many configurations. We answer this question in the negative by presenting explicit counterexamples. We formulate necessary conditions for a vertically periodic shift space to have a countable SFT cover, and prove that they are sufficient in a natural (but quite restricted) subclass of shift spaces. 
The continuous Anderson hamiltonian in $d\le 3$. (arXiv:1809.03718v1 [math.PR]) Cache Translate Page 
Authors: Cyril Labbé We construct the continuous Anderson hamiltonian on $(L,L)^d$ driven by a white noise and endowed with either Dirichlet or periodic boundary conditions. Our construction holds in any dimension $d\le 3$ and relies on the theory of regularity structures: it yields a selfadjoint operator in $L^2\big((L,L)^d\big)$ with pure point spectrum. In $d\ge 2$, a renormalisation of the operator by means of infinite constants is required to compensate for illdefined products involving functionals of the white noise. We also obtain left tail estimates on the distributions of the eigenvalues: in particular, for $d=3$ these estimates show that the eigenvalues do not have exponential moments. 
Constraint Energy Minimizing Generalized Multiscale Finite Element Method for highcontrast linear elasticity problem. (arXiv:1809.03726v1 [math.NA]) Cache Translate Page 
Authors: Shubin Fu, Eric T. Chung In this paper, we consider the offline and online Constraint Energy Minimizing Generalized Mul tiscale Finite Element Method (CEMGMsFEM) for highcontrast linear elasticity problem. Offline basis construction starts with an auxiliary multiscale space by solving local spectral problems. We select eigenfunctions that correspond to a few small eigenvalues to form the auxiliary space. Using the auxiliary space, we solve a constraint energy minimization problem to construct offline multiscale spaces. The minimization problem is defined in the oversampling domain, which is larger than the target coarse block. To get a good approximation space, the oversampling domain should be large enough. We also propose a relaxed minimization problem to construct multiscale basis functions, which will yield more accurate and robust solution. To take into account the influence of input pa rameters, such as source terms, we propose the construction of online multiscale basis and an adaptive enrichment algorithm. We provide extensive numerical experiments on 2D and 3D models to show the performance of the proposed method. 
The Maximum Number of Three Term Arithmetic Progressions, and Triangles in Cayley Graphs. (arXiv:1809.03729v1 [math.CO]) Cache Translate Page 
Authors: Zachary Chase Let $G$ be a finite Abelian group. For a subset $S \subseteq G$, let $T_3(S)$ denote the number of length three arithemtic progressions in $S$ and Prob[$S$] $= \frac{1}{S^2}\sum_{x,y \in S} 1_S(x+y)$. For any $q \ge 1$ and $\alpha \in [0,1]$, and any $S \subseteq G$ with $S = \frac{G}{q+\alpha}$, we show $\frac{T_3(S)}{S^2}$ and Prob[$S$] are bounded above by $\max\left(\frac{q^2\alpha q+\alpha^2}{q^2},\frac{q^2+2\alpha q+4\alpha^26\alpha+3}{(q+1)^2},\gamma_0\right)$, where $\gamma_0 < 1$ is an absolute constant. As a consequence, we verify a graph theoretic conjecture of Gan, Loh, and Sudakov for Cayley graphs. 
Nonlinear stationary subdivision schemes that reproduce trigonometric functions. (arXiv:1809.03731v1 [math.NA]) Cache Translate Page 
Authors: Rosa Donat, Sergio LópezUreña In this paper we define a family of nonlinear, stationary, interpolatory subdivision schemes with the capability of reproducing conic shapes including polynomials upto second order. Linear, nonstationary, subdivision schemes do also achieve this goal, but different conic sections require different refinement rules to guarantee exact reproduction. On the other hand, with our construction, exact reproduction of different conic shapes can be achieved using exactly the same nonlinear scheme. Convergence, stability, approximation and shape preservation properties of the new schemes are analyzed. In addition, the conditions to obtain $\mathcal{C}^1$ limit functions are also studied. 
Consensus of a class of nonlinear fractionalorder multiagent systems via dynamic output feedback. (arXiv:1809.03733v1 [math.OC]) Cache Translate Page 
Authors: Elyar Zavary, Pouya Badri, Mahdi Sojoodi This paper addresses the consensus of a class of nonlinear fractionalorder multiagent systems (FOMAS) with positive real uncertainty. First a fractional nonfragile dynamic output feedback controller is put forward via the output measurements of neighboring agents, then appropriate state transformation reduced the consensus problem to a stability one. A sufficient condition based on direct Lyapunov approach, for the robust asymptotic stability of the transformed system and subsequently for the consensus of the main system is presented. Additionally, utilizing Sprocedure and Schur complement, the systematic stabilization design algorithm is proposed for fractionalorder system with and without nonlinear term. The results are formulated as an optimization problem with linear matrix inequality constraints. Simulation results are given to verify the effectiveness of the theoretical results. 
Determinants of Interval Matrices. (arXiv:1809.03736v1 [math.NA]) Cache Translate Page 
Authors: Jaroslav Horáček, Milan Hladík, Josef Matějka In this paper we shed more light on determinants of interval matrices. Computing the exact bounds on a determinant of an interval matrix is an NPhard problem. Therefore, attention is first paid to approximations. NPhardness of both relative and absolute approximation is proved. Next, methods computing verified enclosures of interval determinants and their possible combination with preconditioning are discussed. A new method based on Cramer's rule was designed. It returns similar results to the stateoftheart method, however, it is less consuming regarding computational time. As a byproduct, the Gerschgorin circles were generalized for interval matrices. New results about classes of interval matrices with polynomially computable tasks related to determinant are proved (symmetric positive definite matrices, class of matrices with identity midpoint matrix, tridiagonal Hmatrices). The mentioned methods were exhaustively compared for random general and symmetric matrices. 
The Abel map for surface singularities I. Generalities and examples. (arXiv:1809.03737v1 [math.AG]) Cache Translate Page 
Authors: János Nagy, András Némethi Let $(X,o)$ be a complex normal surface singularity. We fix one of its good resolutions $\widetilde{X}\to X$, an effective cycle $Z$ supported on the reduced exceptional curve, and any possible (first Chern) class $l'\in H^2(\widetilde{X},\mathbb{Z})$. With these data we define the variety ${\rm ECa}^{l'}(Z)$ of those effective Cartier divisors $D$ supported on $Z$ which determine a line bundles $\mathcal{O}_Z(D)$ with first Chern class $l'$. Furthermore, we consider the affine space ${\rm Pic}^{l'}(Z)\subset H^1(\mathcal{O}_Z^*)$ of isomorphism classes of holomorphic line bundles with Chern class $l'$ and the Abel map $c^{l'}(Z):{\rm ECa}^{l'}(Z)\to {\rm Pic}^{l'}(Z)$. The present manuscript develops the major properties of this map, and links them with the determination of the cohomology groups $H^1(Z,\mathcal{L})$, where we might vary the analytic structure $(X,o)$ (supported on a fixed topological type/resolution graph) and we also vary the possible line bundles ${\mathcal{L}}\in {\rm Pic}^{l'}(Z)$. The case of generic line bundles of ${\rm Pic}^{l'}(Z)$ and generic line bundles of the image of the Abel map will have priority roles. Rewriting the Abel map via Laufer duality based on integration of forms on divisors, we can make explicit the Abel map and its tangent map. The case of superisolated and weighted homogeneous singularities are exemplified with several details. The theory has similar goals (but rather different techniques) as the theory of Abel map or BrillNoether theory of reduced smooth projective curves. 
The Abel map for surface singularities II. Generic analytic structure. (arXiv:1809.03744v1 [math.AG]) Cache Translate Page 
Authors: János Nagy, András Némethi We study the analytic and topological invariants associated with complex normal singularities. Our goal is to provide topological formulae for several discrete analytic invariants whenever the analytic structure is generic (with respect to a fixed topological type), under the condition that the link is a rational homology sphere. The list of analytic invariants include: the geometric genus, the cohomology of certain natural line bundles, the cohomology of their restrictions on effective cycles (in a resolution), the cohomological cycle of natural line bundles, the multivariable Hilbert and Poincar\'e series associated with the divisorial filtration, the analytic semigroup, the maximal ideal cycle. The first part contains the definition of `generic structure' based on the work of Laufer. The second technical part rely on the properties of the Abel map developed in a previous manuscript of the authors. The results can be compared with certain parallel statements from the BrillNoether theory (and the theory of Abel map) associated with projective smooth curves, though the tools and machineries are very different. 
The tangential $k$CauchyFueter complexes and Hartogs' phenomenon over the right quaternionic Heisenberg group. (arXiv:1809.03748v1 [math.CV]) Cache Translate Page 
We construct the tangential $k$CauchyFueter complexes on the right quaternionic Heisenberg group, as the quaternionic counterpart of $\overline{\partial}_b$complex on the Heisenberg group in the theory of several complex variables. We can use the $L^2$ estimate to solve the nonhomogeneous tangential $k$CauchyFueter equation under the compatibility condition over this group modulo a lattice. This solution has an important vanishing property when the group is higher dimensional. It allows us to prove the Hartogs' extension phenomenon for $k$CF functions, which are the quaternionic counterpart of CR functions. 
Joint Spatial Division and Diversity for Massive MIMO Systems. (arXiv:1809.03751v1 [cs.IT]) Cache Translate Page 
Authors: KeWen Huang, HuiMing Wang, Jia Hou, Shi Jin We propose a downlink beamforming scheme that combines spatial division and orthogonal spacetime block coding (OSTBC) in multiuser massive MIMO systems. The beamformer is divided into two parts: a prebeamforming matrix to separate the users into different beams with no interference between each other, which is designed based on the low rank covariance matrix of the downlink channel, and a linear precoding matrix using partial or even no channel state information (CSI) concatenated by an OSTBC. To construct the prebeamforming matrix, a simple method that selects columns from DFT matrix is presented. To design the linear precoding matrix with partial CSI of the effective channel after the prebeamforming, we solve an optimization problem to minimize the pairwise error probability (PEP) of the users under an individual power or sum power constraint, respectively. For the individual power constraint, a semidefinite relaxing (SDR) method with a sufficient condition achieving the globally optimal solution is proposed to provide a performance benchmark. In addition, an efficient iterative successive convex approximation (SCA) method is provided to achieve a suboptimal solution. Furthermore, closed form solutions are derived under some special cases. For the sum power constraint, we consider two different designs, i.e., minimizing the average PEP and minimizing the maximum PEP of all users. We find that both nonconvex problems have a similar structure, and proposed a unified SCAAlternating Direction Method of Multipliers (ADMM) algorithm to handle them. The SCAADMM method can be implemented in a parallel manner, and thus is with great efficiency. Simulation results show the efficiency of our proposed JSDD scheme and the optimization method. 
The reproducing kernel Hilbert space approach in nonparametric regression problems with correlated observations. (arXiv:1809.03754v1 [math.ST]) Cache Translate Page 
Authors: Djihad Benelmadani, Karim Benhenni, Sana Louhichi In this paper we investigate the problem of estimating the regression function in models with correlated observations. The data is obtained from several experimental units each of them forms a time series. We propose a new estimator based on the in verse of the autocovariance matrix of the observations, assumed known and invertible. Using the properties of the Reproducing Kernel Hilbert spaces, we give the asymptotic expressions of its bias and its variance. In addition, we give a theoretical comparison, by calculating the IMSE, between this new estimator and the classical one proposed by Gasser and Muller. Finally, we conduct a simulation study to investigate the performance of the proposed estimator and to compare it to the Gasser and Muller's estimator in a finite sample set. 
On the aberrations of mixed level Orthogonal Arrays with removed runs. (arXiv:1809.03759v1 [math.ST]) Cache Translate Page 
Authors: Roberto Fontana, Fabio Rapallo Given an Orthogonal Array we analyze the aberrations of the subfractions which are obtained by the deletion of some of its points. We provide formulae to compute the Generalized WordLength Pattern of any subfraction. In the case of the deletion of one single point, we provide a simple methodology to find which the best subfractions are according to the Generalized Minimum Aberration criterion. We also study the effect of the deletion of 1, 2 or 3 points on some examples. The methodology does not put any restriction on the number of levels of each factor. It follows that any mixed level Orthogonal Array can be considered. 
Asymptotic joint spectra of Cartesian powers of strongly regular graphs and bivariate CharlierHermite polynomials. (arXiv:1809.03761v1 [math.CO]) Cache Translate Page 
Authors: John Vincent S. Morales, Nobuaki Obata, Hajime Tanaka Generalizing previous work of Hora (1998) on the asymptotic spectral analysis for the Hamming graph $H(n,q)$ which is the $n^{\mathrm{th}}$ Cartesian power $K_q^{\square n}$ of the complete graph $K_q$ on $q$ vertices, we describe the possible limits of the joint spectral distribution of the pair $(G^{\square n},\overline{G}\vphantom{G}^{\square n})$ of the $n^{\mathrm{th}}$ Cartesian powers of a strongly regular graph $G$ and its complement $\overline{G}$, where we let $n\rightarrow\infty$, and $G$ may vary with $n$. This result is an analogue of the bivariate central limit theorem, and we obtain in this way the bivariate Poisson distributions and the standard bivariate Gaussian distribution, together with the product measures of univariate Poisson and Gaussian distributions. We also report a family of bivariate hypergeometric orthogonal polynomials with respect to the last distributions, which we call the bivariate CharlierHermite polynomials, and prove basic formulas for them. This family of orthogonal polynomials seems previously unnoticed, possibly because of its peculiarity. 
Automorphisms and transformations of solutions to the generalised Chazy equation for various parameters. (arXiv:1809.03762v1 [math.CA]) Cache Translate Page 
Authors: Matthew Randall We analyse the automorphisms of solutions to Chazy's equation and the generalised Chazy equation for the parameters $k=2,3,4$ and $9$. These automorphisms are induced by triangular domains with isosceles symmetry. We also prove theorems about the transformations of solutions to the generalised Chazy equation between various different parameters. Using the transformation of solutions between parameters $k=2$ and $k=\frac{2}{3}$, we are able to prove a result about the automorphism of the solutions to the $k=\frac{2}{3}$ generalised Chazy equation. 
A negative answer to the problem: are stratifiable spaces $M_1$?. (arXiv:1809.03763v1 [math.GN]) Cache Translate Page 
Authors: Huaipeng Chen, Gary Gruenhage, Bosen Wang In accordance with $M_3$structures in paper [4], we construct a stratifiable space which is not $M_1$spaces. 
A note on reducing the computation time for minimum distance and equivalence check of binary linear codes. (arXiv:1809.03764v1 [cs.IT]) Cache Translate Page 
Authors: Nikolay Yankov, Krassimir Enev In this paper we show the usability of the Gray code with constant weight words for computing linear combinations of codewords. This can lead to a big improvement of the computation time for finding the minimum distance of a code. We have also considered the usefulness of combinatorial $2$$(t,k,1)$ designs when there are memory limitations to the number of objects (linear codes in particular) that can be tested for equivalence. 
Solution of a Nonlinear Integral Equation via New Fixed Point Iteration Process. (arXiv:1809.03771v1 [math.FA]) Cache Translate Page 
Authors: Chanchal Garodia, Izhar Uddin In this paper, we introduce a new threestep iteration process in Banach space and prove convergence results for approximating fixed points for nonexpansive mappings. Also, we show that the newly introduced iteration process converges faster than a number of existing iteration processes. Further, we discuss about the solution of mixed type VolterraFredholm functional nonlinear integral equation. 
Galois connections and tense operators on qeffect algebras. (arXiv:1809.03773v1 [math.LO]) Cache Translate Page 
Authors: Ivan Chajda, Jan Paseka For effect algebras, the socalled tense operators were already introduced by Chajda and Paseka. They presented also a canonical construction of them using the notion of a time frame. Tense operators express the quantifiers "it is always going to be the case that" and "it has always been the case that" and hence enable us to express the dimension of time both in the logic of quantum mechanics and in the manyvalued logic. A crucial problem concerning tense operators is their representation. Having an effect algebra with tense operators, we can ask if there exists a time frame such that each of these operators can be obtained by the canonical construction. To approximate physical real systems as best as possible, we introduce the notion of a qeffect algebra and we solve this problem for qtense operators on qrepresentable qJauchPiron qeffect algebras. 
A few properties of sample variance. (arXiv:1809.03774v1 [math.ST]) Cache Translate Page 
Authors: Eric Benhamou A basic result is that the sample variance for i.i.d. observations is an unbiased estimator of the variance of the underlying distribution (see for instance Casella and Berger (2002)). But what happens if the observations are neither independent nor identically distributed. What can we say? Can we in particular compute explicitly the first two moments of the sample mean and hence generalize formulae provided in Tukey (1957a), Tukey (1957b) for the first two moments of the sample variance? We also know that the sample mean and variance are independent if they are computed on an i.i.d. normal distribution. This is one of the underlying assumption to derive the Student distribution Student alias W. S. Gosset (1908). But does this result hold for any other underlying distribution? Can we still have independent sample mean and variance if the distribution is not normal? This paper precisely answers these questions and extends previous work of Cho, Cho, and Eltinge (2004). We are able to derive a general formula for the first two moments and variance of the sample variance under no specific assumption. We also provide a faster proof of a seminal result of Lukacs (1942) by using the log characteristic function of the unbiased sample variance estimator. 
Compressive Massive Random Access for Massive MachineType Communications (mMTC). (arXiv:1809.03784v1 [cs.IT]) Cache Translate Page 
Authors: Malong Ke, Zhen Gao, Yongpeng Wu, Xiangming Meng In future wireless networks, one fundamental challenge for massive machinetype communications (mMTC) lies in the reliable support of massive connectivity with low latency. Against this background, this paper proposes a compressive sensing (CS)based massive random access scheme for mMTC by leveraging the inherent sporadic traffic, where both the active devices and their channels can be jointly estimated with low overhead. Specifically, we consider devices in the uplink massive random access adopt pseudo random pilots, which are designed under the framework of CS theory. Meanwhile, the massive random access at the base stations (BS) can be formulated as the sparse signal recovery problem by leveraging the sparse nature of active devices. Moreover, by exploiting the structured sparsity among different receiver antennas and subcarriers, we develop a distributed multiple measurement vector approximate message passing (DMMVAMP) algorithm for further improved performance. Additionally, the state evolution (SE) of the proposed DMMVAMP algorithm is derived to predict the performance. Simulation results demonstrate the superiority of the proposed scheme, which exhibits a good tightness with the theoretical SE. 
Kodaira vanishing for singular varieties revisited. (arXiv:1809.03785v1 [math.AG]) Cache Translate Page 
Authors: Donu Arapura, Lei Song We correct the proof and slightly strengthen a Kodairatype vanishing theorem for singular varieties originally due to Jaffe and the first author. Specifically, we show that if $L$ is a nef and big line bundle on a projective variety of characteristic zero, the $i^{\text{th}}$ cohomology of $L^{1}$ vanishes for $i$ in a range determined by the depth and dimension of the singular locus. 
Laplacian preconditioning of elliptic PDEs: Localization of the eigenvalues of the discretized operator. (arXiv:1809.03790v1 [math.NA]) Cache Translate Page 
Authors: Tomáš Gergelits, KentAndré Mardal, Bjørn Fredrik Nielsen, Zdeněk Strakoš In the paper \textit{Preconditioning by inverting the {L}aplacian; an analysis of the eigenvalues. IMA Journal of Numerical Analysis 29, 1 (2009), 2442}, Nielsen, Hackbusch and Tveito study the operator generated by using the inverse of the Laplacian as preconditioner for second order elliptic PDEs $\nabla \cdot (k(x) \nabla u) = f$. They prove that the range of $k(x)$ is contained in the spectrum of the preconditioned operator, provided that $k$ is continuous. Their rigorous analysis only addresses mappings defined on infinite dimensional spaces, but the numerical experiments in the paper suggest that a similar property holds in the discrete case. % Motivated by this investigation, we analyze the eigenvalues of the matrix $\bf{L}^{1}\bf{A}$, where $\bf{L}$ and ${\bf{A}}$ are the stiffness matrices associated with the Laplace operator and general second order elliptic operators, respectively. Without any assumption about the continuity of $k(x)$, we prove the existence of a onetoone pairing between the eigenvalues of $\bf{L}^{1}\bf{A}$ and the intervals determined by the images under $k(x)$ of the supports of the FE nodal basis functions. As a consequence, we can show that the nodal values of $k(x)$ yield accurate approximations of the eigenvalues of $\bf{L}^{1}\bf{A}$. Our theoretical results are illuminated by several numerical experiments. 
Outer billiards outside regular dodecagon: computer proof of periodicity of almost all orbits and existence of an aperiodic point. (arXiv:1809.03791v1 [math.DS]) Cache Translate Page 
Authors: Filipp Rukhovich An existence of an aperiodic point for outer billiard outside regular dodecagon is proved. Additionally, almost all orbits of such an outer billiard are proved to be periodic, and all possible periods are listed explicitly. The proof is based on facts established with computer program implemented by author. All calculations of a program has been made with absolute accuracy; these calculations can be done "by hands" but it this case, amount of calculations would be too large. 
Cut distance identifying graphon parameters over weak* limits. (arXiv:1809.03797v1 [math.CO]) Cache Translate Page 
Authors: Martin Doležal, Jan Grebík, Jan Hladký, Israel Rocha, Václav Rozhoň The theory of graphons comes with the socalled cut distance. The cut distance is finer than the weak* topology. Dole\v{z}al and Hladk\'y [arXiv:1705.09160] showed, that given a sequence of graphons, a cut distance accumulation graphon can be pinpointed in the set of weak* accumulation points as minimizers of the entropy. Motivated by this, we study graphon parameters with the property that their minimizers or maximizers identify cut distance accumulation points over the set of weak* accumulation points. We call such parameters cut distance identifying. Of particular importance are cut distance identifying parameters coming from subgraph densities, $t(H,\cdot)$. It turns out that this concept is closely related to graph norms. In particular, we prove that a connected graph $H$ is step Sidorenko (a concept very similar to $t(H,\cdot)$ being cut distance identifying) if and only if it is weakly norming. This answers a question of Kr\'al', Martins, Pach and Wrochna [arXiv:1802.05007]. Further, we study convexity properties of cut distance identifying graphon parameters, and find a way to identify cut distance limits using spectra of graphons. 
The hiring problem with rankbased strategies. (arXiv:1809.03800v1 [math.PR]) Cache Translate Page 
Authors: Svante Janson The hiring problem is studied for general strategies based only on the relative ranking of the candidates; this includes some well known strategies studied before such as hiring above the median. We give general limit theorems for the number of hired candidates and some other properties, extending previous results. The results exhibit a dichotomy between two classes of rankbased strategies: either the asymptotics of the process are determined by the early events, with a.s. convergence of suitably normalized random variables, or there is a mixing behaviour without longterm memory and with asymptotic normality. 
Homogeneous Dynamics and Unlikely Intersections. (arXiv:1809.03802v1 [math.NT]) Cache Translate Page 
Authors: R. Richard, A. Yafaev, T. Zamojski This is a preliminary version of a monograph on homogeneous dynamics and application to some problems of unlikely intersections in Shimura varieties. It consists of four articles, which can be read independently. The first one, by the two first named authors, discuss the main application, to some refinement of the Andr\'{e}PinkZannier conjecture about closures of subsets of restricted Hecke orbits in Shimura varieties. The second article, by the first and last named author, establishes results about the dynamics of sequences translates of some measures in spaces of $S$arithmetic lattices. These results are the cornerstone of the methods in the first article. The last two articles, by the first named author, establish results which are crucial for the second article. The third article gives an ultrametric analogue of archimedean results of Richard and Shah, and contains methods of independent interest about stability, Berkovich spaces and BruhatTits buildings. The last article is set in the same context as the second article, and discusses nondivergence of the studied sequences of translates. 
Jump inequalities for translationinvariant operators of Radon type on $\mathbb{Z}^d$. (arXiv:1809.03803v1 [math.CA]) Cache Translate Page 
Authors: Mariusz Mirek, Elias M. Stein, Pavel ZorinKranich We prove strong jump inequalities for a large class of operators of Radon type in the discrete and ergodic theoretical settings. These inequalities are the $r=2$ endpoints of the $r$variational estimates studied in arXiv:1512.07523, and are formulated in terms of the jump quasiseminorm. Here we rely on the facts about jumps derived in arXiv:1808.04592, and also used in arXiv:1808.09048. 
A fast Fourier transform based direct solver for the Helmholtz problem. (arXiv:1809.03808v1 [cs.NA]) Cache Translate Page 
Authors: Jari Toivanen, Monika Wolfmayr This paper is devoted to the efficient numerical solution of the Helmholtz equation in a two or threedimensional rectangular domain with an absorbing boundary condition (ABC). The Helmholtz problem is discretized by standard bilinear and trilinear finite elements on an orthogonal mesh yielding a separable system of linear equations. The main key to high performance is to employ the Fast Fourier transform (FFT) within a fast direct solver to solve the large separable systems. Numerical results for both two and threedimensional problems are presented confirming the efficiency of the method discussed. 
The Cosmological Semiclassical Einstein Equation as an InfiniteDimensional Dynamical System. (arXiv:1809.03812v1 [mathph]) Cache Translate Page 
Authors: Hanno Gottschalk, Daniel Siemssen We develop a comprehensive framework in which the existence of solutions to the semiclassical Einstein equation (SCE) in cosmological spacetimes is shown. Different from previous work on this subject, we do not restrict to the conformally coupled scalar field and we admit the full renormalization freedom. Based on a regularization procedure, which utilizes homogeneous distributions and is equivalent to Hadamard pointsplitting, we obtain a reformulation of the evolution of the quantum state as an infinitedimensional dynamical system with mathematical features that are distinct from the standard theory of infinitedimensional dynamical systems (e.g. unbounded evolution operators). Nevertheless, applying new mathematical methods, we show existence of maximal/global (in time) solutions to the SCE for vacuumlike states, and of local solutions for thermallike states. Our equations do not show the instability of the Minkowski solution described by other authors. 
Globally constraintpreserving FR/DG scheme for Maxwell's equations at all orders. (arXiv:1809.03816v1 [math.NA]) Cache Translate Page 
Authors: Arijit Hazra, Praveen Chandrashekar, Dinshaw S. Balsara Computational electrodynamics (CED), the numerical solution of Maxwell's equations, plays an incredibly important role in several problems in science and engineering. High accuracy solutions are desired, and the discontinuous Galerkin (DG) method is one of the better ways of delivering high accuracy in CED. Maxwell's equations have a pair of involution constraints for which mimetic schemes that globally satisfy the constraints at a discrete level are highly desirable. Balsara and Kappeli presented a von Neumann stability analysis of globally constraintpreserving DG schemes for CED up to 4'th order which was focused on developing the theory and documenting the superior dissipation and dispersion of DGTD schemes in media with constant permittivity and permeability. In this paper we present DGTD schemes for CED that go up to 5'th order of accuracy and analyze their performance when permittivity and permeability vary strongly in space. Our DGTD schemes achieve constraint preservation by collocating the electric displacement and magnetic induction as well as their higher order modes in the faces of the mesh. Our first finding is that at 4'th and higher orders, one has to evolve some zonecentered modes in addition to the facecentered modes. It is wellknown that the limiting step in DG schemes causes a reduction of the optimal accuracy of the scheme. In this paper we document simulations where permittivity and permeability vary by almost an order of magnitude without requiring any limiting of the DG scheme. This very favorable finding ensures that DGTD schemes retain optimal accuracy even in the presence of large spatial variations in permittivity/permeability. Our third finding shows that the electromagnetic energy is conserved very well even when permittivity and permeability vary strongly in space; as long as the conductivity is zero. 
Delayed and rushed motions through time change. (arXiv:1809.03818v1 [math.PR]) Cache Translate Page 
Authors: Raffaela Capitanelli, Mirko D'Ovidio We consider time changes given by subordinators and their inverse processes. Our analysis shows that, quite surprisingly, inverse processes are not necessarily leading to delayed processes. 
The Undirected Two Disjoint Shortest Paths Problem. (arXiv:1809.03820v1 [math.CO]) Cache Translate Page 
Authors: Marinus Gottschau, Marcus Kaiser, Clara Waldmann The $k$ disjoint shortest paths problem ($k$DSPP) on a graph with $k$ sourcesink pairs $(s_i, t_i)$ asks for the existence of $k$ pairwise edge or vertexdisjoint shortest $s_i$$t_i$paths. It is known to be NPcomplete if $k$ is part of the input. Restricting to $2$DSPP with strictly positive lengths, it becomes solvable in polynomial time. We extend this result by allowing zero edge lengths and give a polynomial time algorithm based on dynamic programming for $2$DSPP on undirected graphs with nonnegative edge lengths. 
On higher special elements of $p$adic representations. (arXiv:1809.03830v1 [math.NT]) Cache Translate Page 
Authors: David Burns, Takamichi Sano, KwokWing Tsoi As a natural generalization of the notion of `higher rank Euler system', we develop a theory of `higher special elements' in the exterior power biduals of the Galois cohomology of $p$adic representations. We show, in particular, that such elements encode detailed information about the structure of Galois cohomology groups and are related by families of congruences involving natural height pairings on cohomology. As a first concrete application of the approach, we use it to refine, and extend, a variety of existing results and conjectures concerning the values of derivatives of Dirichlet $L$series. 
The 6element case of SFrankl conjecture (I). (arXiv:1809.03836v1 [math.CO]) Cache Translate Page 
Authors: ZeChun Hu, ShiLun Li The unionclosed sets conjecture (Frankl's conjecture) says that for any finite unionclosed family of finite sets, other than the family consisting only of the empty set, there exists an element that belongs to at least half of the sets in the family. In [3], a stronger version of Frankl's conjecture (SFrankl conjecture for short) was introduced and a partial proof was given. In particular, it was proved in \cite{CH17} that SFrankl conjecture holds for $n\leq 5$, where $n$ is the number of all the elements in the family of sets. Now, we want to prove that it holds for $n=6$. Since the paper is very long, we split it into two parts. This is the first part. 
Eigenstates of Linear Combinations of Phase Operators. (arXiv:1809.03844v1 [quantph]) Cache Translate Page 
Authors: C.V.Sukumar The eigenstates of linear combinations of the Susskind and Glogowerphase operators for the harmonic oscillator are constructed. It is shown that such eigenstates are squeezed states. 
On the motion of a fluidfilled rigid body with Navier Boundary conditions. (arXiv:1809.03852v1 [math.AP]) Cache Translate Page 
Authors: Giusy Mazzone, Jan Pruess, Gieri Simonett We consider the inertial motion of a system constituted by a rigid body with an interior cavity entirely filled with a viscous incompressible fluid. Navier boundary conditions are imposed on the cavity surface. We prove the existence of weak solutions and determine the critical spaces for the governing evolution equation. Using parabolic regularization in timeweighted spaces, we establish regularity of solutions and their longtime behavior. We show that every weak solution \`a la LerayHopf to the equations of motion converges to an equilibrium at an exponential rate in the $L_q$topology for every fluidsolid configuration. A nonlinear stability analysis shows that equilibria associated with the largest moment of inertia are asymptotically (exponentially) stable, whereas all other equilibria are normally hyperbolic and unstable in an appropriate topology. 
Robust Energy Efficient Beamforming in MISOMESWIPT Systems With Proportional Secrecy Rate. (arXiv:1809.03856v1 [cs.IT]) Cache Translate Page 
Authors: Yanjie Dong, Md. Jahangir Hossain, Julian Cheng, Victor C. M. Leung The joint design of beamforming vector and artificial noise covariance matrix is investigated for the multipleinputsingleoutputmultipleeavesdropper simultaneous wireless information and power transferring \mbox{(MISOMESWIPT)} systems. In the MISOMESWIPT system, the base station delivers information signals to the legitimate user equipments and broadcasts jamming signals to the eavesdroppers. A secrecy energy efficiency (SEE) maximization problem is formulated for the considered \mbox{MISOMESWIPT} system with imperfect channel state information, where the SEE is defined as the ratio of sum secrecy rate over total power consumption. Since the formulated SEE maximization problem is nonconvex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Two suboptimal solutions are also proposed based on the heuristic beamforming techniques that trade performance for computational complexity. In addition, the analysis of computational complexity is performed for the optimal and suboptimal solutions. Numerical results are used to verify the performance of proposed algorithms and to reveal practical insights. 
Euler's divergent series in arithmetic progressions. (arXiv:1809.03859v1 [math.NT]) Cache Translate Page 
Authors: AnneMaria ErnvallHytönen, Tapani Matalaaho, Louna Seppälä Let $\xi$ and $m$ be integers satisfying $\xi\ne 0$ and $m\ge 3$. We show that for any given integers $a$ and $b$, $b \neq 0$, there are $\frac{\varphi(m)}{2}$ reduced residue classes modulo $m$ each containing infinitely many primes $p$ such that $abF_p(\xi) \ne 0$, where $F_p(\xi)=\sum_{n=0}^\infty n!\xi^n$ is the $p$adic evaluation of Euler's factorial series at the point $\xi$. 
Equivalence of two BV classes of functions in metric spaces, and existence of a Semmes family of curves under a $1$Poincar\'e inequality. (arXiv:1809.03861v1 [math.MG]) Cache Translate Page 
Authors: Estibalitz DurandCartagena, Sylvester ErikssonBique, Riikka Korte, Nageswari Shanmugalingam We consider two notions of functions of bounded variation in complete metric measure spaces, one due to Martio and the other due to Miranda~Jr. We show that these two notions coincide, if the measure is doubling and supports a $1$Poincar\'e inequality. In doing so, we also prove that if the measure is doubling and supports a $1$Poincar\'e inequality, then the metric space supports a \emph{Semmes family of curves} structure. 
Fixed point on partial metric type spaces. (arXiv:1809.03862v1 [math.GN]) Cache Translate Page 
Authors: Yaé Ulrich Gaba In this paper, we study some new fixed point results for self maps defined on partial metric type spaces. In particular, we give common fixed point theorems in the same setting. Some examples are given which illustrate the results. 
On association in Colombeau algebras without asymptotics. (arXiv:1809.03865v1 [math.FA]) Cache Translate Page 
Authors: Eduard A. Nigsch A recent variant of Colombeau algebras does not employ asymptotic estimates for its definition. We discuss how the concept of association with distributions transfers to this setting and why it still needs to be based on asymptotics. 
Intransitive Machines. (arXiv:1809.03869v1 [math.HO]) Cache Translate Page 
Authors: Alexander Poddiakov The intransitive cycle of superiority is characterized by such binary relations between A, B, and C that A is superior to B, B is superior to C, and C is superior to A (i.e., A>B>C>A  in contrast with transitive relations A>B>C). The first part of the article presents a brief review of studies of intransitive cycles in various disciplines (mathematics, biology, sociology, logical games, decision theory, etc.), and their reflections in educational materials. The second part of the article introduces the issue of intransitivity in elementary physics. We present principles of building mechanical intransitive devices in correspondence with the structure of the Condorcet paradox, and describe five intransitive devices: intransitive gears; levers; pulleys, wheels, and axles; wedges; inclined planes. Each of the mechanisms are constructed as compositions of simple machines and show paradoxical intransitivity of relations such as "to rotate faster than", "to lift", "to be stronger than" in some geometrical constructions. The article is an invitation to develop teaching materials and problems advancing the understanding of transitivity and intransitivity in various areas, including physics education. 
Dicounted HamiltonJacobi Equation on Networks and Asymptotic Analysis. (arXiv:1809.03872v1 [math.AP]) Cache Translate Page 
Authors: Marco Pozza, Antonio Siconolfi We study discounted Hamilton Jacobi equations on networks, without putting any restriction on their geometry. Assuming the Hamiltonians continuous and coercive, we establish a comparison principle and provide representation formulae for solutions. We follow the approach introduced in 11, namely we associate to the differential problem on the network, a discrete functional equation on an abstract underlying graph. We perform some qualitative analysis and single out a distinguished subset of vertices, called lambda Aubry set, which shares some properties of the Aubry set for Eikonal equations on compact manifolds. We finally study the asymptotic behavior of solutions and lambda Aubry sets as the discount factor lambda becomes infinitesimal. 
On the genericity of positive exponents of conservative skew products with twodimensional fibers. (arXiv:1809.03874v1 [math.DS]) Cache Translate Page 
Authors: Davi Obata, Mauricio Poletti In this paper we study the existence of positive Lyapunov exponents for three different types of skew products, whose fibers are compact Riemannian surfaces and the action on the fibers are by volume preserving diffeomorphisms. These three types include skew products with a volume preserving Anosov diffeomorphism on the basis; or with a subshift of finite type on the basis preserving a measure with product structure; or locally constant skew products with Bernoulli shifts on the basis. We prove the $C^1$density and $C^r$openess of the existence of positive Lyapunov exponents on a set of positive measure in the space of such skew products. 
Nuclearity for Fourier integral operators in $L^p$spaces. (arXiv:1809.03876v1 [math.SP]) Cache Translate Page 
Authors: Duván Cardona In this note we study sharp sufficient conditions for the nuclearity of Fourier integral operators on $L^p$spaces, $1< p\leq 2$. Our conditions and those presented in Cardona [2] provide a systematic investigation on the subject for all $1<p<\infty.$ 
Generalized multipliers for leftinvertible operators and applications. (arXiv:1809.03882v1 [math.FA]) Cache Translate Page 
Authors: Pawel Pietrzycki We introduce generalized multipliers for leftinvertible operators which formal Laurent series $U_x(z)=\sum_{n=1}^\infty(P_ET^{n}x) \frac{1}{z^n}+\sum_{n=0}^\infty(P_E{T^{\prime*}}^{n}x)z^n$ actually represent analytic functions on an annulus or a disc. 
Rational equivalence and Lagrangian tori on K3 surfaces. (arXiv:1809.03892v1 [math.SG]) Cache Translate Page 
Authors: Nick Sheridan, Ivan Smith Fix a symplectic K3 surface X homologically mirror to an algebraic K3 surface Y by an equivalence taking a graded Lagrangian torus L in X to the skyscraper sheaf of a point y of Y. We show there are Lagrangian tori with vanishing Maslov class in X whose class in the Grothendieck group of the Fukaya category is not generated by Lagrangian spheres. This is mirror to a statement about the `BeauvilleVoisin subring' in the Chow groups of Y, and fits into a conjectural relationship between Lagrangian cobordism and rational equivalence of algebraic cycles. 
Geometric SurfaceBased Tracking Control of a Quadrotor UAV under Actuator Constraints. (arXiv:1809.03898v1 [math.OC]) Cache Translate Page 
Authors: Michalis Ramp, Evangelos Papadopoulos This paper presents contributions on nonlinear tracking control systems for a quadrotor unmanned micro aerial vehicle. New controllers are proposed based on nonlinear surfaces composed by tracking errors that evolve directly on the nonlinear configuration manifold thus inherently including in the control design the nonlinear characteristics of the SE(3) configuration space. In particular geometric surfacebased controllers are developed, and through rigorous stability proofs they are shown to have desirable closed loop properties that are almost global. A region of attraction, independent of the position error, is produced and its effects are analyzed. A strategy allowing the quadrotor to achieve precise attitude tracking while simultaneously following a desired position command and complying to actuator constraints in a computationally inexpensive manner is derived. This important contribution differentiates this work from existing Geometric Nonlinear Control System solutions (GNCSs) since the commanded thrusts can be realized by the majority of quadrotors produced by the industry. The new features of the proposed GNCSs are illustrated by numerical simulations of aggressive maneuvers and a comparison with a GNCSs from the bibliography. 
LOS MIMO Design based on Multiple Optimum Antenna Separations. (arXiv:1809.03899v1 [eess.SP]) Cache Translate Page 
Authors: Mario H. Castañeda García, Marcin Iwanow, Richard A. StirlingGallacher The use of multiple antennas in a transmit and receive antenna array for MIMO wireless communication allows the spatial degrees of freedom in rich scattering environments to be exploited. However, for lineofsight (LOS) MIMO channels with uniform linear arrays (ULAs) at the transmitter and receiver, the antenna separations at the transmit and receive array need to be optimized to maximize the spatial degrees of freedom and the channel capacity. In this paper, we first revisit the derivation of the optimum antenna separation at the transmit and receive ULAs in a LOS MIMO system, and provide the general expression for the optimum antenna separation product, which consists of multiple solutions. Although only the solution corresponding to the smallest antenna separation product is usually considered in the literature, we exploit the multiple solutions for a LOS MIMO design over a range of distances between the transmitter and receiver. In particular, we consider the LOS MIMO design in a vehicletovehicle (V2V) communication scenario, over a range of distances between the transmit and receive vehicle. 
Explicit examples in Ergodic Optimization. (arXiv:1809.03900v1 [math.DS]) Cache Translate Page 
Authors: Hermes H. Ferreira, Artur O. Lopes, Elismar R. Oliveira Denote by $T$ the transformation $T(x)= 2 \,x $ (mod 1). Given a potential $A:S^1 \to \mathbb{R}$ we are interested in exhibiting explicit examples of calibrated subactions $V: S^1 \to \mathbb{R}$ for $A$. The action of the $1/2$operator $\mathcal{G}$ acting on H\"older functions $f: S^1 \to \mathbb{R}$ was analyzed in a companion paper by the same authors. The sharp numerical evidence obtained from this algorithm in several examples permits to guess explicit expressions for the subaction: among them for $A(x) = \sin^2 ( 2 \pi x)$ and $A(x) = \sin ( 2 \pi x)$. Here, among other things, we present a piecewise analytical expression for these calibrated subactions. The explicit expression of the subaction can help to localize the maximizing probability. The algorithm can also be applied to the estimation of the joint spectral radius of matrices. We present an example of a potential $A$ which is equal to its subaction. We also analyze the case where the subaction is not unique. Moreover, we briefly present the version of the $1/2$algorithm for the estimation of the main eigenfunction of the Ruelle operator. 
On the irreducibility of Severi varieties on K3 surfaces. (arXiv:1809.03914v1 [math.AG]) Cache Translate Page 
Authors: Ciro Ciliberto, Thomas Dedieu Let $(S,L)$ be a polarized $K3$ surface of genus $p \geqslant 11$ such that $\mathrm{Pic}(S)=\mathbf{Z}[L]$, and $\delta$ a nonnegative integer. We prove that if $p\geqslant 4\delta3$, then the Severi variety of $\delta$nodal curves in $L$ is irreducible. 
Computing the resolvent of the sum of operators with application to best approximation problems. (arXiv:1809.03921v1 [math.OC]) Cache Translate Page 
Authors: Minh N. Dao, Hung M. Phan We propose a flexible approach for computing the resolvent of the sum of weakly monotone operators in real Hilbert spaces. This relies on splitting methods where strong convergence is guaranteed. We also prove linear convergence under Lipschitz continuity assumption. The approach is then applied to computing the proximity operator of the sum of weakly convex functions, and particularly to finding the best approximation to the intersection of convex sets. 
Constructive regularization of the random matrix norm. (arXiv:1809.03926v1 [math.PR]) Cache Translate Page 
Authors: Elizaveta Rebrova We show a simple local norm regularization algorithm that works with high probability. Namely, we prove that if the entries of a $n \times n$ matrix $A$ are i.i.d. symmetrically distributed and have finite second moment, it is enough to zero out a small fraction of the rows and columns of $A$ with largest $L_2$ norms in order to bring the operator norm of $A$ to the almost optimal order $O(\sqrt{\log \log n \cdot n})$. As a corollary, we also obtain a constructive procedure to find a small submatrix of $A$ that one can zero out to achieve the same goal. This work is a natural continuation of our recent work with R. Vershynin, where we have shown that the norm of $A$ can be reduced to the optimal order $O(\sqrt{n})$ by zeroing out just a small submatrix of $A$, but did not provide a constructive procedure to find this small submatrix. Our current approach extends the norm regularization techniques developed for the graph adjacency (Bernoulli) matrices in the works of Feige and Ofek, and Le, Levina and Vershynin to the considerably broader class of matrices. 
A Short Note on Integral Transformations and Conversion Formulas for Sequence Generating Functions. (arXiv:1809.03933v1 [math.CO]) Cache Translate Page 
Authors: Maxie D. Schmidt The purpose of this note is to provide an expository introduction to some more curious integral formulas and transformations involving generating functions. We seek to generalize these results and integral representations which effectively provide a mechanism for converting between a sequence's ordinary and exponential generating function (OGF and EGF, respectively) and vice versa. The Laplace transform provides an integral formula for the EGFtoOGF transformation, where the reverse OGFtoEGF operation requires more careful integration techniques. We prove two variants of the OGFtoEGF transformation integrals from the Hankel loop contour for the reciprocal gamma function and from Fourier series expansions of integral representations for the Hadamard product of two generating functions, respectively. We also suggest several generalizations of these integral formulas and provide new examples along the way. 
MIMO MutliCell Processing: Optimal Precoding and Power Allocation. (arXiv:1809.03937v1 [cs.IT]) Cache Translate Page 
Authors: Samah A. M. Ghanem We investigate the optimal power allocation and optimal precoding for a cluster of two BSs which cooperate to jointly maximize the achievable rate for two users connecting to each BS in a MCP framework. This framework is modeled by a virtual network MIMO channel due to the framework of full cooperation. In particular, due to sharing the CSI and data between the two BSs over the backhaul link. We provide a generalized fixed point equation of the optimal precoder in the asymptotic regimes of the low and highsnr. We introduce a new iterative approach that leads to a closedform expression for the optimal precoding matrix in the highsnr regime which is known to be an NPhard problem. Two MCP distributed algorithms have been introduced, a power allocation algorithm for the UL, and a precoding algorithm for the DL. 
On Hopf algebras over basic Hopf algebras of dimension 24. (arXiv:1809.03938v1 [math.QA]) Cache Translate Page 
Authors: Rongchuan Xiong We determine finitedimensional Hopf algebras over an algebraically closed field of characteristic zero, whose Hopf coradical is isomorphic to a nonpointed basic Hopf algebra of dimension $24$ and the infinitesimal braidings are simple objects, under the assumption that the diagrams are strictly graded. In particular, we obtain families of new finitedimensional Hopf algebras without the dual Chevalley property. 
Structural Analysis and Control of a Model of Twosite Electricity and Heat Supply. (arXiv:1809.03939v1 [math.OC]) Cache Translate Page 
Authors: Hikaru Hoshino, Yoshihiko Susuki, T.John Koo, Takashi Hikihara This paper introduces a control problem of regulation of energy flows in a twosite electricity and heat supply system, where two Combined Heat and Power (CHP) plants are interconnected via electricity and heat flows. The control problem is motivated by recent development of fast operation of CHP plants to provide ancillary services of power system on the order of tens of seconds to minutes. Due to the physical constraint that the responses of the heat subsystem are not necessary as fast as those of the electric subsystem, the target controlled state is not represented by any isolated equilibrium point, implying that stability of the system is lost in the longterm sense on the order of hours. In this paper, we first prove in the context of nonlinear control theory that the statespace model of the twosite system is nonminimum phase due to nonexistence of isolated equilibrium points of the associated zero dynamics.Instead, we locate a onedimensional invariant manifold that represents the target controlled flows completely. Then, by utilizing a virtual output under which the statespace model becomes minimum phase, we synthesize a controller that achieves not only the regulation of energy flows in the shortterm regime but also stabilization of an equilibrium point in the longterm regime. Effectiveness of the synthesized controller is established with numerical simulations with a practical set of model parameters. 
The determined property of Baire in reverse math. (arXiv:1809.03940v1 [math.LO]) Cache Translate Page 
Authors: Eric Astor, Damir Dzhafarov, Antonio Montalbán, Reed Solomon, Linda Brown Westrick We define the notion of a determined Borel code in reverse math, and consider the principle $DPB$, which states that every determined Borel set has the property of Baire. We show that this principle is strictly weaker than $ATR$. Any $\omega$model of $DPB$ must be closed under hyperarithmetic reduction, but $DPB$ is not a theory of hyperarithmetic analysis. We show that whenever $M\subseteq 2^\omega$ is the secondorder part of an $\omega$model of $DPB$, then for every $Z \in M$, there is a $G \in M$ such that $G$ is $\Delta^1_1$generic relative to $Z$. 
Multidomain Spectral Collocation Method for VariableOrder Nonlinear Fractional Differential Equations. (arXiv:1809.03945v1 [math.NA]) Cache Translate Page 
Authors: Tinggang Zhao, Zhiping Mao, George Em Karniadakis Spectral and spectral element methods using Galerkin type formulations are efficient for solving linear fractional PDEs (FPDEs) of constant order but are not efficient in solving nonlinear FPDEs and cannot handle FPDEs with variableorder. In this paper, we present a multidomain spectral collocation method that addresses these limitations. We consider FPDEs in the RiemannLiouville sense, and employ Jacobi Lagrangian interpolants to represent the solution in each element. We provide variableorder differentiation formulas, which can be computed efficiently for the multidomain discretization taking into account the nonlocal interactions. We enforce the interface continuity conditions by matching the solution values at the element boundaries via the Lagrangian interpolants, and in addition we minimize the jump in (integer) fluxes using a penalty method. We analyze numerically the effect of the penalty parameter on the condition number of the global differentiation matrix and on the stability and convergence of the penalty collocation scheme. We demonstrate the effectiveness of the new method for the fractional Helmholtz equation of constant and variableorder using $hp$ refinement for different values of the penalty parameter. We also solve the fractional Burgers equation with constant and variableorder and compare with solutions obtained with a single domain spectral collocation method. 
Real algebraic curves of bidegree (5,5) on the quadric ellipsoid. (arXiv:1809.03946v1 [math.AG]) Cache Translate Page 
Authors: Matilde Manzaroli We complete the topological classification of real algebraic nonsingular curves of bidegree $(5, 5)$ on the quadric ellipsoid. We show in particular that previously known restrictions form a complete system for this bidegree. Therefore, the main part of the paper concerns the construction of real algebraic curves. Our strategy is first to reduce to the construction of curves in the second Hirzebruch surface by degenerating the quadric ellipsoid to the quadratic cone. Next, we combine different classical construction methods on toric surfaces, such as Dessin d'enfants and and Viro's patchworking method. 
Linear and nonlinear equations for beams and degenerate plates with multiple intermediate piers. (arXiv:1809.03948v1 [math.AP]) Cache Translate Page 
Authors: Maurizio Garrione, Filippo Gazzola A full theory for hinged beams and degenerate plates with multiple intermediate piers is developed. The analysis starts with the variational setting and the study of the linear stationary problem in one dimension. Wellposedness results are provided and the possible loss of regularity, due to the presence of the piers, is underlined. A complete spectral theorem is then proved, explicitly determining the eigenvalues on varying of the position of the piers and exhibiting the fundamental modes of oscillation. The obtained eigenfunctions are used to tackle the study of the nonlinear evolution problem in presence of different nonlinearities, focusing on the appearance of linear and (a suitable notion of) nonlinear instability, with a twofold goal: finding the most reliable nonlinearity describing the oscillations of real structures and determining the position of the piers that maximizes the stability of the structure. The last part of the paper is devoted to the study of degenerate plate models, where the structure is composed by a central beam moving vertically and by a continuum of crosssections free to rotate around the beam and allowed to deflect from the horizontal equilibrium position. The torsional instability of the structure is investigated, taking into account the impact of different nonlinear terms aiming at modeling the action of cables and hangers in a suspension bridge. Again, the optimal position of the piers in terms of stability is discussed. The stability analysis is carried out both by means of analytical tools, such as Floquet theory, and numerical experiments. Several open problems and possible future developments are presented. 
Partial and full hyperviscosity for NavierStokes and primitive equations. (arXiv:1809.03954v1 [math.AP]) Cache Translate Page 
Authors: Amru Hussein The $3$D primitive equations and incompressible NavierStokes equations with full hyperviscosity and only horizontal hyperviscosity are considered on the torus, i.e., the diffusion term $\Delta$ is replaced by $\Delta+ \varepsilon(\Delta)^{l}$ or by $\Delta + \varepsilon(\Delta_H)^{l}$, respectively, where $\Delta_H = \partial_x^2+\partial_y^2 $, $\Delta= \Delta_H + \partial_z^2$, $\varepsilon> 0$, $l>1$. Hyperviscosity is applied in many numerical schemes, and in particular horizontal hyperviscosity appears in meteorological models. A classical result by Lions states that for the NavierStokes equations uniqueness of global weak solutions for initial data in $L^2$ holds if $\Delta$ is replaced by $(\Delta)^{5/4}$. Here, for the primitive equations the corresponding result is proven for $(\Delta)^{8/5}$. For the case of horizontal hyperviscosity $l=2$ is sufficient in both cases. Strong convergence for $\varepsilon\to 0$ of hyperviscous solutions to a weak solution of the NavierStokes and primitive equations, respectively, is proven as well. The approach presented here is based on the construction of strong solutions via an evolution equation approach for initial data in $L^2$ and weakstrong uniqueness. 
Dimension walks on $\mathbb{S}^d \times \mathbb{R}$. (arXiv:1809.03955v1 [math.CA]) Cache Translate Page 
Authors: N. H. Bingham, Tasmin L. Symons We verify that the established one and twostep recurrences for positive definite functions on spheres extend to the spatiotemporal case. 
Taut Foliations, Positive 3Braids, and the LSpace Conjecture. (arXiv:1809.03959v1 [math.GT]) Cache Translate Page 
Authors: Siddhi Krishna We construct taut foliations in every closed 3manifold obtained by $r$framed Dehn surgery along a positive 3braid knot $K$ in $S^3$, where $r < 2g(K)1$ and $g(K)$ denotes the Seifert genus of $K$. This confirms a prediction of the Lspace Conjecture. For instance, we produce taut foliations in every nonLspace obtained by surgery along the pretzel knot $P(2,3,7)$, and indeed along every pretzel knot $P(2,3,q)$, for $q$ a positive odd integer. This is the first construction of taut foliations for every nonLspace obtained by surgery along an infinite family of hyperbolic Lspace knots. Additionally, we construct taut foliations in every closed 3manifold obtained by $r$framed Dehn surgery along a positive 1bridge braid in $S^3$, where $r <g(K)$. 
Curved fronts in a shear flow: case of combustion nonlinearities. (arXiv:1809.03963v1 [math.AP]) Cache Translate Page 
Authors: Mohammad El Smaily We prove the existence and uniqueness, up to a shift in time, of curved traveling fronts for a reactionadvectiondiffusion equation with a combustiontype nonlinearity. The advection is through a shear flow $q$. This analyzes, for instance, the shape of flames produced by a Bunsen burner in the presence of advection. We also give a formula for the speed of propagation of these conical fronts in terms of the wellknown speed of planar pulsating traveling waves. 
The descent of biquaternion algebras in characteristic two. (arXiv:1809.03965v1 [math.AC]) Cache Translate Page 
Authors: Demba Barry, Adam Chapman, Ahmed Laghribi In this paper we associate an invariant to a biquaternion algebra $B$ over a field $K$ with a subfield $F$ such that $K/F$ is a quadratic separable extension and $\operatorname{char}(F)=2$. We show that this invariant is trivial exactly when $B \cong B_0 \otimes K$ for some biquaternion algebra $B_0$ over $F$. We also study the behavior of this invariant under certain field extensions and provide several interesting examples. 
More Cases Where the KruskalKatona Bound is Tight. (arXiv:1809.03967v1 [math.CO]) Cache Translate Page 
Authors: Robert Cowen In graph theory, knowing the number of complete subgraphs with r vertices that a graph g has, limits the number of its complete subgraphs with s vertices, for s > r. A useful upper bound is provided by the KruskalKatona theorem, but this bound is often not tight. In this note, we add to the known cases where this bound is tight and begin an investigation of tight bounded graph sequences. 
Cusp Universality for Random Matrices I: Local Law and the Complex Hermitian Case. (arXiv:1809.03971v1 [math.PR]) Cache Translate Page 
Authors: László Erdős, Torben Krüger, Dominik Schröder For complex Wignertype matrices, i.e. Hermitian random matrices with independent, not necessarily identically distributed entries above the diagonal, we show that at any cusp singularity of the limiting eigenvalue distribution the local eigenvalue statistics are universal and form a Pearcey process. Since the density of states typically exhibits only square root or cubic root cusp singularities, our work complements previous results on the bulk and edge universality and it thus completes the resolution of the WignerDysonMehta universality conjecture for the last remaining universality type in the complex Hermitian class. Our analysis holds not only for exact cusps, but approximate cusps as well, where an extended Pearcey process emerges. As a main technical ingredient we prove an optimal local law at the cusp for both symmetry classes. This result is also used in the companion paper [18] where the cusp universality for real symmetric Wignertype matrices is proven. 
Complex dynamic of the system of nonlinear difference equations in the Hilbert space. (arXiv:1809.03980v1 [math.AP]) Cache Translate Page 
Authors: O.O. Pokutnyi In the given article the necessary and sufficient conditions of the existence of solutions of boundary value problem for the nonlinear system in the Hilbert spaces are obtained. Examples of such systems like a LotkaVolterra are considered. Bifurcation and branching conditions of solutions are obtained. 
C*algebras of stable rank one and their Cuntz semigroups. (arXiv:1809.03984v1 [math.OA]) Cache Translate Page 
Authors: Ramon Antoine, Francesc Perera, Leonel Robert, Hannes Thiel The uncovering of new structure on the Cuntz semigroup of a C*algebra of stable rank one leads to several applications: We answer affirmatively, for the class of stable rank one C*algebras, a conjecture by Blackadar and Handelman on dimension functions, the Global Glimm Halving problem, and the problem of realizing functions on the cone of 2quasitraces as ranks of Cuntz semigroup elements. We also gain new insights into the comparability properties of positive elements in C*algebras of stable rank one. 
Efficient Statistics, in High Dimensions, from Truncated Samples. (arXiv:1809.03986v1 [math.ST]) Cache Translate Page 
Authors: Constantinos Daskalakis, Themis Gouleakis, Christos Tzamos, Manolis Zampetakis We provide an efficient algorithm for the classical problem, going back to Galton, Pearson, and Fisher, of estimating, with arbitrary accuracy the parameters of a multivariate normal distribution from truncated samples. Truncated samples from a $d$variate normal ${\cal N}(\mathbf{\mu},\mathbf{\Sigma})$ means a samples is only revealed if it falls in some subset $S \subseteq \mathbb{R}^d$; otherwise the samples are hidden and their count in proportion to the revealed samples is also hidden. We show that the mean $\mathbf{\mu}$ and covariance matrix $\mathbf{\Sigma}$ can be estimated with arbitrary accuracy in polynomialtime, as long as we have oracle access to $S$, and $S$ has nontrivial measure under the unknown $d$variate normal distribution. Additionally we show that without oracle access to $S$, any nontrivial estimation is impossible. 
The $\epsilon$error Capacity of Symmetric PIR with Byzantine Adversaries. (arXiv:1809.03988v1 [cs.IT]) Cache Translate Page 
Authors: Qiwen Wang, Hua Sun, Mikael Skoglund The capacity of symmetric private information retrieval with $K$ messages, $N$ servers (out of which any $T$ may collude), and an omniscient Byzantine adversary (who can corrupt any $B$ answers) is shown to be $1  \frac{T+2B}{N}$ [1], under the requirement of zero probability of error. In this work, we show that by weakening the adversary slightly (either providing secret low rate channels between the servers and the user, or limiting the observation of the adversary), and allowing vanishing probability of error, the capacity increases to $1  \frac{T+B}{N}$. 
DLR equations and rigidity for the Sinebeta process. (arXiv:1809.03989v1 [math.PR]) Cache Translate Page 
Authors: David Dereudre, Adrien Hardy, Thomas Leblé, Mylène Maïda We investigate Sine$_\beta$, the universal point process arising as the thermodynamic limit of the microscopic scale behavior in the bulk of onedimensional loggases, or $\beta$ensembles, at inverse temperature $\beta>0$. We adopt a statistical physics perspective, and give a description of Sine$_\beta$ using the DobrushinLandfordRuelle (DLR) formalism by proving that it satisfies the DLR equations: the restriction of Sine$_\beta$ to a compact set, conditionally to the exterior configuration, reads as a Gibbs measure given by a finite loggas in a potential generated by the exterior configuration. Moreover, we show that Sine$_\beta$ is numberrigid and tolerant in the sense of GhoshPeres, i.e. the number, but not the position, of particles lying inside a compact set is a deterministic function of the exterior configuration. Our proof of the rigidity differs from the usual strategy and is robust enough to include more general long range interactions in arbitrary dimension. 
On the Relation between Very Weak and LerayHopf Solutions to NavierStokes Equations. (arXiv:1809.03991v1 [math.AP]) Cache Translate Page 
Authors: Giovanni P. Galdi We prove a general result that implies that very weak solutions to the Cauchy problem for the NavierStokes equations must be, in fact, LerayHopf solutions if only their initial data are (solenoidal) with finite kinetic energy. 
Convex functions on graphs: Sum of the eigenvalues. (arXiv:1809.03996v1 [math.CO]) Cache Translate Page 
Authors: Asghar Bahmani Let $G$ be a simple graph with the Laplacian matrix $L(G)$ and let $e(G)$ be the number of edges of $G$. A conjecture by Brouwer and a conjecture by Grone and Merris state that the sum of the $k$ largest Laplacian eigenvalues of $G$ is at most $e(G)+\binom{k+1}{2}$ and $\sum_{i=1}^{k}d_{i}^{*}$, respectively, where $(d_{i}^{*})_{i}$ is the conjugate of the degree sequence $(d_i)_{i}$. We generalize these conjectures to weighted graphs and symmetric matrices. Moreover, among other results we show that under some assumptions, concave upper bounds on convex functions of symmetric real matrices are equivalent to concave upper bounds on convex functions of $(0,1)$ matrices. 
Eigenfunction expansions and scattering theory associated with the Dirac equation. (arXiv:1809.03998v1 [math.CA]) Cache Translate Page 
Authors: Lev Sakhnovich The classical LippmannSchwinger equation (LS equation) plays an important role in the scattering theory for the nonrelativistic case (Schr\"odinger equation). In our previous paper arXiv:1801.05370, we consider the relativistic analogue of the LippmannSchwinger equation (RLS equation). We represent the corresponding equation in the integral form. In the present paper, we use the corresponding integral equation and investigate the scattering problems for both stationary and dynamical cases. Our approach allows us to develop an RLS equation theory which is comparable in its completeness with the theory of the LS equation. In particular, we consider the eigenfunction expansion associated with the relativistic Dirac equation. We note that the works on the theory of the LS equation serve as a model for us. 
Relativistic formulation of abstract evolution equations. (arXiv:1809.04001v1 [math.AP]) Cache Translate Page 
Authors: Yoritaka Iwata The relativistic formulation of abstract evolution equations is introduced. The corresponding logarithmic representation is shown to exist without assuming the invertible property of evolution operators. Consequently, by means of the logarithmic representation of operators, nonlinear and discrete properties are shown to be valid to the infinitesimal generators of relativistic abstract evolution equations. 
Subgroupoids and groupoid embeddings. (arXiv:1809.04003v1 [math.GT]) Cache Translate Page 
Authors: João Nuno Mestre, Martin Weilandt Given the notion of suborbifold of the second author (based on ideas of Borzellino/Brunsden) and the classical correspondence (up to certain equivalences) between (effective) orbifolds via atlases and effective orbifold groupoids, we analyze which groupoid embeddings correspond to suborbifolds and give classes of suborbifolds naturally leading to groupoid embeddings. 
Local density of Caputostationary functions of any order. (arXiv:1809.04005v1 [math.AP]) Cache Translate Page 
Authors: Alessandro Carbotti, Serena Dipierro, Enrico Valdinoci We show that any given function can be approximated with arbitrary precision by solutions of linear, timefractional equations of any prescribed order. This extends a recent result by Claudia Bucur, which was obtained for timefractional derivatives of order less than one, to the case of any fractional order of differentiation. In addition, our result applies also to the $\psi$Caputostationary case, and it will provide one of the building blocks of a forthcoming paper in which we will establish general approximation results by operators of any order involving anisotropic superpositions of classical, spacefractional and timefractional diffusions. 
Dynamics near a periodically forced robust heteroclinic cycle. (arXiv:1809.04006v1 [math.DS]) Cache Translate Page 
Authors: Isabel S. Labouriau, Alexandre A.P. Rodrigues There are few examples of nonautonomous vector fields exhibiting complex dynamics that may be proven analytically. We analyse a family of periodic perturbations of a weakly attracting robust heteroclinic network defined on the twosphere. We derive the first return map near the heteroclinic cycle for small amplitude of the perturbing term, and we reduce the analysis of the nonautonomous system to that of a twodimensional map on a cylinder. When the perturbation strength is small there is an attracting invariant closed curve not contractible on the cylinder. Near the centre of frequency locking there are parameter values for which this curve coexists with an attracting periodic solution. Increasing the perturbation strength there are periodic solutions that bifurcate into a closed contractible invariant curve and into a region where the dynamics is conjugate to a full shift on two symbols. These last two dynamical features appear at a discretetime BogdanovTakens bifurcation. 
On the question "Can one hear the shape of a group?" and Hulanicki type theorem for graphs. (arXiv:1809.04008v1 [math.GR]) Cache Translate Page 
Authors: Artem Dudko, Rostislav Grigorchuk We study the question of whether it is possible to determine a finitely generated group $G$ up to some notion of equivalence from the spectrum $\mathrm{sp}(G)$ of $G$. We show that the answer is "No" in a strong sense. As the first example we present the collection of amenable 4generated groups $G_\omega$, $\omega\in\{0,1,2\}^\mathbb N$, constructed by the second author in 1984. We show that among them there is a continuum of pairwise nonquasiisometric groups with $\mathrm{sp}(G_\omega)=[\tfrac{1}{2},0]\cup[\tfrac{1}{2},1]$. Moreover, for each of these groups $G_\omega$ there is a continuum of covering groups $G$ with the same spectrum. As the second example we construct a continuum of $2$generated torsionfree step3 solvable groups with the spectrum $[1,1]$. In addition, in relation to the above results we prove a version of Hulanicki Theorem about inclusion of spectra for covering graphs. 
Failure Rate Properties of Parallel Systems. (arXiv:1809.04009v1 [math.PR]) Cache Translate Page 
Authors: Idir Arab, Milto Hadjikyriakou, Paulo Eduardo Oliveira We study failure rate monotonicity and generalized convex transform stochastic ordering properties of random variables, with a concern on applications. We are especially interested in the effect of a tail weight iteration procedure to define distributions, which is equivalent to the characterization of moments of the residual lifetime at a given instant. For the monotonicity properties, we are mainly concerned with hereditary properties with respect to the iteration procedure providing counterexamples showing either that the hereditary property does not hold or that inverse implications are not true. For the stochastic ordering, we introduce a new criterium, based on the analysis of the sign variation of a suitable function. This criterium is then applied to prove ageing properties of parallel systems formed with components that have exponentially distributed lifetimes. 
ShiftInequivalent Decimations of the SidelnikovLempelCohnEastman Sequences. (arXiv:1809.04010v1 [math.CO]) Cache Translate Page 
Authors: Saban Alaca, Goldwyn Millar We consider the problem of finding maximal sets of shiftinequivalent decimations of SidelnikovLempelCohnEastman (SLCE) sequences (as well as the equivalent problem of determining the multiplier groups of the almost difference sets associated with these sequences). We derive a numerical necessary condition for a residue to be a multiplier of an SLCE almost difference set. Using our necessary condition, we show that if $p$ is an odd prime and $S$ is an SLCE almost difference set over $\mathbb{F}_p,$ then the multiplier group of $S$ is trivial. Consequently, for each odd prime $p,$ we obtain a family of $\phi(p1)$ shiftinequivalent balanced periodic sequences (where $\phi$ is the EulerTotient function) each having period $p1$ and nearly perfect autocorrelation. 
On the approximation of L\'evy driven Volterra processes and their integrals. (arXiv:1809.04011v1 [math.OC]) Cache Translate Page 
Authors: Giulia di Nunno, Andrea Fiacco, Erik Hove Karlsen Volterra processes appear in several applications ranging from turbulence to energy finance where they are used in the modelling of e.g. temperatures and wind and the related financial derivatives. Volterra processes are in general nonsemimartingales and a theory of integration with respect to such processes is in fact not standard. In this work we suggest to construct an approximating sequence of L\'evy driven Volterra processes, by perturbation of the kernel function. In this way, one can obtain an approximating sequence of semimartingales. Then we consider fractional integration with respect to Volterra processes as integrators and we study the corresponding approximations of the fractional integrals. We illustrate the approach presenting the specific study of the GammaVolterra processes. Examples and illustrations via simulation are given. 
Tstatistic for Autoregressive process. (arXiv:1809.04018v1 [math.ST]) Cache Translate Page 
Authors: Eric Benhamou In this paper, we discuss the distribution of the tstatistic under the assumption of normal autoregressive distribution for the underlying discrete time process. This result generalizes the classical result of the traditional tdistribution where the underlying discrete time process follows an uncorrelated normal distribution. However, for AR(1), the underlying process is correlated. All traditional results break down and the resulting tstatistic is a new distribution that converges asymptotically to a normal. We give an explicit formula for this new distribution obtained as the ratio of two dependent distribution (a normal and the distribution of the norm of another independent normal distribution). We also provide a modified statistic that follows a non central tdistribution. Its derivation comes from finding an orthogonal basis for the the initial circulant Toeplitz covariance matrix. Our findings are consistent with the asymptotic distribution for the tstatistic derived for the asympotic case of large number of observations or zero correlation. This exact finding of this distribution has applications in multiple fields and in particular provides a way to derive the exact distribution of the Sharpe ratio under normal AR(1) assumptions. 
Stochastic growth rates for populations in random environments with rare migration. (arXiv:1809.04025v1 [qbio.PE]) Cache Translate Page 
Authors: David Steinsaltz, Shripad Tuljapurkar The growth of a population divided among spatial sites, with migration between the sites, is sometimes modelled by a product of random matrices, with each diagonal elements representing the growth rate in a given time period, and offdiagonal elements the migration rate. The randomness of the matrices then represents stochasticity of environmental conditions. We consider the case where the offdiagonal elements are small, representing a situation where migration has been introduced into an otherwise sessile metapopulation. We examine the asymptotic behaviour of the longterm growth rate. When there is a single site with the highest growth rate, under the assumption of Gaussian log growth rates at the individual sites (or having Gaussianlike tails) we show that the behavior near zero is like a power of $\epsilon$, and derive upper and lower bounds for the power in terms of the difference in the growth rates and the distance between the sites. In particular, when the difference in mean log growth rate between two sites is sufficiently small, or the variance of the difference between the sites sufficiently large, migration will always be favored by natural selection, in the sense that introducing a small amount of migration will increase the growth rate of the population relative to the zeromigration case. 
Stability of fixed life histories to perturbation by rare diapause. (arXiv:1809.04027v1 [qbio.PE]) Cache Translate Page 
Authors: David Steinsaltz, Shripad Tuljapurkar We follow up on a companion work that considered growth rates of populations growing at different sites, with different randomly varying growth rates at each site, in the limit as migration between sites goes to 0. We extend this work here to the special case where the maximum average log growth rate is achieved at two different sites. The primary motivation is to cover the case where `sites' are understood as age classes for the same individuals. The theory then calculates the effect on growth rate of introducing a rare delay in development, a diapause, into an otherwise fixedlength semelparous life history. Whereas the increase in stochastic growth rate due to rare migrations was found to grow as a power of the migration rate, we show that under quite general conditions that in the diapause model  or in the migration model with two or more sites having equal individual stochastic growth rates  the increase in stochastic growth rate due to diapause at rate $\epsilon$ behaves like $(\log \epsilon^{1})^{1}$ as $\epsilon\downarrow 0$. In particular, this implies that a small random disruption to the deterministic life history will always be favored by natural selection, in the sense that it will increase the stochastic growth rate relative to the zerodelay deterministic life history. 
Polygones fondamentaux d'une courbe modulaire. (arXiv:1809.04030v1 [math.NT]) Cache Translate Page 
Authors: Karim Belabas, Dominique Bernardi, Bernadette PerrinRiou A few pages in Siegel describe how, starting with a fundamental polygon for a compact Riemann surface, one can construct a symplectic basis of its homology. This note retells that construction, specializing to the case where the surface is associated to a congruence subgroup $\Gamma$ of $SL_2(Z)$. One then obtains by classical procedures a generating system for $\Gamma$ with a minimal number of hyperbolic elements and a presentation of the $Z[\Gamma]$module $Z[P^1(Q)]_0$. 
Augmented Lagrangian for treatment of hanging nodes in hexahedral meshes. (arXiv:1809.04031v1 [math.NA]) Cache Translate Page 
Authors: Saumik Dana, Mary F Wheeler The surge of activity in the resolution of fine scale features in the field of earth sciences over the past decade necessitates the development of robust yet simple algorithms that can tackle the various drawbacks of in silico models developed hitherto. One such drawback is that of the restrictive computational cost of finite element method in rendering resolutions to the fine scale features, while at the same time keeping the domain being modeled sufficiently large. We propose the use of the augmented lagrangian method commonly used in the treatment of hanging nodes in contact mechanics in tackling the drawback. An interface is introduced in a typical finite element mesh across which an aggressive coarsening of the finite elements is possible. The method is based upon minimizing an augmented potential energy which factors in the constraint that exists at the hanging nodes on that interface. This allows for a significant reduction in the number of finite elements comprising the mesh with concomitant reduction in the computational expense. 
BitMetric Decoding of NonBinary LDPC Codes with Probabilistic Amplitude Shaping. (arXiv:1809.04037v1 [cs.IT]) Cache Translate Page 
Authors: Fabian Steiner, Georg Böcherer, Gianluigi Liva A new approach for combining nonbinary lowdensity paritycheck (NBLDPC) codes with higherorder modulation and probabilistic amplitude shaping (PAS) is presented. Instead of symbolmetric decoding (SMD), a bitmetric decoder (BMD) is used so that matching the field order of the nonbinary code to the constellation size is not needed, which increases the flexibility of the coding scheme. Information rates, density evolution thresholds and finitelength simulations show that the flexibility comes at no loss of performance if PAS is used. 
SmallGainBased Boundary Feedback Design for Global Exponential Stabilization of 1D Semilinear Parabolic PDEs. (arXiv:1809.04039v1 [math.OC]) Cache Translate Page 
Authors: Iasson Karafyllis, Miroslav Krstic This paper presents a novel methodology for the design of boundary feedback stabilizers for 1D, semilinear, parabolic PDEs. The methodology is based on the use of smallgain arguments and can be applied to parabolic PDEs with nonlinearities that satisfy a linear growth condition. The nonlinearities may contain nonlocal terms. Two different types of boundary feedback stabilizers are constructed: a linear static boundary feedback and a nonlinear dynamic boundary feedback. It is also shown that there are fundamental limitations for feedback design in the parabolic case: arbitrary gain assignment is not possible by means of boundary feedback. An example with a nonlocal nonlinear term illustrates the applicability of the proposed methodology. 
Spin structures and the divisibility of Euler classes. (arXiv:1809.04045v1 [math.GT]) Cache Translate Page 
Authors: Yukio Kametani In this short article we give a geometric meaning of the divisibility of $KO$theoretical Euler classes for given two spin modules. We are motivated by Furuta's 10/8inequality for a closed spin $4$manifold. The role of the reducibles is clarified in the monopole equations of SeibergWitten theory, as done by Donaldson and Taubes in YangMills theory. 
Dynamical invariants of mapping torus categories. (arXiv:1809.04046v1 [math.SG]) Cache Translate Page 
Authors: Yusuf Barış Kartal This paper describes constructions in homological algebra that are part of a strategy whose goal is to understand and classify symplectic mapping tori. More precisely, given a dg category and an autoequivalence, satisfying certain assumptions, we introduce a category $M_\phi$called the mapping torus category that describes the wrapped Fukaya category of an open symplectic mapping torus. Then we define a family of bimodules on a natural deformation of $M_\phi$, uniquely characterize it and using this, we distinguish $M_\phi$ from the mapping torus category of the identity. The proof of the equivalence of $M_\phi$ with wrapped Fukaya category is not proven here, and it will be shown in an upcoming paper. 
On the structure of Ricci shrinkers. (arXiv:1809.04049v1 [math.DG]) Cache Translate Page 
Authors: Haozhao Li, Yu Li, Bing Wang We develop a structure theory for noncollapsed Ricci shrinkers without any curvature condition. As applications, we obtain some curvature estimates of the Ricci shrinkers depending only on the noncollapsing constant. 
On RogersShephard type inequalities for general measures. (arXiv:1809.04051v1 [math.MG]) Cache Translate Page 
Authors: David AlonsoGutiérrez, María A. Hernández Cifre, Michael Roysdon, Jesús Yepes Nicolás, Artem Zvavitch In this paper we prove a series of RogersShephard type inequalities for convex bodies when dealing with measures on the Euclidean space with either radially decreasing densities, or quasiconcave densities attaining their maximum at the origin. Functional versions of classical RogersShephard inequalities are also derived as consequences of our approach. 
On Hawking mass and Bartnik mass of CMC surfaces. (arXiv:1809.04056v1 [math.DG]) Cache Translate Page 
Authors: Pengzi Miao, Yaohua Wang, Naqing Xie Given a constant mean curvature surface that bounds a compact manifold with nonnegative scalar curvature, we obtain intrinsic conditions on the surface that guarantee the positivity of its Hawking mass. We also obtain estimates of the Bartnik mass of such surfaces, without assumptions on the integral of the squared mean curvature. If the ambient manifold has negative scalar curvature, our method also applies and yields estimates on the hyperbolic Bartnik mass of these surfaces. 
Horocycle averages on closed manifolds and transfer operators. (arXiv:1809.04062v1 [math.DS]) Cache Translate Page 
Authors: Alexander Adam We study semigroups of weighted transfer operators for Anosov flows of regularity C^r, r>1, on compact manifolds without boundary. We construct an anisotropic Banach space on which the resolvent of the generator is quasicompact and where the upper bound on the essential spectral radius depends continuously on the regularity. We apply this result to the ergodic average of the horocycle flow for C^3 contact Anosov flows in dimension three. 
Logarithmic growth filtrations for $(\varphi,\nabla)$modules over the bounded Robba ring. (arXiv:1809.04065v1 [math.NT]) Cache Translate Page 
Authors: Shun Ohkubo In this paper, we study the logarithmic growth (loggrowth) filtration, a mysterious invariant found by B. Dwork, for $(\varphi,\nabla)$modules over the bounded Robba ring. The main result is a proof of a conjecture proposed by B. Chiarellotto and N. Tsuzuki on a comparison between the loggrowth filtration and Frobenius slope filtration. One of the ingredients of the proof is a new criterion for pure of bounded quotient, which is a notion introduced by Chiarellotto and Tsuzuki to formulate their conjecture. We also give several applications to loggrowth Newton polygons, including a conjecture of Dwork on the semicontinuity, and an analogue of a theorem due to V. Drinfeld and K. Kedlaya on Frobenius Newton polygons for indecomposable convergent $F$isocrystals. 
An Application of the Index Theorem for Manifolds with Fibered Boundaries. (arXiv:1809.04066v1 [math.DG]) Cache Translate Page 
Authors: Andres LarrainHubach We show how the index formula for manifolds with fibered boundaries can be used to compute the index of the Dirac operator on TaubNUT space twisted by an antiselfdual generic instanton connection. 
The Metric Completion of Outer Space. (arXiv:1202.6392v6 [math.GR] UPDATED) Cache Translate Page 
Authors: Yael AlgomKfir We develop the theory of a metric completion of an asymmetric metric space. We characterize the points on the boundary of Outer Space that are in the metric completion of Outer Space with the Lipschitz metric. We prove that the simplicial completion, the subset of the completion consisting of simplicial tree actions, is homeomorphic to the free splitting complex. We use this to give a new proof of a theorem by Francaviglia and Martino that the isometry group of Outer Space is homeomorphic to $\text{Out}(F_n)$ for $n \geq 3$ and equal to $\text{PSL}(2,\mathbb{Z})$ for $n=2$. 
Generalized iterated wreath products of symmetric groups and generalized rooted trees correspondence. (arXiv:1409.0604v2 [math.RT] UPDATED) Cache Translate Page 
Authors: Mee Seong Im, Angela Wu Consider the generalized iterated wreath product $S_{r_1}\wr \ldots \wr S_{r_k}$ of symmetric groups. We give a complete description of the traversal for the generalized iterated wreath product. We also prove an existence of a bijection between the equivalence classes of ordinary irreducible representations of the generalized iterated wreath product and orbits of labels on certain rooted trees. We find a recursion for the number of these labels and the degrees of irreducible representations of the generalized iterated wreath product. Finally, we give rough upper bound estimates for fast Fourier transforms. 
Configuration categories and homotopy automorphisms. (arXiv:1503.00501v3 [math.AT] UPDATED) Cache Translate Page 
Authors: Michael S Weiss Let M be a smooth compact manifold with boundary. Under some geometric conditions on M, a homotopical model for the pair (M,boundary of M) can be recovered from the configuration category of the interior of M. The grouplike monoid of derived homotopy automorphisms of the configuration category of the interior of M then acts on the homotopical model of the pair (M,boundary of M), in a way which is compatible with a known homotopical action of the homeomorphism group of M minus boundary on (M,boundary of M). 
Lower bounds for the dynamically defined measures. (arXiv:1506.04497v19 [math.DS] UPDATED) Cache Translate Page 
Authors: Ivan Werner The dynamically defined measure (DDM) $\Phi$ arising from a finite measure $\phi_0$ on an initial $\sigma$algebra on a set and an invertible map acting on the latter is considered. Several lower bounds for it are obtained and sufficient conditions for its positivity are deduced under the general assumption that there exists an invariant measure $\Lambda$ such that $\Lambda\ll\phi_0$. In particular, DDMs arising from the Hellinger integral $\mathcal{J}_\alpha(\Lambda,\phi_0)\geq\mathcal{H}^{\alpha,0}(\Lambda,\phi_0)\geq\mathcal{H}_\alpha(\Lambda,\phi_0)$ are constructed with $\mathcal{H}_{0}\left(\Lambda,\phi_0\right)(Q) = \Phi(Q)$, $\mathcal{H}_{1}\left(\Lambda,\phi_0\right)(Q) = \Lambda(Q)$, and \[\Phi(Q)^{1\alpha}\Lambda(Q)^{\alpha}\geq\mathcal{J}_{\alpha}\left(\Lambda,\phi_0\right)(Q)\] for all measurable $Q$ and $\alpha\in[0,1]$, and further computable lower bounds for them are obtained and analyzed. It is shown, in particular, that $(0,1)\owns\alpha\longmapsto\mathcal{H}_{\alpha}(\Lambda,\phi_0)(Q)$ is completely determined by the $\Lambda$essential supremum of $d\Lambda/d\phi_0$ for all $0<\alpha<1$ if $\Lambda$ is ergodic, and if also a condition for the continuity at $0$ is satisfied, the above inequalities become equalities. In general, for every measurable $Q$, it is shown that $[0,1]\owns\alpha\longmapsto\mathcal{J}_{\alpha}(\Lambda,\phi_0)(Q)$ is logconvex, all onesided derivatives of $(0,1)\owns\alpha\longmapsto\mathcal{H}^{\alpha,0}(\Lambda,\phi_0)(Q)$ and $(0,1)\owns\alpha\longmapsto\mathcal{J}_{\alpha}(\Lambda,\phi_0)(Q)$ are obtained, and some lower bounds for the functions by means of the derivatives are given. Some sufficient conditions for the continuity and a onesided differentiability of $(0,1)\owns\alpha\longmapsto\mathcal{H}_{\alpha}(\Lambda,\phi_0)(Q)$ are provided. 
Differential operators and families of automorphic forms on unitary groups of arbitrary signature. (arXiv:1511.06771v4 [math.NT] UPDATED) Cache Translate Page 
Authors: Ellen Eischen, Jessica Fintzen, Elena Mantovan, Ila Varma In the 1970's, Serre exploited congruences between $q$expansion coefficients of Eisenstein series to produce $p$adic families of Eisenstein series and, in turn, $p$adic zeta functions. Partly through integration with more recent machinery, including Katz's approach to $p$adic differential operators, his strategy has influenced four decades of developments. Prior papers employing Katz's and Serre's ideas exploiting differential operators and congruences to produce families of automorphic forms rely crucially on $q$expansions of automorphic forms. The overarching goal of the present paper is to adapt the strategy to automorphic forms on unitary groups, which lack $q$expansions when the signature is of the form $(a, b)$, $a\neq b$. In particular, this paper completely removes the restrictions on the signature present in prior work. As intermediate steps, we achieve two key objectives. First, partly by carefully analyzing the action of the Young symmetrizer on SerreTate expansions, we explicitly describe the action of differential operators on the SerreTate expansions of automorphic forms on unitary groups of arbitrary signature. As a direct consequence, for each unitary group, we obtain congruences and families analogous to those studied by Katz and Serre. Second, via a novel lifting argument, we construct a $p$adic measure taking values in the space of $p$adic automorphic forms on unitary groups of any prescribed signature. We relate the values of this measure to an explicit $p$adic family of Eisenstein series. One application of our results is to the recently completed construction of $p$adic $L$functions for unitary groups by the first named author, Harris, Li, and Skinner. 
On links of vertices in simplicial $d$complexes embeddable in the euclidean $2d$space. (arXiv:1512.05164v5 [cs.CG] UPDATED) Cache Translate Page 
Authors: Salman Parsa We consider $d$dimensional simplicial complexes which can be PL embedded in the $2d$dimensional euclidean space. In short, we show that in any such complex, for any three vertices, the intersection of the linkcomplexes of the vertices is linklessly embeddable in the $(2d1)$dimensional euclidean space. These considerations lead us to a new upper bound on the total number of $d$simplices in an embeddable complex in $2d$space with $n$ vertices, improving known upper bounds, for all $d \geq 2$. Moreover, the bound is also true for the size of $d$complexes linklessly embeddable in the $(2d+1)$dimensional space. 
Efficiency analysis of double perturbed pairwise comparison matrices. (arXiv:1602.07137v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Kristóf ÁbeleNagy, Sándor Bozóki, Örs Rebák Efficiency is a core concept of multiobjective optimization problems and multiattribute decision making. In the case of pairwise comparison matrices a weight vector is called efficient if the approximations of the elements of the pairwise comparison matrix made by the ratios of the weights cannot be improved in any position without making it worse in some other position. A pairwise comparison matrix is called double perturbed if it can be made consistent by altering two elements and their reciprocals. The most frequently used weighting method, the eigenvector method is analyzed in the paper, and it is shown that it produces an efficient weight vector for double perturbed pairwise comparison matrices. 
John Ellipsoid and the Center of Mass of a Convex Body. (arXiv:1605.06881v3 [math.MG] UPDATED) Cache Translate Page 
Authors: Han Huang It is natural to ask whether the center of mass of a convex body $K\subset \mathbb{R}^n$ lies in its John ellipsoid $B_K$, i.e., in the maximal volume ellipsoid contained in $K$. This question is relevant to the efficiency of many algorithms for convex bodies. In this paper, we obtain an unexpected negative result. There exists a convex body $K\subset \mathbb{R}^n$ such that its center of mass does not lie in the John ellipsoid $B_K$ inflated $(1C\sqrt{\frac{\log(n)} {n}})n$ times about the center of $B_K$. Moreover, there exists a polytope $P \subset \mathbb{R}^n$ with $O(n^2)$ facets whose center of mass is not contained in the John ellipsoid $B_P$ inflated $O(\frac{n}{\log(n)})$ times about the center of $B_P$. 
Identities involving (doubly) symmetric polynomials and integrals over Grassmannians. (arXiv:1607.04850v3 [math.AG] UPDATED) Cache Translate Page 
Authors: Dang Tuan Hiep We obtain identities involving symmetric and doubly symmetric polynomials. These identities provide a way of handling expressions appearing in the AtiyahBottBerlineVergne formula for Grassmannians. As corollaries, we obtain formulas for integrals over Grassmannians of characteristic classes of the tautological bundles. Moreover, we provide a valid proof of the Martin formula for the classical Grassmannian. 
On the Iterates of Digit Maps. (arXiv:1609.03263v3 [math.NT] UPDATED) Cache Translate Page 
Authors: Zachary Chase Given a base $b$, a "digit map" is a map $f: \mathbb{Z}^{\ge 0} \to \mathbb{Z}^{\ge 0}$ of the form $f(\sum_{i=0}^n a_ib^i) = \sum_{i=0}^n f_*(a_i)$ where $\sum_i a_ib^i$ is the base $b$ representation and $f_* : \{0,1,\dots, b1\} \to \mathbb{Z}^{\ge 0}$ satisfies $f_*(0) = 0, f_*(1) = 1$, and $\gcd(f_*(b1),b) = 1$. Suppose further there exists some $m_*$, $0 \le m_* \le b1$, such that $f(m_*)m_*$ is relatively prime to $f(b1)$. We generalize recent results on socalled 'happy numbers' to general digit maps, showing that any periodic point, that is, under iterates of the digit map, can eventually be reached by arbitrarily long sequences of consecutive positive integers. 
Wronskians of theta functions and series for $1/\pi$. (arXiv:1611.02217v3 [math.NT] UPDATED) Cache Translate Page 
Authors: Alex Berkovich, Heng Huat Chan, Michael J. Schlosser In this article, we define functions analogous to Ramanujan's function $f(n)$ defined in his famous paper "Modular equations and approximations to $\pi$". We then use these new functions to study Ramanujan's series for $1/\pi$ associated with the classical, cubic and quartic bases. 
Singular Limit of BSDEs and Optimal Control of two Scale Stochastic Systems in Infinite Dimensional Spaces. (arXiv:1701.01165v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Giuseppina Guatteri, Gianmario Tessitore In this paper we study, by probabilistic techniques, the convergence of the value function for a twoscale, infinitedimensional, stochastic controlled system as the ratio between the two evolution speeds diverges. The value function is represented as the solution of a backward stochastic differential equation (BSDE) that it is shown to converge towards a reduced BSDE. The noise is assumed to be additive both in the slow and the fast equations for the state. Some non degeneracy condition on the slow equation are required. The limit BSDE involves the solution of an ergodic BSDE and is itself interpreted as the value function of an auxiliary stochastic control problem on a reduced state space. 
Autinvariant norms and Autinvariant quasimorphisms on free and surface groups. (arXiv:1702.01662v3 [math.GT] UPDATED) Cache Translate Page 
Authors: Michael Brandenbursky, Michał Marcinkowski Let $F_n$ be the free group on $n$ generators and $\Gamma_g$ the surface group of genus $g$. We consider two particular generating sets: the set of all primitive elements in $F_n$ and the set of all simple loops in $\Gamma_g$. We give a complete characterization of distorted and undistorted elements in the corresponding $Aut$invariant word metrics. In particular, we reprove Stallings theorem and answer a question of Danny Calegari about the growth of simple loops. In addition, we construct infinitely many quasimorphisms on $F_2$ that are $Aut(F_2)$invariant. This answers an open problem posed by Mikl\'os Ab\'ert. 
Gauge from holography and holographic gravitational observables. (arXiv:1704.07959v3 [grqc] UPDATED) Cache Translate Page 
Authors: José A. Zapata In a spacetime divided into two regions $U_1$ and $U_2$ by a hypersurface $\Sigma$, a perturbation of the field in $U_1$ is coupled to perturbations in $U_2$ by means of the holographic imprint that it leaves on $\Sigma$. The linearized gluing field equation constrains perturbations on the two sides of a dividing hypersurface, and this linear operator may have a nontrivial null space. A nontrivial perturbation of the field leaving a holographic imprint on a dividing hypersurface which does not affect perturbations on the other side should be considered physically irrelevant. This consideration, together with a locality requirement, leads to the notion of gauge equivalence in Lagrangian field theory over confined spacetime domains. Physical observables in a spacetime domain $U$ can be calculated integrating locally defined gauge invariant conserved currents on hypersurfaces such that $\partial \Sigma \subset \partial U$. This type of observables are capable of distinguishing gauge inequivalent solutions. The integral of a conserved current on a hypersurface is sensitive only to its homology class $[\Sigma]$, and if $U$ is homeomorphic to a four ball the homology class is determined by its boundary $S = \partial \Sigma$. We will see that a result of Anderson and Torre \cite{anderson1996classification} implies that for a large class of theories including General Relativity local observables turn out to be holographic in the sense that they can be written as integrals of over the two dimensional surface $S$. However, non holographic observables are needed to distinguish between gauge inequivalent solutions. 
Auslander's Theorem for permutation actions on noncommutative algebras. (arXiv:1705.00068v2 [math.RA] UPDATED) Cache Translate Page 
Authors: Jason Gaddis, Ellen Kirkman, W. Frank Moore, Robert Won When $A = \mathbb{k}[x_1, \ldots, x_n]$ and $G$ is a small subgroup of $\operatorname{GL}_n(\mathbb{k})$, Auslander's Theorem says that the skew group algebra $A \# G$ is isomorphic to $\operatorname{End}_{A^G}(A)$ as graded algebras. We prove a generalization of Auslander's Theorem for permutation actions on $(1)$skew polynomial rings, $(1)$quantum Weyl algebras, threedimensional Sklyanin algebras, and a certain graded downup algebra. We also show that certain fixed rings $A^G$ are graded isolated singularities in the sense of Ueyama. 
A classification of star log symplectic structures on a compact oriented surface. (arXiv:1705.01793v3 [math.SG] UPDATED) Cache Translate Page 
Authors: Melinda Lanius Given a compact oriented surface, we classify log Poisson bivectors whose degeneracy loci are locally modeled by a finite set of lines in the plane intersecting at a point. Further, we compute the Poisson cohomology of such structures and discuss the relationship between our classification and the second Poisson cohomology. 
Exact Formulas for the Generalized SumofDivisors Functions. (arXiv:1705.03488v4 [math.NT] UPDATED) Cache Translate Page 
Authors: Maxie D. Schmidt We prove new exact formulas for the generalized sumofdivisors functions. The formulas for $\sigma_{\alpha}(x)$ when $\alpha \in \mathbb{C}$ is fixed and $x \geq 1$ involves a finite sum over all of the prime factors $n \leq x$ and terms involving the $r$order harmonic number sequences. The generalized harmonic number sequences correspond to the partial sums of the Riemann zeta function when $r > 1$ and are related to the generalized Bernoulli numbers when $r \leq 0$ is integervalued. A key part of our expansions of the Lambert series generating functions for the generalized divisor functions is formed by taking logarithmic derivatives of the cyclotomic polynomials, $\Phi_n(q)$, which completely factorize the Lambert series terms $(1q^n)^{1}$ into irreducible polynomials in $q$. We also consider applications of our new results to asymptotic approximations for sums over these divisor functions and to the forms of perfect numbers defined by the special case of the divisor function, $\sigma(n)$, when $\alpha := 1$. Keywords: divisor function; sumofdivisors function; Lambert series; perfect number. MSC (2010): 30B50; 11N64; 11B83 
Antimatroids Induced by Matchings. (arXiv:1705.05510v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Yasushi Kawase, Yutaro Yamaguchi We explore novel connections between antimatroids and matchings in bipartite graphs. In particular, we prove that a combinatorial structure induced by stable matchings or maximumweight matchings is an antimatroid. Moreover, we demonstrate that every antimatroid admits such a representation by stable matchings and maximumweight matchings. 
The Tutte embedding of the matedCRT map converges to Liouville quantum gravity. (arXiv:1705.11161v4 [math.PR] UPDATED) Cache Translate Page 
Authors: Ewain Gwynne, Jason Miller, Scott Sheffield We prove that the Tutte embeddings (a.k.a. harmonic/embeddings) of certain random planar maps converge to $\gamma$Liouville quantum gravity ($\gamma$LQG). Specifically, we treat matedCRT maps, which are discretized matings of correlated continuum random trees, and $\gamma$ ranges from $0$ to $2$ as one varies the correlation parameter. We also show that the associated spacefilling path on the embedded map converges to spacefilling SLE$_{\kappa}$ for $\kappa =16/\gamma^2$ (in the annealed sense) and that simple random walk on the embedded map converges to Brownian motion (in the quenched sense). Our arguments also yield analogous statements for the Smith (square tiling) embedding of the matedCRT map. This work constitutes the first proof that a discrete conformal embedding of a random planar map converges to LQG. Many more such statements have been conjectured. Since the matedCRT map can be viewed as a coarsegrained approximation to other random planar maps (the UIPT, treeweighted maps, bipolaroriented maps, etc.), our results indicate a potential approach for proving that embeddings of these maps converge to LQG as well. To prove the main result, we establish several (independently interesting) theorems about LQG surfaces decorated by spacefilling SLE. There is a natural way to use the SLE curve to divide the plane into `cells' corresponding to vertices of the matedCRT map. We study the law of the shape of the origincontaining cell, in particular proving moments for the ratio of its squared diameter to its area. We also give bounds on the degree of the origincontaining cell and establish a form of ergodicity for the entire configuration. Ultimately, we use these properties to show (using a general theorem proved in a separate paper) that random walk on these cells converges to a time change of Brownian motion, which in turn leads to the Tutte embedding result. 
More Tur\'anType Theorems for Triangles in Convex Point Sets. (arXiv:1706.10193v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Boris Aronov, Vida Dujmović, Pat Morin, Aurélien Ooms, Luís Fernando Schultz Xavier da Silveira We study the following family of problems: Given a set of $n$ points in convex position, what is the maximum number triangles one can create having these points as vertices while avoiding certain sets of forbidden configurations. As forbidden configurations we consider all 8 ways in which a pair of triangles in such a point set can interact. This leads to 256 extremal Tur\'antype questions. We give nearly tight (within a $\log n$ factor) bounds for 248 of these questions and show that the remaining 8 questions are all asymptotically equivalent to Stein's longstanding tripod packing problem. 
Long paths and toughness of ktrees and chordal planar graphs. (arXiv:1707.08026v3 [math.CO] UPDATED) Cache Translate Page 
Authors: Adam Kabela We show that every $k$tree of toughness greater than $\frac{k}{3}$ is Hamiltonconnected for $k \geq 3$. (In particular, chordal planar graphs of toughness greater than $1$ are Hamiltonconnected.) This improves the result of Broersma et al. (2007) and generalizes the result of B{\"o}hme et al. (1999). On the other hand, we present graphs whose longest paths are short. Namely, we construct $1$tough chordal planar graphs and $1$tough planar $3$trees, and we show that the shortness exponent of the class is $0$, at most $\log_{30}{22}$, respectively. Both improve the bound of B{\"o}hme et al. Furthermore, the construction provides $k$trees (for $k \geq 4$) of toughness greater than $1$. 
Internal sizes in $\mu$abstract elementary classes. (arXiv:1708.06782v3 [math.LO] UPDATED) Cache Translate Page 
Authors: Michael Lieberman, Jiří Rosický, Sebastien Vasey The internal size of an object $M$ inside a given category is, roughly, the least infinite cardinal $\lambda$ such that any morphism from $M$ into the colimit of a $\lambda^+$directed system factors through one of the components of the system. The existence spectrum of a category is the class of cardinals $\lambda$ such that the category has an object of internal size $\lambda$. We study the existence spectrum in $\mu$abstract elementary classes ($\mu$AECs), which are, up to equivalence of categories, the same as accessible categories with all morphisms monomorphisms. We show for example that, assuming instances of the singular cardinal hypothesis which follow from a large cardinal axiom, $\mu$AECs which admit intersections have objects of all sufficiently large internal sizes. We also investigate the relationship between internal sizes and cardinalities and analyze a series of examples, including one of Shelaha certain class of sufficientlyclosed constructible models of set theorywhich show that the categoricity spectrum can behave very differently depending on whether we look at categoricity in cardinalities or in internal sizes. 
GIANT: Globally Improved Approximate Newton Method for Distributed Optimization. (arXiv:1709.03528v5 [cs.LG] UPDATED) Cache Translate Page 
Authors: Shusen Wang, Farbod RoostaKhorasani, Peng Xu, Michael W. Mahoney For distributed computing environment, we consider the empirical risk minimization problem and propose a distributed and communicationefficient Newtontype optimization method. At every iteration, each worker locally finds an Approximate NewTon (ANT) direction, which is sent to the main driver. The main driver, then, averages all the ANT directions received from workers to form a {\it Globally Improved ANT} (GIANT) direction. GIANT is highly communication efficient and naturally exploits the tradeoffs between local computations and global communications in that more local computations result in fewer overall rounds of communications. Theoretically, we show that GIANT enjoys an improved convergence rate as compared with firstorder methods and existing distributed Newtontype methods. Further, and in sharp contrast with many existing distributed Newtontype methods, as well as popular firstorder methods, a highly advantageous practical feature of GIANT is that it only involves one tuning parameter. We conduct largescale experiments on a computer cluster and, empirically, demonstrate the superior performance of GIANT. 
KacWard formula and its extension to orderdisorder correlators through a graph zeta function. (arXiv:1709.06052v3 [mathph] UPDATED) Cache Translate Page 
Authors: Michael Aizenman, Simone Warzel A streamlined derivation of the KacWard formula for the planar Ising model's partition function is presented and applied in relating the kernel of the KacWard matrices' inverse with the correlation functions of the Ising model's orderdisorder correlation functions. A shortcut for both is facilitated by the BowenLanford graph zeta function relation. The KacWard relation is also extended here to produce a family of non planar interactions on $\mathbb{Z}^2$ for which the partition function and the correlation function based on the orderdisorder correlators are solvable at special values of the coupling parameters / temperature. 
Smalltime asymptotics for subelliptic Hermite functions on $SU(2)$ and the CR sphere. (arXiv:1710.02550v2 [math.AP] UPDATED) Cache Translate Page 
Authors: Joshua Campbell, Tai Melcher We show that, under a natural scaling, the smalltime behavior of the logarithmic derivatives of the subelliptic heat kernel on $SU(2)$ converges to their analogues on the Heisenberg group at time 1. Realizing $SU(2)$ as $\mathbb{S}^3$, we then generalize these results to higherorder odddimensional spheres equipped with their natural subRiemannian structure, where the limiting spaces are now the higherdimensional Heisenberg groups. 
Using a Factored Dual in Augmented Lagrangian Methods for Semidefinite Programming. (arXiv:1710.04869v3 [math.OC] UPDATED) Cache Translate Page 
Authors: Marianna De Santis, Franz Rendl, Angelika Wiegele In the context of augmented Lagrangian approaches for solving semidefinite programming problems, we investigate the possibility of eliminating the positive semidefinite constraint on the dual matrix by employing a factorization. Hints on how to deal with the resulting unconstrained maximization of the augmented Lagrangian are given. We further use the approximate maximum of the augmented Lagrangian with the aim of improving the convergence rate of alternating direction augmented Lagrangian frameworks. Numerical results are reported, showing the benefits of the approach. 
Classification of simple linearly compact Kantor triple systems over the complex numbers. (arXiv:1710.05375v3 [math.QA] UPDATED) Cache Translate Page 
Authors: Nicoletta Cantarini, Antonio Ricciardo, Andrea Santi Simple finite dimensional Kantor triple systems over the complex numbers are classified in terms of Satake diagrams. We prove that every simple and linearly compact Kantor triple system has finite dimension and give an explicit presentation of all the classical and exceptional systems. 
Isolated singularities of conformal hyperbolic metrics. (arXiv:1711.01018v2 [math.DG] UPDATED) Cache Translate Page 
Authors: Yu Feng, Yiqian Shi, Bin Xu J. Nitsche proved that an isolated singularity of a conformal hyperbolic metric is either a conical singularity or a cusp one. We prove by developing map that there exists a complex coordinate $z$ centered at the singularity where the metric has the expression of either $\displaystyle{\frac{4\alpha^2\vert z \vert^{2\alpha2}}{(1\vert z \vert ^{2\alpha})^2}\vert \mathrm{d} z \vert^2}$ with $\alpha>0$ or $\displaystyle{\vert z \vert ^{2}\big(\lnz\big)^{2}dz^{2}}$. 
Convexity of complements of tropical varieties, and approximations of currents. (arXiv:1711.02045v3 [math.AG] UPDATED) Cache Translate Page 
Authors: Karim Adiprasito, Farhad Babaee The goal of this note is to affirm a local version of the conjecture of NisseSottile [NS16] on higher convexity of complements of tropical varieties, while providing a family of counterexamples for the global NisseSottle conjecture in any codimension and dimension higher than 1. Moreover, it will be shown that, surprisingly, this family also provides a family of counterexamples for the generalized Hodge conjecture for positive currents in these dimensions, and gives rise to further approximability obstruction. 
Uncertainty quantification for radio interferometric imaging: I. proximal MCMC methods. (arXiv:1711.04818v2 [astroph.IM] UPDATED) Cache Translate Page 
Authors: Xiaohao Cai, Marcelo Pereyra, Jason D. McEwen Uncertainty quantification is a critical missing component in radio interferometric imaging that will only become increasingly important as the bigdata era of radio interferometry emerges. Since radio interferometric imaging requires solving a highdimensional, illposed inverse problem, uncertainty quantification is difficult but also critical to the accurate scientific interpretation of radio observations. Statistical sampling approaches to perform Bayesian inference, like Markov Chain Monte Carlo (MCMC) sampling, can in principle recover the full posterior distribution of the image, from which uncertainties can then be quantified. However, traditional highdimensional sampling methods are generally limited to smooth (e.g. Gaussian) priors and cannot be used with sparsitypromoting priors. Sparse priors, motivated by the theory of compressive sensing, have been shown to be highly effective for radio interferometric imaging. In this article proximal MCMC methods are developed for radio interferometric imaging, leveraging proximal calculus to support nondifferential priors, such as sparse priors, in a Bayesian framework. Furthermore, three strategies to quantify uncertainties using the recovered posterior distribution are developed: (i) local (pixelwise) credible intervals to provide error bars for each individual pixel; (ii) highest posterior density credible regions; and (iii) hypothesis testing of image structure. These forms of uncertainty quantification provide rich information for analysing radio interferometric observations in a statistically robust manner. 
Uncertainty quantification for radio interferometric imaging: II. MAP estimation. (arXiv:1711.04819v2 [astroph.IM] UPDATED) Cache Translate Page 
Authors: Xiaohao Cai, Marcelo Pereyra, Jason D. McEwen Uncertainty quantification is a critical missing component in radio interferometric imaging that will only become increasingly important as the bigdata era of radio interferometry emerges. Statistical sampling approaches to perform Bayesian inference, like Markov Chain Monte Carlo (MCMC) sampling, can in principle recover the full posterior distribution of the image, from which uncertainties can then be quantified. However, for massive data sizes, like those anticipated from the Square Kilometre Array (SKA), it will be difficult if not impossible to apply any MCMC technique due to its inherent computational cost. We formulate Bayesian inference problems with sparsitypromoting priors (motivated by compressive sensing), for which we recover maximum a posteriori (MAP) point estimators of radio interferometric images by convex optimisation. Exploiting recent developments in the theory of probability concentration, we quantify uncertainties by postprocessing the recovered MAP estimate. Three strategies to quantify uncertainties are developed: (i) highest posterior density credible regions; (ii) local credible intervals (cf. error bars) for individual pixels and superpixels; and (iii) hypothesis testing of image structure. These forms of uncertainty quantification provide rich information for analysing radio interferometric observations in a statistically robust manner. Our MAPbased methods are approximately $10^5$ times faster computationally than stateoftheart MCMC methods and, in addition, support highly distributed and parallelised algorithmic structures. For the first time, our MAPbased techniques provide a means of quantifying uncertainties for radio interferometric imaging for realistic data volumes and practical use, and scale to the emerging bigdata era of radio astronomy. 
A Saito criterion for holonomic divisors. (arXiv:1711.10259v3 [math.AG] UPDATED) Cache Translate Page 
Authors: Raul Epure, Mathias Schulze We show that a holonomic divisor is free if and only if applying all logarithmic derivations to a generic function with isolated critical point yields a complete intersection Artin algebra. 
Edge rings with $3$linear resolutions. (arXiv:1712.03504v2 [math.AC] UPDATED) Cache Translate Page 
Authors: Takayuki Hibi, Kazunori Matsuda, Akiyoshi Tsuchiya It is shown that the edge ring of a finite connected simple graph with a $3$linear resolution is a hypersurface. 
ROAST: Rapid Orthogonal Approximate Slepian Transform. (arXiv:1712.04613v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Zhihui Zhu, Santhosh Karnik, Michael B. Wakin, Mark A. Davenport, Justin Romberg In this paper, we provide a Rapid Orthogonal Approximate Slepian Transform (ROAST) for the discrete vector that one obtains when collecting a finite set of uniform samples from a baseband analog signal. The ROAST offers an orthogonal projection which is an approximation to the orthogonal projection onto the leading discrete prolate spheroidal sequence (DPSS) vectors (also known as Slepian basis vectors). As such, the ROAST is guaranteed to accurately and compactly represent not only oversampled bandlimited signals but also the leading DPSS vectors themselves. Moreover, the subspace angle between the ROAST subspace and the corresponding DPSS subspace can be made arbitrarily small. The complexity of computing the representation of a signal using the ROAST is comparable to the FFT, which is much less than the complexity of using the DPSS basis vectors. We also give nonasymptotic results to guarantee that the proposed basis not only provides a very high degree of approximation accuracy in a mean squared error sense for bandlimited sample vectors, but also that it can provide highquality approximations of all sampled sinusoids within the band of interest. 
Full Orbit Sequences in Affine Spaces via Fractional Jumps and Pseudorandom Number Generation. (arXiv:1712.05258v3 [math.NT] UPDATED) Cache Translate Page 
Authors: Federico Amadio Guidi, Sofia Lindqvist, Giacomo Micheli Let $n$ be a positive integer. In this paper we provide a general theory to produce full orbit sequences in the affine $n$dimensional space over a finite field. For $n=1$ our construction covers the case of the Inversive Congruential Generators (ICG). In addition, for $n>1$ we show that the sequences produced using our construction are easier to compute than ICG sequences. Furthermore, we prove that they have the same discrepancy bounds as the ones constructed using the ICG. 
Boolean Tensor Decomposition for Conjunctive Queries with Negation. (arXiv:1712.07445v2 [cs.DB] UPDATED) Cache Translate Page 
Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Dan Olteanu, Dan Suciu We propose an algorithm for answering conjunctive queries with negation, where the negated relations have bounded degree. Its data complexity matches that of the best known algorithms for the positive subquery of the input query and is expressed in terms of the fractional hypertree width and the submodular width. The query complexity depends on the structure of the negated subquery; in general it is exponential in the number of join variables occurring in negated relations yet it becomes polynomial for several classes of queries. This algorithm relies on several contributions. We show how to rewrite queries with negation on boundeddegree relations into equivalent conjunctive queries with notallequal (NAE) predicates, which are a multidimensional analog of disequality (notequal). We then generalize the known colorcoding technique to conjunctions of NAE predicates and explain it via a Boolean tensor decomposition of conjunctions of NAE predicates. This decomposition can be achieved via a probabilistic construction that can be derandomized efficiently. 
A note on logarithmic growth of solutions of $p$adic differential equations without solvability. (arXiv:1801.00771v2 [math.NT] UPDATED) Cache Translate Page 
Authors: Shun Ohkubo For a $p$adic differential equation solvable in an open disc (in a $p$adic sense), around 1970, Dwork proves that the solutions satisfy a certain growth condition on the boundary. Dwork also conjectures that a similar phenomenon should be observed without assuming the solvability. In this paper, we verify Dwork's conjecture in the rank two case, which is the first nontrivial result on the conjecture. The proof is an application of Kedlaya's decomposition theorem of $p$adic differential equations defined over annulus. 
On properties of Bourgeois contact structures. (arXiv:1801.00869v4 [math.SG] UPDATED) Cache Translate Page 
Authors: Samuel Lisi, Aleksandra Marinković, Klaus Niederkrüger The Bourgeois construction associates to every contact open book on a manifold $V$ a contact structure on $V\times T^2$. We study in this article some of the properties of $V$ that are inherited by $V\times T^2$ and some that are not. Giroux has provided recently a suitable framework to work with contact open books. In the appendix of this article, we quickly review this formalism, and we work out a few classical examples of contact open books to illustrate how to use this new language. 
An operatorvalued Lyapunov theorem. (arXiv:1801.03109v2 [math.FA] UPDATED) Cache Translate Page 
Authors: Sarah Plosker, Christopher Ramsey We generalize Lyapunov's convexity theorem for classical (scalarvalued) measures to quantum (operatorvalued) measures. In particular, we show that the range of a nonatomic quantum probability measure is a weak*closed convex set of quantum effects (positive operators bounded above by the identity operator) under a sufficient condition on the noninjectivity of integration. To prove the operatorvalued version of Lyapunov's theorem, we must first define the notions of essentially bounded, essential support, and essential range for quantum random variables (Borel measurable functions from a set to the bounded linear operators acting on a Hilbert space). 
Stably irrational hypersurfaces of small slopes. (arXiv:1801.05397v3 [math.AG] UPDATED) Cache Translate Page 
Authors: Stefan Schreieder Let k be an uncountable field of characteristic different from two. We show that a very general hypersurface of dimension N>2 and degree at least $\log_2N +2$ is not stably rational over the algebraic closure of k. 
The Slowcoloring Game on Outerplanar, Planar, and $k$degenerate Graphs. (arXiv:1801.06754v2 [math.CO] UPDATED) Cache Translate Page 
Authors: Grzegorz Gutowski, Tomasz Krawczyk, Douglas B. West, Michał Zając, Xuding Zhu The \emph{slowcoloring game} is played by Lister and Painter on a graph $G$. Initially, all vertices of $G$ are uncolored. In each round, Lister marks a nonempty set $M$ of uncolored vertices, and Painter colors a subset of $M$ that is independent in $G$. The game ends when all vertices are colored. The score of the game is the sum of the sizes of all sets marked by Lister. The goal of Painter is to minimize the score, while Lister tries to maximize it. We provide strategies for Painter on various classes of graphs whose vertices can be partitioned into a bounded number of sets inducing forests, including $k$degenerate, acyclically $k$colorable, planar, and outerplanar graphs. For example, we show that on an $n$vertex graph $G$, Painter can keep the score to at most $\frac{3k+4}4n$ when $G$ is $k$degenerate, $3.9857n$ when $G$ is acyclically $5$colorable, $3n$ when $G$ is planar with a Hamiltonian dual, $\frac{8n+3m}5$ when $G$ is $4$colorable with $m$ edges (hence $3.4n$ when $G$ is planar), and $\frac73n$ when $G$ is outerplanar. 
Crossover between diffusionlimited and reactionlimited regimes in the coagulationdiffusion process. (arXiv:1801.09216v3 [condmat.statmech] UPDATED) Cache Translate Page 
Authors: Dmytro Shapoval, Maxym Dudka, Xavier Durang, Malte Henkel The change from the diffusionlimited to the reactionlimited cooperative behaviour in reactiondiffusion systems is analysed by comparing the universal longtime behaviour of the coagulationdiffusion process on a chain and on the Bethe lattice. On a chain, this model is exactly solvable through the emptyinterval method. This method can be extended to the Bethe lattice, in the benAvrahamGlasser approximation. On the Bethe lattice, the analysis of the Laplacetransformed timedependent particledensity is analogous to the study of the stationary state, if a stochastic reset to a configuration of uncorrelated particles is added. In this stationary state logarithmic corrections to scaling are found, as expected for systems at the upper critical dimension. Analogous results hold true for the timeintegrated particledensity. The crossover scaling functions and the associated effective exponents between the chain and the Bethe lattice are derived. 
Counting and Sampling from Markov Equivalent DAGs Using Clique Trees. (arXiv:1802.01239v2 [cs.DS] UPDATED) Cache Translate Page 
Authors: AmirEmad Ghassami, Saber Salehkaleybar, Negar Kiyavash, Kun Zhang A directed acyclic graph (DAG) is the most common graphical model for representing causal relationships among a set of variables. When restricted to using only observational data, the structure of the ground truth DAG is identifiable only up to Markov equivalence, based on conditional independence relations among the variables. Therefore, the number of DAGs equivalent to the ground truth DAG is an indicator of the causal complexity of the underlying structureroughly speaking, it shows how many interventions or how much additional information is further needed to recover the underlying DAG. In this paper, we propose a new technique for counting the number of DAGs in a Markov equivalence class. Our approach is based on the clique tree representation of chordal graphs. We show that in the case of bounded degree graphs, the proposed algorithm is polynomial time. We further demonstrate that this technique can be utilized for uniform sampling from a Markov equivalence class, which provides a stochastic way to enumerate DAGs in the equivalence class and may be needed for finding the best DAG or for causal inference given the equivalence class as input. We also extend our counting and sampling method to the case where prior knowledge about the underlying DAG is available, and present applications of this extension in causal experiment design and estimating the causal effect of joint interventions. 
Unified Models for SecondOrder TVType Regularisation in Imaging  A New Perspective Based on Vector Operators. (arXiv:1802.01895v3 [math.NA] UPDATED) Cache Translate Page 
Authors: EvaMaria Brinkmann, Martin Burger, Joana Sarah Grah We introduce a novel regulariser based on the natural vector field operations gradient, divergence, curl and shear. For suitable choices of the weighting parameters contained in our model it generalises wellknown first and secondorder TVtype regularisation methods including TV, ICTV and TGV$^2$ and enables interpolation between them. To better understand the influence of each parameter, we characterise the nullspaces of the respective regularisation functionals. Analysing the continuous model, we conclude that it is not sufficient to combine penalisation of the divergence and the curl to achieve highquality results, but interestingly it seems crucial that the penalty functional includes at least one component of the shear or suitable boundary conditions. We investigate which requirements regarding the choice of weighting parameters yield a rotational invariant approach. To guarantee physically meaningful reconstructions, implying that conservation laws for vectorial differential operators remain valid, we need a careful discretisation that we therefore discuss in detail. 
A Unified Gaskinetic Scheme for Continuum and Rarefied Flows VI: Dilute Disperse GasParticle Multiphase System. (arXiv:1802.04961v2 [physics.compph] UPDATED) Cache Translate Page 
Authors: Chang Liu, Zhao Wang, Kun Xu In this paper, a unified gas kinetic scheme for multiphase dilute gasparticle system is proposed. The UGKS multiphase (UGKSM) is a finite volume method, which captures flow physics in the regimes from collisionless multispecies transport to the twofluid hydrodynamic NavierStokes (NS) solution with the variation of Knudsen number, and from granular flow regime to dusty gas dynamics with the variation of Stokes number. The main reason for preserving the multiscale nature in UGKSM is mainly coming from the direct modeling of the flow physics in the scales of discrete cell size and time step, where the ratio of the time step over the particle collision time determines flow behavior in different regimes. For the particle phase, the integral solution of the kinetic equation is used in the construction of the numerical flux, which takes into account the particle transport, collision, and acceleration. The gas phase, which is assumed to be in the continuum flow regime, evolves numerically by the gas kinetic scheme (GKS), which is a subset of the UGKS for the NavierStokes (NS) solutions. The interaction between the gas and particle phase is calculated based on a velocity space mapping method, which solves accurately the kinetic acceleration process. The stability of UGKSM is determined by the CFL condition only. With the inclusion of the material temperature evolution equation of solid particles, the UGKSM conserves the total mass, momentum, and energy for the whole multiphase system. In the numerical tests, the UGKSM shows good multiscale property in capturing the particle trajectory crossing (PTC), particle wall reflecting phenomena, and vortexinduced segregation of inertial particles under different Stokes numbers. The scheme is also applied to simulate shock induced fluidization problem and the simulation results agree well with experimental measurement. 
Matrix Exponential Learning Schemes with Low Informational Exchange. (arXiv:1802.06652v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Wenjie Li, Mohamad Assaad We consider a distributed resource allocation problem in networks where each transmitterreceiver pair aims at maximizing its local utility function by adjusting its action matrix, which belongs to a given feasible set. This problem has been addressed recently by applying a matrix exponential learning (MXL) algorithm which has a very appealing convergence rate. In this learning algorithm, however, each transmitter must know an estimate of the gradient matrix of the local utility. The knowledge of the gradient matrix at the transmitters incurs a high signaling overhead especially that the matrix size increases with the dimension of the action matrix. In this paper, we therefore investigate two strategies in order to decrease the informational exchange per iteration of the algorithm. In the first strategy, each receiver sends at each iteration part of the elements of the gradient matrix with respect to a certain probability. In the second strategy, each receiver feeds back sporadically the whole gradient matrix. We focus on the analysis of the convergence of the MXL algorithm to optimum under these two strategies. We prove that the algorithm can still converge to optimum almost surely. Upper bounds of the average convergence rate are also derived in both situations with general stepsize setting, from which we can clearly see the impact of the incompleteness of the feedback information. The proposed algorithms are applied to solve the energy efficiency maximization problem in a multicarrier multiuser MIMO network. Simulation results further corroborate our claim. 
Univalence of a certain quartic function. (arXiv:1803.03098v2 [math.CV] UPDATED) Cache Translate Page 
Authors: Jimmy Dillies We give a short proof that the quartic polynomial $f(z)=\frac 1 6 z^{4} + \frac 2 3 z^{3} + \frac 7 6 z^{2} + z$ is univalent. 
Singular limit of BSDEs and Optimal control of two scale stochastic systems in infinite dimensional spaces. (arXiv:1803.05908v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Giuseppina Guatteri, Gianmario Tessitore In this paper we study by probabilistic techniques the convergence of the value function for a twoscale, infinitedimensional, stochastic controlled system as the ratio between the two evolution speeds diverges. The value function is represented as the solution of a \textit{backward stochastic differential equation} (BSDE) that it is shown to converge towards a \textit{reduced} BSDE. The noise is assumed to be additive both in the slow and the fast equations for the state. Some non degeneracy condition on the slow equation is required. The limit BSDE involves the solution of an \textit{ergodic} BSDE and is itself interpreted as the value function of an auxiliary stochastic control problem on a reduced state space. 
Higher Lelong numbers and convex geometry. (arXiv:1803.07948v3 [math.CV] UPDATED) Cache Translate Page 
Authors: Dano Kim, Alexander Rashkovskii We confirm Demailly's conjecture on the convergence of higher Lelong numbers under the canonical approximation of a plurisubharmonic function, in the case when the function is toric and in the Cegrell class. As applications to convex geometry, we give a unified complex analytic proof of the AlexandrovFenchel inequalities for mixed MongeAmp\`ere masses, mixed covolumes and mixed multiplicities. 
Datadriven Discovery of Closure Models. (arXiv:1803.09318v3 [math.DS] UPDATED) Cache Translate Page 
Authors: Shaowu Pan, Karthik Duraisamy Derivation of reduced order representations of dynamical systems requires the modeling of the truncated dynamics on the retained dynamics. In its most general form, this socalled closure model has to account for memory effects. In this work, we present a framework of operator inference to extract the governing dynamics of closure from data in a compact, nonMarkovian form. We employ sparse polynomial regression and artificial neural networks to extract the underlying operator. For a special class of nonlinear systems, observability of the closure in terms of the resolved dynamics is analyzed and theoretical results are presented on the compactness of the memory. The proposed framework is evaluated on examples consisting of linear to nonlinear systems with and without chaotic dynamics, with an emphasis on predictive performance on unseen data. 
Semitotal domination in trees. (arXiv:1803.10486v3 [math.CO] UPDATED) Cache Translate Page 
Authors: Zhuang Wei, Hao Guoliang In this paper, we study a parameter that is squeezed between arguably the two important domination parameters, namely the domination number, $\gamma(G)$, and the total domination number, $\gamma_t(G)$. A set $S$ of vertices in $G$ is a semitotal dominating set of $G$ if it is a dominating set of $G$ and every vertex in S is within distance $2$ of another vertex of $S$. The semitotal domination number, $\gamma_{t2}(G)$, is the minimum cardinality of a semitotal dominating set of $G$. We observe that $\gamma(G)\leq \gamma_{t2}(G)\leq \gamma_t(G)$. In this paper, we give a lower bound for the semitotal domination number of trees and we characterize the extremal trees. In addition, we characterize trees with equal domination and semitotal domination numbers. 
Effective Action for Relativistic Hydrodynamics: Fluctuations, Dissipation, and Entropy Inflow. (arXiv:1803.11155v2 [hepth] UPDATED) Cache Translate Page 
Authors: Felix M. Haehl, R. Loganayagam, Mukund Rangamani We present a detailed and selfcontained analysis of the universal SchwingerKeldysh effective field theory which describes macroscopic thermal fluctuations of a relativistic field theory, elaborating on our earlier construction in arXiv:1511.07809. We write an effective action for appropriate hydrodynamic Goldstone modes and fluctuation fields, and discuss the symmetries to be imposed. The constraints imposed by fluctuationdissipation theorem are manifest in our formalism. Consequently, the action reproduces hydrodynamic constitutive relations consistent with the local second law at all orders in the derivative expansion, and captures the essential elements of the eightfold classification of hydrodynamic transport of arXiv:1502.00636. We demonstrate how to recover the hydrodynamic entropy and give predictions for the nonGaussian hydrodynamic fluctuations. The basic ingredients of our construction involve (i) doubling of degrees of freedom a la SchwingerKeldysh, (ii) an emergent thermal gauge symmetry associated with entropy which is encapsulated in a Noether current a la Wald, and (iii) a BRST/topological supersymmetry imposing the fluctuationdissipation theorem a la ParisiSourlas. The overarching mathematical framework for our construction is provided by the balanced equivariant cohomology of thermal translations, which captures the basic constraints arising from the SchwingerKeldysh doubling, and the thermal KuboMartinSchwinger relations. All these features are conveniently implemented in a covariant superspace formalism. An added benefit is that the second law can be understood as being due to entropy inflow from the Grassmannodd directions of superspace. 
On the relationship between greentored sequences, localacyclicity, and upper cluster algebras. (arXiv:1804.00479v2 [math.AC] UPDATED) Cache Translate Page 
Authors: Matthew R. Mills A cluster is a finite set of generators of a cluster algebra. The Laurent Phenomenon of Fomin and Zelevinsky says that any element of a cluster algebra can be written as a Laurent polynomial in terms of any cluster. The upper cluster algebra of a cluster algebra is the ring of rational functions that can be written as a Laurent polynomial in every cluster of the cluster algebra. By the Laurent phenomenon a cluster algebra is always contained in its upper cluster algebra, but they are not always equal. In 2014 it was conjectured that the equality of the cluster algebra and upper cluster algebra is equivalent to a combinatorial property regarding the existence of a maximal green sequence. In this work we prove a stronger result for cluster algebras from mutationfinite quivers, and provide a counterexample to show that the conjecture does not hold in general. Finally, we propose a new conjecture about the upper cluster algebra on the relationship which replaces maximal green sequences with more general greentored sequences and incorporates Mueller's localacyclicity. 
Counting graded lattices of rank three that have few coatoms. (arXiv:1804.03679v3 [math.CO] UPDATED) Cache Translate Page 
Authors: Jukka Kohonen We consider the problem of computing $R(c,a)$, the number of unlabeled graded lattices of rank $3$ that contain $c$ coatoms and $a$ atoms. More specifically we do this when $c$ is fairly small, but $a$ may be large. For this task, we describe a computational method that combines constructive listing of basic cases and tools from enumerative combinatorics. With this method we compute the exact values of $R(c,a)$ for $c\le 9$ and $a\le 1000$. We also show that, for any fixed $c$, there exists a quasipolynomial in $a$ that matches with $R(c,a)$ for all $a$ above a small value. We explicitly determine these quasipolynomials for $c \le 7$, thus finding closed form expressions of $R(c,a)$ for $c \le 7$. 
New Lower Bounds for Permutation Arrays Using Contraction. (arXiv:1804.03768v3 [math.CO] UPDATED) Cache Translate Page 
Authors: Sergey Bereg, Zevi Miller, Luis Gerardo Mojica, Linda Morales, I.H. Sudborough A permutation array $A$ is a set of permutations on a finite set $\Omega$, say of size $n$. Given distinct permutations $\pi, \sigma\in \Omega$, we let $hd(\pi, \sigma) = \{ x\in \Omega: \pi(x) \ne \sigma(x) \}$, called the Hamming distance between $\pi$ and $\sigma$. Now let $hd(A) =$ min$\{ hd(\pi, \sigma): \pi, \sigma \in A \}$. For positive integers $n$ and $d$ with $d\le n$, we let $M(n,d)$ be the maximum number of permutations in any array $A$ satisfying $hd(A) \geq d$. There is an extensive literature on the function $M(n,d)$, motivated in part by suggested applications to error correcting codes for message transmission over power lines. A basic fact is that if a permutation group $G$ is sharply $k$transitive on a set of size $n\geq k$, then $M(n,nk+1) = G$. Motivated by this we consider the permutation groups $AGL(1,q)$ and $PGL(2,q)$ acting sharply $2$transitively on $GF(q)$ and sharply $3$transitively on $GF(q)\cup \{\infty\}$ respectively. Applying a contraction operation to these groups, we obtain the following new lower bounds for prime powers $q$ satisfying $q\equiv 1$ (mod $3$). 1. $M(q1,q3)\geq (q^{2}  1)/2$ for $q$ odd, $q\geq 7$, 2. $M(q1,q3)\geq (q1)(q+2)/3$ for $q$ even, $q\geq 8$, 3. $M(q,q3)\geq Kq^{2}\log q$ for some constant $K$ if $q$ is odd, $q\geq 13$. These results resolve a case left open in a previous paper \cite{BLS}, where it was shown that $M(q1, q3) \geq q^{2}  q$ and $M(q,q3) \geq q^{3}  q$ for all prime powers $q$ such that $q\not \equiv 1$ (mod $3$). We also obtain lower bounds for $M(n,d)$ for a finite number of exceptional pairs $n,d$, by applying this contraction operation to the sharply $4$ and $5$transitive Mathieu groups. 
The Dyson equation with linear selfenergy: spectral bands, edges and cusps. (arXiv:1804.07752v4 [math.OA] UPDATED) Cache Translate Page 
Authors: Johannes Alt, Laszlo Erdos, Torben Krüger We study the unique solution $m$ of the Dyson equation \[ m(z)^{1} = z  a + S[m(z)] \] on a von Neumann algebra $\mathcal{A}$ with the constraint $\mathrm{Im} \, m\geq 0$. Here, $z$ lies in the complex upper halfplane, $a$ is a selfadjoint element of $\mathcal{A}$ and $S$ is a positivitypreserving linear operator on $\mathcal{A}$. We show that $m$ is the Stieltjes transform of a compactly supported $\mathcal{A}$valued measure on $\mathbb{R}$. Under suitable assumptions, we establish that this measure has a uniformly $1/3$H\"{o}lder continuous density with respect to the Lebesgue measure, which is supported on finitely many intervals, called bands. In fact, the density is analytic inside the bands with a squareroot growth at the edges and internal cubic root cusps whenever the gap between two bands vanishes. The shape of these singularities is universal and no other singularity may occur. We give a precise asymptotic description of $m$ near the singular points. These asymptotics play a key role in the companion papers on the TracyWidom universality for the edge eigenvalue statistics for correlated random matrices [arXiv:1804.07744] and on the Pearcey universality at the cusp for Wignertype matrices [19]. We also show that the spectral mass of the bands is topologically rigid under deformations and we conclude that these masses are quantized in some important cases. 
On the saturation conjecture for $\operatorname{Spin}(2n)$. (arXiv:1804.09229v3 [math.RT] UPDATED) Cache Translate Page 
Authors: Joshua Kiers In this paper we examine the saturation conjecture on decompositions of tensor products of irreducible representations for complex semisimple algebraic groups of type $D$ (the even \emph{spin} groups: Spin$(2n)$ for $n\ge 4$ an integer), extending work done by KumarKapovichMillson on Spin(8). Our main theorem asserts that the saturation conjecture holds for Spin(10) and Spin(12): for all triples of dominants weights $\lambda,\mu,\nu$ such that $\lambda+\mu+\nu$ is in the root lattice, and for any $N>0$, $$ \left(V(\lambda)\otimes V(\mu)\otimes V(\nu)\right)^G \ne 0 $$ if and only if $$ \left(V(N\lambda)\otimes V(N\mu)\otimes V(N\nu)\right)^G\ne 0, $$ for $G=$ Spin(10) or Spin(12). Some related results for groups of other types are listed as well. 
Stabilization of portHamiltonian systems by nonlinear boundary control in the presence of disturbances. (arXiv:1804.10598v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Jochen Schmid, Hans Zwart In this paper, we are concerned with the stabilization of linear portHamiltonian systems of arbitrary order $N \in \mathbb{N}$ on a bounded $1$dimensional spatial domain $(a,b)$. In order to achieve stabilization, we couple the system to a dynamic boundary controller, that is, a controller that acts on the system only via the boundary points $a,b$ of the spatial domain. We use a nonlinear controller in order to capture the nonlinear behavior that realistic actuators often exhibit and, moreover, we allow the output of the controller to be corrupted by actuator disturbances before it is fed back into the system. What we show here is that the resulting nonlinear closedloop system is inputtostate stable w.r.t.~squareintegrable disturbance inputs. In particular, we obtain uniform inputtostate stability for systems of order $N=1$ and a special class of nonlinear controllers, and weak inputtostate stability for systems of arbitrary order $N \in \mathbb{N}$ and a more general class of nonlinear controllers. Also, in both cases, we obtain convergence to $0$ of all solutions as $t \to \infty$. Applications are given to vibrating strings and beams. 
First eigenvalue of the $p$Laplacian on K\"ahler manifolds. (arXiv:1804.10876v2 [math.DG] UPDATED) Cache Translate Page 
Authors: Casey Blacker, Shoo Seto We prove a Lichnerowicz type lower bound for the first nontrivial eigenvalue of the $p$Laplacian on K\"ahler manifolds. Parallel to the $p = 2$ case, the first eigenvalue lower bound is improved by using a decomposition of the Hessian on K\"ahler manifolds with positive Ricci curvature. 
On the dimension and measure of inhomogeneous attractors. (arXiv:1805.00887v3 [math.MG] UPDATED) Cache Translate Page 
Authors: Stuart A. Burrell A central question in the field of inhomogeneous attractors has been to relate the dimension of an inhomogeneous attractor to the condensation set and associated homogeneous attractor. This has been achieved only in specific settings, with notable results by Olsen, Snigireva, Fraser and Kaenmaki on inhomogeneous selfsimilar sets, and by Burrell and Fraser on inhomogeneous selfaffine sets. This paper is devoted to filling a significant gap in the dimension theory of inhomogeneous attractors, by studying those formed from arbitrary biLipschitz contractions. We show that the maximum of the dimension of the condensation set and a quantity related to pressure, which we term upper Lipschitz dimension, forms a natural and general upper bound on the dimension. Additionally, we begin a new line of enquiry; the methods developed are used to classify the Hausdorff measure of inhomogeneous attractors. Our results have applications for affine systems with affinity dimension less than or equal to one and systems satisfying bounded distortion, such as conformal systems in dimensions greater than one. 
Statistical mechanical analysis of sparse linear regression as a variable selection problem. (arXiv:1805.11259v2 [condmat.disnn] UPDATED) Cache Translate Page 
Authors: Tomoyuki Obuchi, Yoshinori NakanishiOhno, Masato Okada, Yoshiyuki Kabashima An algorithmic limit of compressed sensing or related variableselection problems is analytically evaluated when a design matrix is given by an overcomplete random matrix. The replica method from statistical mechanics is employed to derive the result. The analysis is conducted through evaluation of the entropy, an exponential rate of the number of combinations of variables giving a specific value of fit error to given data which is assumed to be generated from a linear process using the design matrix. This yields the typical achievable limit of the fit error when solving a representative $\ell_0$ problem and includes the presence of unfavourable phase transitions preventing local search algorithms from reaching the minimumerror configuration. The associated phase diagrams are presented. A noteworthy outcome of the phase diagrams is that there exists a wide parameter region where any phase transition is absent from the high temperature to the lowest temperature at which the minimumerror configuration or the ground state is reached. This implies that certain local search algorithms can find the ground state with moderate computational costs in that region. Another noteworthy result is the presence of the random firstorder transition in the strong noise case. The theoretical evaluation of the entropy is confirmed by extensive numerical methods using the exchange Monte Carlo and the multihistogram methods. Another numerical test based on a metaheuristic optimisation algorithm called simulated annealing is conducted, which well supports the theoretical predictions on the local search algorithms. In the successful region with no phase transition, the computational cost of the simulated annealing to reach the ground state is estimated as the third order polynomial of the model dimensionality. 
Liouville property of strongly transitive actions. (arXiv:1806.02753v2 [math.GR] UPDATED) Cache Translate Page 
Authors: Kate Juschenko Liouville property of actions of discrete groups can be reformulated in terms of existence coF$\o$lner sets. Since every action of amenable group is Liouville, the property can be served as an approach for proving nonamenability. The verification of this property is conceptually different than finding a nonamenable action. There are many groups that are defined by strongly transitive actions. In some cases amenability of such groups is an open problem. We define $n$Liouville property of action to be Liouville property of pointwise action of the group on the sets of cardinality $n$. We reformulate $n$Liouville property in terms of additive combinatorics and prove it for $n=1, 2$. The case $n\geq 3$ remains open. 
Sturm attractors for quasilinear parabolic equations with singular coefficients. (arXiv:1806.04019v2 [math.DS] UPDATED) Cache Translate Page 
Authors: Phillipo Lappicy The goal of this paper is to construct explicitly the global attractors of parabolic equations with singular diffusion coefficients on the boundary, as it was done without the singular term for the semilinear case by Brunovsk'y and Fiedler (1986), generalized by Fiedler and Rocha (1996) and later for quasilinear equa tions by the author (2017). In particular, we construct heteroclinic connections between hyperbolic equilibria, stating necessary and sufficient conditions for heteroclinics to occur. Such conditions can be computed through a permutation of the equilibria. Lastly, an example is computed yielding the well known ChafeeInfante attractor. 
Duality of Gabor frames and Heisenberg modules. (arXiv:1806.05616v3 [math.FA] UPDATED) Cache Translate Page 
Authors: Mads S. Jakobsen, Franz Luef Given a locally compact abelian group $G$ and a closed subgroup $\Lambda$ in $G\times\widehat{G}$, Rieffel associated to $\Lambda$ a Hilbert $C^*$module $\mathcal{E}$, known as a Heisenberg module. He proved that $\mathcal{E}$ is an equivalence bimodule between the twisted group $C^*$algebra $C^*(\Lambda,\textsf{c})$ and $C^*(\Lambda^\circ,\overline{\textsf{c}})$, where $\Lambda^{\circ}$ denotes the adjoint subgroup of $\Lambda$. Our main goal is to study Heisenberg modules using tools from timefrequency analysis and pointing out that Heisenberg modules provide the natural setting of the duality theory of Gabor systems. More concretely, we show that the Feichtinger algebra ${\textbf{S}}_{0}(G)$ is an equivalence bimodule between the Banach subalgebras ${\textbf{S}}_{0}(\Lambda,\textsf{c})$ and ${\textbf{S}}_{0}(\Lambda^{\circ},\overline{\textsf{c}})$ of $C^*(\Lambda,\textsf{c})$ and $C^*(\Lambda^\circ,\overline{\textsf{c}})$, respectively. Further, we prove that ${\textbf{S}}_{0}(G)$ is finitely generated and projective exactly for cocompact closed subgroups $\Lambda$. In this case the generators $g_1,\ldots,g_n$ of the left ${\textbf{S}}_{0}(\Lambda)$module ${\textbf{S}}_{0}(G)$ are the Gabor atoms of a multiwindow Gabor frame for $L^2(G)$. We prove that this is equivalent to $g_1,\ldots,g_n$ being a Gabor super frame for the closed subspace generated by the Gabor system for $\Lambda^{\circ}$. This duality principle is of independent interest and is also studied for infinitely many Gabor atoms. We also show that for any nonrational lattice $\Lambda$ in $\mathbb{R}^{2m}$ with volume ${s}(\Lambda)<1$ there exists a Gabor frame generated by a single atom in ${\textbf{S}}_{0}(\mathbb{R}^m)$. 
Embeddings of $3$manifolds via open books. (arXiv:1806.09784v2 [math.GT] UPDATED) Cache Translate Page 
Authors: Dishant M. Pancholi, Suhas Pandit, Kuldeep Saha In this note, we discuss embeddings of $3$manifolds via open books. First we show that every open book of every closed orientable $3$manifold admits an open book embedding in any open book decompistion of $S^2 \times S^3$ and $S^2 \widetilde{\times} S^3$ with the page a disk bundle over $S^2$ and monodromy the identity. We then use open book embeddings to reprove that every closed orientable $3$manifold embeds in $S^5.$ 
Behavior of zeros of $X_{1}$Jacobi and $X_{1}$Laguerre exceptional polynomials. (arXiv:1807.00034v2 [math.CA] UPDATED) Cache Translate Page 
Authors: Yen Chi Lun The $X_1$Jacobi and the $X_1$Laguerre exceptional orthogonal polynomials have been introduced and studied by G\'omezUllate, Kamran and Milson in a series of papers. In this note, we establish some properties about the called regular and exceptional zeros of these two classes of polynomials such as interlacing, monotonicity with respect to the parameters and asymptotic behavior. 
Constrained dynamical optimal transport and its Lagrangian formulation. (arXiv:1807.00937v2 [math.OC] UPDATED) Cache Translate Page 
Authors: Wuchen Li, Stanley Osher We propose dynamical optimal transport (OT) problems constrained in a parameterized probability subset. In application problems such as deep learning, the probability distribution is often generated by a parameterized mapping function. In this case, we derive a simple formulation for the constrained dynamical OT. 
Optimum Transmission Delay for Function Computation in NFVbased Networks: the role of Network Coding and Redundant Computing. (arXiv:1807.03337v2 [cs.IT] UPDATED) Cache Translate Page 
Authors: Behrooz Tahmasebi, Mohammad Ali MaddahAli, Saeedeh Parsaeefard, Babak Hossein Khalaj In this paper, we study the problem of delay minimization in NFVbased networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal endtoend transmission delay. In addition, we show that using such technique, we can significantly reduce the transmission delay as compared to the conventional approach. In some scenarios, such reduction can even scale with the size of the network. More precisely, by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the endtoend delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upperbounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches. 
Soap films with gravity and almostminimal surfaces. (arXiv:1807.05200v2 [math.AP] UPDATED) Cache Translate Page 
Authors: Francesco Maggi, Antonello Scardicchio, Salvatore Stuvard Motivated by the study of the equilibrium equations for a soap film hanging from a wire frame, we prove a compactness theorem for surfaces with asymptotically vanishing mean curvature and fixed or converging boundaries. In particular, we obtain sufficient geometric conditions for the minimal surfaces spanned by a given boundary to represent all the possible limits of sequences of almostminimal surfaces. Finally, we provide some sharp quantitative estimates on the distance of an almostminimal surface from its limit minimal surface. 
The Structure of BPS Equations for Ambipolar Microstate Geometries. (arXiv:1807.06596v2 [hepth] UPDATED) Cache Translate Page 
Authors: Alexander Tyukov, Robert Walker, Nicholas P. Warner Ambipolar metrics, defined so as to allow the signature to change from +4 to 4 across hypersurfaces, are a mainstay in the construction of BPS microstate geometries. This paper elucidates the cohomology of these spaces so as to simplify greatly the construction of infinite families of fluctuating harmonic magnetic fluxes. It is argued that such fluxes should come from scalar, harmonic prepotentials whose source loci are holomorphic divisors. This insight is obtained by exploring the Kahler structure of ambipolar GibbonsHawking spaces and it is shown that differentiating the prepotentials with respect to Kahler moduli yields solutions to the BPS equations for the electric potentials sourced by the magnetic fluxes. This suggests that harmonic analysis on ambipolar spaces has a novel, and an extremely rich structure, that is deeply intertwined with the BPS equations. We illustrate our results using a family of twocentered solutions. 
An invariance principle for ergodic scalefree random environments. (arXiv:1807.07515v2 [math.PR] UPDATED) Cache Translate Page 
Authors: Ewain Gwynne, Jason Miller, Scott Sheffield There are many classical random walk in random environment results that apply to ergodic random planar environments. We extend some of these results to random environments in which the length scale varies from place to place, so that the law of the environment is in a certain sense only translation invariant modulo scaling. For our purposes, an "environment" consists of an infinite random planar map embedded in $\mathbb C$, each of whose edges comes with a positive real conductance. Our main result is that under modest constraints (translation invariance modulo scaling together with the finiteness of a type of specific energy) a random walk in this kind of environment converges to Brownian motion modulo time parameterization in the quenched sense. Environments of the type considered here arise naturally in the study of random planar maps and Liouville quantum gravity. In fact, the results of this paper are used in separate works to prove that certain random planar maps (embedded in the plane via the socalled Tutte embedding) have scaling limits given by SLEdecorated Liouville quantum gravity, and also to provide a more explicit construction of Brownian motion on the Brownian map. However, the results of this paper are much more general and can be read independently of that program. One general consequence of our main result is that if a translation invariant (modulo scaling) random embedded planar map and its dual have finite energy per area, then they are close on large scales to a minimal energy embedding (the harmonic embedding). To establish Brownian motion convergence for an infinite energy embedding, it suffices to show that one can perturb it to make the energy finite. 
On the logical complexity of cyclic arithmetic. (arXiv:1807.10248v3 [cs.LO] UPDATED) Cache Translate Page 
Authors: Anupam Das We study the logical complexity of proofs in cyclic arithmetic ($\mathsf{CA}$), as introduced in Simpson '17, in terms of quantifier alternations of formulae occurring. Writing $C\Sigma_n$ for (the logical consequences of) cyclic proofs containing only $\Sigma_n$ formulae, our main result is that $I\Sigma_{n+1}$ and $C\Sigma_n$ prove the same $\Pi_{n+1}$ theorems, for all $n\geq 0$. Furthermore, due to the 'uniformity' of our method, we also show that $\mathsf{CA}$ and Peano Arithmetic ($\mathsf{PA}$) proofs of the same theorem differ only exponentially in size. The inclusion $I\Sigma_{n+1} \subseteq C\Sigma_n$ is obtained by proof theoretic techniques, relying on normal forms and structural manipulations of $\mathsf{PA}$ proofs. It improves upon the natural result that $I\Sigma_n$ is contained in $C\Sigma_n$. The converse inclusion, $C\Sigma_n \subseteq I\Sigma_{n+1}$, is obtained by calibrating the approach of Simpson '17 with recent results on the reverse mathematics of B\"uchi's theorem in Ko{\l}odziejczyk, Michalewski, Pradic & Skrzypczak '16, and specialising to the case of cyclic proofs. These results improve upon the bounds on proof complexity and logical complexity implicit in Simpson '17 and also an alternative approach due to Berardi & Tatsuta '17. The uniformity of our method also allows us to recover a metamathematical account of fragments of $\mathsf{CA}$; in particular we show that, for $n\geq 0$, the consistency of $C\Sigma_n$ is provable in $I\Sigma_{n+2}$ but not $I\Sigma_{n+1}$. 
$p$adic dynamical systems of $(3,1)$rational functions with unique fixed point. (arXiv:1807.11561v2 [math.DS] UPDATED) Cache Translate Page 
Authors: A.R. Luna, U.A. Rozikov, I.A. Sattarov We describe the set of all $(3,1)$rational functions given on the set of complex $p$adic field $\mathbb C_p$ and having a unique fixed point. We study $p$adic dynamical systems generated by such $(3,1)$rational functions and show that the fixed point is indifferent and therefore the convergence of the trajectories is not the typical case for the dynamical systems. We obtain Siegel disks of these dynamical systems. Moreover an upper bound for the set of limit points of each trajectory is given. For each $(3,1)$rational function on $\mathbb C_p$ there is a point $\hat x=\hat x(f)\in \mathbb C_p$ which is zero in its denominator. We give explicit formulas of radii of spheres (with the center at the fixed point) containing some points that the trajectories (under actions of $f$) of the points after a finite step come to $\hat x$. For a class of $(3,1)$rational functions defined on the set of $p$adic numbers $\mathbb Q_p$ we study ergodicity properties of the corresponding dynamical systems. We show that if $p\geq 3$ then the $p$adic dynamical system reduced on each invariant sphere is not ergodic with respect to Haar measure. For $p=2$, under some conditions we prove non ergodicity and show that there exists a sphere on which the dynamical system is ergodic. Finally, we give a characterization of periodic orbits and some uniformly local properties of the $(3.1)$rational functions. 
A quasistrictly nonvolterra quadratic stochastic operator. (arXiv:1808.00229v2 [math.DS] UPDATED) Cache Translate Page 
Authors: A.J.M. Hardin, U.A. Rozikov We consider a fourparameter family of nonVolterra operators defined on the twodimensional simplex and show that, with one exception, each such operator has a unique fixed point. Depending on the parameters, we establish the type of this fixed point. We study the set of limit points for each trajectory and show that this set can be a single point or can contain a 2periodic trajectory. 
Safe Dependency Atoms and Possibility Operators in Team Semantics. (arXiv:1808.00710v2 [math.LO] UPDATED) Cache Translate Page 
Authors: Pietro Galliani (Free University of BozenBolzano) I consider the question of which dependencies are safe for a Team Semanticsbased logic FO(D), in the sense that they do not increase its expressive power over sentences when added to it. I show that some dependencies, like totality, nonconstancy and nonemptiness, are safe for all logics FO(D), and that other dependencies, like constancy, are not safe for FO(D) for some choices of D despite being strongly first order. I furthermore show that the possibility operator, which holds in a team if and only if its argument holds in some nonempty subteam, can be added to any logic FO(D) without increasing its expressive power over sentences. 
On Volterra quadratic stochastic operators of a twosex population on $S^1\times S^1$. (arXiv:1808.01812v2 [math.DS] UPDATED) Cache Translate Page 
Authors: O. Castanos, U.U. Jamilov, U.A. Rozikov We consider a fourparametric $(a, b, \alpha, \beta)$ family of Volterra quadratic stochastic operators for a bisexual population (i.e., each organism of the population must belong either to the female sex or the male sex). We show that independently on parameters each such operator has at least two fixed points. Moreover, under some conditions on parameters the operator has infinitely many (continuum) fixed points. Choosing parameters, numerically we show that a fixed point may be any type: attracting, repelling, saddle and nonhyperbolic. We separate five subfamilies of quadratic operators and show that each operator of these subfamilies is regular, i.e. any trajectory constructed by the operator converges to a fixed point. 
Ricci curvature and isometric actions with scaling nonvanishing property. (arXiv:1808.02329v3 [math.DG] UPDATED) Cache Translate Page 
Authors: Jiayin Pan, Xiaochun Rong In the study manifolds of Ricci curvature bounded below, a stumbling obstruction is the lack of links between largescale geometry and smallscale geometry at a fixed reference point. There have been few links (volume, dimension) when the unit ball at the point is not collapsed, that is, $\mathrm{vol}(B_1(p))\ge v>0$. In this paper, we conjecture a new link in terms of isometries: if the maximal displacement of an isometry $f$ on $B_1(p)$ is at least $\delta>0$, then the maximal displacement of $f$ on the rescaled unit ball $r^{1}B_r(p)$ is at least $\Phi(\delta,n,v)>0$ for all $r\in(0,1)$. We call this scaling $\Phi$nonvanishing property at $p$. We study the equivariant GromovHausdorff convergence of a sequence of Riemannian universal covers with abelian $\pi_1(M_i,p_i)$actions $(\widetilde{M}_i,\tilde{p}_i,\pi_1(M_i,p_i))\overset{GH}\longrightarrow(\widetilde{X},\tilde{p},G)$, where $\pi_1(M_i,p_i)$action is scaling $\Phi$nonvanishing at $\tilde{p_i}$. We establish a dimension monotonicity on the limit group associated to any rescaling sequence. As one of the applications, we prove that for an open manifold $M$ of nonnegative Ricci curvature, if the universal cover $\widetilde{M}$ has Euclidean volume growth and $\pi_1(M,p)$action on $R^{1}\widetilde{M}$ is scaling $\Phi$nonvanishing at $\tilde{p}$ for all $R$ large, then $\pi_1(M)$ is finitely generated. 
Stein's method for asymmetric $\alpha$stable distributions, with application to the stable CLT. (arXiv:1808.02405v3 [math.PR] UPDATED) Cache Translate Page 
Authors: Peng Chen, Ivan Nourdin, Lihu Xu This paper is concerned with the Stein's method associated with a (possibly) asymmetric $\alpha$stable distribution $Z$, in dimension one. More precisely, its goal is twofold. In the first part, we exhibit a genuine bound for the Wasserstein distance between $Z$ and any integrable random variable $X$, in terms of an operator that reduces to the classical fractional Laplacian in the symmetric case. Then, in the second part we apply the aforementioned bound to compute error rates in the stable central limit theorem, when the entries are in the domain $\mathcal{D}_\alpha$ of normal attraction of a stable law of exponent $\alpha$. To conclude, we study the specific case where the entries are Pareto like multiplied by a slowly varying function, which provides an example of random variables that do not belong to $\mathcal{D}_\alpha$, but for which our approach continues to apply. 
Dirac spinors and their application to BianchiI spacetimes in 5 dimensions. (arXiv:1808.08536v2 [grqc] UPDATED) Cache Translate Page 
Authors: Stefano Vignolo, Luca Fabbri, Oscar CastilloFelisola We consider a fivedimensional EinsteinCartan spacetime upon which Dirac spinor fields can be defined. Dirac spinor fields in five and four dimensions share many features, like the fact that both are described by fourcomponent spinor fields, but they are also characterized by strong differences, like the fact that in five dimensions we do not have the possibility to project on lefthanded and righthanded chiral parts unlike what happens in the fourdimensional instance: we conduct a polar decomposition of the spinorial fields, so to highlight all similarities and discrepancies. As an application of spinor fields in five dimensions, we study BianchiI spacetimes, verifying whether the Dirac fields in five dimensions can give rise to inflation or darkenergy dominated cosmological eras or not. 
The Steinberg relation in the stable motivic homotopy theory over a base. (arXiv:1809.00087v2 [math.AG] UPDATED) Cache Translate Page 
Authors: A. Druzhinin We prove the Steinberg relation in the sections of the Zariski sheaf $\underline{\pi}^{2,2}$ in $\mathbf{SH}(S)$ over a noetherian base scheme $S$ of a finite Krull dimension (actually for an arbitrary base scheme $S$ such that $\mathbf{SH}(U)$ exists for any Zariski open $U\subset S$). Namely we prove that the class of the morphism $$(1x,x)\colon \mathbf (A^1\{0,1\})\times S\to \mathbf G_m\times\mathbf G_m/(1\times\mathbf G_m\cup \mathbf G_m\times 1)$$ is trivial in the stable motivic homotopy category $$[(1x,x)]=0\in [A^1_S\{0_S,1_S\},\mathbf G_m^{\wedge 2}]_{\mathbf{SH}(S)}.$$ 
Convex optimization using quantum oracles. (arXiv:1809.00643v2 [quantph] UPDATED) Cache Translate Page 
Authors: Joran van Apeldoorn, András Gilyén, Sander Gribling, Ronald de Wolf We study to what extent quantum algorithms can speed up solving convex optimization problems. Following the classical literature we assume access to a convex set via various oracles, and we examine the efficiency of reductions between the different oracles. In particular, we show how a separation oracle can be implemented using $\tilde{O}(1)$ quantum queries to a membership oracle, which is an exponential quantum speedup over the $\Omega(n)$ membership queries that are needed classically. We show that a quantum computer can very efficiently compute an approximate subgradient of a convex Lipschitz function. Combining this with a simplification of recent classical work of Lee, Sidford, and Vempala gives our efficient separation oracle. This in turn implies, via a known algorithm, that $\tilde{O}(n)$ quantum queries to a membership oracle suffice to implement an optimization oracle (the best known classical upper bound on the number of membership queries is quadratic). We also prove several lower bounds: $\Omega(\sqrt{n})$ quantum separation (or membership) queries are needed for optimization if the algorithm knows an interior point of the convex set, and $\Omega(n)$ quantum separation queries are needed if it does not. 
Quantized VershikKerov Theory and Quantized Central Measures on Branching Graphs. (arXiv:1804.02644v2 [math.RT] CROSS LISTED) Cache Translate Page 
Authors: Ryosuke Sato We propose a natural quantized character theory for inductive systems of compact quantum groups based on KMS states on AFalgebras following StratilaVoiculescu's work (StratilaVoiculescu, 1975) (or (EnomotoIzumi, 2016)), and give its serious investigation when the system consists of quantum unitary groups $U_q(N)$ with $q$ in $(0,1)$. The key features of this work are: The "quantized trace" of a unitary representation of a compact quantum group can be understood as a quantized character associated with the unitary representation and its normalized one is captured as a KMS state with respect to a certain oneparameter automorphism group related to the socalled scaling group. In this paper we provide a VershikKerov type approximation theorem for extremal quantized characters (called the ergodic method) and also compare our quantized character theory for the inductive system of $U_q(N)$ with Gorin's theory on $q$GelfandTsetlin graphs (Gorin, 2012). 
An analogue of Schur functions for the plane partitions. (arXiv:1808.01059v3 [hepth] CROSS LISTED) Cache Translate Page 
Authors: A.Morozov An attempt is described to extend the notion of Schur functions from Young diagrams to plane partitions. The suggestion is to use the recursion in the partition size, which is easily generalized and deformed. This opens a possibility to obtain Macdonald polynomials by a change of recursion coefficients and taking appropriate limit from three to two dimensions  though details still remain to be worked out. Another perspective is opened by the observation of a rich nonabelian structure, extending that of commuting cutandjoin operators, for which the discovered 3Schurs are the common eigenfunctions. 
Secret Sharing with Binary Shares. (arXiv:1808.02974v2 [cs.CR] CROSS LISTED) Cache Translate Page 
Authors: Fuchun Lin, Mahdi Cheraghchi, Venkatesan Guruswami, Reihaneh SafaviNaini, Huaxiong Wang Shamir's celebrated secret sharing scheme provides an efficient method for encoding a secret of arbitrary length $\ell$ among any $N \leq 2^\ell$ players such that for a threshold parameter $t$, (i) the knowledge of any $t$ shares does not reveal any information about the secret and, (ii) any choice of $t+1$ shares fully reveals the secret. It is known that any such threshold secret sharing scheme necessarily requires shares of length $\ell$, and in this sense Shamir's scheme is optimal. The relaxed notion of ramp schemes requires the reconstruction of secret from any $t+1+g$ shares, for a gap parameter $g>0$. Ramp secret sharing is possible with share lengths depending only on the gap ratio $g/N$. In this work, we study secret sharing in the extremal case of bitlong shares, where even ramp secret sharing becomes impossible. We show, however, that a slightly relaxed but equally effective notion of semantic security for the secret, and negligible reconstruction error probability, eliminates the impossibility. Moreover, we provide explicit constructions of such schemes. Our relaxation results in separation of adaptive and nonadaptive adversaries. For nonadaptive adversaries, we explicitly construct secret sharing schemes that provide secrecy against any $\tau$ fraction of observed shares, and reconstruction from any $\kappa$ fraction of shares, for any choices of $0 \leq \tau < \kappa \leq 1$. Our construction achieves secret length $N(\kappa\tauo(1))$ which we show to be optimal. Finally, we construct explicit schemes against adaptive adversaries attaining a secret length $\Omega(N(\kappa\tau))$. Our work makes a new connection between secret sharing and coding theory, this time wiretap codes, that was not known before, and raises new interesting open questions. 
Approximately counting bases of bicircular matroids. (arXiv:1808.09548v1 [cs.DS] CROSS LISTED) Cache Translate Page 
Authors: Heng Guo, Mark Jerrum We give a fully polynomialtime randomised approximation scheme (FPRAS) for the number of bases in a bicircular matroids. This is a natural class of matroids for which counting bases exactly is #Phard and yet approximate counting can be done efficiently. 
“Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi Qaydaları” təsdiq edilib Cache Translate Page 
Prezident İlham Əliyev “Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi Qaydaları”nın təsdiq edilməsi və elektron hökumətlə bağlı bəzi tədbirlər haqqında Fərman imzalayıb.
AZƏRTAC xəbər verir ki, Fərmana əsasən 
Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi QAYDALARI Cache Translate Page 
1.1. “Dövlət informasiya ehtiyatları və sistemlərinin formalaşdırılması, aparılması, inteqrasiyası və arxivləşdirilməsi Qaydaları” (bundan sonra – Qaydalar) “Elektron hökumətin inkişafı və rəqəmsal hökumətə keçid ilə bağlı tədbirlər haqqında” Azərbaycan Respublikası Prezidentinin 
“Paket”lərdə gələn pullar – Böyük rəhbərlərin kiçik maaşları Cache Translate Page 
SSRİ rəhbərlərinin şəxsi həyatları, yaşam tərzi sovet dönəmində nə qədər gizli və qapalı saxlansa da, ölkə dağıldıqdan sonra açılan arxivlər bu şəxslərin həyat tərzlərinin bütün məqamlarını eninəboyuna ictimaiyyətə təqdim etdi. Hətta arxivlər sovet liderlərinin ciblərini də açıb göstərdi. Kommunizmə doğru […] 
LA ESTAFA QUE QUIERE QUEDARSE CON TODO, TUS DATOS Y TU CUENTA (PARA VACIARLA) Cache Translate Page 
La suplantación de identidad o phishing es un método para realizar estafas por internet conocido desde la década de 1980 y comenzó a hacerse popular en los años siguientes, con la popularización de la red de redes. El término phishing fue inventado por el hacker y spammer Khan C. Smith y la primera estafa que se conoce estaba relacionada con robar contraseñas y datos financieros de los usuarios de America Online, según los archivos de la Universidad Cornell. De hecho, la palabra está relacionada con “pescar” usuarios de AOL (“pescar” en inglés es “fishing”. Una forma habitual es enviar un mail avisando de una deuda o de la falta de actualización de datos de contacto o de pago con una institución conocida. Ese correo incluye un sitio web que, en ocasiones, es similar al de la institución. Cuando se entra al sitio web, la pantalla que aparece solicita una serie de datos que luego usará para obtener dinero (de cuentas bancarias o tarjetas de crédito) o datos directamente para venderlos. En la actualidad, es uno de los métodos de estafa online más populares, más que nada en su modalidad “bulk” (en criollo, envían mails al voleo). Sin embargo, el número de sitios únicos de phishing identificados por el Antipishing Working Group bajo en el último trimestre de 2017 (180.757 frente a 190.942 en el tercero) y en el año contra año (de un total de 277.693 en el último trimestre de 2016). Esta caída podría deberse a un cambio en la metodología de medición, ya que ahora se computan direcciones web que suelen aparecen con URL personalizadas pero que dirigen al mismo lugar, según consigna el blog Seguinfo. El caso más reciente: PayPal (y Apple)Como puede verse en la imagen dada a conocer desde la cuenta del Twitter del blog mencionado, el correo en cuestión llega en este caso sin enlace (para evitar las medidas de seguridad de los distintos clientes de correo) pero con un archivo PDF adjunto. En él se informa que los datos propios en la cuenta de PayPal son incorrectos y que si el usuario quiere seguir utilizando la cuenta deberá actualizar. Por supuesto, en el PDF sí aparece una dirección web que lleva a un sitio web que comienza con “country0mypapal” y que pide mail y contraseña. Una vez que el usuario introduce los datos, los ladrones se habrán hecho con los datos de PayPal. En el caso de Apple, pide información para quedarse con el Apple ID de los usuarios de la manzanita. Qué buscanSegún Borghello, en este caso se trata tan solo de los datos más básicos del usuario, ya que luego de introducirlos en la pantalla mostrada arriba, el sitio web redirige a la página oficial de PayPal. ¿Qué pueden hacer con esos datos? Si bien no pueden acceder a los datos de las tarjetas de crédito y débito, si pueden utilizar el saldo precargado que se pueda tener en la cuenta, tal como lo confima Camilo Gutiérrez , jefe de Laboratorio de la compañía de ciberseguridad ESET. Además dice Rodríguez, "cuando uno se loguea utiliza el mismo correo electrónico y la misma clave que usa en otros servicios, algo que hacen muchos usuarios; ahí pueden matar muchos pájaros de un tiro". Si consiguen ingresar a la cuenta de email, desde allí podrán modificar y hacerse con las contraseñas de muchos otros servicios, como las de las redes sociales. Un dato a tener en cuenta es que quien roba los datos no es quien necesariamente lo va a utilizar. "Estos suelen ponerse a la venta en mercados de la Deep Web. Se trata de bases de datos de, por ejemplo, 10.000 cuentas de correos electrónicos con contraseñas no todas funcionan, por supuesto y hay personas que luego utilizan esa información. Así que un posible objetivo es obtener la información para obtener ganancias con ella." Consejos útilesDesde ya, la recomendación es no hacer caso a este tipo de email. ¿Cómo darse cuenta? Si uno mira el mail, vera que más allá del nombre de fantasía de la cuenta (Centro de Ayuda de PayPal), la dirección real está llena de números y no tiene mucho sentido. En el PDF, hay una serie de errores de edición que las empresas suelen cuidar mucho (la prolijidad en las comunicaciones es parte de la imagen corporativa): dos, puntualmente –como puede verse en la imagen, un salto de línea en el medio del párrafo que habla de lo rápido del proceso y luego dos puntos en lugar de uno en el final del último párrafo. El sitio web, con todos esos caracteres, no tiene sentido: la URL de PayPal es www.paypal.com. Más allá de esto, la propia página de PayPal dedicada a este tipo de estafas señala que nunca le va a pedir al usuario números de tarjeta de crédito y débito, números de cuenta bancaria, número de documento de identidad, direcciones de correo electrónico, contraseñas y el nombre completo. O sea, justamente lo que solicitan las web falsas involucradas en un phishing. En caso de recibir este correo PayPal solicita que se denuncie a spoof@paypal.com. Otro lugar para denunciar es phishing@antiphishing.com.ar, de SeguInfo, que se ocupa de avisar a las compañías. Cristian Borghello, director de SeguInfo, además de lo ya dicho, recomienda "nunca hacer clic en los enlaces recibidos" y aclara que no alcanza con chequear la dirección de correo electrónico o la URL. No es suficiente, de hecho, que los sitios web comienzen con el HTTPS. Se deben dar ambas condiciones, ser el sitio real y comenzar con HTTPS. "Esto es muy importante porque los delincuentes suelen crear dominios parecidos al real. Por ejemplo: HTTPS://www.sitioseguro.com vs HTTPS://www.sitiosegur0.com (ambos son HTTPS pero en el segundo se cambió la letra "o" por el nro "0")", desarrolla el experto en ciberseguridad. "Una táctica común en casos de correos falsos es la de intentar asustar al destinatario. Es común que los asuntos del correo sean intimidatorios como 'bloquearemos su cuenta' o 'su tarjeta ha caducado'", puntualiza. "En cada correo recibido, utilizar el sentido común. Si algo es demasiado bueno o demasiado malo seguramente el correo es falso", recomienda. El caso reciente que llegó a las noticias es el de Netflix: ofrecían una suscripción por $1 por año pero, claro, era solo una estafa más. La estafa apareció repetidamente en Instagram. infotechnology 
Google AI with Jeff Dean Cache Translate Page 
Jeff Dean, the lead of Google AI, is on the podcast this week to talk with Melanie and Mark about AI and machine learning research, his upcoming talk at Deep Learning Indaba and his educational pursuit of parallel processing and computer systems was how his career path got him into AI. We covered topics from his team’s work with TPUs and TensorFlow, the impact computer vision and speech recognition is having on AI advancements and how simulations are being used to help advance science in areas like quantum chemistry. We also discussed his passion for the development of AI talent in the content of Africa and the opening of Google AI Ghana. It’s a full episode where we cover a lot of ground. One piece of advice he left us with, “the way to do interesting things is to partner with people who know things you don’t.” Listen for the end of the podcast where our colleague, Gabe Weiss, helps us answer the question of the week about how to get data from IoT core to display in real time on a web front end. Jeff DeanJeff Dean joined Google in 1999 and is currently a Google Senior Fellow, leading Google AI and related research efforts. His teams are working on systems for speech recognition, computer vision, language understanding, and various other machine learning tasks. He has codesigned/implemented many generations of Google’s crawling, indexing, and query serving systems, and codesigned/implemented major pieces of Google’s initial advertising and AdSense for Content systems. He is also a codesigner and coimplementor of Google’s distributed computing infrastructure, including the MapReduce, BigTable and Spanner systems, protocol buffers, the opensource TensorFlow system for machine learning, and a variety of internal and external libraries and developer tools. Jeff received a Ph.D. in Computer Science from the University of Washington in 1996, working with Craig Chambers on wholeprogram optimization techniques for objectoriented languages. He received a B.S. in computer science & economics from the University of Minnesota in 1990. He is a member of the National Academy of Engineering, and of the American Academy of Arts and Sciences, a Fellow of the Association for Computing Machinery (ACM), a Fellow of the American Association for the Advancement of Sciences (AAAS), and a winner of the ACM Prize in Computing. Cool things of the week
Interview
Question of the weekHow do I get data from IoT core to display in real time on a web front end?
Where can you find us next?Melanie is at Deep Learning Indaba and Mark is at Tokyo NEXT. We’ll both be at Strangeloop end of the month. Gabe will be at Cloud Next London and the IoT World Congress. 
L’Audiència espanyola arxiva definitivament la querella per la trama entorn del projecte Castor Cache Translate Page 
La sala penal refusa el recurs d'apel·lació negant l'existència d'una conxorxa i acceptant les xifres de l'exconcessionària sobre el cost 
ミツバチと同じように農作物の受粉を行うロボット「BrambleBee」 Cache Translate Page 
ミツバチは農作物の受粉を担う重要な役目を持っている動物ですが、近年その個体数が減少していることが問題になっています。今後の農業に大きなダメージを与えかねない状況が叫ばれている中、ミツバチのような受粉作業を代わりに担うロボット「BrambleBee」が開発されています。[1808.10010] Design of an Autonomous Precision Pollination Robothttps://arxiv.org/abs/1808.10010BrambleBee Robot Promises to Help Honeybees Pollinate Flowers  Digital Trendshttps://www.digita 全文 GIGAZINE（ギガジン） 09月13日 07時30分 
A quantum algebra approach to multivariate AskeyWilson polynomials. (arXiv:1809.04327v1 [math.QA]) Cache Translate Page 
Authors: Wolter Groenevelt We study matrix elements of a change of base between two different bases of representations of the quantum algebra $U_q(su(1,1))$. The two bases, which are multivariate versions of AlSalamChihara polynomials, are eigenfunctions of iterated coproducts of twisted primitive elements. The matrix elements are identified with Gasper and Rahman's multivariate AskeyWilson polynomials, and from this interpretation we derive their orthogonality relations. Furthermore, the matrix elements are shown to be eigenfunctions of the twisted primitive elements after a change of representation, which gives a quantum algebraic derivation of the fact that the multivariate AskeyWilson polynomials are solutions of a multivariate bispectral $q$difference problem. 
The center of the small quantum group II: singular blocks. (arXiv:1703.02457v3 [math.RT] UPDATED) Cache Translate Page 
Authors: Anna Lachowska, You Qi We generalize to the case of singular blocks the result in \cite{BeLa} that describes the center of the principal block of a small quantum group in terms of sheaf cohomology over the Springer resolution. Then using the method developed in \cite{LQ1}, we present a linear algebrogeometric approach to compute the dimensions of the singular blocks and of the entire center of the small quantum group associated with a complex semisimple Lie algebra. A conjectural formula for the dimension of the center of the small quantum group at an $l$th root of unity is formulated in type A. 
Twistfield representations of Walgebras, exact conformal blocks and character identities. (arXiv:1705.00957v3 [hepth] UPDATED) Cache Translate Page 
Authors: M. Bershtein, P. Gavrylenko, A. Marshakov We study the twistfield representations of Walgebras and generalize construction of the corresponding vertex operators to D and Bseries. It is shown, how the computation of characters of these representations leads to nontrivial identities involving lattice thetafunctions. We also propose a way to calculate their exact conformal blocks, expressing them for Dseries in terms of geometric data of the corresponding Prym variety for covering curve with involution. 
L'Audiència Nacional arxiva la demanda pel magatzem de gas Castor contra exministres i ESCALUGS Cache Translate Page 
La Sala penal de l'Audiència Nacional ha desestimat el recurs d'apel·lació i arxiva la demanda que demanava responsabilitat penal per la indemnització fixada pel cessament d'activitat del magatzem de gas Castor, enfront de les costes de Vinaròs (Castelló). 
Episode 67: #67: “Your encryption is useless, Charlie Brown” Cache Translate Page 
This week Dave and Gunnar talk about encrypting everything, why encryption doesn’t matter, and why we are all Charlie Brown now. Lucy, in the role of a cloud server provider. Or telco. Or regulator.
Cutting Room Floor

KMi researchers, David Pride and Petr Knoth, receive best paper award at TPDL2018 Cache Translate Page 
The best paper award at the 22nd International Conference on Theory and Practice of Digital Libraries (TPDL 2018) went to the paper authored by David Pride and Petr Knoth titled "Peer review and citation data in predicting university rankings, a largescale analysis." The paper conducted the largest analysis of REF2014 data so far (data of 145 thousand submitted papers, 7 million citations across all 36 REF Units of Assessment/disciplines), looking at the link between peer review, conducted by REF nominated panels, and bibliometric indicators. The study found surprisingly high correlations of the REF results at an institutional level (Grade Points Average  GPA) with simple bibliometric indicators.
This indicates that 2014 REF results could have been predicted using automated techniques to a high degree of accuracy for about a third of the disciplines, those with high average citations per paper. If such approach was adopted for just those disciplines, this could result in savings to UK universities and Research England of about £50 million every time a national exercise is run and even more if more disciplines adopted a similar approach. Since the preprint of this study was made available, a number of researchers have made contact with us and confirmed that they have since obtained similar results. This information is now being discussed with Jisc, who finance the project, to advise Research England on the next steps.
TPDL 2018 is the highest regarded conference in the area of digital libraries in Europe and 2nd worldwide. TPDL 2018 took place in Porto, Portugal.
Pride, D. and Knoth, P. (2018) Peer review and citation data in predicting university rankings, a largescale analysis, Theory and Practice of Digital Libraries (TPDL) 2018, Porto, Portugal Lecture Notes in Computer Science, Springer, https://arxiv.org/abs/1805.08529 
上交大卢策吾团队AlphaPose更新，顶级性能的实时姿态估计 Cache Translate Page 
雷锋网 AI 科技评论按：今年 2 月，我们报道过 上海交通大学卢策吾团队开源 AlphaPose 的消息。 AlphaPose 是一个多人姿态估计系统，具有极高的精准度。据卢策吾团队介绍，AlphaPose 在姿态估计（Pose Estimation）标准测试集 MSCOCO 上达到 72.3 mAP，是首个超过 70 mAP 的开源系统， 比 MaskRCNN 相对提高 8.2%，比 OpenPose（CMU）相对提高 17% 。除此之外，在 MPII 排行榜上，AlphaPose以 6% 的相对优势占据榜首。AlphaPose 基于腾讯优图和卢策吾团队在 ICCV 2017 上发表的分区域多人姿态识别算法（RMPE）。 近日，AlphaPose 迎来一次重大更新。在不损失精度的情况下，他们把识别速度提升到 实时 。系统采用PyTorch 框架，在姿态估计的标准测试集MSCOCO上， 达到 71mAP 的精度，同时，速度达到 20FPS （平均每张图像中有 4. 6 人）。代码支持 linux 和 windows 。 各开源框架在MSCOCO上的性能，运行在 1080Ti 单卡上 据卢策吾团队介绍，新版 AlphaPose 系统，架设在 PyTorch 框架上，得益于 PyTorch 的灵活性，新系统对用户更加友好，安装使用过程更加简易，也方便进行二次开发。同时，系统支持图片、视频、摄像头输入，实时在线计算出多人的姿态结果。 为了在兼顾速度的同时保持精度，新版 AlphaPose 提出了一个新的姿态估计模型。模型的骨架网络使用 ResNet101，在下采样部分添加 SE 模块作为 attention 模块。除此之外，使用 PixelShuffle 进行3次上采样，输出关键点的热度图，在提高分辨率的同时，保持特征信息不丢失，技术论文会在近期公布。 另一方面，卢策吾本人在知乎上表示，「alphapose 系统接下来计划上线 3D pose，密集人群 pose，超轻量级 pose，poseaction 联合预测模块，等等，每一个模块一般会对应一篇学术论文。MVIG 团队会持续优化速度，精度。希望能像 Yolo 一样持续更新成为一个对大家有用的系统。学术上，有新的算法第一时间更新，并投稿顶级会议。工程上，也会做到方便二次开发。」从这样的路线图可以看到，AlphaPose 目标是成为一个对学界、业界都开放、有用的代码库，我们也非常期待AlphaPose 的未来更新。 项目链接： https://github.com/MVIGSJTU/AlphaPose/tree/pytorch 项目主页： http://www.mvig.org/research/alphapose.html ICCV 2017 RMPE论文链接： http://cn.arxiv.org/abs/1612.00137 人体关键点检测对于描述人体姿态，预测人体行为至关重要。因此人体关键点检测是诸多计算机视觉任务的基础。其在动作分类，异常行为检测，以及人机交互等领域有着很广阔的应用前景，是计算机视觉领域中一个既具有研究价值、同时又极具挑战性的热门课题。 卢策吾：上海交通大学研究员，博士生导师。主要从事计算机视觉与深度学习相关研究，入选国家「青年千人」计划，原斯坦福 AI Lab 博士后研究员（导师：FeiFei Li 和 Leo Guibas），为斯坦福丰田无人车重要研究人员之一。 雷锋网 (公众号：雷锋网) AI 科技评论报道。上海交大机器视觉与智能实验室公众号推文参见 这里 。 雷锋网版权文章，未经授权禁止转载。详情见 转载须知 。 
SonarSnoop：一种将智能手机转变为迷你声纳系统窃取用户手机解锁图案的新技术 Cache Translate Page 
近日，来自瑞典和英国大学的学者们提出了一项被称之为SonarSnoop的新技术。据称，通过该技术可以将将智能手机的内置扬声器和麦克风，转化为迷你声纳系统，从而窃取Android设备的手机解锁模式。该技术的主要思路是，使用声波来跟踪用户在手机屏幕上手指的位置。攻击者只需在目标手机上安装一个恶意app，手机扬声器就会发出人耳听不到的频率（18kHz和20kHz之间）。 就像潜水艇的声纳一样，恶意app会利用（设备的）麦克风来接收从附近物体反弹的声波，即用户手指的点击/滑动声波。根据设备外壳上扬声器和麦克风的位置，可以构建机器学习算法来读取收集的数据并确定可能的解锁模式。 在上周，来自英国兰开斯特大学（Lancaster University）和瑞典林雪平大学（ Linköping University）的学者，发表了一篇关于在Android 5.0.1的三星Galaxy S4智能手机上SonarSnoop技术测试的详细研究论文。
该研究小组表示，SonarSnoop获得的数据将可能的解锁模式数量减少近70％。虽说如此，但SonarSnoop技术并没有像你在好莱坞电影的黑客场景中看到的那样酷炫，迄今我们仍无法做到100％准确的解锁模式输出。当前，SonarSnoop正处于实验的早期阶段。相信随着该项技术的不断推进，准确率也会进一步的提升。 在网络安全研究领域，使用声音进行用户跟踪仍然是一个新概念。 在过去的几年中，学者们已经探索了使用智能手机传感器（如加速度计，陀螺仪和接近传感器）来记录和窃取智能手机的PIN码和解锁模式，但从未利用过声波。 自从它在2008年蝙蝠侠电影“黑暗骑士”中出现后，使用类似声纳的系统来跟踪用户及其行为的想法，也逐渐走进了我们的现实。 2017年8月美国华盛顿大学的研究人员，首次尝试并实现了一种称之为CovertBand的技术。该技术可将含有麦克风和扬声器的智能设备转化为一种监控工具（主动声纳系统），隐蔽发射频率为1820 kHz特定构造的音频信号，并可穿越墙壁、门和窗户监测多个用户的位置和身体活动。 但SonarSnoop研究团队认为，其主要的灵感来源于FingerIO。FingerIO是2016年3月发布的一种新概念，当时学者们创建了类似声纳的系统，主要用于改善与智能手表的互动。 使用FingerIO，用户可以用手指在智能手表附近绘制线条和形状，智能手表将使用高频声波来接收手指运动并将其转换为触摸屏交互。可以说，SonarSnoop是FingerIO的邪恶版本，概念相同但目的不同（SonarSnoop主要是窃取触摸屏的交互数据）。 研究人员还指出，尽管他们的实验目前专注于智能手机。但SonarSnoop“也适用于许多其他类型的计算设备和可用麦克风和扬声器的物理环境。” 有关SonarSnoop技术的更多细节，可在“SonarSnoop: Active Acoustic SideChannel Attacks”研究论文中找到。 *参考来源：zdnet，FB小编 secist 编译，转载请注明来自FreeBuf.COM 
NALU 0.0.4 Cache Translate Page 
basic implementation of Neural arithmetic and logic units as described in arxiv.org/pdf/1808.00508.pdf 
Whats new on arXiv Cache Translate Page 
OutofDistribution Detection Using an Ensemble of Self Supervised Leaveout Classifiers As deep learning methods form a critical part in commercially … 
Whats new on arXiv Cache Translate Page 
Performance Metrics (Error Measures) in Machine Learning Regression, Forecasting and Prognostics: Properties and Typology Performance metrics (error measures) are vital … 
Zoom: SSDbased Vector Search for Optimizing Accuracy, Latency and Memory. (arXiv:1809.04067v1 [cs.CV]) Cache Translate Page 
Authors: Minjia Zhang, Yuxiong He With the advancement of machine learning and deep learning, vector search becomes instrumental to many information retrieval systems, to search and find best matches to user queries based on their semantic similarities.These online services require the search architecture to be both effective with high accuracy and efficient with low latency and memory footprint, which existing work fails to offer. We develop, Zoom, a new vector search solution that collaboratively optimizes accuracy, latency and memory based on a multiview approach. (1) A "preview" step generates a small set of good candidates, leveraging compressed vectors in memory for reduced footprint and fast lookup. (2) A "fullview" step on SSDs reranks those candidates with their fulllength vector, striking high accuracy. Our evaluation shows that, Zoom achieves an order of magnitude improvements on efficiency while attaining equal or higher accuracy, comparing with the stateoftheart. 
Estimate the Warfarin Dose by Ensemble of Machine Learning Algorithms. (arXiv:1809.04069v1 [qbio.QM]) Cache Translate Page 
Authors: Zhiyuan Ma, Ping Wang, Zehui Gao, Ruobing Wang, Koroush Khalighi Warfarin dosing remains challenging due to narrow therapeutic index and highly individual variability. Incorrect warfarin dosing is associated with devastating adverse events. Remarkable efforts have been made to develop the machine learning based warfarin dosing algorithms incorporating clinical factors and genetic variants such as polymorphisms in CYP2C9 and VKORC1. The most widely validated pharmacogenetic algorithm is the IWPC algorithm based on multivariate linear regression (MLR). However, with only a single algorithm, the prediction performance may reach an upper limit even with optimal parameters. Here, we present novel algorithms using stacked generalization frameworks to estimate the warfarin dose, within which different types of machine learning algorithms function together through a metamachine learning model to maximize the prediction accuracy. Compared to the IWPCderived MLR algorithm, Stack 1 and 2 based on stacked generalization frameworks performed significantly better overall. Subgroup analysis revealed that the mean of the percentage of patients whose predicted dose of warfarin within 20% of the actual stable therapeutic dose (mean percentage within 20%) for Stack 1 was improved by 12.7% (from 42.47% to 47.86%) in Asians and by 13.5% (from 22.08% to 25.05%) in the lowdose group compared to that for MLR, respectively. These data suggest that our algorithms would especially benefit patients required low warfarin maintenance dose, as subtle changes in warfarin dose could lead to adverse clinical events (thrombosis or bleeding) in patients with low dose. Our study offers novel pharmacogenetic algorithms for clinical trials and practice. 
DNN Dataflow Choice Is Overrated. (arXiv:1809.04070v1 [cs.DC]) Cache Translate Page 
Authors: Xuan Yang, Mingyu Gao, Jing Pu, Ankita Nayak, Qiaoyi Liu, Steven Emberton Bell, Jeff Ou Setter, Kaidi Cao, Heonjae Ha, Christos Kozyrakis, Mark Horowitz Many DNN accelerators have been proposed and built using different microarchitectures and program mappings. To fairly compare these different approaches, we modified the Halide compiler to produce hardware as well as CPU and GPU code, and show that Halide's existing scheduling language has enough power to represent all existing dense DNN accelerators. Using this system we can show that the specific dataflow chosen for the accelerator is not critical to achieve good efficiency: many different dataflows yield similar energy efficiency with good performance. However, finding the best blocking and resource allocation is critical, and we achieve a 2.6X energy savings over Eyeriss system by reducing the size of the local register file. Adding an additional level in the memory hierarchy saves an additional 25%. Based on these observations, we develop an optimizer that automatically finds the optimal blocking and storage hierarchy. Compared with Eyeriss system, it achieves up to 4.2X energy improvement for Convolutional Neural Networks (CNNs), 1.6X and 1.8X improvement for Long ShortTerm Memories (LSTMs) and multilayer perceptrons (MLPs) respectively. 
Smooth Structured Prediction Using Quantum and Classical Gibbs Samplers. (arXiv:1809.04091v1 [cs.LG]) Cache Translate Page 
Authors: Behrooz Sepehry, Ehsan Iranmanesh, Michael P. Friedlander, Pooya Ronagh We introduce a quantum algorithm for solving structuredprediction problems with a runtime that scales with the square root of the size of the label space, but scales in $\widetilde O\left(\frac{1}{\epsilon^5}\right)$ with respect to the precision of the solution. In doing so, we analyze a stochastic gradient algorithm for convex optimization in the presence of an additive error in the calculation of the gradients, and show that its convergence rate does not deteriorate if the additive errors are of the order $\widetilde O(\epsilon)$. Our algorithm uses quantum Gibbs sampling at temperature $O (\epsilon)$ as a subroutine. Numerical results using Monte Carlo simulations on an image tagging task demonstrate the benefit of the approach. 
The Coin Problem in Constant Depth: Sample Complexity and Parity Gates. (arXiv:1809.04092v1 [cs.CC]) Cache Translate Page 
Authors: Nutan Limaye, Karteek Sreenivasaiah, Srikanth Srinivasan, Utkarsh Tripathi, S. Venkitesh The $\textit{\deltaCoin Problem}$ is the computational problem of distinguishing between coins that are heads with probability $(1+\delta)/2$ or $(1\delta)/2,$ where $\delta$ is a parameter tending to $0$. We study this problem's complexity in the model of constantdepth Boolean circuits and prove the following results. $\textbf{Upper bounds.}$ For any constant $d\geq 2$, we show that there are $\textit{explicit}$ monotone AC$^0$ formulas (i.e. made up of AND and OR gates only) solving the $\delta$coin problem, having depth $d$, size $\exp(O(d(1/\delta)^{1/(d1)}))$, and sample complexity (no. of inputs) poly$(1/\delta).$ This matches previous upper bounds of O'Donnell and Wimmer (ICALP 2007) and Amano (ICALP 2009) in terms of size (which is optimal) and improves the sample complexity from $\exp(O(d(1/\delta)^{1/(d1)}))$ to poly$(1/\delta)$. $\textbf{Lower bounds.}$ We show that the above upper bounds are nearly tight even for the significantly stronger model of AC$^0[\oplus]$ formulas (i.e. allowing NOT and Parity gates): formally, we show that any AC$^0[\oplus]$ formula solving the $\delta$coin problem must have size $\exp(\Omega(d(1/\delta)^{1/(d1)})).$ This strengthens a result of Cohen, Ganor and Raz (APPROXRANDOM 2014), who prove a similar result for AC$^0$, and a result of Shaltiel and Viola (SICOMP 2010), which implies a superpolynomially weaker (still exponential) lower bound. The above yields the first class of $\textit{explicit}$ functions where we have nearly (up to a polynomial factor) matching upper and lower bounds for the class of AC$^0[\oplus]$ formulas. In particular, this yields the first $\textit{Fixeddepth SizeHierarchy Theorem}$ for the uniform version of this class: our results imply that for any fixed $d$, the class $\mathcal{C}_{d,k}$ of functions that have uniform AC$^0[\oplus]$ formulas of depth $d$ and size $n^k$ form an infinite hierarchy. 
Is together better? Examining scientific collaborations across multiple authors, institutions, and departments. (arXiv:1809.04093v1 [cs.SI]) Cache Translate Page 
Authors: Lovenoor Aulck, Kishore Vasan, Jevin West Collaborations are an integral part of scientific research and publishing. In the past, access to largescale corpora has limited the ways in which questions about collaborations could be investigated. However, with improvements in data/metadata quality and access, it is possible to explore the idea of research collaboration in ways beyond the traditional definition of multiple authorship. In this paper, we examine scientific works through three different lenses of collaboration: across multiple authors, multiple institutions, and multiple departments. We believe this to be a first look at multiple departmental collaborations as we employ extensive data curation to disambiguate authors' departmental affiliations for nearly 70,000 scientific papers. We then compare citation metrics across the different definitions of collaboration and find that papers defined as being collaborative were more frequently cited than their noncollaborative counterparts, regardless of the definition of collaboration used. We also share preliminary results from examining the relationship between cocitation and coauthorship by analyzing the extent to which similar fields (as determined by cocitation) are collaborating on works (as determined by coauthorship). These preliminary results reveal trends of compartmentalization with respect to intrainstitutional collaboration and show promise in being expanded. 
FIVR: Finegrained Incident Video Retrieval. (arXiv:1809.04094v1 [cs.MM]) Cache Translate Page 
Authors: Giorgos KordopatisZilos, Symeon Papadopoulos, Ioannis Patras, Ioannis Kompatsiaris This paper introduces the problem of Finegrained Incident Video Retrieval (FIVR). Given a query video, the objective is to retrieve all associated videos, considering several types of association that range from duplicate videos to videos from the same incident. FIVR offers a single framework that contains as special cases several retrieval tasks. To address the benchmarking needs of all such tasks, we constructed and present a largescale annotated video dataset, which we call FIVR200K and it comprises 225,960 videos. To create the dataset, we devised a process for the collection of YouTube videos based on major events from recent years crawled from Wikipedia and deployed a retrieval pipeline for the automatic selection of query videos based on their estimated suitability as benchmarks. We also devised a protocol for the annotation of the dataset with respect to the four types of video association defined by FIVR. Finally, we report results of an experimental study on the dataset comparing a variety of stateoftheart visual descriptors and aggregation techniques, highlighting the challenges of the problem at hand. 
Parallel Separable 3D Convolution for Video and Volumetric Data Understanding. (arXiv:1809.04096v1 [cs.CV]) Cache Translate Page 
Authors: Felix Gonda, Donglai Wei, Toufiq Parag, Hanspeter Pfister For video and volumetric data understanding, 3D convolution layers are widely used in deep learning, however, at the cost of increasing computation and training time. Recent works seek to replace the 3D convolution layer with convolution blocks, e.g. structured combinations of 2D and 1D convolution layers. In this paper, we propose a novel convolution block, Parallel Separable 3D Convolution (PmSCn), which applies m parallel streams of n 2D and one 1D convolution layers along different dimensions. We first mathematically justify the need of parallel streams (Pm) to replace a single 3D convolution layer through tensor decomposition. Then we jointly replace consecutive 3D convolution layers, common in modern network architectures, with the multiple 2D convolution layers (Cn). Lastly, we empirically show that PmSCn is applicable to different backbone architectures, such as ResNet, DenseNet, and UNet, for different applications, such as video action recognition, MRI brain segmentation, and electron microscopy segmentation. In all three applications, we replace the 3D convolution layers in stateofthe art models with PmSCn and achieve around 14% improvement in test performance and 40% reduction in model size and on average. 
On the Structural Sensitivity of Deep Convolutional Networks to the Directions of Fourier Basis Functions. (arXiv:1809.04098v1 [cs.CV]) Cache Translate Page 
Authors: Yusuke Tsuzuku, Issei Sato Dataagnostic quasiimperceptible perturbations on inputs can severely degrade recognition accuracy of deep convolutional networks. This indicates some structural instability of their predictions and poses a potential security threat. However, characterization of the shared directions of such harmful perturbations remains unknown if they exist, which makes it difficult to address the security threat and performance degradation. Our primal finding is that convolutional networks are sensitive to the directions of Fourier basis functions. We derived the property by specializing a hypothesis of the cause of the sensitivity, known as the linearity of neural networks, to convolutional networks and empirically validated it. As a byproduct of the analysis, we propose a fast algorithm to create shiftinvariant universal adversarial perturbations available in blackbox settings. 
Usable Differential Privacy: A Case Study with PSI. (arXiv:1809.04103v1 [cs.HC]) Cache Translate Page 
Authors: Jack Murtagh, Kathryn Taylor, George Kellaris, Salil Vadhan Differential privacy is a promising framework for addressing the privacy concerns in sharing sensitive datasets for others to analyze. However differential privacy is a highly technical area and current deployments often require experts to write code, tune parameters, and optimize the tradeoff between the privacy and accuracy of statistical releases. For differential privacy to achieve its potential for wide impact, it is important to design usable systems that enable differential privacy to be used by ordinary data owners and analysts. PSI is a tool that was designed for this purpose, allowing researchers to release useful differentially private statistical information about their datasets without being experts in computer science, statistics, or privacy. We conducted a thorough usability study of PSI to test whether it accomplishes its goal of usability by nonexperts. The usability test illuminated which features of PSI are most userfriendly and prompted us to improve aspects of the tool that caused confusion. The test also highlighted some general principles and lessons for designing usable systems for differential privacy, which we discuss in depth. 
Infectivity Enhances Prediction of Viral Cascades in Twitter. (arXiv:1809.04104v1 [physics.socph]) Cache Translate Page 
Authors: Weihua Li, Skyler J. Cranmer, Zhiming Zheng, Peter J. Mucha Models of contagion dynamics, originally developed for infectious diseases, have proven relevant to the study of information, news, and political opinions in online social systems. Modelling diffusion processes and predicting viral information cascades are important problems in network science. Yet, many studies of information cascades neglect the variation in infectivity across different pieces of information. Here, we employ earlytime observations of online cascades to estimate the infectivity of distinct pieces of information. Using simulations and data from realworld Twitter retweets, we demonstrate that these estimated infectivities can be used to improve predictions about the virality of an information cascade. Developing our simulations to mimic the realworld data, we consider the effect of the limited effective time for transmission of a cascade and demonstrate that a simple model for slow but nonnegligible decay of the infectivity captures the essential properties of retweet distributions. These results demonstrate the interplay between the intrinsic infectivity of a tweet and the complex network environment within which it diffuses, strongly influencing the likelihood of becoming a viral cascade. 
On the Beneficial Roles of Fading and Transmit Diversity in Wireless Power Transfer with Nonlinear Energy Harvesting. (arXiv:1809.04105v1 [cs.IT]) Cache Translate Page 
Authors: Bruno Clerckx, Junghoon Kim We study the effect of channel fading in Wireless Power Transfer (WPT) and show that fading enhances the RFto DC conversion efficiency of nonlinear RF energy harvesters. We then develop a new form of signal design for WPT, denoted as Transmit Diversity, that relies on multiple dumb antennas at the transmitter to induce fast fluctuations of the wireless channel. Those fluctuations boost the RFtoDC conversion efficiency thanks to the energy harvester nonlinearity. In contrast with (energy) beamforming, Transmit Diversity does not rely on Channel State Information at the Transmitter (CSIT) and does not increase the average power at the energy harvester input, though it still enhances the overall endtoend power transfer efficiency. Transmit Diversity is also combined with recently developed (energy) waveform and modulation to provide further enhancements. The efficacy of the scheme is analyzed using physicsbased and curve fittingbased nonlinear models of the energy harvester and demonstrated using circuit simulations, prototyping and experimentation. Measurements with two transmit antennas reveal gains of 50%in harvested DC power over a single transmit antenna setup. The work (again) highlights the crucial role played by the harvester nonlinearity and demonstrates that multiple transmit antennas can be beneficial to WPT even in the absence of CSIT. 
ACM RecSys 2018 LateBreaking Results Proceedings. (arXiv:1809.04106v1 [cs.AI]) Cache Translate Page 
Authors: Christoph Trattner (University of Bergen), Vanessa Murdock (Amazon), Steven Chang (Quora) The ACM RecSys'18 LateBreaking Results track (previously known as the Poster track) is part of the main program of the 2018 ACM Conference on Recommender Systems in Vancouver, Canada. The track attracted 48 submissions this year out of which 18 papers could be accepted resulting in an acceptance rated of 37.5%. 
David Rosenthal: Blockchain Solves Preservation! Cache Translate Page  
We're in a period when blockchain or "Distributed Ledger Technology" is the Solution to Everything™, so it is inevitable that it will be proposed as the solution to the problems of digital preservation. John Collomosse et al's abstract for ARCHANGEL: Trusted Archives of Digital Public Documents states:We present ARCHANGEL; a decentralised platform for ensuring the longterm integrity of digital documents stored within public archives. Document integrity is fundamental to public trust in archives. Yet currently that trust is built upon institutional reputation  trust at face value in a centralised authority, like a national government archive or University. ARCHANGEL proposes a shift to a technological underscoring of that trust, using distributed ledger technology (DLT) to cryptographically guarantee the provenance, immutability and so the integrity of archived documents. We describe the ARCHANGEL architecture, and report on a prototype of that architecture build over the Ethereum infrastructure. We report early evaluation and feedback of ARCHANGEL from stakeholders in the research data archives space.This is a wonderful example of the way people blithely assume that the claimed properties of blockchain systems are actually delivered in the real world. Below the fold I ask whether Collomosse et al have applied appropriate skepticism to blockchain's claims, and whether they have considered the sustainability of their proposal. Collomosse et al start by claiming: ARCHANGEL breaks new ground by proposing the use of a blockchain payload to record digital signatures (content evidence) derived from either scanned physical, or borndigital, document to ensure their integrity over decade or centurylong timespans.Seven years ago I wrote Do Digital Signatures Assure LongTerm Integrity? in response to Duane Dunston's advocacy of the use of digital signatures to assure the integrity of preserved digital documents. After reviewing the issues I concluded: Basing the longterm integrity of digital documents on digital signatures, and thus on the ability to keep secrets for the long term is unwise. Fortunately, it is not necessary. There are at least two different approaches to doing so that do not depend on longterm secrets:So they are proposing to use blockchain technology to solve a problem for which a commercial centralized solution has been available for twentyfour years, and an opensource academic solution for eleven years (both based on patents issued twentysix years ago), and a decentralized solution available for fifteen years which has been in economically sustainable production use for twelve years. None of this work is cited. The authors do not establish that there is significant unmet demand for services of these kinds, presumably because they are unaware that such services have existed for more than a decade. ARCHANGEL does not even "break new ground" in proposing the use of blockchain technology for this purpose. Victoria Lemieux's 2016 paper Trusting records: is Blockchain technology the answer? concluded: Blockchain technology can be used to address issues associated with information integrity in the present and near term, assuming proper security architecture and infrastructure management controls. It does not, however, guarantee reliability of information in the first place, and would have several limitations as a longterm solution for maintaining trustworthy digital records.It is important to observe that: ARCHANGEL utilises a permissioned blockchain model, in which operators or automatic processes authorised to add content to the AMI commit blocks into the chain encoding content evidence.They go on to suggest that their permissioned blockchain use proofofwork to establish consensus: In our architecture we propose two modes of consensus checking, both predicated upon a permissioned DLT model:There are a number of problems here. The first is that permissioned blockchains do not need proof of work to maintain consensus; the canonical permissioned blockchain, IBM's Hyperledger, uses Byzantine Fault Tolerance protocols and thereby avoids the appalling and obviously unsustainable energy use of current proof of work blockchains (the top 5 cryptocurrencies are estimated to use as much energy as The Netherlands). Option 1 could be implemented using Hyperledger far more easily and efficiently than by using proof of work. The second is that the security of blockchains assumes that a large number of nodes act independently. It has been known for more than four years that this is not the case in public blockchains such as Ethereum, which are dominated by a small number of large "mining pools": in Ethereum — 3 pools control more than 60% of the hashrate, and 6 pools will get you over 85%.For major cryptocurrencies these pools contain large numbers of nodes, which were attracted by the rapidly rising "price" of the coin. Since the beginning of this year, however: MVIS CryptoCompare Digital Assets 10 Index extended its collapse from a January high to 80 percent. ... Wednesday’s losses were led by Ether, the secondlargest virtual currency. It fell 6 percent to $171.15 at 7:50 a.m. in New York, extending this month’s retreat to 40 percent.This makes mining uneconomic for most miners, as does utilities raising electricity prices for miners, so the networks will lose nodes. Committing digital preservation for the long term to infrastructure as volatile as cryptocurrencies is not a route to sustainability.
Third, Collomosse et al pay scant attention to the fact that digital preservation is primarily an economic problem. A sustainable digital preservation technology requires a viable business model: We might also explore ... new business models to encourage sustainability. For example, the maintenance of the DLT (in terms of computational effort for mining) might be facilitated by users who seek document verification ’paying’ for that service via contribution of mining effort to maintain the DLT.The whole point of archives and memory institutions is that they hold materials that are very rarely accessed. Thus the idea of sustaining them economically by charging for access can never work. Not to mention that the idea that individual scholars wanting to verify a document would "pay" by running a network node fails the laugh test. Fourth, the authors uncritically accept blockchain's marketing hype that the only security threat is the unlikely one of collusion among the independent nodes: The security of a blockchain is afforded by the immutability of data with the blocks, delivered by the compounding effect of each new block being hashed to include the hashes of previous blocks. Thus as content is committed into the blockchain, the security of the content is reinforced.There are a number of issues with this:
Blockchain offers a shield which archives can use to defend the records as authentic. ... It was also noted that acceptance of content evidence might eventually become similar to acceptance of DNA evidence in court, but that establishing that level of confidence would require strong public engaged to explain Blockchain in an accessible manner particularly explaining why one could trust the cryptographic assurances inherent in a DLT solution.But, to the extent that blockchains and cryptocurrencies are perceived by the public as a single technology, and cryptocurrencies perceived as rancid with theft, fraud and manipulation, this may be difficult. Sustainability is job #1 for archives. There's no point in setting up an archiving system and filling it with content only to have it fail after a decade or so. Sustainability has to be designed into both the technology and the organization into which it is embedded from the start if the contents are to survive the wide range of threats to which archived data is subject. Layering it on afterwards isn't going to be effective. Basing the architecture of a preservation system on economically and environmentally unsustainable proof of work blockchains, and failing to identify any sustainable business model to support them isn't realistic.  
The 21 Card Trick and its Generalization. (arXiv:1809.04072v1 [math.CO]) Cache Translate Page 
Authors: Dibyajyoti Deb The 21 card trick is well known. It was recently shown in an episode of the popular YouTube channel Numberphile. In that trick, the audience is asked to remember a card, and through a series of steps, the magician is able to find the card. In this article, we look into the mathematics behind the trick, and look at a complete generalization of the trick. We show that this trick can be performed with any number of cards. 
Multivariate Brenier cumulative distribution functions and their application to nonparametric testing. (arXiv:1809.04090v1 [math.ST]) Cache Translate Page 
Authors: Melf Boeckel, Vladimir Spokoiny, Alexandra Suvorikova In this work we introduce a novel approach of construction of multivariate cumulative distribution functions, based on cyclicalmonotone mapping of an original measure $\mu \in \mathcal{P}^{ac}_2(\mathbb{R}^d)$ to some target measure $\nu \in \mathcal{P}^{ac}_2(\mathbb{R}^d)$ , supported on a convex compact subset of $\mathbb{R}^d$. This map is referred to as $\nu$Brenier distribution function ($\nu$BDF), whose counterpart under the onedimensional setting $d = 1$ is an ordinary CDF, with $\nu$ selected as $\mathcal{U}[0, 1]$, a uniform distribution on $[0, 1]$. Following onedimensional framework, a multivariate analogue of GlivenkoCantelli theorem is provided. A practical applicability of the theory is then illustrated by the development of a nonparametric pivotal twosample test, that is rested on $2$Wasserstein distance. 
Smooth Structured Prediction Using Quantum and Classical Gibbs Samplers. (arXiv:1809.04091v1 [cs.LG]) Cache Translate Page 
Authors: Behrooz Sepehry, Ehsan Iranmanesh, Michael P. Friedlander, Pooya Ronagh We introduce a quantum algorithm for solving structuredprediction problems with a runtime that scales with the square root of the size of the label space, but scales in $\widetilde O\left(\frac{1}{\epsilon^5}\right)$ with respect to the precision of the solution. In doing so, we analyze a stochastic gradient algorithm for convex optimization in the presence of an additive error in the calculation of the gradients, and show that its convergence rate does not deteriorate if the additive errors are of the order $\widetilde O(\epsilon)$. Our algorithm uses quantum Gibbs sampling at temperature $O (\epsilon)$ as a subroutine. Numerical results using Monte Carlo simulations on an image tagging task demonstrate the benefit of the approach. 
Normcontrolled inversion in weighted convolution algebras. (arXiv:1809.04097v1 [math.FA]) Cache Translate Page 
Authors: Ebrahim Samei, Varvara Shepelska Let $G$ be a discrete group, let $p\ge1$, and let $\omega$ be a weight on $G$. Using the approach from [9], we provide sufficient conditions on a weight $\omega$ for $\ell^p(G,\omega)$ to be a Banach algebra admitting a normcontrolled inversion in the reduced C$^*$algebra of $G$, namely $C^*_r(G)$. We show that our results can be applied to various cases including locally finite groups as well as finitely generated groups of polynomial or intermediate growth and a natural class of weights on them. These weights are of the form of polynomial or certain subexponential functions. We also consider the nondiscrete case and study the existence of normcontrolled inversion in $B(L^2(G))$ for some related convolution algebras. 
On the Beneficial Roles of Fading and Transmit Diversity in Wireless Power Transfer with Nonlinear Energy Harvesting. (arXiv:1809.04105v1 [cs.IT]) Cache Translate Page 
Authors: Bruno Clerckx, Junghoon Kim We study the effect of channel fading in Wireless Power Transfer (WPT) and show that fading enhances the RFto DC conversion efficiency of nonlinear RF energy harvesters. We then develop a new form of signal design for WPT, denoted as Transmit Diversity, that relies on multiple dumb antennas at the transmitter to induce fast fluctuations of the wireless channel. Those fluctuations boost the RFtoDC conversion efficiency thanks to the energy harvester nonlinearity. In contrast with (energy) beamforming, Transmit Diversity does not rely on Channel State Information at the Transmitter (CSIT) and does not increase the average power at the energy harvester input, though it still enhances the overall endtoend power transfer efficiency. Transmit Diversity is also combined with recently developed (energy) waveform and modulation to provide further enhancements. The efficacy of the scheme is analyzed using physicsbased and curve fittingbased nonlinear models of the energy harvester and demonstrated using circuit simulations, prototyping and experimentation. Measurements with two transmit antennas reveal gains of 50%in harvested DC power over a single transmit antenna setup. The work (again) highlights the crucial role played by the harvester nonlinearity and demonstrates that multiple transmit antennas can be beneficial to WPT even in the absence of CSIT. 
Vortex filament solutions of the NavierStokes equations. (arXiv:1809.04109v1 [math.AP]) Cache Translate Page 
Authors: Jacob Bedrossian, Pierre Germain, Benjamin HarropGriffiths We consider solutions of the NavierStokes equations in \(3d\) with vortex filament initial data of arbitrary circulation, that is, initial vorticity given by a divergencefree vectorvalued measure of arbitrary mass supported on a smooth curve. First, we prove global wellposedness for perturbations of the Oseen vortex column in scalingcritical spaces. Second, we prove local wellposedness (in a sense to be made precise) when the filament is a smooth, closed, nonselfintersecting curve. Besides their physical interest, these results are the first to give wellposedness in a neighborhood of large selfsimilar solutions of $3d$ NavierStokes, as well as solutions which are locally approximately selfsimilar. 
Two applications of the integral regulator. (arXiv:1809.04114v1 [math.AG]) Cache Translate Page 
We review Li's refinement of the KLM regulator map, and use it to detect torsion phenomena in higher Chow groups. 
On Boolean algebras with strictly positive measures. (arXiv:1809.04118v1 [math.LO]) Cache Translate Page 
Authors: Menachem Magidor, Grzegorz Plebanek We investigate reflectiontype problems on the class SPM, of Boolean algebras carrying strictly positive finitely additive measures. We show, in particular, that in the constructible universe there is a Boolean algebra $\mathfrak A$ which is not in SPM but every subalgebra of $\mathfrak A$ of cardinality $\mathfrak c$ admits a strictly positive measure. 
Dedekind's criterion for the monogenicity of a number field versus Uchida's and L\"uneburg's. (arXiv:1809.04122v1 [math.NT]) Cache Translate Page 
Authors: Xavier Vidaux, Carlos R. Videla We compare three different characterizations, due respectively to R. Dedekind, K. Uchida, and H. L\"uneburg, of when $\mathbb Z[\theta]$ is the ring of integers of $\mathbb Q(\theta)$, and apply our results to some concrete $2$towers of number fields. 
Categorical foundations of varietybased bornology. (arXiv:1809.04124v1 [math.CT]) Cache Translate Page 
Authors: Jan Paseka, Sergey A. Solovyov Following the concept of topological theory of S.~E.~Rodabaugh, this paper introduces a new approach to (latticevalued) bornology, which is based in bornological theories, and which is called varietybased bornology. In particular, motivated by the notion of topological system of S.~Vickers, we introduce the concept of varietybased bornological system, and show that the category of varietybased bornological spaces is isomorphic to a full reflective subcategory of the category of varietybased bornological systems. 
Thinshell concentration for zero cells of stationary Poisson mosaics. (arXiv:1809.04134v1 [math.PR]) Cache Translate Page 
Authors: Eliza O'Reilly We study the concentration of the norm of a random vector $Y$ uniformly sampled in the centered zero cell of two types of stationary and isotropic random mosaics in $\mathbb{R}^n$ for large dimensions $n$. For a stationary and isotropic PoissonVoronoi mosaic, $Y$ has a radial and logconcave distribution, implying that $Y/\mathbb{E}(Y^2)^{\frac{1}{2}}$ approaches one for large $n$. If we assume that the centroids of the mosaic have intensity scaling like $e^{n \lambda}$, then $Y$ is on the order of $\sqrt{n}$ for large $n$. For the PoissonVoronoi mosaic, we show that $Y/\sqrt{n}$ concentrates to $e^{\lambda}(2\pi e)^{\frac{1}{2}}$ as $n$ increases, and for a stationary and isotropic Poisson hyperplane mosaic, we show there is a range $(R_{\ell}, R_u)$ such that ${Y}/{\sqrt{n}}$ will be within this range with high probability for large $n$. The rates of convergence are also computed in both cases. 
Large deviations and localization of the microcanonical ensembles given by multiple constraints. (arXiv:1809.04138v1 [math.PR]) Cache Translate Page 
Authors: Kyeongsik Nam We develop a unified theory to analyze the microcanonical ensembles given by several constraints. Several interesting phenomena that do not occur in the single constraint case can happen under the multiple constraints case. We systematically analyze detailed structures of such microcanonical ensembles in two orthogonal directions using the theory of large deviations. First of all, we establish the equivalence of ensembles result, which exhibits an interesting phase transition phenomenon. Secondly, we study the localization and delocalization phenomena by obtaining large deviation results for the joint law of empirical distributions and the maximum component. Some concrete examples for which the theory applies will be given as well. 
Quantum revival patterns from classical phasespace trajectories. (arXiv:1809.04139v1 [quantph]) Cache Translate Page 
Authors: Gabriel M. Lando, Raúl O. Vallejos, GertLudwig Ingold, Alfredo M. Ozorio de Almeida A general semiclassical method in phase space based on the finalvalue representation of the Wigner function is discussed that bypasses caustics and the need to search for classical trajectories. We demonstrate its potential by applying the method to the Kerr Hamiltonian. Fractional revivals sensitive to details in the quantum evolution are obtained semiclassically and provide decisive evidence for the validity of the approach far beyond the Ehrenfest time. There is no constraint on the initial state as is shown by reproducing fractional revivals not only for the usual coherent states but also for a shifted weakly excited Fock state. 
Nonparametric Bayesian analysis of the compound Poisson prior for support boundary recovery. (arXiv:1809.04140v1 [math.ST]) Cache Translate Page 
Authors: Markus Reiss, Johannes SchmidtHieber Given data from a Poisson point process with intensity $(x,y) \mapsto n \mathbf{1}(f(x)\leq y),$ frequentist properties for the Bayesian reconstruction of the support boundary function $f$ are derived. We mainly study compound Poisson process priors with fixed intensity proving that the posterior contracts with nearly optimal rate for monotone and piecewise constant support boundaries and adapts to H\"older smooth boundaries with smoothness index at most one. We then derive a nonstandard Bernsteinvon Mises result for a compound Poisson process prior and a function space with increasing parameter dimension. As an intermediate result the limiting shape of the posterior for random histogram type priors is obtained. In both settings, it is shown that the marginal posterior of the functional $\vartheta =\int f$ performs an automatic bias correction and contracts with a faster rate than the MLE. In this case, $(1\alpha)$credible sets are also asymptotic $(1\alpha)$confidence intervals. As a negative result, it is shown that the frequentist coverage of credible sets is lost for linear functions indicating that credible sets only have frequentist coverage for priors that are specifically constructed to match properties of the underlying true function. 
Nonconvex Variance Reduced Optimization with Arbitrary Sampling. (arXiv:1809.04146v1 [math.OC]) Cache Translate Page 
Authors: Samuel Horváth, Peter Richtárik We provide the first importance sampling variants of variance reduced algorithms for empirical risk minimization with nonconvex loss functions. In particular, we analyze nonconvex versions of SVRG, SAGA and SARAH. Our methods have the capacity to speed up the training process by an order of magnitude compared to the state of the art on real datasets. Moreover, we also improve upon current minibatch analysis of these methods by proposing importance sampling for minibatches in this setting. Surprisingly, our approach can in some regimes lead to superlinear speedup with respect to the minibatch size, which is not usually present in stochastic optimization. All the above results follow from a general analysis of the methods which works with arbitrary sampling, i.e., fully general randomized strategy for the selection of subsets of examples to be sampled in each iteration. Finally, we also perform a novel importance sampling analysis of SARAH in the convex setting. 
Noncontractible loops of symplectic embeddings between convex toric domains. (arXiv:1809.04147v1 [math.SG]) Cache Translate Page 
Authors: Mihai Munteanu Given two 4dimensional ellipsoids whose symplectic sizes satisfy a specified inequality, we prove that a certain loop of symplectic embeddings between the two ellipsoids is noncontractible. The statement about symplectic ellipsoids is a particular case of a more general result. Given two convex toric domains whose first and second ECH capacities satisfy a specified inequality, we prove that a certain loop of symplectic embeddings between the two convex toric domains is noncontractible. We show how the constructed loops become contractible if the target domain becomes large enough. The proof involves studying certain moduli spaces of holomorphic cylinders in families of symplectic cobordisms arising from families of symplectic embeddings. 
Joint Chance Constraints in AC Optimal Power Flow: Improving Bounds through Learning. (arXiv:1809.04153v1 [math.OC]) Cache Translate Page 
Authors: Kyri Baker, Andrey Bernstein This paper considers distribution systems with a high penetration of distributed, renewable generation and addresses the problem of incorporating the associated uncertainty into the optimal operation of these networks. Joint chance constraints, which satisfy multiple constraints simultaneously with a prescribed probability, are one way to incorporate uncertainty across sets of constraints, leading to a chanceconstrained optimal power flow problem. Departing from the computationallyheavy scenariobased approaches or approximations that transform the joint constraint into conservative deterministic constraints, this paper develops a scalable, datadriven approach which learns operational trends in a power network, eliminates zeroprobability events (e.g., inactive constraints), and accurately and efficiently approximates bounds on the joint chance constraint iteratively. In particular, the proposed framework improves upon the classic methods based on the union bound (or Boole's inequality) by generating a much less conservative set of single chance constraints that also guarantees the satisfaction of the original joint constraint. The proposed framework is evaluated numerically using the IEEE 37node test feeder, focusing on the problem of voltage regulation in distribution grids. 
Gabber's rigidity theorem for stable framed linear presheaves. (arXiv:1809.04158v1 [math.AG]) Cache Translate Page 
Authors: A. Druzhinin We extend the results of the joint work of the author with Alexey Ananievsky [AnDr17] for the case of smooth affine henselian pairs over a field which means the rigidity theorem in sense of Gabber [Gab92] for a stable homotopy invariant linear framed presheaf (of abelian groups). Precisely we prove that for such a presheaf $F$ on $Sm_k$, and a smooth affine henselian pair $(U,Z)$ over the base filed $k$, there is an isomorphism $$F(U)\big/ \Lambda_l\cdot F(U)\simeq F(Z)\big/\Lambda_l\cdot F(Z),$$ where $\Lambda_l= nh$, if $l=2n$, $\Lambda_l= nh+1$, if $l=2n+1$, for any $l\in k^\times$. As a consequence this implies the rigidity with respect to smooth henselian pairs for a $\Lambda_l$torsion $\mathbf{SH}(k)$representable cohomology theory on $Sm_k$. 
Restrictions of higher derivatives of the Fourier transform. (arXiv:1809.04159v1 [math.CA]) Cache Translate Page 
Authors: Michael Goldberg, Dmitriy Stolyarov We consider several problems related to the restriction of $(\nabla^k) \hat{f}$ to a surface $\Sigma \subset \mathbb R^d$ with nonvanishing Gauss curvature. While such restrictions clearly exist if $f$ is a Schwartz function, there are few bounds available that enable one to take limits with respect to the $L_p(\mathbb R^d)$ norm of $f$. We establish three scenarios where it is possible to do so: $\bullet$ When the restriction is measured according to a Sobolev space $H^{s}(\Sigma)$ of negative index. We determine the complete range of indices $(k, s, p)$ for which such a bound exists. $\bullet$ Among functions where $\hat{f}$ vanishes on $\Sigma$ to order $k1$, the restriction of $(\nabla^k) \hat{f}$ defines a bounded operator from (this subspace of) $L_p(\mathbb R^d)$ to $L_2(\Sigma)$ provided $1 \leq p \leq \frac{2d+2}{d+3+4k}$. $\bullet$ When there is _a priori_ control of $\hat{f}_\Sigma$ in a space $H^{\ell}(\Sigma)$, $\ell > 0$, this implies improved regularity for the restrictions of $(\nabla^k)\hat{f}$. If $\ell$ is large enough then even $\\nabla \hat{f}\_{L_2(\Sigma)}$ can be controlled in terms of $\\hat{f}\_{H^\ell(\Sigma)}$ and $\f\_{L_p(\mathbb R^d)}$ alone. The techniques underlying these results are inspired by the spectral synthesis work of Y. Domar, which provides a mechanism for $L_p$ approximation by "convolving along surfaces", and the SteinTomas restriction theorem. Our main inequality is a bilinear form bound with similar structure to the SteinTomas $T^*T$ operator, generalized to accommodate smoothing along $\Sigma$ and derivatives transverse to it. It is used both to establish basic $H^{s}(\Sigma)$ bounds for derivatives of $\hat{f}$ and to bootstrap from surface regularity of $\hat{f}$ to regularity of its higher derivatives. 
$C^{1,\alpha}$ Isometric Embeddings of Polar Caps. (arXiv:1809.04161v1 [math.AP]) Cache Translate Page 
Authors: Camillo De Lellis, Dominik Inauen We study isometric embeddings of $C^2$ Riemannian manifolds in the Euclidean space and we establish that the H\"older space $C^{1,\frac{1}{2}}$ is critical in a suitable sense: in particular we prove that for $\alpha > \frac{1}{2}$ the LeviCivita connection of any isometric immersion is induced by the Euclidean connection, whereas for any $\alpha < \frac{1}{2}$ we construct $C^{1,\alpha}$ isometric embeddings of portions of the standard $2$dimensional sphere for which such property fails. 
A splitting of the virtual class for genus one stable maps. (arXiv:1809.04162v1 [math.AG]) Cache Translate Page 
Authors: Tom Coates, Cristina Manolache Moduli spaces of stable maps to a smooth projective variety typically have several components. We express the virtual class of the moduli space of genus one stable maps to a smooth projective variety as a sum of virtual classes of the components. The key ingredient is a generalised functoriality result for virtual classes. We show that the natural maps from 'ghost' components of the genus one moduli space to moduli spaces of genus zero stable maps satisfy the strong push forward property. As a consequence, we give a cyclelevel formula which relates standard and reduced genus one GromovWitten invariants of a smooth projective CalabiYau theefold. 
On the geometry of the automorphism groups of affine varieties. (arXiv:1809.04175v1 [math.AG]) Cache Translate Page 
Authors: JeanPhilippe Furter, Hanspeter Kraft This article is a survey on indvarieties and indgroups introduced by Shafarevich in 1965, with a special emphasis on automorphism groups of affine varieties and actions of indgroups on indvarieties. We give precise definitions and complete proofs, including several known results. The survey contains many examples and also some questions which came up during our work on the subject. Among the new results we show that for an affine variety X the automorphism group Aut(X) is always locally closed in the indsemigroup End(X) of all endomorphisms, and we give an example of a strict closed subgroup of a connected indgroup which has the same Lie algebra, based on the work of ShestakovUmirbaev on the existence of nontame automorphisms of affine 3space. 
Phaseless Subspace Tracking. (arXiv:1809.04176v1 [cs.LG]) Cache Translate Page 
Authors: Seyedehsara Nayer, Namrata Vaswani This work takes the first steps towards solving the "phaseless subspace tracking" (PST) problem. PST involves recovering a time sequence of signals (or images) from phaseless linear projections of each signal under the following structural assumption: the signal sequence is generated from a much lower dimensional subspace (than the signal dimension) and this subspace can change over time, albeit gradually. It can be simply understood as a dynamic (timevarying subspace) extension of the lowrank phase retrieval problem studied in recent work. 
The arithmetic of arithmetic Coxeter groups. (arXiv:1809.04181v1 [math.NT]) Cache Translate Page 
Authors: Suzana Milea, Christopher Shelley, Martin H. Weissman In the 1990s, J.H. Conway published a combinatorialgeometric method for analyzing integervalued binary quadratic forms (BQFs). Using a visualization he named the "topograph," Conway revisited the reduction of BQFs and the solution of quadratic Diophantine equations such as Pell's equation. It appears that the crux of his method is the coincidence between the arithmetic group $PGL_2({\mathbb Z})$ and the Coxeter group of type $(3,\infty)$. There are many arithmetic Coxeter groups, and each may have unforeseen applications to arithmetic. We introduce Conway's topograph, and generalizations to other arithmetic Coxeter groups. This includes a study of "arithmetic flags" and variants of binary quadratic forms. 
Satellites of Infinite Rank in the Smooth Concordance Group. (arXiv:1809.04186v1 [math.GT]) Cache Translate Page 
Authors: Matthew Hedden, Juanita PinzonCaicedo We conjecture that satellite operations are either constant or have infinite rank in the concordance group. We reduce this to the difficult case of winding number zero satellites, and use $SO(3)$ gauge theory to provide a general criterion sufficient for the image of a satellite operation to generate an infinite rank subgroup of the smooth concordance group $\mathcal{C}$. Our criterion applies widely, notably to scores of unknotted patterns for which the corresponding operators on the topological concordance group are zero. We raise some questions and conjectures regarding satellite operators and their interaction with concordance. 
Inner vectors for Toeplitz operators. (arXiv:1809.04194v1 [math.CV]) Cache Translate Page 
Authors: Raymond Cheng, Javad Mashreghi, William T. Ross In this paper we survey and bring together several approaches to obtaining inner functions for Toeplitz operators. These approaches include the classical definition, the Wold decomposition, the operatorvalued Poisson Integral, and Clark measures. We then extend these notions somewhat to inner functions on model spaces. Along the way we present some novel examples. 
Optimization with NonDifferentiable Constraints with Applications to Fairness, Recall, Churn, and Other Goals. (arXiv:1809.04198v1 [cs.LG]) Cache Translate Page 
Authors: Andrew Cotter, Heinrich Jiang, Serena Wang, Taman Narayan, Maya Gupta, Seungil You, Karthik Sridharan We show that many machine learning goals, such as improved fairness metrics, can be expressed as constraints on the model's predictions, which we call rate constraints. We study the problem of training nonconvex models subject to these rate constraints (or any nonconvex and nondifferentiable constraints). In the nonconvex setting, the standard approach of Lagrange multipliers may fail. Furthermore, if the constraints are nondifferentiable, then one cannot optimize the Lagrangian with gradientbased methods. To solve these issues, we introduce the proxyLagrangian formulation. This new formulation leads to an algorithm that produces a stochastic classifier by playing a twoplayer nonzerosum game solving for what we call a semicoarse correlated equilibrium, which in turn corresponds to an approximately optimal and feasible solution to the constrained optimization problem. We then give a procedure which shrinks the randomized solution down to one that is a mixture of at most $m+1$ deterministic solutions, given $m$ constraints. This culminates in algorithms that can solve nonconvex constrained optimization problems with possibly nondifferentiable and nonconvex constraints with theoretical guarantees. We provide extensive experimental results enforcing a wide range of policy goals including different fairness metrics, and other goals on accuracy, coverage, recall, and churn. 
Sharp sectional curvature bounds and a new proof of The Spectral Theorem. (arXiv:1809.04200v1 [math.DG]) Cache Translate Page 
Authors: Maxine Calle, Corey Dunn We algebraically compute all possible sectional curvature values for canonical algebraic curvature tensors, and use this result to give a method for constructing general sectional curvature bounds. We use a wellknown method to geometrically realize these results to produce a hypersurface with prescribed sectional curvatures at a point. By extending our methods, we give a relatively short proof of the Spectral Theorem for selfadjoint operators on a finite dimensional real vector space. 
Genuinely entangled subspace with allencompassing free bipartite entanglement. (arXiv:1809.04202v1 [quantph]) Cache Translate Page 
Authors: Sristy Agrawal, Saronath Halder, Manik Banik In a multipartite scenario quantum entanglement manifests its most dramatic form when the state is genuinely entangled. It is, therefore, of significant operational interest to identify subspaces of multipartite quantum systems that contain such states only. In this work, we introduce the notion of unextendible biseparable bases (UBB) that provides an adequate method to construct such genuinely entangled subspaces (GES). We provide explicit construction of two types of UBBs  party symmetric and party asymmetric  for every 3qudit quantum system, with local dimension $d\ge 3$. Further we show that the GES resulting from the symmetric construction is indeed a bidistillable subspace, i.e., all the states supported on it contain free (distillable) entanglement across every bipartition. 
Colorings and doubled colorings of virtual doodles. (arXiv:1809.04205v1 [math.GT]) Cache Translate Page 
Authors: Andrew Bartholomew, Roger Fenn, Naoko Kamada, Seiichi Kamada A virtual doodle is an equivalence class of virtual diagrams under an equivalence relation generated by flat version of classical Reidemesiter moves and virtual Reidemsiter moves such that Reidemeister moves of type 3 are forbidden. In this paper we discuss colorings of virtual diagrams using an algebra, called a doodle switch, and define an invariant of virtual doodles. Besides usual colorings of diagrams, we also introduce doubled colorings. 
On scattering for the defocusing high dimensional intercritical NLS. (arXiv:1809.04211v1 [math.AP]) Cache Translate Page 
Authors: Chuanwei Gao, Zehua Zhao In this paper, we study the critical norm conjecture for the intercritical nonlinear Schr{\"o}dinger equation with critical index $s_c$ satisfying $\frac{1}{2}<s_c<1$ when $d\geq 5$. Under the assumption of uniform boundedness of the critical norm, we prove the global wellposedness and scattering for the Cauchy problem. We follow the standard `Concentration compactness/Rigidity method' established in \cite{KenigMerle1,KenigMerle2}, and treat three scenarios for the critical element respectively. Moreover, double Duhamel method and interaction Morawetz estimate are applied to exclude the critical element. 
On Markov Chain Gradient Descent. (arXiv:1809.04216v1 [math.OC]) Cache Translate Page 
Authors: Tao Sun, Yuejiao Sun, Wotao Yin Stochastic gradient methods are the workhorse (algorithms) of largescale optimization problems in machine learning, signal processing, and other computational sciences and engineering. This paper studies Markov chain gradient descent, a variant of stochastic gradient descent where the random samples are taken on the trajectory of a Markov chain. Existing results of this method assume convex objectives and a reversible Markov chain and thus have their limitations. We establish new nonergodic convergence under wider step sizes, for nonconvex problems, and for nonreversible finitestate Markov chains. Nonconvexity makes our method applicable to broader problem classes. Nonreversible finitestate Markov chains, on the other hand, can mix substatially faster. To obtain these results, we introduce a new technique that varies the mixing levels of the Markov chains. The reported numerical results validate our contributions. 
Constrained optimization as ecological dynamics with applications to random quadratic programming in high dimensions. (arXiv:1809.04221v1 [condmat.statmech]) Cache Translate Page 
Authors: Pankaj Mehta, Wenping Cui, ChingHao Wang, Robert Marsland III Quadratic programming (QP) is a common and important constrained optimization problem. Here, we derive a surprising duality between constrained optimization with inequality constraints  of which QP is a special case  and consumer resource models describing ecological dynamics. Combining this duality with a recent `cavity solution', we analyze highdimensional, random QP where the optimization function and constraints are drawn randomly. Our theory shows remarkable agreement with numerics and points to a deep connection between optimization, dynamical systems, and ecology. 
Concentration for Coulomb gases on compact manifolds. (arXiv:1809.04231v1 [math.PR]) Cache Translate Page 
Authors: David GarcíaZelada We study the nonasymptotic behavior of a Coulomb gas on a compact Riemannian manifold. This gas is a symmetric nparticle Gibbs measure associated to the twobody interaction energy given by the Green function. We encode such a particle system by using an empirical measure. Our main result is a concentration inequality in KantorovichWasserstein distance inspired from the work of Chafa\"i, Hardy and Ma\"ida on the Euclidean space. Their proof involves large deviation techniques together with an energydistance comparison and a regularization procedure based on the superharmonicity of the Green function. This last ingredient is not available on a manifold. We solve this problem by using the heat kernel and its shorttime asymptotic behavior. 
A twodimensional topological representation theorem for matroid polytopes of rank 4. (arXiv:1809.04236v1 [math.CO]) Cache Translate Page 
Authors: Hiroyuki Miyata The FolkmanLawrence topological representation theorem, which states that every (loopfree) oriented matroid of rank $r$ can be represented as a pseudosphere arrangement on the $(r1)$dimensional sphere $S^{r1}$, is one of the most outstanding results in oriented matroid theory. In this paper, we provide a lowerdimensional version of the topological representation theorem for uniform matroid polytopes of rank $4$. We introduce $2$weak configurations of points and pseudocircles ($2$weak PPC configurations) on $S^2$ and prove that every uniform matroid polytope of rank $4$ can be represented by a $2$weak PPC configuration. As an application, we provide a proof of Las Vergnas conjecture on simplicial topes for the case of uniform matroid polytopes of rank $4$. 
On the topological boundary of the range of superBrownian motionextended version. (arXiv:1809.04238v1 [math.PR]) Cache Translate Page 
Authors: Jieliang Hong, Leonid Mytnik, Edwin Perkins We show that if $\partial\mathcal{R}$ is the boundary of the range of superBrownian motion and dim denotes Hausdorff dimension, then with probability one, for any open set $U$, $\partial\mathcal{R}\cap U\neq\emptyset$ implies $$\text{dim}(U\cap\partial\mathcal{R})=\begin{cases} 42\sqrt2\approx1.17&\text{ if }d=2\\ \frac{9\sqrt{17}}{2}\approx 2.44&\text{ if }d=3. \end{cases}$$ This improves recent results of the last two authors (arxiv:1711.03486) by working with the actual topological boundary, rather than the boundary of the zero set of the local time, and establishing a local result for the dimension. 
A geometric proof of an equivariant Pieri rule for flag manifolds. (arXiv:1809.04242v1 [math.AG]) Cache Translate Page 
Authors: Changzheng Li, Vijay Ravikumar, Frank Sottile, Mingzhi Yang We use geometry to give a short proof of an equivariant Pieri rule in the classical flag manifold. 
Selffoldability of monohedral quadrilateral origami tessellations. (arXiv:1809.04243v1 [math.MG]) Cache Translate Page 
Authors: Thomas C. Hull, Tomohiro Tachi Using a mathematical model for selffoldability of rigid origami, we determine which monohedral quadrilateral tilings of the plane are uniquely selffoldable. In particular, the Miuraori and Chicken Wire patterns are not selffoldable under our definition, but such tilings that are rotationallysymmetric about the midpoints of the tile are uniquely selffoldable. 
On Conjectural Rank Parities of Quartic and Sextic Twists of Elliptic Curves. (arXiv:1809.04244v1 [math.NT]) Cache Translate Page 
Authors: Matthew Weidner We study the behavior under twisting of the Selmer rank parities of a selfdual primedegree isogeny on a principally polarized abelian variety defined over a number field, subject to compatibility relations between the twists and the isogeny. In particular, we study isogenies on abelian varieties whose Selmer rank parities are related to the rank parities of elliptic curves with $j$invariant 0 or 1728, assuming the ShafarevichTate conjecture. Using these results, we show how to classify the conjectural rank parities of all quartic or sextic twists of an elliptic curve defined over a number field, after a finite calculation. This generalizes previous results of Hadian and Weidner on the behavior of $p$Selmer ranks under $p$twists. 
Limit theorems for the minimal position of a branching random walk in random environment. (arXiv:1809.04245v1 [math.PR]) Cache Translate Page 
Authors: Wenming Hong, Xiaoyue Zhang We consider a branching system of random walk in random environment (in location) in $\mathbb{N}$. We will give the exact limit value of $\frac{M_{n}}{n}$, where $M_{n}$ denotes the minimal position of branching random walk at time $n$. A key step in the proof is to transfer our branching random walks in random environment (in location) to branching random walks in random environment (in time), by use of Bramson's "branching processes within a branching process" . 
Weight filtrations on GKZsystems. (arXiv:1809.04247v1 [math.AG]) Cache Translate Page 
Authors: Thomas Reichelt, Uli Walther If $\beta\in\CC^d$ is integral but not a strongly resonant parameter for the homogeneous matrix $A\in\ZZ^{d\times n}$ with $\ZZ A=\ZZ^d$, then the associated GKZsystem carries a naturally defined mixed Hodge module structure. We study here in the normal case the corresponding weight filtration by computing the intersection complexes with respective multiplicities on the associated graded parts. We do this by computing the weight filtration of a GaussManin system with respect to a locally closed embedding of a torus inside an affine space. Our results show that these data, which we express in terms of intersection cohomology groups on induced toric varieties, are purely combinatorial, and not arithmetic, in the sense that they only depend on the polytopal structure of the cone of $A$ but not on the semigroup itself. As a corollary we get a purely combinatorial formula for the length of the underlying (regular) holonomic $D$module, irrespective of homogeneity. In dimension up to three, and for simplicial semigroups, we give explicit generators of the weight filtration. 
A Fast Globally Linearly Convergent Algorithm for the Computation of Wasserstein Barycenters. (arXiv:1809.04249v1 [math.OC]) Cache Translate Page 
Authors: Lei Yang, Jia Li, Defeng Sun, KimChuan Toh In this paper, we consider the problem of computing a Wasserstein barycenter for a set of discrete probability distributions with finite supports, which finds many applications in different areas such as statistics, machine learning and image processing. When the support points of the barycenter are prespecified, this problem can be modeled as a linear programming (LP), while the problem size can be extremely large. To handle this largescale LP, in this paper, we derive its dual problem, which is conceivably more tractable and can be reformulated as a wellstructured convex problem with 3 kinds of block variables and a coupling linear equality constraint. We then adapt a symmetric GaussSeidel based alternating direction method of multipliers (sGSADMM) to solve the resulting dual problem and analyze its global convergence as well as its global linear convergence rate. We also show how all the subproblems involved can be solved exactly and efficiently. This makes our method suitable for computing a Wasserstein barycenter on a large dataset. In addition, our sGSADMM can be used as a subroutine in an alternating minimization method to compute a barycenter when its support points are not prespecified. Numerical results on synthetic datasets and image datasets demonstrate that our method is more efficient for solving largescale problems, comparing with two existing representative methods and the commercial software Gurobi. 
On the convergence rate improvement of a splitting method for finding the resolvent of the sum of maximal monotone operators. (arXiv:1809.04250v1 [math.OC]) Cache Translate Page 
Authors: Shinya Matsushita This paper provides a new way of developing the splitting method which is used to solve the problem of finding the resolvent of the sum of maximal monotone operators in Hilbert spaces. By employing accelerated techniques developed by Davis and Yin (in SetValued Var. Anal. 25(4):829858, 2017), this paper presents an implementable, strongly convergent splitting method which is designed to solve the problem. In particular, we show that the distance between the sequence of iterates and the solution converges to zero at a rate O(1/k) to illustrate the efficiency of the proposed method, where k is the number of iterations. Then, we apply the result to a class of optimization problems. 
Large time behavior of ODE type solutions to nonlinear diffusion equations. (arXiv:1809.04252v1 [math.AP]) Cache Translate Page 
Authors: Junyong Eom, Kazuhiro Ishige Consider the Cauchy problem for a nonlinear diffusion equation \begin{equation} \tag{P} \left\{ \begin{array}{ll} \partial_t u=\Delta u^m+u^\alpha & \quad\mbox{in}\quad{\bf R}^N\times(0,\infty),\\ u(x,0)=\lambda+\varphi(x)>0 & \quad\mbox{in}\quad{\bf R}^N, \end{array} \right. \end{equation} where $m>0$, $\alpha\in(\infty,1)$, $\lambda>0$ and $\varphi\in BC({\bf R}^N)\,\cap\, L^r({\bf R}^N)$ with $1\le r<\infty$ and $\inf_{x\in{\bf R}^N}\varphi(x)>\lambda$. Then the positive solution to problem (P) behaves like a positive solution to ODE $\zeta'=\zeta^\alpha$ in $(0,\infty)$ and it tends to $+\infty$ as $t\to\infty$. In this paper we obtain the precise description of the large time behavior of the solution and reveal the relationship between the behavior of the solution and the diffusion effect the nonlinear diffusion equation has. 
Free Pseudodistance Growth Rates for Spatially Coupled LDPC Codes over the BEC. (arXiv:1809.04253v1 [cs.IT]) Cache Translate Page 
Authors: Cunlu Zhou, David G. M. Mitchell, Roxana Smarandache The minimum pseudoweight is an important parameter related to the decoding performance of LDPC codes with iterative messagepassing decoding. In this paper, we consider ensembles of periodically timevarying spatially coupled LDPC (SCLDPC) codes and the pseudocodewords arising from their finite graph covers of a fixed degree. We show that for certain $(J,K)$regular SCLDPC code ensembles and a fixed cover degree, the typical minimum pseudoweight of the unterminated (and associated tailbiting/terminated) SCLDPC code ensembles grows linearly with the constraint (block) length as the constraint (block) length tends to infinity. We prove that one can bound the the free pseudodistance growth rate over a BEC from below (respectively, above) using the associated tailbiting (terminated) SCLDPC code ensemble and show empirically that these bounds coincide for a sufficiently large period, which gives the exact free pseudodistance growth rate for the SCLDPC ensemble considered. 
Efficiency and detectability of random reactive jamming in carrier sense wireless networks. (arXiv:1809.04263v1 [cs.IT]) Cache Translate Page 
Authors: Ni An, Steven Weber A natural basis for the detection of a wireless random reactive jammer (RRJ) is the perceived violation by the detector (typically located at the access point (AP)) of the carrier sensing protocol underpinning many wireless random access protocols (e.g., WiFi). Specifically, when the wireless medium is perceived by a station to be busy, a carrier sensing compliant station will avoid transmission while a RRJ station will often initiate transmission. However, hidden terminals (HTs), i.e., activity detected by the AP but not by the sensing station, complicate the use of carrier sensing as the basis for RRJ detection since they provide plausible deniability to a station suspected of being an RRJ. The RRJ has the dual objectives of avoiding detection and effectively disrupting communication, but there is an inherent performance tradeoff between these two objectives. In this paper we capture the behavior of both the RRJ and the compliant stations via a parsimonious Markov chain model, and pose the detection problem using the framework of Markov chain hypothesis testing. Our analysis yields the receiver operating characteristic of the detector, and the optimized behavior of the RRJ. While there has been extensive work in the literature on jamming detection, our innovation lies in leveraging carrier sensing as a natural and effective basis for detection. 
Scalable Computation of 2DMinkowski Sum of Arbitrary NonConvex Domains: Modeling Flexibility in Energy Resources. (arXiv:1809.04265v1 [math.OC]) Cache Translate Page 
Authors: Soumya Kundu, Vikas Chandan, Karan Kalsi The flexibility of active ($p$) and reactive power ($q$) consumption in distributed energy resources (DERs) can be represented as a (potentially nonconvex) set of points in the $p$$q$ plane. Modeling of the aggregated flexibility in a heterogeneous ensemble of DERs as a Minkowski sum (Msum) is computationally intractable even for moderately sized populations. In this article, we propose a scalable method of computing the Msum of the flexibility domains of a heterogeneous ensemble of DERs, which are allowed to be nonconvex, noncompact. In particular, the proposed algorithm computes a guaranteed superset of the true Msum, with desired accuracy. The worstcase complexity of the algorithm is computed. Special cases are considered, and it is shown that under certain scenarios, it is possible to achieve a complexity that is linear with the size of the ensemble. Numerical examples are provided by computing the aggregated flexibility of different mix of DERs under varying scenarios. 
A Singular Integral Measure for $C^{1,1}$ and $C^1$ Boundaries. (arXiv:1809.04266v1 [math.CA]) Cache Translate Page 
Authors: Laramie Paxton, Kevin R. Vixie The art of analysis involves the subtle combination of approximation, inequalities, and geometric intuition as well as being able to work at different scales. With this subtlety in mind, we present this paper in a manner designed for wide accessibility for both advanced undergraduate students and graduate students. The main results include a singular integral for measuring the level sets of a $C^{1,1}$ function mapping from $\mathbb{R}^n$ to $\mathbb{R}$, that is, one whose derivative is Lipschitz continuous. We extend this to measure embedded submanifolds in $\mathbb{R}^2$ that are merely $C^1$ using the distance function and provide an example showing that the measure does not hold for general rectifiable boundaries. 
Convex domain which tiles space by translation,with multiplicity. (arXiv:1809.04272v1 [math.MG]) Cache Translate Page 
Authors: Qi Yang This paper shows that a multiple translative tile in the plane must be a multiple lattice tile. 
Prediction outofsample using block shrinkage estimators: model selection and predictive inference. (arXiv:1809.04275v1 [math.ST]) Cache Translate Page 
Authors: Hannes Leeb, Nina Senitschnig In a linear regression model with random design, we consider a family of candidate models from which we want to select a `good' model for prediction outofsample. We fit the models using block shrinkage estimators, and we focus on the challenging situation where the number of explanatory variables can be of the same order as sample size and where the number of candidate models can be much larger than sample size. We develop an estimator for the outofsample predictive performance, and we show that the empirically best model is asymptotically as good as the truly best model. Using the estimator corresponding to the empirically best model, we construct a prediction interval that is approximately valid and short with high probability, i.e., we show that the actual coverage probability is close to the nominal one and that the length of this prediction interval is close to the length of the shortest but infeasible prediction interval. All results hold uniformly over a large class of datagenerating processes. These findings extend results of Leeb (2009), where the models are fit using leastsquares estimators, and of Huber (2013), where the models are fit using shrinkage estimators without block structure. 
Classes of graphs with no long cycle as a vertexminor are polynomially $\chi$bounded. (arXiv:1809.04278v1 [math.CO]) Cache Translate Page 
Authors: Ringi Kim, Ojoung Kwon, Sangil Oum, Vaidy Sivaraman A class $\mathcal G$ of graphs is $\chi$bounded if there is a function $f$ such that for every graph $G\in \mathcal G$ and every induced subgraph $H$ of $G$, $\chi(H)\le f(\omega(H))$. In addition, we say that $\mathcal G$ is polynomially $\chi$bounded if $f$ can be taken as a polynomial function. We prove that for every integer $n\ge3$, there exists a polynomial $f$ such that $\chi(G)\le f(\omega(G))$ for all graphs with no vertexminor isomorphic to the cycle graph $C_n$. To prove this, we show that if $\mathcal G$ is polynomially $\chi$bounded, then so is the closure of $\mathcal G$ under taking the $1$join operation. 
Equidistributions of Jacobi sums. (arXiv:1809.04286v1 [math.NT]) Cache Translate Page 
Authors: Ping Xi Let $\mathbf{F}_q$ be a finite field of $q$ elements. We show that the normalized Jacobi sum $J(\chi,\eta)/\sqrt{q}$, for each fixed nontrivial multiplicative character $\eta$, becomes equidistributed in the unit circle as $q\rightarrow+\infty,$ when $\chi$ runs over all nontrivial multiplicative characters different from $\eta^{1}.$ Previously, the similar equidistribution was obtained by Katz and Zheng by varying both of $\chi$ and $\eta$. On the other hand, we also obtain the equidistribution of $J(\chi,\eta)$ as $(\chi,\eta)$ runs over $\mathcal{X}\times\mathcal{Y}\subseteq(\widehat{\mathrm{F}^*})^2$, as long as $\mathcal{X}>q^{\frac{1}{2}+\varepsilon}$ and $\mathcal{Y}>q^\varepsilon$ for any $\varepsilon>0$. This updates a recent work of Lu, Zheng and Zheng, who require $\mathcal{X}\mathcal{Y}>q\log^2q.$ The main ingredient is the estimate for hypergeometric sums due to Katz. 
On symplectic resolutions and factoriality of Hamiltonian reductions. (arXiv:1809.04301v1 [math.AG]) Cache Translate Page 
Authors: Gwyn Bellamy, Travis Schedler Recently, HerbigSchwarzSeaton have shown that $2$large representations of a reductive group $G$ give rise to a large class of symplectic singularities via Hamiltonian reduction. We show that these singularities are always terminal. We show that they are $\mathbb{Q}$factorial if and only if $G$ has finite abelianization. When $G$ is connected and semisimple, we show they are actually locally factorial. As a consequence, the symplectic singularities do not admit symplectic resolutions when $G$ is semisimple. We end with some open questions. 
Power values of sums of certain products of consecutive integers and related results. (arXiv:1809.04304v1 [math.NT]) Cache Translate Page 
Authors: Szabolcs Tengely, Maciej Ulas Let $n$ be a nonnegative integer and put $p_{n}(x)=\prod_{i=0}^{n}(x+i)$. In the first part of the paper, for given $n$, we study the existence of integer solutions of the Diophantine equation $$ y^m=p_{n}(x)+\sum_{i=1}^{k}p_{a_{i}}(x), $$ where $m\in\N_{\geq 2}$ and $a_{1}<a_{2}<\ldots <a_{k}<n$. This equation can be considered as a generalization of the Erd\H{o}sSelfridge Diophantine equation $y^m=p_{n}(x)$. We present some general finiteness results concerning the integer solutions of the above equation. In particular, if $n\geq 2$ with $a_{1}\geq 2$, then our equation has only finitely many solutions in integers. In the second part of the paper we study the equation $$ y^m=\sum_{i=1}^{k}p_{a_{i}}(x_{i}), $$ for $m=2, 3$, which can be seen as an additive version of the equation considered by Erd\H{o}s and Graham. In particular, we prove that if $m=2, a_{1}=1$ or $m=3, a_{2}=2$, then for each $k1$ tuple of positive integers $(a_{2},\ldots, a_{k})$ there are infinitely many solutions in integers. 
On Kn\"orrer periodicity for quadric hypersurfaces in skew projective spaces. (arXiv:1809.04305v1 [math.RA]) Cache Translate Page 
Authors: Kenta Ueyama We study the structure of the stable category $\mathsf{\underline{CM}}^{\mathbb Z}(S/(f))$ of graded maximal CohenMacaulay module over $S/(f)$ where $S$ is a graded ($\pm 1$)skew polynomial algebra in $n$ variables of degree 1, and $f =x_1^2 + \cdots +x_n^2$. If $S$ is commutative, then the structure of $\mathsf{\underline{CM}}^{\mathbb Z}(S/(f))$ is wellknown by Kn\"orrer's periodicity theorem. We prove in this paper that if $n\leq 5$, then the structure of $\mathsf{\underline{CM}}^{\mathbb Z}(S/(f))$ is determined by the number of irreducible components of the point scheme of $S$ which are isomorphic to ${\mathbb P}^1$. 
Filippov trajectories and clustering in the Kuramoto model with singular couplings. (arXiv:1809.04307v1 [math.AP]) Cache Translate Page 
Authors: Jinyeong Park, David Poyato, Juan Soler We study the synchronization of a generalized Kuramoto system in which the coupling weights are determined by the phase differences between oscillators. We employ the fastlearning regime in a Hebbianlike plasticity rule so that the interaction between oscillators is enhanced by the approach of phases. First, we study the wellposedness problem for the singular weighted Kuramoto systems in which the Lipschitz continuity is deprived. We present the dynamics of the system equipped with singular weights in all the subcritical, critical and supercritical regimes of the singularity. A key fact is that solutions in the most singular cases must be considered in Filippov's sense. We characterize sticking of phases in the subcritical and critical case and we exhibit a continuation criterion of classical solutions after any collision state in the supercritical regime. Second, we prove that strong solutions to these systems of differential inclusions can be recovered as singular limits of regular weights. We also provide the emergence of synchronous dynamics for the singular and regular weighted Kuramoto models. 
The breadthdegree type of a finite $p$group. (arXiv:1809.04308v1 [math.GR]) Cache Translate Page 
Authors: Norberto Gavioli, Valerio Monti We determine an upper bound for the size of a stem $p$group in terms of its breadth and its maximum character degree. 
Fourth order finite difference methods for the wave equation with mesh refinement interfaces. (arXiv:1809.04310v1 [math.NA]) Cache Translate Page 
Authors: Siyang Wang, N. Anders Petersson We analyze two types of summationbyparts finite difference operators for solving the twodimensional wave equation on a grid with a mesh refinement interface. The first type uses ghost points, while the second type does not use any ghost points. A previously unexplored relation between the two types of summationbyparts operators is investigated. By combining them we develop a new fourth order accurate finite difference discretization for the wave equation with hanging nodes on the mesh refinement interface. Compared to previous approaches using ghost points, the proposed method leads to a smaller system of linear equations that needs to be solved for the ghost point values. An attractive feature of the proposed method is that the explicit time step does not need to be reduced relative to the corresponding periodic problem. Numerical experiments, both for smoothly varying and discontinuous material properties, demonstrate that the proposed method converges to fourth order accuracy. A detailed comparison of the accuracy and the timestep restriction of the simultaneousapproximationterm penalty method is also presented. 
Some breathers and multibreathers for FPUtype chains. (arXiv:1809.04311v1 [math.DS]) Cache Translate Page 
Authors: Gianni Arioli, Hans Koch We consider several breather solutions for FPUtype chains that have been found numerically. Using computerassisted techniques, we prove that there exist true solutions nearby, and in some cases, we determine whether or not the solution is spectrally stable. Symmetry properties are considered as well. In addition, we construct solutions that are close to (possibly infinite) sums of breather solutions. 
On the number of increasing trees with label repetitions. (arXiv:1809.04314v1 [math.CO]) Cache Translate Page 
Authors: Olivier Bodini, Antoine Genitrini, Bernhard Gittenberger In this paper we study a special subclass of monotonically labeled increasing trees: each sequence of labels from the root to any leaf is strictly increasing and each integer between $1$ and $k$ must appear in the tree, where $k$ is the largest label. The main difference with the classical model of binary increasing tree is that the same label can appear in distinct branches of the tree. Such a class of trees can be used in order to model population evolution processes or concurrent processes. A specificity of such trees is that they are built through an evolution process that induces ordinary generating functions. Finally, we solve the nice counting problem for these trees of size $n$ and observe interesting asymptotics involving powers of $n$ with irrational exponents. 
On superspecial abelian surfaces and type numbers of totally definite quaternion algebras. (arXiv:1809.04316v1 [math.NT]) Cache Translate Page 
Authors: Jiangwei Xue, ChiaFu Yu In this paper we determine the number of endomorphism rings of superspecial abelian surfaces over a field $\mathbb{F}_q$ of odd degree over $\mathbb{F}_p$ in the isogeny class corresponding to the Weil $q$number $\pm\sqrt{q}$. This extends earlier works of T.C. Yang and the present authors on the isomorphism classes of these abelian surfaces, and also generalizes the classical formula of Deuring for the number of endomorphism rings of supersingular elliptic curves. Our method is to explore the relationship between the type and class numbers of the quaternion orders concerned. We study the Picard group action of the center of an arbitrary $\mathbb{Z}$order in a totally definite quaternion algebra on the ideal class set of said order, and derive an orbit number formula for this action. This allows us to prove an integrality assertion of Vign\'eras [Enseign. Math. (2), 1975] as follows. Let $F$ be a totally real field of even degree over $\mathbb{Q}$, and $D$ be the (unique up to isomorphism) totally definite quaternion $F$algebra unramified at all finite places of $F$. Then the quotient $h(D)/h(F)$ of the class numbers is an integer. 
On the status of expansion by regions. (arXiv:1809.04325v1 [hepth]) Cache Translate Page 
Authors: Tatiana Yu. Semenova, Alexander V. Smirnov, Vladimir A. Smirnov We discuss the status of expansion by regions, i.e. a wellknown strategy to obtain an expansion of a given multiloop Feynman integral in a given limit where some kinematic invariants and/or masses have certain scaling measured in powers of a given small parameter. Using the LeePomeransky parametric representation, we formulate the corresponding prescriptions in a simple geometrical language and make a conjecture that they hold even in a much more general case. We prove this conjecture in some partial cases and illustrate them in a simple example. 
PrivacyUtility Management of Hypothesis Tests. (arXiv:1809.04329v1 [cs.IT]) Cache Translate Page 
Authors: Zuxing Li, Tobias J. Oechtering The tradeoff of hypothesis tests on the correlated privacy hypothesis and utility hypothesis is studied. The error exponent of the Bayesian composite hypothesis test on the privacy or utility hypothesis can be characterized by the corresponding minimal Chernoff information rate. An optimal management protects the privacy by minimizing the error exponent of the privacy hypothesis test and meanwhile guarantees the utility hypothesis testing performance by satisfying a lower bound on the corresponding minimal Chernoff information rate. The asymptotic minimum error exponent of the privacy hypothesis test is shown to be characterized by the infimum of corresponding minimal Chernoff information rates subject to the utility guarantees. 
Adaptive NewtonType Schemes Based on Projections. (arXiv:1809.04337v1 [math.NA]) Cache Translate Page 
Authors: Mario Amrein In this work we present and discuss a possible globalization concept for Newtontype methods. We consider nonlinear problems $f(x)=0$ in $\mathbb{R}^{n}$ using the concepts from ordinary differential equations as a basis for the proposed numerical solution procedure. Thus, the starting point of our approach is within the framework of solving ordinary differential equations numerically. Accordingly, we are able to reformulate general Newtontype iteration schemes using an adaptive step size control procedure. In doing so, we derive and discuss a discrete adaptive solution scheme thereby trying to mimic the underlying continuous problem numerically without losing the famous quadratic convergence regime of the classical Newton method in a vicinity of a regular solution. The derivation of the proposed adaptive iteration scheme relies on a simple orthogonal projection argument taking into account that, sufficiently close to regular solutions, the vector field corresponding to the Newton scheme is approximately linear. We test and exemplify our adaptive rootfinding scheme using a few lowdimensional examples. Based on the presented examples, we finally show some performance data. 
On framed simple purely real Hurwitz numbers. (arXiv:1809.04340v1 [math.AG]) Cache Translate Page 
Authors: Maxim Kazarian, Sergey Lando, Sergey Natanzon We present a study of real Hurwitz numbers enumerating a special kind of real meromorphic functions, which we call simple framed purely real functions. We deduce partial differential equations of cutandjoin type for generating functions for these numbers. We also construct a topological field theory for them. 
An asymptotic expansion for the error term in the BrentMcMillan algorithm for Euler's constant. (arXiv:1809.04342v1 [math.CA]) Cache Translate Page 
Authors: R B Paris The BrentMcMillan algorithm is the fastest known procedure for the highprecision computation of Euler's constant $\gamma$ and is based on the modified Bessel functions $I_0(2x)$ and $K_0(2x)$. An error estimate for this algorithm relies on the optimally truncated asymptotic expansion for the product $I_0(2x) K_0(2x)$ when $x$ assumes large positive integer values. An asymptotic expansion for this optimal error term is derived by exploiting the techniques developed in hyperasymptotics, thereby enabling more precise information on the error term than recently obtained bounds and estimates. 
Selfadjoint local boundary problems on compact surfaces. II. Family index. (arXiv:1809.04353v1 [mathph]) Cache Translate Page 
Authors: Marina Prokhorova The paper deals with first order formally selfadjoint elliptic differential operators on a smooth compact oriented surface with nonempty boundary. We consider such operators with selfadjoint elliptic local boundary conditions. The paper is focused on families of such operators parametrized by points of a compact topological space $X$. The first result of the paper is the computation of the $K^1(X)$valued index for such families in terms of the topological data over the boundary. The second result is universality of the index: we show that the index is a universal additive homotopy invariant for such families, if the vanishing on families of invertible operators is required. 
Robust Beamforming for AN Aided MISO SWIPT System with Unknown Eavesdroppers and Nonlinear EH Model. (arXiv:1809.04354v1 [cs.IT]) Cache Translate Page 
Authors: Miao Zhang, Kanapathippillai Cumanan, Lei Ni, Hang Hu Alister G. Burr, Zhiguo Ding This work studies a beamforming design for downlink transmission of a multiuser multipleinput singleoutput (MISO) system where each legitimate user employs a power splitting (PS) based simultaneous wireless information and power transfer (SWIPT) technique. The transmitter intends to send confidential information to its legitimate users in the presence of purely unknown eavesdroppers. Since the transmitter does not have any knowledge of the eavesdroppers' channel state information (CSI), we consider an artificial noise (AN) approach to establishing secure communication. This beamforming design is developed by maximizing the AN power to interfere with the eavesdropper as much as possible. Based on the assumption of imperfect CSI of legitimate users at the transmitter, two robust design approaches for the joint beamforming and PS ratio have been studied to maximize the AN power under both energy harvesting (EH) and signaltointerferenceplusnoise ratio (SINR) requirements at each legitimate user. In the first robust design, we consider the bounded channel uncertainties, and employ semidefinite relaxation (SDR) and a linear matrix inequality (LMI) representation to transform the original problem into a semidefinite program (SDP). In the second robust design, we consider the statistical channel uncertainties, and show that the proposed problem can be reformulated into another form of SDP through both SDR and Bernsteintype inequality. In addition, the nonlinear energy harvesting (EH) model is incorporated in this work as it could reflect the characteristics of practical radio frequency(RF)EH conversion circuit. Simulation results have been provided to demonstrate the performance of our proposed robust designs. 
Optimality conditions and complete description of polytopes in combinatorial optimization. (arXiv:1809.04363v1 [math.OC]) Cache Translate Page 
Authors: Alexey Antonov A combinatorial optimization problem (COP) has a finite groundset $E(\leftE\right=N$), a weight vector $c=\left(c^e:e\in E\right)$ and a family $T\in E$ of feasible subsets with objective to find $t\in T$ with maximal weight: ${max}\{\sum_{e\in t}c^e$: $t\in T\}$. Polyhedral combinatorics reformulates combinatorial optimization as linear program: $T$ is mapped into the set $X\in R^N$ of 0/1 incidence vectors and $c\in R^N$ is maximized over the convex hull of $X$: ${max}\{cx: x\in conv(X)\}$. In theory, complementary slackness conditions for the induced linear program provide optimality conditions for the COP. However, in general case, optimality conditions for combinatorial optimization have not been formulated analytically as for many problems complete description of the induced polytopes is available only as a convex hull of extreme points rather than a system of linear inequalities. Here, we formulate optimality conditions for a COP in general case: $x_k\in X\ \ $is optimal if and only if $c\in cone\left(H_k\right)\ $ where $H_k$ $=\{h\in V:\ {hx}_k\ \ge hx$ for all $x\in X\}$ and $V$ is the set of all 1/0/1 valued vectors in $R^N$. This provides basis to get, in theory, a complete description of a combinatorial polytope induced by any COP: all facet inducing inequalities for $conv(X)$ can be written as $hx\le l$ where $h\in V$ and $l$ is integer. A vector $h\in V$ induces a nonredundent facet if and only if $h\in H_k^o$ $\in H_k$ for at least one $x_k\in X\ $(where $H_k^o$$=\{h\in H_k:h\notin cone(H_k\setminus \{h\})\}$ ) and $l=\ $ $x_kh$. 
Nonequilibrium fluctuations for the SSEP with a slow bond. (arXiv:1809.04367v1 [math.PR]) Cache Translate Page 
Authors: Dirk Erhard, Tertuliano Franco, Patrícia Gonçalves, Adriana Neumann, Mariana Tavares We prove the nonequilibrium fluctuations for the onedimensional symmetric simple exclusion process with a slow bond. This generalizes a result of T. Franco, A. Neumann and P. Gon\c{c}alves (2013), which dealt with the equilibrium fluctuations. The foundation stone of our proof is a precise estimate on the correlations of the system, and that is by itself one of the main novelties of this paper. To obtain these estimates, we first deduce a spatially discrete PDE for the covariance function and we relate it to the local times of a random walk in a nonhomogeneous environment via Duhamel's principle. Projection techniques and coupling arguments reduce the analysis to the problem of studying the local times of the classical random walk. We think that the method developed here can be applied to a variety of models, and we provide a discussion on this matter. 
Symmetries of special 2flags. (arXiv:1809.04368v1 [math.DG]) Cache Translate Page 
Authors: Piotr Mormul, Fernand Pelletier This work is a continuation of authors' research interrupted in the year 2010. Derived are recursive relations describing for the first time all infinitesimal symmetries of special 2flags (sometimes also misleadingly called `Goursat 2flags'). When algorithmized to the software level, they will give an answer filling in the gap in knowledge as of 2010: on one side the local finite classification of special 2flags known in lengths not exceeding four, on the other side the existence of a continuous numerical modulus of that classification in length seven. 
Thick points of random walk and the Gaussian free field. (arXiv:1809.04369v1 [math.PR]) Cache Translate Page 
Authors: Antoine Jego We consider the thick points of random walk, i.e. points where the local time is a fraction of the maximum. In two dimensions, we answer a question of Dembo, Peres, Rosen and Zeitouni and compute the number of thick points of planar random walk, assuming that the increments are symmetric and have a finite moment of order two. The proof provides a streamlined argument based on the connection to the Gaussian free field and works in a very general setting including isoradial graphs. In higher dimensions, we study the scaling limit of the thick points. In particular, we show that the rescaled number of thick points converges to a nondegenerate random variable and that the centered maximum of the local times converges to a randomly shifted Gumbel distribution. 
Global smoothness for a 1D supercritical transport model with nonlocal velocity. (arXiv:1809.04373v1 [math.AP]) Cache Translate Page 
Authors: Lucas C. F. Ferreira, Valter V. C. Moitinho We are concerned with a nonlocal transport 1Dmodel with supercritical dissipation $\gamma\in(0,1)$ in which the velocity is coupled via the Hilbert transform. This model arises in fluid mechanics linked to vortexsheet problems, and as a lower dimensional model for the 2D dissipative quasigeostrophic equation. It is known that solutions can blow up in finite time when $\gamma\in(0,1/2)$ . On the other hand, in the supercritical subrange $\gamma\in\lbrack1/2,1)$ it is an open problem to know whether solutions are globally regular, as stated by Kiselev (2010). We show global smoothness of solutions in a supercritical subrange (close to 1) that depends on the nonnegative initial data. More precisely, for each smooth nonnegative initial data (without smallness condition) the model has a unique global smooth solution provided that $\gamma\in\lbrack\gamma_{1},1)$, where $\gamma_{1}$ depends on the initial data size. Our approach is inspired on that of Coti Zelati and Vicol (2016). 
Binary MDS Array Codes with Optimal Repair. (arXiv:1809.04380v1 [cs.IT]) Cache Translate Page 
Authors: Hanxu Hou, Patrick P. C. Lee Consider a binary maximum distance separate (MDS) array code composed of an $m\times (k+r)$ array of bits with $k$ information columns and $r$ parity columns, such that any $k$ out of $k+r$ columns suffice to reconstruct the $k$ information columns. Our goal is to provide {\em optimal repair access} for binary MDS array codes, meaning that the bandwidth triggered to repair any single failed information or parity column is minimized. In this paper, we propose a generic transformation framework for binary MDS array codes, using EVENODD codes as a motivating example, to support optimal repair access for $k+1\le d \le k+r1$, where $d$ denotes the number of nonfailed columns that are connected for repair. In addition, we show that the efficient decoding property of the original EVENODD codes is maintained after transformation. Furthermore, we show how our transformation framework applies to general binary MDS array codes and enables them to support optimal repair access. 
On convergence of Chorin's projection method to a LerayHopf weak solution. (arXiv:1809.04383v1 [math.AP]) Cache Translate Page 
Authors: Hidesato Kuroki, Kohei Soga The projection method to solve the incompressible NavierStokes equations was first studied by Chorin [Math. Comp., 1969] in the framework of a finite difference method and Temam [Arch. Rational Mech. and Anal., 1969] in the framework of a finite element method. Chorin showed convergence of approximation and its error estimates in problems with the periodic boundary condition assuming existence of a $C^5$solution, while Temam demonstrated an abstract argument to obtain a LerayHopf weak solution in problems on a bounded domain with the noslip boundary condition. In the present paper, the authors extend Chorin's result with full details to obtain convergent finite difference approximation of a LerayHopf weak solution to the incompressible NavierStokes equations on a bounded domain of $\mathbb{R}^3$ with the noslip boundary condition. The results contain a new method to prove strong $L^2$convergence from weak $L^2$convergence by means of an interpolation inequality for step functions. 
Hybrid matrix compression for highfrequency problems. (arXiv:1809.04384v1 [math.NA]) Cache Translate Page 
Authors: Steffen Börm, Christina Börst Boundary element methods for the Helmholtz equation lead to large dense matrices that can only be handled if efficient compression techniques are used. Directional compression techniques can reach good compression rates even for highfrequency problems. Currently there are two approaches to directional compression: analytic methods approximate the kernel function, while algebraic methods approximate submatrices. Analytic methods are quite fast and proven to be robust, while algebraic methods yield significantly better compression rates. We present a hybrid method that combines the speed and reliability of analytic methods with the good compression rates of algebraic methods. 
On the regularconvexity of Ricci shrinker limit spaces. (arXiv:1809.04386v1 [math.DG]) Cache Translate Page 
Authors: Shaosai Huang, Yu Li, Bing Wang In this paper, we study the structure of the pointedGromovHausdorff limits of sequences of Ricci shrinkers. We define a regularsingular decomposition following the work of CheegerColding for manifolds with a uniform Ricci curvature lower bound, and prove that the regular part of any Ricci shrinker limit space is convex, inspired by ColdingNaber's original idea of parabolic smoothing of the distance functions. 
Quantum version of Wielandt's Inequality revisited. (arXiv:1809.04387v1 [math.AC]) Cache Translate Page 
Authors: Mateusz Michałek, Yaroslav Shitov Consider a linear space L of complex Ddimensional linear operators, and assume that some power L^k of L is the whole space of DxD matrices. PerezGarcia, Verstraete, Wolf and Cirac conjectured that the sequence L^1,L^2,... stablilizes after O(D^2) terms; we prove that this happens after O(D^2 log(D)) terms, improving the previously known bound of O(D^4). 
A random geometric social network with Poisson point measures. (arXiv:1809.04388v1 [math.PR]) Cache Translate Page 
Authors: Ahmed SidAli, Khader Khadraoui We formalize the problem of modeling social networks into Poisson point measures. We obtain a simple model that describes each member of the network at virtual state as a Dirac measure. We set the exact Monte Carlo scheme of this model and its representation as a stochastic process. By assuming that the spatial dependence of the kernels and rates used to build the model is bounded in some sense, we show that the size of the network remains bounded in expectation over any finite time. By assuming the compactness of the virtual space, we study the extinction and the survival properties of the network. Furthermore, we use a renormalization technique, which has the effect that the density of the network population must grow to infinity, to prove that the rescaled network converges in law towards the solution of a deterministic equation. Finally, we use our algorithm for some numerical simulations. 
Induced path factors of regular graphs. (arXiv:1809.04394v1 [math.CO]) Cache Translate Page 
Authors: Saieed Akbari, Daniel Horsley, Ian M. Wanless An induced path factor of a graph $G$ is a set of induced paths in $G$ with the property that every vertex of $G$ is in exactly one of the paths. The induced path number $\rho(G)$ of $G$ is the minimum number of paths in an induced path factor of $G$. We show that if $G$ is a connected cubic graph on $n>6$ vertices, then $\rho(G)\le(n1)/3$. Fix an integer $k\ge3$. For each $n$, define $\mathcal{M}_n$ to be the maximum value of $\rho(G)$ over all connected $k$regular graphs $G$ on $n$ vertices. As $n\rightarrow\infty$ with $nk$ even, we show that $c_k=\lim(\mathcal{M}_n/n)$ exists. We prove that $5/18\le c_3\le1/3$ and $3/7\le c_4\le1/2$ and that $c_k=\frac12O(k^{1})$ for $k\rightarrow\infty$. 
Finding Cheeger Cuts in Hypergraphs via Heat Equation. (arXiv:1809.04396v1 [cs.DS]) Cache Translate Page 
Authors: Masahiro Ikeda, Atsushi Miyauchi, Yuuki Takai, Yuichi Yoshida Cheeger's inequality states that a tightly connected subset can be extracted from a graph $G$ using an eigenvector of the normalized Laplacian associated with $G$. More specifically, we can compute a subset with conductance $O(\sqrt{phi_G})$, where $\phi_G$ is the minimum conductance of a set in $G$. It has recently been shown that Cheeger's inequality can be extended to hypergraphs. However, as the normalized Laplacian of a hypergraph is no longer a matrix, we can only approximate to its eigenvectors; this causes a loss in the conductance of the obtained subset. To address this problem, we here consider the heat equation on hypergraphs, which is a differential equation exploiting the normalized Laplacian. We show that the heat equation has a unique solution and that we can extract a subset with conductance $\sqrt{phi_G}$ from the solution. An analogous result also holds for directed graphs. 
Optimal Strong Convergence Rate of a Backward Euler Type Scheme for the CoxIngersollRoss Model Driven by Fractional Brownian Motion. (arXiv:1809.04398v1 [math.NA]) Cache Translate Page 
Authors: Jialin Hong, Chuying Huang, Minoo Kamrani, Xu Wang In this paper, we investigate the optimal strong convergence rate of numerical approximations for the CoxIngersollRoss model driven by fractional Brownian motion with Hurst parameter $H>1/2$. To deal with the unbounded diffusion coefficient and ensure the positivity of the numerical solution, we apply the backward Euler scheme to an auxiliary equation based on Lamperti transformation. By means of Malliavin calculus, we give the strong order one convergence for the scheme. Numerical experiments are performed to confirm the theoretical analysis. 
Torus orbifolds with two fixed points. (arXiv:1809.04402v1 [math.GT]) Cache Translate Page 
Authors: Alastair Darby, Shintaro Kuroki, Jongbaek Song The main objects of this paper are torus orbifolds that have exactly two fixed points. We study the equivariant topological type of these orbifolds and consider when we can use the results of the paper [DKS] (arXiv:1809.03678) to compute its integral equivariant cohomology, in terms of generators and relations, coming from the corresponding orbifold torus graph. 
Optimal residence time control for stochastically perturbed prescription opioid epidemic models. (arXiv:1809.04410v1 [math.OC]) Cache Translate Page 
Authors: Getachew K. Befekadu, Quanyan Zhu In this paper, we consider an optimal control problem for a prescription opioid epidemic model that describes the interaction between the regular prescription or addictive use of opioid drugs, and the process of rehabilitation and that of relapsing into opioid drug use. In particular, our interest is in the situation, where the control appearing linearly in the opioid epidemics is interpreted as the rate at which the susceptible individuals are effectively removed from the population due to an opioidrelated intervention policy or when the dynamics of the addicted is strategically influenced due to an accessible addiction treatment facility, while a small perturbing noise enters through the dynamics of the susceptible group in the population compartmental model. To this end, we introduce a mathematical apparatus that minimizes the asymptotic exitrate with which the solution for such stochastically perturbed prescription opioid epidemics exits from a given bounded open domain. Moreover, under certain assumptions, we also provide an admissible optimal Markov control for the corresponding optimal control problem that optimally effected removal of the susceptible or recovered individuals from the population dynamics. 
Infinitely divisible states on finite quantum groups. (arXiv:1809.04417v1 [math.OA]) Cache Translate Page 
Authors: Haonan Zhang In this paper we study the states of Poisson type and infinitely divisible states on compact quantum groups. Each state of Poisson type is infinitely divisible, i.e., it admits $n$th root for all $n\geq1$. The main result is that on finite quantum groups infinitely divisible states must be of Poisson type. This generalizes B\"oge's theorem concerning infinitely divisible measures (commutative case) and Parthasarathy's result on infinitely divisible positive definite functions (cocommutative case). Two proofs are given. 
Balanced Phase Field model for Active Surfaces. (arXiv:1809.04420v1 [math.OC]) Cache Translate Page 
Authors: Jozsef Molnar, Peter Horvath In this paper we present a balanced phase field model for active surfaces. This work is devoted to the generalization of the Balanced Phase Field Model for Active Contours devised to eliminate the often undesirable curvaturedependent shrinking of the zero level set while maintaining the smooth interface necessary to calculate the fundamental geometric quantities of the represented contour. As its antecedent work, the proposed model extends the GinzburgLandau phase field energy with a higher order smoothness term. The relative weights are determined with the analysis of the level set motion in a curvilinear system adapted to the zero level set. The proposed model exhibits strong shape maintaining capability without significant interference with the active (e.g. a segmentation) model. 
Fertility Numbers. (arXiv:1809.04421v1 [math.CO]) Cache Translate Page 
Authors: Colin Defant A nonnegative integer is called a fertility number if it is equal to the number of preimages of a permutation under West's stacksorting map. We prove structural results concerning permutations, allowing us to deduce information about the set of fertility numbers. In particular, the set of fertility numbers is closed under multiplication and contains every nonnegative integer that is not congruent to $3$ modulo $4$. We show that the lower asymptotic density of the set of fertility numbers is at least $1954/2565\approx 0.7618$. We also exhibit some positive integers that are not fertility numbers and conjecture that there are infinitely many such numbers. 
Inverse monoids of partial graph automorphisms. (arXiv:1809.04422v1 [math.CO]) Cache Translate Page 
Authors: Robert Jajcay, Tatiana Jajcayova, Nóra Szakács, Mária B. Szendrei A partial automorphism of a finite graph is an isomorphism between its vertex induced subgraphs. The set of all partial automorphisms of a given finite graph forms an inverse monoid under composition (of partial maps). We describe the algebraic structure of such inverse monoids by the means of the standard tools of inverse semigroup theory, namely Green's relations and some properties of the natural partial order, and give a characterization of inverse monoids which arise as inverse monoids of partial graph automorphisms. We extend our results to digraphs and edgecolored digraphs as well. 
NonScattering Energies and Transmission Eigenvalues in H^n. (arXiv:1809.04426v1 [math.AP]) Cache Translate Page 
Authors: Eemeli Blåsten, Esa V. Vesalainen We consider nonscattering energies and transmission eigenvalues of compactly supported potentials in the hyperbolic spaces $\mathbb H^n$. We prove that in $\ \mathbb H^2$ a corner bounded by two hyperbolic lines intersecting at an angle smaller than $180^\circ$ always scatters, and that one of the lines may be rep\ laced by a horocycle. In higher dimensions, we obtain similar results for corners bounded by hyperbolic hyperplanes intersecting each other pairwise orthogon\ ally, and that one of the hyperplanes may be replaced by a horosphere. The corner scattering results are contrasted by proving discreteness and existence res\ ults for the related transmission eigenvalue problems. 
Convergence of jump processes with stochastic intensity to Brownian motion with inert drift. (arXiv:1809.04428v1 [math.PR]) Cache Translate Page 
Authors: Clayton Barnes Consider a random walker on the nonnegative lattice, moving in continuous time, whose positive transition intensity is proportional to the time the walker spends at the origin. In this way, the walker is a jump process with a stochastic and adapted jump intensity. We show that, upon Brownian scaling, the sequence of such processes converges to Brownian motion with inert drift (BMID). BMID was introduced by Frank Knight in 2001 and generalized by White in 2007. This confirms a conjecture of Burdzy and White in 2008 in the onedimensional setting. 
The Simanca metric admits a regular quantization. (arXiv:1809.04431v1 [math.DG]) Cache Translate Page 
Authors: Francesco Cannas Aghedu, Andrea Loi Let $g_S$ be the Simanca metric on the blowup $\tilde{\mathbb{C}}^2$ of $\mathbb{C}^2$ at the origin. We show that $(\tilde{\mathbb{C}}^2,g_S)$ admits a regular quantization. We use this fact to prove that all coefficients in the TianYauZelditch expansion for the Simanca metric vanish and that a dense subset of $(\tilde{\mathbb{C}}^2, g_S)$ admits a Berezin quantization 
Symmetric Function Theory at the Border of A_n and C_n. (arXiv:1809.04433v1 [math.CO]) Cache Translate Page 
Authors: Graham Hawkes We relate the type $A_n$ and type $C_n$ Stanley symmetric functions, by producing a new symmetric function: Our double Stanley symmetric function gives the type $A$ case at $(\mathbf{x},\mathbf{0})$ and gives the type $C$ case at $(\mathbf{x},\mathbf{x})$ and is symmetric and Schur positive in general at $(\mathbf{x}, \mathbf{y})$ for $\omega \in A_n \subseteq C_n$. In order to produce a Schur expansion for our functions, we make two attempts to generalize EdelmanGreene to signed words. We successfully do this using a \emph{signedrecording EdelmanGreene} map. However, the dual notion of the \emph{singedinsertion EdelmanGreene} map appears a difficult task, although its possible existence leaves us with the interesting conjecture of the \emph{even} and \emph{odd} Stanley symmetric functions. 
Generalized Staircase Tableaux: Symmetry and Applications. (arXiv:1809.04434v1 [math.CO]) Cache Translate Page 
Authors: Graham Hawkes We define a number of related combinatorial objects, each of which possesses a surprising symmetry. We include several applications such as a combinatorial explanation for certain fixed points of the involution $\omega$ on the ring of symmetric functions, as well as a relationship between certain skew Schur functions and skew $Q$Schur functions. We give a $t$deformation of these $Q$Schur functions, and show that it is Schur positive, including a combinatorial description of the Schur coefficients. A corollary of our results is the equality of skew $Q$Schur functions: $Q_{\lambda+\delta/\mu + \delta}=Q_{\lambda'+\delta/\mu' + \delta}$ for $\mu \subseteq \lambda$ and $\delta=(n,\ldots,1)$ for some $n > l(\lambda)$. 
Magnustype Integrator for the Finite Element Discretization of Semilinear Parabolic nonAutonomous SPDEs Driven by multiplicative noise. (arXiv:1809.04438v1 [math.NA]) Cache Translate Page 
Authors: Antoine Tambue, Jean Daniel Mukam This paper aims to investigate numerical approximation of a general second order nonautonomous semilinear parabolic stochastic partial differential equation (SPDE) driven by multiplicative noise. Numerical approximations of autonomous SPDEs are thoroughly investigated in the literature, while the nonautonomous case is not yet understood. We discretize the nonautonomous SPDE driven by multiplicative noise by the finite element method in space and the Magnustype integrator in time. We provide a strong convergence proof of the fully discrete scheme toward the mild solution in the rootmeansquare $L^2$ norm. The result reveals how the convergence orders in both space and time depend on the regularity of the noise and the initial data. In particular, for multiplicative trace class noise we achieve convergence order $\mathcal{O}\left(h^2\left(1+\max(0,\ln\left(t_m/h^2\right)\right)+\Delta t^{1/2}\right)$. Numerical simulations to illustrate our theoretical finding are provided. 
The sharp $L^p$ Korn interpolation and second inequalities in thin domains. (arXiv:1809.04439v1 [math.AP]) Cache Translate Page 
Authors: Davit Harutyunyan In the present paper we extend the $L^2$ Korn interpolation and second inequalities in thin domains, proven in [16], to the space $L^p$ for any $1<p<\infty.$ A thin domain is roughly speaking a shell with nonconstant thickness in three dimensional Euclidean space around a smooth enough surface. The inequality holds for practically any thin domain $\Omega\subset\mathbb R^3$ and any vector field $\Bu\in W^{1,p}(\Omega).$ The constants in the estimate are asymptotically optimal in terms of the domain thickness $h.$ This in particular solves the problem of finding the asymptotics of the optimal constant in the classical Korn second inequality in $L^p$ for thin domains in terms of the domain thickness in almost full generality. The remarkable fact is that the interpolation inequality reduces the problem of estimating the gradient $\nabla\Bu$ in terms of the strain $e(\Bu)$ to the easier problem of estimating only the vector field $\Bu$, which is a KornPoincar\'e inequality. 
Synchronization of stochastic hybrid oscillators driven by a common switching environment. (arXiv:1809.04442v1 [math.PR]) Cache Translate Page 
Authors: Paul Bressloff, James MacLaurin Many systems in biology, physics and chemistry can be modeled through ordinary differential equations, which are piecewise smooth, but switch between different states according to a Markov jump process. In the fast switching limit, the dynamics converges to a deterministic ODE. In this paper we suppose that this limit ODE supports a stable limit cycle. We demonstrate that a set of such oscillators can synchronize when they are uncoupled, but they share the same switching Markov jump process. The latter is taken to represent the effect of a common randomly switching environment. We determine the leading order of the Lyapunov coefficient governing the rate of decay of the phase difference in the fast switching limit. The analysis bears some similarities to the classical analysis of synchronization of stochastic oscillators subject to common white noise. However the discrete nature of the Markov jump process raises some difficulties: in fact we find that the Lyapunov coefficient from the quasisteadystate approximation differs from the Lyapunov coefficient one obtains from a second order perturbation expansion in the waiting time between jumps. Finally, we demonstrate synchronization numerically in the radial isochron clock model and show that the latter Lyapinov exponent is more accurate. 
NonArchimedean Mathematics and the formalism of Quantum Mechanics. (arXiv:1809.04446v1 [mathph]) Cache Translate Page 
Authors: Vieri Benci This paper is divided in four parts. In the introduction, we discuss the program and the motivations of this paper. In section 2, we introduce the nonArchimedean field of Euclidean numbers E and we present a summary of the theory of {\Lambda}limits which can be considered as a different approach to nonstandard methods. In the third part (section 3), we define axiomatically the space of ultrafunctions which are a kind of generalized function based on the field of Euclidean numbers E. Finally, we describe an application of the previus theory to the formalism of classical Quantum Mecanics. 
RichardsonGaudin models and broken integrability. (arXiv:1809.04447v1 [mathph]) Cache Translate Page 
Authors: Pieter W. Claeys This thesis presents an introduction to the class of RichardsonGaudin integrable models, with special focus on the Bethe ansatz wave function, and investigates ways of applying the properties of RichardsonGaudin models both in and out of integrability. A framework is outlined for the numerical and theoretical treatment of these systems, exposing a duality allowing the Bethe equations to be solved numerically. This is extended to the calculation of inner products and correlation functions. Using this framework, the influence of particle exchange on the Bethe ansatz is discussed, after which it is shown how the Bethe ansatz is able to accurately model wave functions of nonintegrable models in two different settings. First, a variational approach is outlined for stationary models where integrabilitybreaking perturbations are explicitly introduced. Second, an alternative way of breaking integrability is through the introduction of dynamics and periodic driving, where it is shown how integrability can be used to model the resulting Floquet manybody resonances. Throughout this work, it is shown how the clearcut structure and relatively large freedom in RichardsonGaudin models makes them ideal for an investigation of the general principles of integrability, as well as being a perfect testing ground for the development of new quantum manybody techniques beyond integrability. 
What is Schur positivity and how common is it?. (arXiv:1809.04448v1 [math.CO]) Cache Translate Page 
Authors: Rebecca Patrias This is a short note about Schur positivity. We introduce Schur polynomials and explain how they appear in the representation theory of the general linear group. We end with a new result of the author with F. Bergeron and V. Reiner that gives the probability that a homogeneous symmetric polynomial with positive coefficients is Schur positive. 
RCpositivity and rigidity of harmonic maps into Riemannian manifolds. (arXiv:1809.04449v1 [math.DG]) Cache Translate Page 
Authors: Jun Wang, Xiaokui Yang In this paper, we show that every harmonic map from a compact K\"ahler manifold with uniformly RCpositive curvature to a Riemannian manifold with nonpositive complex sectional curvature is constant. In particular, there is no nonconstant harmonic map from a compact K\"ahler manifold with positive holomorphic sectional curvature to a Riemannian manifold with nonpositive complex sectional curvature. 
Global Strong Solutions to Magnetohydrodynamics with DensityDependent Viscosity and Degenerate HeatConductivity. (arXiv:1809.04451v1 [math.AP]) Cache Translate Page 
Authors: Bin Huang, Xiaoding Shi, Ying Sun We deal with the equations of a planar magnetohydrodynamic compressible flow with the viscosity depending on the specific volume of the gas and the heat conductivity proportional to a positive power of the temperature. Under the same conditions on the initial data as those of the constant viscosity and heat conductivity case ([Kazhikhov (1987)], we obtain the global existence and uniqueness of strong solutions which means no shock wave, vacuum, or mass or heat concentration will be developed in finite time, although the motion of the flow has large oscillations and the interaction between the hydrodynamic and magnetodynamic effects is complex. Our result can be regarded as a natural generalization of the Kazhikhov's theory for the constant viscosity and heat conductivity case to that of nonlinear viscosity and degenerate heatconductivity. 
Wideband mmWave Channel Estimation for Hybrid Massive MIMO with LowPrecision ADCs. (arXiv:1809.04454v1 [eess.SP]) Cache Translate Page 
Authors: Yucheng Wang, Wei Xu, Hua Zhang, Xiaohu You In this article, we investigate channel estimation for wideband millimeterwave (mmWave) massive multipleinput multipleoutput (MIMO) under hybrid architecture with lowprecision analogtodigital converters (ADCs). To design channel estimation for the hybrid structure, both analog processing components and frequencyselective digital combiners need to be optimized. The proposed channel estimator follows the typical linearminimummeansquareerror (LMMSE) structure and applies for an arbitrary channel model. Moreover, for sparsity channels as in mmWave, the proposed estimator performs more efficiently by incorporating orthogonal matching pursuit (OMP) to mitigate quantization noise caused by lowprecision ADCs. Consequently, the proposed estimator outperforms conventional ones as demonstrated by computer simulation results. 
Dynamic logic assigned to automata. (arXiv:1809.04456v1 [cs.LO]) Cache Translate Page 
Authors: Ivan Chajda, Jan Paseka A dynamic logic ${\mathbf B}$ can be assigned to every automaton ${\mathcal A}$ without regard if ${\mathcal A}$ is deterministic or nondeterministic. This logic enables us to formulate observations on ${\mathcal A}$ in the form of composed propositions and, due to a transition functor $T$, it captures the dynamic behaviour of ${\mathcal A}$. There are formulated conditions under which the automaton ${\mathcal A}$ can be recovered by means of ${\mathbf B}$ and $T$. 
Quantum chromodynamics through the geometry of M\"{o}bius structures. (arXiv:1809.04457v1 [physics.genph]) Cache Translate Page 
Authors: John Mashford This paper describes a rigorous mathematical formulation providing a divergence free framework for QCD and the standard model in curved spacetime. The starting point of the theory is the notion of covariance which is interpreted as (4D) conformal covariance rather than the general (diffeomorphism) covariance of general relativity. It is shown how the infinitesimal symmetry group (i.e. Lie algebra) of the theory, that is $su(2,2)$, is a linear direct sum of $su(3)$ and the algebra ${\mathfrak\kappa}\cong sl(2,{\bf C})\times u(1)$, these being the QCD algebra and the electroweak algebra. Fock space which is a graded algebra composed of Hilbert spaces of multiparticle states where the particles can be fermions such as quarks and electrons or bosons such as gluons or photons is described concretely. Algebra bundles whose typical fibers are the Fock spaces are defined. Scattering processes are associated with covariant linear maps between the Fock space fibers which can be generated by intertwining operators between the Fock spaces. It is shown how quarkquark scattering and gluongluon scattering are associated with kernels which generate such intertwining operators. The rest of the paper focusses on QCD vacuum polarization in order to compute and display the running coupling constant for QCD at different scales. Through an easy application of the technique called the spectral calculus the densities associated with the quark bubble and the gluon bubble are computed and hence the QCD vacuum polarization function is determined. It is found that the QCD running coupling constant has nontrivial behavior particularly at the subnuclear level. Asymptotic freedom and quark confinement are proved. 
Profinite groups with pronilpotent centralizers. (arXiv:1809.04462v1 [math.GR]) Cache Translate Page 
Authors: Pavel Shumyatsky The article deals with profinite groups in which the centralizers are pronilpotent (CNgroups). It is shown that such groups are virtually pronilpotent. More precisely, let G be a profinite CNgroup, and let F be the maximal normal pronilpotent subgroup of G. It is shown that F is open and the structure of the finite quotient G/F is described in detail. 
Arbitrarily Varying Remote Sources. (arXiv:1809.04464v1 [cs.IT]) Cache Translate Page 
Authors: Amitalok J. Budkuley, Bikash Kumar Dey, Sidharth Jaggi, Vinod M. Prabhakaran We study a lossy source coding problem for an arbitrarily varying remote source (AVRS) which was proposed in a prior work. An AVRS transmits symbols, each generated in an independent and identically distributed manner, which are sought to be estimated at the decoder. These symbols are remotely generated, and the encoder and decoder observe noise corrupted versions received through a twooutput noisy channel. This channel is an arbitrarily varying channel controlled by a jamming adversary. We assume that the adversary knows the coding scheme as well as the source data noncausally, and hence, can employ malicious jamming strategies correlated to them. Our interest lies in studying the rate distortion function for codes with a stochastic encoder, i.e, when the encoder can privately randomize while the decoder is deterministic. We provide upper and lower bounds on this rate distortion function. 
A note on deformations and mutations of fake weighted projective planes. (arXiv:1809.04470v1 [math.AG]) Cache Translate Page 
Authors: Irem Portakal It has been shown by Hacking and Prokhorov that if the projective surface X with quotient singularities and selfintersection number 9 has a smoothing to the projective plane, then X is the general fiber of a QGorenstein deformation of the weighted projective plane with weights giving solutions to the Markov equation. This result has been understood and generalized by combinatorial mutations of Fano triangles by Akhtar, Coates, Galkin, and Kasprzyk. In this note, we study this result by utilizing polarized Tvarieties and describe the associated deformation explicitly in terms of certain Minkowski summands of socalled divisorial polytopes. 
Analytic solutions of convolution equations on convex sets with a mixed structure. I. (arXiv:1809.04473v1 [math.FA]) Cache Translate Page 
Authors: S.N. Melikhov, L.V. Khanina We prove an abstract criterion that a surjective convolution operator in spaces of analytic functions on convex subsets of the complex plane has a continuous linear right inverse. Considered convex sets have a countable neighborhood basis of convex domains. The mentioned criterion is obtained in terms of the existence of a special family of subharmonic functions with global upper bounds and local lower bounds. 
Regularly Varying Random Fields. (arXiv:1809.04477v1 [math.PR]) Cache Translate Page 
Authors: Lifan Wu, Gennady Samorodnitsky We study the extremes of multivariate regularly varying random fields. The crucial tools in our study are the tail field and the spectral field, notions that extend the tail and spectral processes of Basrak and Segers (2009). The spatial context requires multiple notions of extremal index, and the tail and spectral fields are applied to clarify these notions and other aspects of extremal clusters. An important application of the techniques we develop is to the BrownResnick random fields. 
On the Fractional Landis Conjecture. (arXiv:1809.04480v1 [math.AP]) Cache Translate Page 
Authors: Angkana Rüland, JennNan Wang In this paper we study a Landistype conjecture for fractional Schr\"odinger equations of fractional power $s\in(0,1)$ with potentials. We discuss both the cases of differentiable and nondifferentiable potentials. On the one hand, it turns out for \emph{differentiable} potentials with some a priori bounds, if a solution decays at a rate $e^{x^{1+}}$, then this solution is trivial. On the other hand, for $s\in(1/4,1)$ and merely bounded \emph{nondifferentiable} potentials, if a solution decays at a rate $e^{x^\alpha}$ with $\alpha>4s/(4s1)$, then this solution must again be trivial. Remark that when $s\to 1$, $4s/(4s1)\to 4/3$ which is the optimal exponent for the standard Laplacian. For the case of nondifferential potentials and $s\in(1/4,1)$, we also derive a quantitative estimate mimicking the classical result by Bourgain and Kenig. 
Dynamic Edge Caching with Popularity Drifting. (arXiv:1809.04486v1 [cs.IT]) Cache Translate Page 
Authors: Linqi Song, Jie Xu Caching at the network edge devices such as wireless caching stations (WCS) is a key technology in the 5G network. The spatialtemporal diversity of content popularity requires different content to be cached in different WCSs and periodically updated to adapt to temporal changes. In this paper, we study how the popularity drifting speed affects the number of required broadcast transmissions by the MBS and then design coded transmission schemes by leveraging the broadcast advantage under the index coding framework. The key idea is that files already cached in WCSs, which although may be currently unpopular, can serve as side information to facilitate coded broadcast transmission for cache updating. Our algorithm extends existing index codingbased schemes from a singlerequest scenario to a multiplerequest scenario via a "dynamic coloring" approach. Simulation results indicate that a significant bandwidth saving can be achieved by adopting our scheme. 
Bounds on the expected size of the maximum agreement subtree for a given tree shape. (arXiv:1809.04488v1 [math.CO]) Cache Translate Page 
Authors: Pratik Misra, Seth Sullivant We show that the expected size of the maximum agreement subtree of two $n$leaf trees, uniformly random among all trees with the shape, is $\Theta(\sqrt{n})$. To derive the lower bound, we prove a global structural result on a decomposition of rooted binary trees into subgroups of leaves called blobs. To obtain the upper bound, we generalize a first moment argument for random tree distributions that are exchangeable and not necessarily sampling consistent. 
Global classical solutions of 3D compressible viscoelastic system near equilibrium. (arXiv:1809.04490v1 [math.AP]) Cache Translate Page 
Authors: Yi Zhu In this paper, we prove the global existence of general small solutions to compressible viscoelastic system. We remove the "initial state" assumption ($\tilde \rho_0 \det F_0 =1$) and the "divcurl" structure assumption compared with previous works. It then broadens the class of solutions to a great extent, more precisely the initial density state would not be constant necessarily, and no more structure is need for global wellposedness. It's quite different from the elasticity system in which structure plays an important role. Since we can not obtain any dissipation information for density and deformation tensor, we introduce a new effective flux in the thought of regarding the wildest "nonlinear term" as "linear term". Although the norms of solution may increase now, we can still derive the global existence for it. 
Homogenization for the Stokes equations in randomly perforated domains under almost minimal assumptions on the size of the holes. (arXiv:1809.04491v1 [math.AP]) Cache Translate Page 
Authors: Arianna Giunti, Richard M. Höfer We prove the homogenization to the Brinkman equations for the incompressible Stokes equations in a bounded domain which is perforated by a random collection of small spherical holes. The fluid satisfies a noslip boundary condition at the holes. The balls generating the holes have centres distributed according to a Poisson point process and i.i.d. unbounded radii satisfying a suitable moment condition. We stress that our assumption on the distribution of the radii does not exclude that, with overwhelming probability, the holes contain clusters made by many overlapping balls. We show that the formation of these clusters has no effect on the limit Brinkman equations. In contrast with the case of the Poisson equation studied in [A.~{Giunti}, R.~{H\"ofer}, and J.J.L. {Vel\'azquez}, \textit{Homogenization for the Poisson equation in randomly perforated domains under minimal assumptions on the size of the holes}], the incompressibility condition requires a more detailed study of the geometry of the random holes generated by the class of probability measures considered. 
The W4 method: a new multidimensional rootfinding scheme for nonlinear systems of equations. (arXiv:1809.04495v1 [cs.NA]) Cache Translate Page 
Authors: Hirotada Okawa, Kotaro Fujisawa, Yu Yamamoto, Ryosuke Hirai, Nobutoshi Yasutake, Hiroki Nagakura, Shoichi Yamada We propose a new class of method for solving nonlinear systems of equations, which, among other things,has four nice features: (i) it is inspired by the mathematical property of damped oscillators, (ii) it can be regarded as a simple extention to the NewtonRaphson(NR) method, (iii) it has the same local convergence as the NR method does, (iv) it has a significantly wider convergence region or the global convergence than that of the NR method. In this article, we present the evidence of these properties, applying our new method to some examples and comparing it with the NR method. 
Compatibility of quantum measurements and inclusion constants for the matrix jewel. (arXiv:1809.04514v1 [quantph]) Cache Translate Page 
Authors: Andreas Bluhm, Ion Nechita In this work, we establish the connection between the study of free spectrahedra and the compatibility of quantum measurements with an arbitrary number of outcomes. This generalizes previous results by the authors for measurements with two outcomes. Free spectrahedra arise from matricial relaxations of linear matrix inequalities. A particular free spectrahedron which we define in this work is the matrix jewel. We find that compatibility of arbitrary measurements corresponds to inclusion of the matrix jewel into a free spectrahedron defined by the effect operators of the measurements under study. We subsequently use this connection to bound the set of (asymmetric) inclusion constants for the matrix jewel using results from quantum information theory. Among the techniques we employ are approximate quantum cloning and mutually unbiased bases. 
On Zeros and Growth of Solutions of Second Order Linear Differential Equations. (arXiv:1809.04516v1 [math.CV]) Cache Translate Page 
Authors: Manisha Saini, Sanjay Kumar For a second order linear differential equation $f''+A(z)f'+B(z)f=0$, with $ A(z)$ and $B(z)$ being transcendental entire functions under some restriction, we have established that all nontrivial solutions are of infinite order. In addition, we have proved that these solutions have infinite number of zeros. 
KempfNess type theorems and Nahm equations. (arXiv:1809.04518v1 [math.AG]) Cache Translate Page 
Authors: Maxence Mayrand We prove a version of the affine KempfNess theorem for nonalgebraic symplectic structures and shifted moment maps, and use it to describe hyperkahler quotients of T*G, where G is a complex reductive group. 
Steklov Regularization and Trajectory Methods for Univariate Global Optimization. (arXiv:1809.04530v1 [math.OC]) Cache Translate Page 
Authors: Orhan Arıkan (1), Regina S. Burachik (2), C. Yalçın Kaya (2) ((1) Electrical and Electronics Engineering Department, Bilkent University, Bilkent, Ankara, Turkey, (2) School of Information Technology and Mathematical Sciences, University of South Australia, Mawson Lakes, Australia) We introduce a new regularization technique, using what we refer to as the Steklov regularization function, and apply this technique to devise an algorithm that computes a global minimizer of univariate coercive functions. First, we show that the Steklov regularization convexifies a given univariate coercive function. Then, by using the regularization parameter as the independent variable, a trajectory is constructed on the surface generated by the Steklov function. For monic quartic polynomials, we prove that this trajectory does generate a global minimizer. In the process, we derive some properties of quartic polynomials. Comparisons are made with a previous approach which uses a quadratic regularization function. We carry out numerical experiments to illustrate the working of the new method on polynomials of various degree as well as a nonpolynomial function. 
A coupled bulksurface model for cell polarisation. (arXiv:1809.04535v1 [qbio.CB]) Cache Translate Page 
Authors: Davide Cusseddu, Leah EdelsteinKeshet, John A. Mackenzie, Stéphanie Portet, Anotida Madzvamuse Several cellular activities, such as directed cell migration, are coordinated by an intricate network of biochemical reactions which lead to a polarised state of the cell, in which cellular symmetry is broken, causing the cell to have a well defined front and back. Recent work on balancing biological complexity with mathematical tractability resulted in the proposal and formulation of a famous minimal model for cell polarisation, known as the wave pinning model. In this study, we present a threedimensional generalisation of this mathematical framework through the maturing theory of coupled bulksurface semilinear partial differential equations in which protein compartmentalisation becomes natural. We show how a local perturbation over the surface can trigger propagating reactions, eventually stopped in a stable profile by the interplay with the bulk component. We describe the behavior of the model through asymptotic and local perturbation analysis, in which the role of the geometry is investigated. The bulksurface finite element method is used to generate numerical simulations over simple and complex geometries, which confirm our analysis, showing pattern formation due to propagation and pinning dynamics. The generality of our mathematical and computational framework allows to study more complex biochemical reactions and biomechanical properties associated with cell polarisation in multidimensions. 
Poisson brackets after Jacobi and Plucker. (arXiv:1809.04538v1 [mathph]) Cache Translate Page 
Authors: Pantelis A. Damianou We construct a symplectic realization and a bihamiltonian formulation of a 3dimensional system whose solution are the Jacobi elliptic functions. We generalize this system and the related Poisson brackets to higher dimensions. These more general systems are parametrized by lines in 3dimensional projective space. For these systems the Jacobi identity is satisfied only when the Plucker relations hold. Two of these Poisson brackets are compatible only if the corresponding lines in projective space intersect. We present several examples of such systems. 
Lugsail lag windows and their application to MCMC. (arXiv:1809.04541v1 [stat.CO]) Cache Translate Page 
Authors: Dootika Vats, James M. Flegal Lag windows are commonly used in the time series, steady state simulation, and Markov chain Monte Carlo literature to estimate the long range variances of estimators arising from correlated data. We propose a new lugsail lag window specifically designed for improved finite sample performance. We use this lag window for batch means and spectral variance estimators in Markov chain Monte Carlo simulations to obtain strongly consistent estimators that are biased from above in finite samples and asymptotically unbiased. This quality is particularly useful when calculating effective sample size and using sequential stopping rules where they help avoid premature termination. Further, we calculate the bias and variance of lugsail estimators and demonstrate that there is little loss compared to other estimators. We also show mean square consistency of these estimators under weak conditions. Finite sample properties of lugsail estimators are studied in various examples. 
Propagation of Moments and Semiclassical Limit from Hartree to Vlasov Equation. (arXiv:1809.04544v1 [math.AP]) Cache Translate Page 
Authors: Laurent Lafleche In this paper, we prove a quantitative version of the semiclassical limit from the Hartree to the Vlasov equation with singular interaction, including the Coulomb potential. To reach this objective, we also prove the propagation of velocity moments and weighted Schatten norms which implies the boundedness of the space density of particles uniformly in the Planck constant. 
Classification of Simple Cuspidal Modules over a Lattice Lie Algebra of Witt type. (arXiv:1809.04548v1 [math.RT]) Cache Translate Page 
Authors: Yuly Billig, Kenji Iohara Let $W_\pi$ be the lattice Lie algebra of Witt type associated with an additive inclusion $\pi: \mathbb{Z}^N \hookrightarrow \mathbb{C}^2$ with $N>1$. In this article, the classification of simple $\mathbb{Z}^N$graded $W_\pi$modules, whose multiplicities are uniformly bounded, is given. 
A rapid and wellconditioned algorithm for the HelmholtzHodge decomposition of vector fields on the sphere. (arXiv:1809.04555v1 [math.NA]) Cache Translate Page 
Authors: Julien Molina, Richard Mikael Slevinsky A rapid algorithm is derived for the HelmholtzHodge decomposition on the surface of the sphere in spherical coordinates. The algorithm uncouples modes of spherical harmonics with different absolute order, writes the conversion as barelyoverdetermined banded linear systems, and solves them with banded $QR$ decompositions that factor and execute in optimal complexity. Rigorous upper bounds on the $2$norm relative condition number of the banded linear systems support the observable low error growth with respect to truncation degree. 
OptimizationBased Bound Tightening using a Strengthened QCRelaxation of the Optimal Power Flow Problem. (arXiv:1809.04565v1 [math.OC]) Cache Translate Page 
Authors: Kaarthik Sundar, Harsha Nagarajan, Sidhant Misra, Mowen Lu, Carleton Coffrin, Russell Bent This article develops a strengthened convex quadratic convex (QC) relaxation of the AC Optimal Power Flow (ACOPF) problem and presents an optimizationbased boundtightening (OBBT) algorithm to compute tight, feasible bounds on the voltage magnitude variables for each bus and the phase angle difference variables for each branch in the network. Theoretical properties of the strengthened QC relaxation that show its dominance over the other variants of the QC relaxation studied in the literature are also derived. The effectiveness of the strengthened QC relaxation is corroborated via extensive numerical results on benchmark ACOPF test networks. In particular, the results demonstrate that the proposed relaxation consistently provides the tightest variable bounds and optimality gaps with negligible impacts on runtime performance. 
Stable and Unstable Vortex Knots in Excitable Media. (arXiv:1809.04567v1 [nlin.PS]) Cache Translate Page 
Authors: Jack Binysh, Carl A. Whitfield, Gareth P. Alexander We study the dynamics of knotted vortices in a bulk excitable medium using the FitzHughNagumo model. From a systematic survey of all knots of at most eight crossings we establish that the generic behaviour is of unsteady, irregular dynamics, with prolonged periods of expansion of parts of the vortex. The mechanism for the length expansion is a longrange `wave slapping' interaction, analogous to that responsible for the annihilation of small vortex rings by larger ones. We also show that there are stable vortex geometries for certain knots; in addition to the unknot, trefoil and figure eight knots reported previously, we have found stable examples of the Whitehead link and $6_2$ knot. We give a thorough characterisation of their geometry and steady state motion. For the unknot, trefoil and figure eight knots we greatly expand previous evidence that FitzHughNagumo dynamics untangles initially complex geometries while preserving topology. 
On the uniform generation of random derangements. (arXiv:1809.04571v1 [stat.CO]) Cache Translate Page 
Authors: J. R. G. Mendonça We show how to generate random derangements with the expected distribution of cycle lengths by two different techniques: random restricted transpositions and sequential importance sampling. The algorithms are simple to understand and implement and possess a performance comparable with those of currently known methods. We measure the mixing time (in the chisquare distance) of the randomized algorithm and our data indicate that $\tau_{\mathrm{mix}} \sim O(n\log{n})$, where $n$ is the size of the derangement. The sequential importance sampling algorithm generates random derangements uniformly in ${O}(n)$ time but with a small probability ${O}(1/n)$ of failing. 
Edge universality of separable covariance matrices. (arXiv:1809.04572v1 [math.PR]) Cache Translate Page 
Authors: Fan Yang In this paper, we prove the edge universality of largest eigenvalues for separable covariance matrices of the form $\mathcal Q :=A^{1/2}XBX^*A^{1/2}$. Here $X=(x_{ij})$ is an $n\times N$ random matrix with $x_{ij}=N^{1/2}q_{ij}$, where $q_{ij}$ are $i.i.d.$ random variables with zero mean and unit variance, and $A$ and $B$ are respectively $n \times n$ and $N\times N$ deterministic nonnegative definite symmetric (or Hermitian) matrices. We consider the highdimensional case, i.e. ${n}/{N}\to d \in (0, \infty)$ as $N\to \infty$. Assuming $\mathbb E q_{ij}^3=0$ and some mild conditions on $A$ and $B$, we prove that the limiting distribution of the largest eigenvalue of $\mathcal Q$ coincide with that of the corresponding Gaussian ensemble (i.e. the $\mathcal Q$ with $X$ being an $i.i.d.$ Gaussian matrix) as long as we have $\lim_{s \rightarrow \infty}s^4 \mathbb{P}(\vert q_{ij} \vert \geq s)=0$, which is a sharp moment condition for edge universality. If we take $B=I$, then $\mathcal Q$ becomes the normal sample covariance matrix and the edge universality holds true without the vanishing third moment condition. So far, this is the strongest edge universality result for sample covariance matrices with correlated data (i.e. nondiagonal $A$) and heavy tails, which improves the previous results in \cite{BPZ1,LS} (assuming high moments and diagonal $A$), \cite{Anisotropic} (assuming high moments) and \cite{DY} (assuming diagonal $A$). 
Rainbow numbers for $x_1+x_2=kx_3$ in $\mathbb{Z}_n$. (arXiv:1809.04576v1 [math.CO]) Cache Translate Page 
Authors: Erin Bevilacqua, Samuel King, Jürgen Kritschgau, Michael Tait, Suzannah Tebon, Michael Young In this work, we investigate the fewest number of colors needed to guarantee a rainbow solution to the equation $x_1 + x_2 = k x_3$ in $\mathbb{Z}_n$. This value is called the Rainbow number and is denoted by $rb(\mathbb{Z}_n, k)$ for positive integer values of $n$ and $k$. We find that $rb(\mathbb{Z}_p, 1) = 4$ for all primes greater than $3$ and that $rb(\mathbb{Z}_n, 1)$ can be deterimined from the prime factorization of $n$. Furthermore, when $k$ is prime, $rb(\mathbb{Z}_n, k)$ can be determined from the prime factorization of $n$. 
A Short Note on a Weighed Friedrich's Inequality. (arXiv:1809.04577v1 [math.AP]) Cache Translate Page 
Authors: Immanuel Anjam, Dirk Pauly In this short note we derive an upper bound for a Friedrich's type constant in a weighed Friedrich's type inequality. This upper bound generalizes a well known upper bound of the Friedrich's constant. We apply the derived upper bound in a posteriori error estimation for an elliptic problem. 
Distorting an Adversary's View in CyberPhysical Systems. (arXiv:1809.04580v1 [cs.IT]) Cache Translate Page 
Authors: Gaurav Kumar Agarwal, Mohammed Karmoose, Suhas Diggavi, Christina Fragouli, Paulo Tabuada In CyberPhysical Systems (CPSs), inference based on communicated data is of critical significance as it can be used to manipulate or damage the control operations by adversaries. This calls for efficient mechanisms for secure transmission of data since control systems are becoming increasingly distributed over larger geographical areas. Distortion based security, recently proposed as one candidate for CPSs security, is not only more appropriate for these applications but also quite frugal in terms of prior requirements on shared keys. In this paper, we propose distortionbased metrics to protect CPSs communication and show that it is possible to confuse adversaries with just a few bits of preshared keys. 
The Bernstein problem for Lipschitz intrinsic graphs in the Heisenberg group. (arXiv:1809.04586v1 [math.DG]) Cache Translate Page 
Authors: Sebastiano Nicolussi, Francesco Serra Cassano We prove that, in the first Heisenberg group $\mathbb{H}$, an entire locally Lipschitz intrinsic graph admitting vanishing first variation of its subRiemannian area and nonnegative second variation must be an intrinsic plane, i.e., a coset of a two dimensional subgroup of $\mathbb{H}$. Moreover two examples are given for stressing result's sharpness. 
Distributed Chernoff Test: Optimal decision systems over networks. (arXiv:1809.04587v1 [stat.ME]) Cache Translate Page 
Authors: Anshuka Rangi, Massimo Franceschetti, Stefano Marano In this work, we propose two different sequential and adaptive hypothesis tests, motivated from classic Chernoff's test, for both decentralized and distributed setup of sensor networks. In the former setup, the sensors can communicate via central entity i.e. fusion center. On the other hand, in the latter setup, sensors are connected via communication link, and no central entity is present to facilitate the communication. We compare the performance of these tests with the optimal consistent sequential test in the sensor network. In decentralized setup, the proposed test achieves the same asymptotic optimality of the classic one, minimizing the expected cost required to reach a decision plus the expected cost of making a wrong decision, when the observation cost per unit time tends to zero. This test is also asymptotic optimal in the higher moments of decision time. The proposed test is parsimonious in terms of communications as the expected number of channel uses required by each sensor, in the regime of vanishing observation cost per unit time, to complete the test converges to four.In distributed setup, the proposed test is evaluated on the same performance measures as the test in decentralized setup. We also provide sufficient conditions for which the proposed test in distributed setup also achieves the same asymptotic optimality as the classic one. Like the proposed test in decentralized setup, under these sufficient conditions, the proposed test in distributed setup is also asymptotic optimal in the higher moments of time required to reach a decision in the sensor network. This test is parsimonious is terms of communications in comparison to the state of art schemes proposed in the literature for distributed hypothesis testing. 
Closed geodesics on connected sums and 3manifolds. (arXiv:1809.04588v1 [math.DG]) Cache Translate Page 
Authors: HansBert Rademacher, Iskander A. Taimanov We study the asymptotics of the number N(t) of geometrically distinct closed geodesics of a Riemannian or Finsler metric on a connected sum of two compact manifolds of dimension at least three with nontrivial fundamental groups and apply this result to the prime decomposition of a threemanifold. In particular we show that the function N(t) grows at least like the prime numbers on a compact 3manifold with infinite fundamental group. It follows that a generic Riemannian metric on a compact 3manifold has infinitely many geometrically distinct closed geodesics. We also consider the case of a connected sum of a compact manifold with positive first Betti number and a simplyconnected manifold which is not homeomorphic to a sphere. 
Topological Transformation Monoids. (arXiv:1809.04590v1 [math.GR]) Cache Translate Page 
Authors: Z. Mesyan, J. D. Mitchell, Y. H. Péresse We investigate semigroup topologies on the full transformation monoid T(X) of an infinite set X. We show that the standard pointwise topology is the weakest Hausdorff semigroup topology on T(X), show that the pointwise topology is the unique Hausdorff semigroup topology on T(X) that induces the pointwise topology on the group of all permutations of X, and construct X distinct Hausdorff semigroup topologies on T(X). We also show that every separable semigroup topology on T(X) is perfect, describe the compact sets in an arbitrary Hausdorff semigroup topology on T(X), and show that there are no locally compact Polish semigroup topologies on T(X), among other results. 
On a Diophantine equation with five prime variables. (arXiv:1809.04591v1 [math.NT]) Cache Translate Page 
Authors: Min Zhang, Jinjiang Li Let $[x]$ denote the integral part of the real number $x$, and $N$ be a sufficiently large integer. In this paper, it is proved that, for $1<c<\frac{11216182}{5471123}, c\not=2$, the Diophantine equation $N=[p_1^c]+[p_2^c]+[p_3^c]+[p_4^c]+[p_5^c]$ is solvable in prime variables $p_1,p_2,p_3,p_4,p_5$. 
Hitchin's equations on a nonorientable manifold. (arXiv:1211.0746v3 [math.DG] UPDATED) Cache Translate Page 
Authors: NanKuo Ho, Graeme Wilkin, Siye Wu We define Hitchin's moduli space for a principal bundle $P$, whose structure group is a compact semisimple Lie group $K$, over a compact nonorientable Riemannian manifold $M$. We use the DonaldsonCorlette correspondence, which identifies Hitchin's moduli space with the moduli space of flat $K^\mathbb{C}$connections, which remains valid when M is nonorientable. This enables us to study Hitchin's moduli space both by gauge theoretical methods and algebraically by using representation varieties. If the orientable double cover $\tilde{M}$ of $M$ is a K\"ahler manifold with odd complex dimension and if the K\"ahler form is odd under the nontrivial deck transformation on $\tilde{M}$, Hitchin's moduli space of the pullback bundle $\tilde{P}$ over $\tilde{M}$ has a hyperK\"ahler structure and admits an involution induced by the deck transformation. The fixedpoint set is symplectic or Lagrangian with respect to various symplectic structures on Hitchin's moduli space over $\tilde{M}$. We show that there is a local diffeomorphism from Hitchin's moduli space over (the nonorientable manifold) $M$ to the fixed point set of the Hitchin's moduli space over (its orientable double cover) $\tilde{M}$. We compare the gauge theoretical constructions with the algebraic approach using representation varieties. 
Sandpile models. (arXiv:1401.0354v3 [math.PR] UPDATED) Cache Translate Page 
Authors: Antal A. Járai This survey is an extended version of lectures given at the Cornell Probability Summer School 2013. The fundamental facts about the Abelian sandpile model on a finite graph and its connections to related models are presented. We discuss exactly computable results via Majumdar and Dhar's method. The main ideas of Priezzhev's computation of the height probabilities in 2D are also presented, including explicit error estimates involved in passing to the limit of the infinite lattice. We also discuss various questions arising on infinite graphs, such as convergence to a sandpile measure, and stabilizability of infinite configurations. 
Construction of CapacityAchieving Lattice Codes: Polar Lattices. (arXiv:1411.0187v5 [cs.IT] UPDATED) 