Next Page: 10000

          Fuzzing技术总结与工具列表      Cache   Translate Page      
版权声明:本文为博主原创文章,未经博主允许不得转载。 https://blog.csdn.net/wcventure/article/details/82085251

首先推荐阅读2018年computing Surveys 的《Fuzzing: Art, Science, and Engineering》
https://github.com/wcventure/wcventure/blob/master/Paper/Fuzzing_Art_Science_and_Engineering.pdf
其次推荐阅读2018年Cybersecurity 的 《Fuzzing: a survey》
https://www.researchgate.net/publication/325577316_Fuzzing_a_survey
里面对fuzzing技术和fuzzing工具有详细的介绍。

一、什么是Fuzzing?

Fuzz本意是“羽毛、细小的毛发、使模糊、变得模糊”,后来用在软件测试领域,中文一般指“模糊测试”,英文有的叫“Fuzzing”,有的叫“Fuzz Testing”。本文用fuzzing表示模糊测试。

Fuzzing技术可以追溯到1950年,当时计算机的数据主要保存在打孔卡片上,计算机程序读取这些卡片的数据进行计算和输出。如果碰到一些垃圾卡片或一些废弃不适配的卡片,对应的计算机程序就可能产生错误和异常甚至崩溃,这样,Bug就产生了。所以,Fuzzing技术并不是什么新鲜技术,而是随着计算机的产生一起产生的古老的测试技术。

Fuzzing技术是一种基于黑盒(或灰盒)的测试技术,通过自动化生成并执行大量的随机测试用例来发现产品或协议的未知漏洞。随着计算机的发展,Fuzzing技术也在不断发展。

二、Fuzzing有用么?

Fuzzing是模糊测试,顾名思义,意味着测试用例是不确定的、模糊的。

计算机是精确的科学和技术,测试技术应该也是一样的,有什么的输入,对应什么样的输出,都应该是明确的,怎么会有模糊不确定的用例呢?这些不确定的测试用例具体会有什么作用呢?

为什么会有不确定的测试用例,我想主要的原因是下面几点:

1、我们无法穷举所有的输入作为测试用例。我们编写测试用例的时候,一般考虑正向测试、反向测试、边界值、超长、超短等一些常见的场景,但我们是没有办法把所有的输入都遍历进行测试的。

2、我们无法想到所有可能的异常场景。由于人类脑力的限制,我们没有办法想到所有可能的异常组合,尤其是现在的软件越来越多的依赖操作系统、中间件、第三方组件,这些系统里的bug或者组合后形成的bug,是我们某个项目组的开发人员、测试人员无法预知的。

3、Fuzzing软件也同样无法遍历所有的异常场景。随着现在软件越来越复杂,可选的输入可以认为有无限个组合,所以即使是使用软件来遍历也是不可能实现的,否则你的版本可能就永远也发布不了。Fuzzing技术本质是依靠随机函数生成随机测试用例来进行测试验证,所以是不确定的。

这些不确定的测试用例会起到我们想要的测试结果么?能发现真正的Bug么?

1、Fuzzing技术首先是一种自动化技术,即软件自动执行相对随机的测试用例。因为是依靠计算机软件自动执行,所以测试效率相对人来讲远远高出几个数量级。比如,一个优秀的测试人员,一天能执行的测试用例数量最多也就是几十个,很难达到100个。而Fuzzing工具可能几分钟就可以轻松执行上百个测试用例。

2、Fuzzing技术本质是依赖随机函数生成随机测试用例,随机性意味着不重复、不可预测,可能有意想不到的输入和结果。

3、根据概率论里面的“大数定律”,只要我们重复的次数够多、随机性够强,那些概率极低的偶然事件就必然会出现。Fuzzing技术就是大数定律的典范应用,足够多的测试用例和随机性,就可以让那些隐藏的很深很难出现的Bug成为必然现象。

目前,Fuzzing技术已经是软件测试、漏洞挖掘领域的最有效的手段之一。Fuzzing技术特别适合用于发现0 Day漏洞,也是众多黑客或黑帽子发现软件漏洞的首选技术。Fuzzing虽然不能直接达到入侵的效果,但是Fuzzing非常容易找到软件或系统的漏洞,以此为突破口深入分析,就更容易找到入侵路径,这就是黑客喜欢Fuzzing技术的原因。

三、基于生成和基于编译的Fuzzing算法?*

Fuzzing引擎算法中,测试用例的生成方式主要有2种:
1)基于变异:根据已知数据样本通过变异的方法生成新的测试用例;
2)基于生成:根据已知的协议或接口规范进行建模,生成测试用例;
一般Fuzzing工具中,都会综合使用这两种生成方式。

基于变异的算法核心要求是学习已有的数据模型,基于已有数据及对数据的分析,再生成随机数据做为测试用例。

四、state-of-the-art AFL

AFL就是著名的基于变异的Fuzzer。
以下有一些关于state-of-the-art AFL的资料

  1. american fuzzy lop (2.52b)
    http://lcamtuf.coredump.cx/afl/
  2. AFL内部实现细节小记
    http://rk700.github.io/2017/12/28/afl-internals/
  3. afl-fuzz技术白皮书
    https://blog.csdn.net/gengzhikui1992/article/details/50844857
  4. 如何使用AFL进行一次完整的fuzz过程
    https://blog.csdn.net/abcdyzhang/article/details/53487683
  5. AFL(American Fuzzy Lop)实现细节与文件变异
    https://paper.seebug.org/496/
  6. fuzz实战之libfuzzer
    https://www.secpulse.com/archives/71898.html

1

- Static analysis
- Dynamic analysis
- Symbolic execution
- Fuzzing

T1

- Generation-based Fuzzing
- Mutation-based Fuzzing

T2

- White box fuzzing
- Grey box fuzzing
- Black box fuzzing

T3

- Fuzzing技术中的关键

T4

- Fuzzing 中

T5

- 至今fuzzing工具文献的引用关系,Fuzzing工具的分类和历史

F1

- Fuzzing 工具之调研,还有一张很好的整理后的图表

F2

最后,再整理一下部分开源fuzzing工具的列表
原文来自:[https://www.peerlyst.com/posts/resource-open-source-fuzzers-list],并增加2018年最新的诸如CollAFL和SnowFuzz等工具
1.开源Fuzzers工具
2.Fuzzing的线束或框架
3.其它 Fuzzers 工具是免费的,但是和开源比不值得一提
4.Fuzzing的有效超载
5.博客将帮助你更好的了解Fuzz
6.其它关于Fuzzing博客或资源
7.商业Fuzzers工具

1.开源Fuzzers

CollAFLhttp://chao.100871.net/papers/oakland18.pdf
路径敏感的Fuzzer,解决了AFL中bitmap路径冲突的问题。
并提出了一种选择seed的策略,能更快提高覆盖率。

SnowFuzz
https://arxiv.org/pdf/1708.08437.pdf

VUzzer
http://www.cs.vu.nl//~giuffrida/papers/vuzzer-ndss-2017.pdf
基于应用感知的自进化模糊工具。在这篇文章中,我们提出一个应用感知的进化模糊策略(不需要以前的知识应用或格式输入)。为了最小化地覆盖并扩展更深的路径,我们利用基于静态和动态分析的控制以及数据流功能,来推断应用程序的基本属性。与Application-agnostic方法相比,这可以更快地生成有趣的输入。我们实行我们的模糊策略在VUzzer上,并且用三种不同的数据评估它:DARPA的大挑战二进制文件(CGC)、一组真实的应用程序(二进制输入解析器)和最近发布的LAVA数据集。

Afl-fuzz(American fuzzy lop)
http://lcamtuf.coredump.cx/afl/
Afl-fuzz是一种基于面向安全的模糊测试工具,它采用了一种新型的方式(编译时检测和遗传算法),来自动发掘干净的、有趣的测试案例,即在目标二进制中触发新的内部状态。这基本上改善了模糊代码的功能覆盖。该工具生成的简洁的合成语料库也可以用来传播其它更多的劳动型或资源密集型测试方案。
与其他仪器化的模糊工具相比,afl-fuzz是以实用性而被设计的:它具有适度的性能开销,采用了多种高效的模糊战略,和努力最小化的技巧,基本上不需要配置,并且能够无缝处理复杂的、真实世界案例,以及常见的图像分析或文件压缩等。

Filebuster
一个非常快速和灵活的网络模糊工具

TriforceAFL
AFL / QEMU 模糊器具有全系统的仿真。这是AFL的修补版本,支持使用QEMU的全系统模糊测试。它所包含的QEMU已经更新,允许在运行x86_64的系统仿真器时进行分支机构跟踪。它也添加了额外的指令来启动AFL的forkserver,进行模糊设置,并标记测试用例的启动和停止。

Nightmare:
https://github.com/joxeankoret/nightmare
一个具有web管理的分布式模糊测试套件。

Grr
DECREE二进制的高吞吐量模糊器和仿真器

Randy:
http://ptrace-security.com/blog/randy-random-based-fuzzer-in-python/
Python中的基于随机的模糊工具

IFuzzer
一个进化型的翻译模糊器

Dizzy:
https://github.com/ernw/dizzy
基于python的模糊框架:
1.可以发送到L2以及上层(TCP / UDP / SCTP)
2.能够处理奇长度分组字段(无需匹配字节边界,因此即使单个标志或7位长字3.也可以表示和模糊)
4.非常容易的协议定义语法
5.能够做多包状态的完全模糊,能够使用接收到的目标数据作为响应

Address Sanitizer:
https://github.com/Google/sanitizers
地址Sanitizer、线Sanitizer、记忆Sanitizer

Diffy:
https://github.com/twitter/diffy
使用Diffy查找您的服务中的潜在错误

Wfuzz:
https://github.com/xmendez/wfuzz
Web应用程序HTTP://www.edge-security.com/wfuzz.php

Go-fuzz:
https://github.com/Google/gofuzz
基于放弃的模糊测试

Sulley:
https://github.com/OpenRCE/sulley
Sulley是一个积极开发的模糊引擎和模糊测试框架,由多个可扩展组件组成。Sulley(IMHO)超过了此前公布的大所属模糊技术、商业和公共领域的能力。框架的目标是不仅是可以简化数据表示,而且也可以简化数据传输和仪表。Sulley是以 Monsters Inc.的生物来命名的,因为,他是模糊的。写在python内的。

Sulley_l2:
http://ernw.de/download/sulley_l2.tar.bz2
有些人可能记得2008年发布的sulley_l2,它是sulley模糊框架的修改版本,增强了第2层发送功能和一堆(L2)模糊脚本。所有的blinking, rebooting, mem-corrupting引起了我们的一些关注。从那以后,我们继续写和使用这些模糊脚本,所以它的洞集合增长了。

CERT Basic Fuzzing Framework (BFF)For linux, OSX
https://github.com/CERTCC-Vulnerability-Analysis/certfuzz
http://www.cert.org/vulnerability-analysis/tools/bff.cfm
cert基本模糊框架(BFF)是一个软件测试工具,它用于在linux和mac os x平台上运行的应用程序中寻找漏洞。BFF对消耗文件输入的软件执行突变性的模糊测试。(突变性模糊测试是采取形式良好的输入数据并以各种方式破坏它的行为,寻找导致崩溃的情况。)BFF自动收集导致了软件以独特方式使测试用例崩溃,以及利用崩溃来调试信息。BFF的目标是去最小化软件供应商和安全研究人员通过模糊测试有效地发现和分析发现的安全漏洞过程中所需要的努力。

CERT Failure Observation Engine (FOE)For windows
http://www.cert.org/vulnerability-analysis/tools/foe.cfmhttps://github.com/CERTCC-Vulnerability-Analysis/certfuzz
The cert Failure Observation Engine (FOE) 是一个软件测试工具,它被用于在Windows平台上运行的应用程序中发现漏洞。FOE在消耗文件输入的软件上执行突变模糊测试。(突变性模糊测试是采取形式良好的输入数据并以各种方式破坏它的行为,寻找导致崩溃的情况。)FOE自动收集导致了软件以独特方式使测试用例崩溃,以及利用崩溃来调试信息。FOE的目标是去最小化软件供应商和安全研究人员通过模糊测试有效地发现和分析发现的安全漏洞过程中所需要的努力。

DranzerFor ActiveX Controls.
https://github.com/CERTCC-Vulnerability-Analysis/dranzer
Dranzer是一个工具,使用户能够检查有效的技术,它用于模糊测试ActiveX控件

Radamsaa general purpose fuzzer
https://github.com/aoh/radamsa
Radamsa是一个用于鲁棒性测试的测试用例生成器,也称为fuzzer。它可以用来测试一个程序是否可以承受格式错误以及潜在的恶意输入。它通过制造文件来工作(有趣的不同于通常给定的文件),然后将修改的文件提供给Target程序,或者这样或通过一些脚本。radamsa的主要卖点(而不是其他的模糊器)是:它是非常容易在大多数机器上运行,而且很容易从命令行脚本,这已经被用来找到程序中的一系列安全问题,而且你可能现在正在使用。

zzufApplication fuzzer
https://github.com/samhocevar/zzuf
zzuf是一个透明的应用程序输入模糊器。 它的工作原理是截取文件操作并更改程序输入中的随机位。zzuf的行为是确定性的,使得它很容易再现错误。 有关如何使用zzuf的说明和示例,请参阅手册页和网站http://caca.zoy.org/wiki/zzuf

Backfuzz
https://github.com/localh0t/backfuzz
Backfuzz是一个用python写成的有着不同协议(FTP,HTTP,IMAP等)的模糊工具。因为一般的想法是这个脚本有几个预定义的功能,所以谁想要编写自己的插件(为另一个协议)就可以在一些行这样做。

KEMUfuzzer
https://github.com/jrmuizel/kemufuzzer
KEmuFuzzer是一个基于仿真或直接本地执行测试系统虚拟机的工具。 目前KEmuFuzzer支持:BHOCS,QEMU,VMware和virtualbox。

Pathgrind
https://github.com/codelion/pathgrind
Pathgrind使用基于路径的动态分析来fuzz linux / unix二进制。 它是基于valgrind被写在python内的。

Wadi-fuzzer
https://www.sensepost.com/blog/2015/wadi-fuzzer/ https://gitlab.sensepost.com/saif/DOM-Fuzzer
Wadi是基于web浏览器语法的模糊器。 这个语法用于描述浏览器应该如何处理Web内容,Wadi转向并使用语法来打破浏览器。
Wadi是一个Fuzzing模块,用于NodeFuzz fuzzing Harness并利用AddressSanitizer(ASan)在Linux和Mac OSX上进行测试。
万维网联盟(W3C)是一个国际组织,它开发开放标准以确保Web的长期增长。 W3C允许我们搜索语法并在我们的测试用例中使用。

LibFuzzer, Clang-format-fuzzer, clang-fuzzer
http://llvm.org/docs/LibFuzzer.html
http://llvm.org/viewvc/llvm-project/cfe/trunk/tools/clang-format/fuzzer/ClangFormatFuzzer.cpp?view=markup
http://llvm.org/viewvc/llvm-project/cfe/trunk/tools/clang-fuzzer/ClangFuzzer.cpp?view=markup
我们在LibFuzzer上实现了两个模糊器:clang-format-fuzzer和clang-fuzzer。Clang格式大多是一个词法分析器,所以给它随机字节格式是会完美运行的,但也伴随着超过20个错误。然而Clang不仅仅是一个词法分析器,给它随机字节时几乎没有划伤其表面,所以除了测试随机字节,我们还在令牌感知模式中模糊了Clang。两种模式中都发现了错误; 其中一些以前被AFL检测到,另一些则不是:我们使用AddressSanitizer运行这个模糊器,结果发现一些错误在没有它的情况下不容易被发现。

Perf-fuzzer
http://www.eece.maine.edu/~vweaver/projects/perf_events/validation/https://github.com/deater/perf_event_testshttp://web.eece.maine.edu/~vweaver/projects/perf_events/fuzzer/
用于Linux perf_event子系统的测试套件

HTTP/2 Fuzzer
https://github.com/c0nrad/http2fuzz
HTTP2模糊器内置于Golang。

QuickFuzz
http://quickfuzz.org/
QuickFuzz是一个语法模糊器,由QuickCheck,模板Haskell和Hackage的特定库生成许多复杂的文件格式,如Jpeg,Png,Svg,Xml,Zip,Tar和更多! QuickFuzz是开源的(GPL3),它可以使用其他错误检测工具,如zzuf,radamsa,honggfuzz和valgrind。

SymFuzz
https://github.com/maurer/symfuzz
http://ieeexplore.IEEE.org/xpls/abs_all.jsp?arnumber=7163057
摘要?我们提出了一个算法的设计,以最大化数量的bug为黑盒子突变性的模糊给定一个程序和种子的输入。主要的直观性的是利用给定程序 - 种子对的执行轨迹上的白盒符号进行分析,来检测输入的BIT位置之间的依赖性,然后使用这种依赖关系来为该程序种子对计算概率上最佳的突变比率。我们的结果是有希望的:我们发现使用相同的模糊时间,这比8个应用程序中的三个以前的模糊器的平均错误多38.6%。

OFuzz
https://github.com/sangkilc/ofuzz
OFuzz是一个用OCaml编写的模糊平台。 OFuzz目前专注于在* nix平台上运行的文件处理应用程序。 OFuzz的主要设计原则是灵活性:必须容易添加/替换模糊组件(崩溃分类模块,测试用例生成器等)或算法(突变算法,调度算法)。

Bed
http://www.snake-basket.de/
网络协议fuzzer。 BED是一个程序,旨在检查守护程序的潜在缓冲区溢出、格式字符串等。

Neural Fuzzer
https://cifasis.github.io/neural-fuzzer/
神经模糊测试工具是一种实验性模糊器,它被设计使用国家最先进的机器,从一组初始文件学习。 它分为两个阶段:训练和生成。

Pulsar
https://github.com/hgascon/pulsar
协议学习,模拟和状态模糊器
Pulsar是一个具有自动协议学习和模拟能力的网络模糊器。该工具允许通过机器学习技术来建模协议,例如聚类和隐马尔可夫模型。这些模型可以用于模拟Pulsar与真实客户端或服务器之间进行通信,这些消息,在一系列模糊原语的结合下,让测试一个未知协议错误的实施在更深的状态协议。

D-bus fuzzer:
https://github.com/matusmarhefka/dfuzzer
dfuzzer是D-Bus模糊器,是用于通过D-Bus进行通信的模糊测试过程的工具。它可以用于测试连接到会话总线和系统总线守护程序的进程。模糊器为客户端工作,它首先连接到总线守护进程,然后它遍历并模糊测试由D-Bus服务提供的所有方法。

Choronzon
https://census-labs.com/news/2016/07/20/choronzon-public-release/
Choronzon是一个进化型的模糊工具。它试图模仿进化过程,以保持产生更好的结果。 为了实现这一点,它具有评估系统的能力,用以分类哪些模糊文件是有趣的,哪些应该被丢弃。
此外,Choronzon是一个基于知识的模糊器。 它使用用户定义的信息来读取和写入目标文件格式的文件。要熟悉Choronzon的术语,您应该考虑每个文件由染色体表示。用户应该描述所考虑的文件格式的基本结构, 优选文件格式的高级概述,而不是描述它的每个细节和方面。那些用户定义的基本结构中的每一个都被认为是基因, 每个染色体包含一个基因树,并且它能够从中构建相应的文件。

Exploitable
这里写图片描述
‘exploitable’是一个GDB扩展,它会按严重性分类Linux应用程序错误。扩展检查已崩溃的Linux应用程序的状态,并输出攻击者利用底层软件错误获得系统控制有多困难的总结。扩展可以用于为软件开发人员确定bug的优先级,以便他们可以首先解决最严重的bug。
该扩展实现了一个名为“exploitable”的GDB命令。 该命令使用启发式来描述当前在GDB中调试的应用程序的状态的可利用性。 该命令旨在用于包含GDB Python API的Linux平台和GDB版本。 请注意,此时命令将无法在核心文件目标上正确运行。

Hodor
这里写图片描述

我们想设计一个通用的模糊器,可以用来配置使用已知的良好的输入和分隔符,以模糊特定的位置。在一个完全愚钝的模糊器和一些更聪明的东西之间,与实现适当的智能模糊器相比,表现着更少的努力。

BrundleFuzz
https://github.com/carlosgprado/BrundleFuzz
BrundleFuzz是一个用于Windows和Linux的分布式模糊器,使用动态二进制仪器。

Netzob
https://www.netzob.org/
用于通信协议的逆向工程、流量生成和模糊化的开源工具
P
assiveFuzzFrameworkOSX
该框架用于在内核模式下基于被动内联挂钩机制来模糊OSX内核漏洞。

syntribos
OpenStack安全组的Python API安全测试工具

honggfuzz
http://google.github.io/honggfuzz/
一个通用的,易于使用的有趣的分析选项的模糊器。 支持基于代码覆盖率的反馈驱动的模糊测试

dotdotpwn
http://dotdotpwn.blogspot.com/
目录遍历模糊工具

KernelFuzzer
跨平台内核Fuzzer框架。DEF CON 24视频:
https://www.youtube.com/watch?v=M8ThCIfVXow

PyJFuzz
PyJFuzz - Python JSON Fuzzer
PyJFuzz是一个小的、可扩展的和现成可用的框架,用于模糊JSON输入,如移动端点REST API,JSON实现,浏览器,cli可执行和更多。

RamFuzz
单个方法参数的模糊器。

EMFFuzzer
基于桃树模糊框架的增强的元文件模糊器

js-fuzz
一个基于javascript的AFL启发的遗传模糊测试器。

syzkaller
syzkaller是一个无监督的、覆盖引导的Linux系统调用模糊器。

2.模糊线束/框架使fuzzer提高:

FuzzFlow
Fuzzflow是来自cisco talos的一个分布式的模糊管理框架,它提供虚拟机管理,模糊作业配、可插拔变异引擎、前/后变形脚本、崩溃收集和可插拔崩溃分析。

fuzzinator
Fuzzinator是一个模糊测试框架,可以帮助你自动化任务,它通常需要在一个fuzz会话:
运行您最喜欢的测试生成器并将测试用例馈送到测试中的系统,
抓住和保存独特的问题,
减少失败的测试用例,
缓解错误跟踪器中的问题报告(例如,Bugzilla或GitHub),
如果需要,定期更新SUT
计划多个SUT和发电机,而不会使工作站超载。

Fuzzlabs
https://github.com/DCNWS/FuzzLabs
FuzzLabs在一个模块化的模糊框架中,用Python编写。 它使用了令人惊叹的Sulley模糊框架的修改版本作为核心引擎。 FuzzLabs仍在开发中。

Nodefuzz
https://github.com/attekett/NodeFuzz
对于Linux和Mac OSX。 NodeFuzz是一个用于网络浏览器和类似浏览器的应用程序的模糊器。 NodeFuzz背后有两个主要的想法:第一是创建一个简单、快速、不同浏览器的fuzz方法。 第二,有一个线束,可以轻松地扩展与新的测试用例发生器和客户端仪器,无需修改核心。

Grinder
https://github.com/stephenfewer/grinder
对于windows
Grinder是一个自动化浏览器的模糊化和大量崩溃管理的系统。

Kitty
https://github.com/Cisco-sas/kitty
Kitty是一个开源的模块化和可扩展的模糊框架,使用python编写,灵感来自OpenRCE的Sulley和Michael Eddington(现在是Deja vu Security的)Peach Fuzzer。

Peach
http://community.peachfuzzer.com/
https://github.com/MozillaSecurity/peach
Peach是一个SmartFuzzer,能够执行基于生成和基于突变的模糊测试。

3.此外,还有这些免费的但不是开源的fuzzer:

SDL MiniFuzz File Fuzzer
https://www.Microsoft.com/en-us/download/details.aspx?id=21769
对于Windows。 SDL MiniFuzz File Fuzzer是一个基本的文件模糊工具,旨在简化非安全开发人员对模糊测试的采用,这些非安全开发人员不熟悉文件模糊工具或从未在当前的软件开发过程中使用它们。

Rfuzz
http://rfuzz.rubyforge.org/index.html
RFuzz是一个Ruby库,可以使用快速HttpClient和wicked vil RandomGenerator轻松地从外部测试Web应用程序,它允许普通程序员每天使用先进的模糊技术。

Spike
http://www.immunitysec.com/downloads/SPIKE2.9.tgz
SPIKE是一个API框架,允许你编写模糊器。

Regex Fuzzer
http://go.microsoft.com/?linkid=9751929
DL Regex Fuzzer是一个验证工具,用于帮助测试正则表达式是否存在潜在的拒绝服务漏洞。它包含用指数时间执行的某些子句的正则表达式模式(例如,包含自身重复的重复的子句)可以被攻击者利用来引起拒绝服务(DoS)条件。SDL Regex Fuzzer与SDL过程模板和MSF-Agile + SDL过程模板集成,以帮助用户跟踪和消除其项目中的任何检测到的正则表达式漏洞。

4.博客,将帮助你fuzz更好
Yawml的开始到完成模糊与AFL(一个完整的fuzzjob由foxglovesecurity)
http://foxglovesecurity.com/2016/03/15/fuzzing-workflows-a-fuzz-job-from-start-to-finish/

Fuzz更聪明,更难 - 用afl引发模糊,来自bsidessf2016的引物
https://www.peerlyst.com/posts/bsidessf-2016-recap-of-fuzz-smarter-not-harder-an-afl-primer-claus-cramon

Fuzzing和afl是一种艺术
Fuzzing nginx 和 American Fuzzy Lop
您可以在此处的评论或此Google文档中发表建议:
https://docs.google.com/document/d/17pZxfs8hXBCnhfHoKfJ7JteGziNB2V_VshsVxmNRx6U/edit?usp=sharing

BSidesLisbon 2016主题演讲:智能模糊器革命
Windows内核模糊初学者 - Ben Nagy

5.其他Fuzzer博客:
循环使用编译器转换的模糊包版
谷歌推出了OSS-Fuzz(感谢Dinko Cherkezov) - 一个项目,旨在不断开发开源项目fuzz:
OSS-Fuzz现在正在测试中,并即将接受候选开源项目的建议。为了使项目被OSS-Fuzz接受,它需要有一个庞大的用户基础或针对于至关重要的全球IT基础设施,这是一个通用启发式方法,我们有意在这个早期阶段解释。查看更多详情和说明如何在这里申请。
一旦项目注册了OSS-Fuzz,它将自动接收到我们的跟踪器中,新报告的错误披露截止于90天后(见此处的详细信息)。 这符合行业的最佳实践,并通过更快地为用户提供补丁来提高最终用户的安全性和稳定性。
帮助我们确保这个程序真正服务于开源社区和依赖这个关键软件的互联网,贡献和留下您的反馈在GitHub。

这里写图片描述

6.商业模糊器

超越安全的暴风雨
http://www.beyondsecurity.com/bestorm_and_the_SDL.html
管理员编辑:查找更多真棒Peerlyst社区贡献的资源,资源目录在这里
这里写图片描述

7.关于浏览器的Fuzzing

Skyfire 一种用于Fuzzing的数据驱动的种子生成工具
https://www.inforsec.org/wp/?p=2678
https://www.ieee-security.org/TC/SP2017/papers/42.pdf

使用libFuzzer fuzz Chrome V8入门指南
http://www.4hou.com/info/news/6191.html


          China is capable of destabilizing or destroying Bitcoin, new research suggests      Cache   Translate Page      
TwitterFacebook

In 2008, Bitcoin was envisioned by its pseudonymous founder Satoshi Nakamoto as a trustless, decentralized peer-to-peer electronic cash system. 

Ten years and numerous crazy price jumps later, Bitcoin appears to have withstood the test of time. But is it really decentralized and thus resilient to attacks?

A new paper, signed by researchers from from Princeton University and Florida International University, suggests that Bitcoin is largely at the whim of one powerful entity: China. 

SEE ALSO: Cryptocurrency exchange claimed it was 'practically impossible' to hack. It was hacked.

The paper (found via The Next Web), which hasn't been peer reviewed yet, outlines numerous potential attacks and disruptions China could launch against Bitcoin. It also argues that China has both the means and motivation to potentially launch such attacks, and that it is already influencing the network in some ways.  Read more...

More about China, Bitcoin, Cryptocurrencies, Tech, and Cryptocurrency Blockchain
          Strong biases in infrared-selected gravitational lenses      Cache   Translate Page      
Дата и время публикации : 2012-03-12T21:00:00Z Авторы публикации и институты : Stephen Serjeant Ссылка на журнал-издание: Ссылка на журнал-издание не найденаКоментарии к cтатье: Note added in proof citing Hezaveh et al. (arXiv:1203.3267); other minor changes made to match page proofs. MNRAS in press. 14 pages, 13 figures. Figures slightly degraded from publication version for smaller [...]
           Comment on Telling a Simple Polytope From its Graph by Gil Kalai       Cache   Translate Page      
Conjecture 4 is false. This was proved by Joseph Doolittle in his paper <a href="https://arxiv.org/abs/1809.00662" rel="nofollow">A minimal counterexample to a strengthening of Perles' conjecture</a> .
          We may not have found aliens yet because we’ve barely begun looking      Cache   Translate Page      
A new calculation compares the effort so far to exploring a hot tub’s–worth of Earth’s oceansWith no luck so far in a six-decade search for signals from aliens, you’d be forgiven for thinking, “Where is everyone?” A new calculation shows that if space is an ocean, we’ve barely dipped in a toe. The volume of observable space combed so far for E.T. is comparable to searching the volume of a large hot tub for evidence of fish in Earth’s oceans, astronomer Jason Wright at Penn State and colleagues say in a paper posted online September 19 at arXiv.org. “If you...
          Des particules inconnues hautement énergétiques émanent de l'Antarctique      Cache   Translate Page      

Voilà ce que cela donne lorsque les scientifiques ne relient pas tous les points et qu’ils pratiquent la science sans conscience.

 

* La Terre fait partie du Cosmos car elle est une cellule à part entière de l’Univers, tout comme les êtres humains qui sont des cellules lumineuses de l’Univers,

* la Terre est creuse comme toutes les autres planètes et elle contient un Grand Soleil Central. Ce sont les habitants de la Cité sacrée de Shamballa qui doivent se marrer et heureusement qu’ils sont là parce qu’avec toutes les conneries faites par les reptiliens, la Terre aurait du exploser depuis longtemps,

* depuis l’année 2012 nous avons commencé à traverser la bande photonique constituée par le Grand Soleil Central : Alcyone qui est constitué de 7 soleils, et les vibrations de cet anneau de lumière transforment la matière en profondeur y compris notre ADN pour en activer le second codon sur 12. C’est ce qui va nous rendre télépathes parce que lorsque l’on touche à l’ADN on active certaines parties de notre cerveau,

* C’est sûr qu’en traversant les vibrations lumineuses de l’anneau de lumière d’Alcyone, ces vibrations s’inscrivent sur l’ensemble de notre Système solaire et sur la Terre et notamment dans l’eau et la glace de l’Antarctique parce que l’eau conserve la mémoire de ces particules hautement énergétiques

* en prime notre galaxie est aspirée depuis quelques années par le Grand Attracteur, et c’est sûr qu’au cours de notre trajectoire et de l’ascension de notre Galaxie nous traversons des régions cosmiques empreintes de particules hautement énergétiques parce que nous devons atteindre la 5ème dimension.

En conclusion : le fait que les scientifiques aient découvert ces particules de hautes énergies dans l’Antarctique dont ils ne s’expliquent pas l’origine, c’est bien une preuve que notre système solaire et que notre Galaxie ascensionnent et traversent des zones cosmiques chargées de particules hautement énergétiques et que nous sommes les témoins de notre évolution spirituelle et neurologique.

 

Des particules émanent de l’Antarctique et on ne sait pas ce que c’est

Nelly Lesage

- Sciences

Le projet ANITA de la Nasa a permis d'observer des particules étranges en Antarctique : elles émanent de la Terre, au lieu d'arriver de la galaxie. Selon des physiciens, il est probable que nous soyons face à un phénomène jusqu'ici inconnu.

Des rayonnements cosmiques intriguent les physiciens depuis plusieurs années. Dans les sols glacés de l’Antarctique, la Nasa a enregistré en 2016 la présence de particules au comportement étrange : au lieu de provenir de l’espace, elles semblent jaillir de la banquise. Des chercheurs de l’université d’État de Pennsylvanie ont uni leurs forces pour tenter de comprendre ce phénomène qui a déjà inspiré de nombreuses théories.

Ils relatent cette recherche dans un article pré-publié le 25 septembre 2018 sur arXiv. Leur conclusion soutient l’hypothèse sur laquelle la communauté physicienne s’est déjà reposée, sans toutefois la démontrer. La plupart des scientifiques pensaient que ces particules étaient probablement un élément inconnu : selon cette nouvelle recherche, il y a de grandes chances que ce soit le cas.

La physique au delà du modèle standard

« Nous explorons [l’hypothèse que] ces particules aillent au delà du modèle standard pour expliquer les événements [enregistrés par] ANITA, s’ils sont correctement interprétés, et concluons que c’est le cas », écrivent les chercheurs dans leur résumé.

Ces étranges « rayonnements cosmiques » ont été observés à deux reprises par la Nasa dans le cadre du projet ANITA (Antarctic Impulsive Transient Antenna), un ballon à hélium embarquant un réseau d’antennes radio afin de repérer les rayons cosmiques d’ultra haute énergie (aussi dits zetta-particules), l’un des phénomènes les plus énergétiques connus dans la nature.

https://www.numerama.com/content/uploads/2018/10/anita-nasa-antarctique-1024x597.jpgLe dispositif ANITA de la Nasa en Antarctique. // Source : Flickr/CC/Nasa

 

Les rayonnements cosmiques sont des flux qui circulent dans le milieu interstellaire — l’espace entre les étoiles dans une galaxie. De tels rayonnements peuvent venir du Soleil, de l’intérieur ou de l’extérieur de la galaxie.

Comme l’explique LiveScience, les scientifiques ont fondé de grands espoirs sur la découverte de la mission ANITA, lorsque le dispositif de la Nasa a permis de découvrir non pas des rayons cosmiques provenant de l’espace, mais des particules qui semblaient émerger de la Terre.

Pour tenter d’expliquer l’existence de ces rayons cosmiques, les physiciens ont commencé à élaborer des théories.

Ces particules sont très probablement un phénomène nouveau

En raison de leur comportement inhabituel, les physiciens s’accordaient à dire que ces étranges particules ne pouvaient pas faire partie du modèle standard, une théorie permettant de classifier les particules subatomiques (plus petites que les atomes) connues. Toutes les hypothèses envisageaient le fait que les particules soient la manifestation d’un phénomène nouveau, sans pour autant que cela soit vérifié.

Le travail des universitaires pennsylvaniens vient renforcer cette idée. Selon eux, les particules observées grâce à ANITA ne sont qu’une partie émergée de l’iceberg : ces rayonnements cosmiques sont bien plus nombreux que ce que nous pensions. Un autre observatoire situé dans l’Antarctique, baptisé IceCube, a eu l’occasion d’observer des particules similaires, mais aucun lien n’avait été fait entre les enregistrements d’IceCube et ceux d’ANITA, jusqu’à cette étude.

https://www.numerama.com/content/uploads/2018/10/icecube-1024x576.jpgL’observatoire IceCube en Antarctique. // Source : Flickr/CC/Eli Duke

 

1 chance sur 3,5 millions que nous les connaissions

En combinant ces deux bases de données, les physiciens sont arrivés à la conclusion que ces étranges particules émanant de la Terre avaient une chance infime d’appartenir au modèle standard : il y a très exactement moins d’une chance sur 3,5 millions pour que ces particules en fassent partie. Autrement dit, cette découverte permet de renforcer l’hypothèse que la communauté scientifique envisageait : il est fort probable que ces particules soient une manifestation d’un phénomène nouveau.

Bien que cette découverte ne résolve pas le mystère de leur provenance, le travail de ces chercheurs est important. Il montre que les scientifiques qui voudront étudier ces étranges rayonnements cosmiques devront être prêts à questionner leurs connaissances actuelles sur l’univers s’ils veulent espérer identifier ces particules. Grâce à eux, nous sommes de plus en plus certains que la science est face à un nouveau phénomène.

 


          Quasi-universality in single-cell sequencing data. (arXiv:1810.03602v1 [q-bio.QM])      Cache   Translate Page      

Authors: Luis Aparicio, Mykola Bordyuh, Andrew J. Blumberg, Raul Rabadan

The development of single-cell technologies provides the opportunity to identify new cellular states and reconstruct novel cell-to-cell relationships. Applications range from understanding the transcriptional and epigenetic processes involved in metazoan development to characterizing distinct cells types in heterogeneous populations like cancers or immune cells. However, analysis of the data is impeded by its unknown intrinsic biological and technical variability together with its sparseness; these factors complicate the identification of true biological signals amidst artifact and noise. Here we show that, across technologies, roughly 95% of the eigenvalues derived from each single-cell data set can be described by universal distributions predicted by Random Matrix Theory. Interestingly, 5% of the spectrum shows deviations from these distributions and present a phenomenon known as eigenvector localization, where information tightly concentrates in groups of cells. Some of the localized eigenvectors reflect underlying biological signal, and some are simply a consequence of the sparsity of single cell data; roughly 3% is artifactual. Based on the universal distributions and a technique for detecting sparsity induced localization, we present a strategy to identify the residual 2% of directions that encode biological information and thereby denoise single-cell data. We demonstrate the effectiveness of this approach by comparing with standard single-cell data analysis techniques in a variety of examples with marked cell populations.


          VOAs labelled by complex reflection groups and 4d SCFTs. (arXiv:1810.03612v1 [hep-th])      Cache   Translate Page      

Authors: Federico Bonetti, Carlo Meneghelli, Leonardo Rastelli

We define and study a class of $\mathcal{N}=2$ vertex operator algebras $\mathcal{W}_{\mathcal{\mathsf{G}}}$ labelled by complex reflection groups. They are extensions of the $\mathcal{N}=2$ super Virasoro algebra obtained by introducing additional generators, in correspondence with the invariants of the complex reflection group $\mathcal{\mathsf{G}}$. If $\mathcal{\mathsf{G}}$ is a Coxeter group, the $\mathcal{N}=2$ super Virasoro algebra enhances to the (small) $\mathcal{N}=4$ superconformal algebra. With the exception of $\mathcal{\mathsf{G}} = \mathbb{Z}_2$, which corresponds to just the $\mathcal{N}=4$ algebra, these are non-deformable VOAs that exist only for a specific negative value of the central charge. We describe a free-field realization of $\mathcal{W}_{\mathcal{\mathsf{G}}}$ in terms of rank$(\mathcal{\mathsf{G}})$ $\beta \gamma bc$ ghost systems, generalizing a construction of Adamovic for the $\mathcal{N}=4$ algebra at $c = -9$. If $\mathcal{\mathsf{G}}$ is a Weyl group, $\mathcal{W}_{\mathcal{\mathsf{G}}}$ is believed to coincide with the $\mathcal{N}=4$ VOA that arises from the four-dimensional super Yang-Mills theory whose gauge algebra has Weyl group $\mathcal{\mathsf{G}}$. More generally, if $\mathcal{\mathsf{G}}$ is a crystallographic complex reflection group, $\mathcal{W}_{\mathcal{\mathsf{G}}}$ is conjecturally associated to an $\mathcal{N}=3$ $4d$ superconformal field theory. The free-field realization allows to determine the elusive `$R$-filtration' of $\mathcal{W}_{\mathcal{\mathsf{G}}}$, and thus to recover the full Macdonald index of the parent $4d$ theory


          An algebraic model for rational naive-commutative ring SO(2)-spectra and equivariant elliptic cohomology. (arXiv:1810.03632v1 [math.AT])      Cache   Translate Page      

Authors: David Barnes, J.P.C. Greenlees, Magdalena Kedziorek

Equipping a non-equivariant topological $E_\infty$-operad with the trivial $G$-action gives an operad in $G$-spaces. For a $G$-spectrum, being an algebra over this operad does not provide any multiplicative norm maps on homotopy groups. Algebras over this operad are called na\"{i}ve-commutative ring $G$-spectra. In this paper we take $G=SO(2)$ and we show that commutative algebras in the algebraic model for rational $SO(2)$-spectra model rational na\"{i}ve-commutative ring $SO(2)$-spectra. In particular, this applies to show that the $SO(2)$-equivariant cohomology associated to an elliptic curve $C$ from previous work of the second author is represented by an $E_\infty$-ring spectrum. Moreover, the category of modules over that $E_\infty$-ring spectrum is equivalent to the derived category of sheaves over the elliptic curve $C$ with the Zariski torsion point topology.


          Aggregation-diffusion equations: dynamics, asymptotics, and singular limits. (arXiv:1810.03634v1 [math.AP])      Cache   Translate Page      

Authors: Jose A. Carrillo, Katy Craig, Yao Yao

Given a large ensemble of interacting particles, driven by nonlocal interactions and localized repulsion, the mean-field limit leads to a class of nonlocal, nonlinear partial differential equations known as aggregation-diffusion equations. Over the past fifteen years, aggregation-diffusion equations have become widespread in biological applications and have also attracted significant mathematical interest, due to their competing forces at different length scales. These competing forces lead to rich dynamics, including symmetrization, stabilization, and metastability, as well as sharp dichotomies separating well-posedness from finite time blowup. In the present work, we review known analytical results for aggregation-diffusion equations and consider singular limits of these equations, including the slow diffusion limit, which leads to the constrained aggregation equation, as well as localized aggregation and vanishing diffusion limits, which lead to metastability behavior. We also review the range of numerical methods available for simulating solutions, with special attention devoted to recent advances in deterministic particle methods. We close by applying such a method -- the blob method for diffusion -- to showcase key properties of the dynamics of aggregation-diffusion equations and related singular limits.


          Revisited version of Weyl's limit point-limit circle criterion for essential self-adjointness. (arXiv:1810.03641v1 [math-ph])      Cache   Translate Page      

Authors: Vito Flavio Bellino, Giampiero Esposito

A new proof of the Weyl limit point-limit circle criterion is obtained, with systematic emphasis on Sobolev-space methods.


          Convexity and Operational Interpretation of the Quantum Information Bottleneck Function. (arXiv:1810.03644v1 [quant-ph])      Cache   Translate Page      

Authors: Nilanjana Datta, Christoph Hirche, Andreas Winter

In classical information theory, the information bottleneck method (IBM) can be regarded as a method of lossy data compression which focusses on preserving meaningful (or relevant) information. As such it has recently gained a lot of attention, primarily for its applications in machine learning and neural networks. A quantum analogue of the IBM has recently been defined, and an attempt at providing an operational interpretation of the so-called quantum IB function as an optimal rate of an information-theoretic task, has recently been made by Salek et al. However, the interpretation given in that paper has a couple of drawbacks; firstly its proof is based on a conjecture that the quantum IB function is convex, and secondly, the expression for the rate function involves certain entropic quantities which occur explicitly in the very definition of the underlying information-theoretic task, thus making the latter somewhat contrived. We overcome both of these drawbacks by first proving the convexity of the quantum IB function, and then giving an alternative operational interpretation of it as the optimal rate of a bona fide information-theoretic task, namely that of quantum source coding with quantum side information at the decoder, and relate the quantum IB function to the rate region of this task. We similarly show that the related privacy funnel function is convex (both in the classical and quantum case). However, we comment that it is unlikely that the quantum privacy funnel function can characterize the optimal asymptotic rate of an information theoretic task, since even its classical version lacks a certain additivity property which turns out to be essential.


          Trilinear maps for cryptography II. (arXiv:1810.03646v1 [cs.CR])      Cache   Translate Page      

Authors: Ming-Deh A. Huang

We continue to study the construction of cryptographic trilinear maps involving abelian varieties over finite fields. We introduce Weil descent as a tool to strengthen the security of a trilinear map. More specifically, we prepare a trilinear map by starting with an abelian variety of small dimension defined over a finite field $K$ of large extension degree over a finite field $k$. The points and maps and functions involved in the trilinear maps are encoded using Weil descent. However the original abelian variety as well as the descent basis and descent table will be kept secret. We present a concrete construction involving the jacobian varieties of hyperelliptic curves. The idea of using Weil descent to strengthen security raises some interesting computational problems from a cryptanalytic perspective.


          Fluctuation lower bounds in planar random growth models. (arXiv:1810.03656v1 [math.PR])      Cache   Translate Page      

Authors: Erik Bates, Sourav Chatterjee

We prove $\sqrt{\log n}$ lower bounds on the order of growth fluctuations in three planar growth models (first-passage percolation, last-passage percolation, and directed polymers) under no assumptions on distribution of vertex or edge weights other than the minimum conditions required for avoiding pathologies. Such bounds were previously known only for certain restrictive classes of distributions. In addition, the first-passage shape fluctuation exponent is shown to be at least $1/8$, extending previous results to more general distributions.


          Approximation schemes for countably-infinite linear programs with moment bounds. (arXiv:1810.03658v1 [math.OC])      Cache   Translate Page      

Authors: Juan Kuntz, Philipp Thomas, Guy-Bart Stan, Mauricio Barahona

We introduce approximation schemes for a type of countably-infinite-dimensional linear programs (CILPs) whose feasible points are unsigned measures and whose optimal values are bounds on the averages of these measures. In particular, we explain how to approximate the program's optimal value, optimal points, and minimal point (should one exist) by solving finite-dimensional linear programs. We show that the approximations converge to the CILP's optimal value, optimal points, and minimal point as the size of the finite-dimensional program approaches that of the CILP. Inbuilt in our schemes is a degree of error control: they yield lower and upper bounds on the optimal values and we give a simple bound on the approximation error of the minimal point. To motivate our work, we discuss applications of our schemes taken from the Markov chain literature: stationary distributions, occupation measures, and exit distributions.


          Modularity experiments on $S_4$-symmetric double octics. (arXiv:1810.03659v1 [math.AG])      Cache   Translate Page      

Authors: Christian Meyer

We will invest quite some computer power to find double octic threefolds that are connected to weight four modular forms.


          Moment Maps, Strict Linear Precision, and Maximum Likelihood Degree One. (arXiv:1810.03672v1 [math.AG])      Cache   Translate Page      

Authors: Patrick Clarke, David A. Cox

We study the moment maps of a smooth projective toric variety. In particular, we characterize when the moment map coming from the quotient construction is equal to a weighted Fubini-Study moment map. This leads to an investigation into polytopes with strict linear precision, and in the process we use results from and find remarkable connections between Symplectic Geometry, Geometric Modeling, Algebraic Statistics, and Algebraic Geometry.


          The smallest regulator for number fields of degree 7 with five real places. (arXiv:1810.03675v1 [math.NT])      Cache   Translate Page      

Authors: Eduardo Friedman, Gabriel Ramírez-Raposo

In 2016 Astudillo, Diaz y Diaz and Friedman published sharp lower bounds for regulators of number fields of all signatures up to degree seven, except for fields of degree seven having five real places. We deal with this signature, proving that the field with the first discriminant has minimal regulator. The new element in the proof is an extension of Pohst's geometric method from the totally real case to fields having one complex place.


          On the Fourth order Schr\"odinger equation in four dimensions: dispersive estimates and zero energy resonances. (arXiv:1810.03678v1 [math.AP])      Cache   Translate Page      

Authors: William R. Green, Ebru Toprak

We study the fourth order Schr\"odinger operator $H=(-\Delta)^2+V$ for a decaying potential $V$ in four dimensions. In particular, we show that the $t^{-1}$ decay rate holds in the $L^1\to L^\infty$ setting if zero energy is regular. Furthermore, if the threshold energies are regular then a faster decay rate of $t^{-1}(\log t)^{-2}$ is attained for large $t$, at the cost of logarithmic spatial weights. Zero is not regular for the free equation, hence the free evolution does not satisfy this bound due to the presence of a resonance at the zero energy. We provide a full classification of the different types of zero energy resonances and study the effect of each type on the time decay in the dispersive bounds.


          Binary Quadratic Forms in Difference Sets. (arXiv:1810.03680v1 [math.NT])      Cache   Translate Page      

Authors: Alex Rice

We show that if $h(x,y)=ax^2+bxy+cy^2\in \mathbb{Z}[x,y]$ satisfies $b^2\neq 4ac$, then any subset of $\{1,2,\dots,N\}$ with no nonzero differences in the image of $h$ has size at most a constant depending on $h$ times $N\exp(-c\sqrt{\log N})$, where $c=c(h)>0$. We achieve this goal by adapting an $L^2$ density increment strategy previously used to establish analogous results for sums of one or more single-variable polynomials. Our exposition is thorough and self-contained, in order to serve as an accessible gateway for readers who are unfamiliar with previous implementations of these techniques.


          Existence theory for the Boussinesq equation in Modulation spaces. (arXiv:1810.03684v1 [math.AP])      Cache   Translate Page      

Authors: Élder J. Villamizar-Roa, Carlos Banquet Brango

In this paper we study the Cauchy problem for the generalized Boussinesq equation with initial data in modulation spaces $M^{s}_{p^\prime,q}(\mathbb{R}^n),$ $n\geq 1.$ After a decomposition of the Boussinesq equation in a $2\times 2$-nonlinear system, we obtain the existence of global and local solutions in several classes of functions with values in $ M^s_{p,q}\times D^{-1}JM^s_{p,q}$ spaces for suitable $p,q$ and $s,$ including the special case $p=2,q=1$ and $s=0.$ Finally, we prove some results of scattering and asymptotic stability in the framework of modulation spaces.


          Determinantal Calabi-Yau varieties in Grassmannians and the Givental $I$-functions. (arXiv:1810.03685v1 [hep-th])      Cache   Translate Page      

Authors: Yoshinori Honma, Masahide Manabe

We examine a class of Calabi-Yau varieties of the determinantal type in Grassmannians and clarify what kind of examples can be constructed explicitly. We also demonstrate how to compute their genus-0 Gromov-Witten invariants from the analysis of the Givental $I$-functions. By constructing $I$-functions from the supersymmetric localization formula for the two dimensional gauged linear sigma models, we describe an algorithm to evaluate the genus-0 A-model correlation functions appropriately. We also check that our results for the Gromov-Witten invariants are consistent with previous results for known examples included in our construction.


          SPDEs with fractional noise in space: continuity in law with respect to the Hurst index. (arXiv:1810.03692v1 [math.PR])      Cache   Translate Page      

Authors: Luca M. Giordano, Maria Jolis, Lluís Quer-Sardanyons

In this article, we consider the quasi-linear stochastic wave and heat equations on the real line and with an additive Gaussian noise which is white in time and behaves in space like a fractional Brownian motion with Hurst index $H\in (0,1)$. The drift term is assumed to be globally Lipschitz. We prove that the solution of each of the above equations is continuous in terms of the index $H$, with respect to the convergence in law in the space of continuous functions.


          Strong nonlinear instability and growth of Sobolev norms near quasiperiodic finite-gap tori for the 2D cubic NLS equation. (arXiv:1810.03694v1 [math.AP])      Cache   Translate Page      

Authors: Marcel Guardia, Zaher Hani, Emanuele Haus, Alberto Maspero, Michela Procesi

We consider the defocusing cubic nonlinear Schr\"odinger equation (NLS) on the two-dimensional torus. The equation admits a special family of elliptic invariant quasiperiodic tori called finite-gap solutions. These are inherited from the integrable 1D model (cubic NLS on the circle) by considering solutions that depend only on one variable. We study the long-time stability of such invariant tori for the 2D NLS model and show that, under certain assumptions and over sufficiently long timescales, they exhibit a strong form of transverse instability in Sobolev spaces $H^s(\mathbb{T}^2)$ ($0<s<1$). More precisely, we construct solutions of the 2D cubic NLS that start arbitrarily close to such invariant tori in the $H^s$ topology and whose $H^s$ norm can grow by any given factor. This work is partly motivated by the problem of infinite energy cascade for 2D NLS, and seems to be the first instance where (unstable) long-time nonlinear dynamics near (linearly stable) quasiperiodic tori is studied and constructed.


          Actor-Critic Deep Reinforcement Learning for Dynamic Multichannel Access. (arXiv:1810.03695v1 [cs.IT])      Cache   Translate Page      

Authors: Chen Zhong, Ziyang Lu, M. Cenk Gursoy, Senem Velipasalar

We consider the dynamic multichannel access problem, which can be formulated as a partially observable Markov decision process (POMDP). We first propose a model-free actor-critic deep reinforcement learning based framework to explore the sensing policy. To evaluate the performance of the proposed sensing policy and the framework's tolerance against uncertainty, we test the framework in scenarios with different channel switching patterns and consider different switching probabilities. Then, we consider a time-varying environment to identify the adaptive ability of the proposed framework. Additionally, we provide comparisons with the Deep-Q network (DQN) based framework proposed in [1], in terms of both average reward and the time efficiency.


          Stable Cluster Variables. (arXiv:1810.03699v1 [math.CO])      Cache   Translate Page      

Authors: Grace Zhang

Richard Eager and Sebastian Franco introduced a change of basis transformation on the F-polynomials of Fomin and Zelevinsky, corresponding to rewriting them in the basis given by fractional brane charges rather than quiver gauge groups. This transformation seems to display a surprising stabilization property, apparently causing the first few terms of the polynomials at each step of the mutation sequence to coincide. Eager and Franco conjecture that this transformation will always cause the polynomials to converge to a formal power series as the number of mutations goes to infinity, at least for quivers possessing certain symmetries and along periodic mutation sequences respecting such symmetries. In this paper, we verify this convergence in the case of the Kronecker and Conifold quivers. We also investigate convergence in the $F_0$ quiver. We provide a combinatorial interpretation for the stable cluster variables in each appropriate case.


          A Three-Dimensional Hybrid Spectral Element-Fourier Spectral Method for Wall-Bounded Two-Phase Flows. (arXiv:1810.03701v1 [physics.flu-dyn])      Cache   Translate Page      

Authors: S.H. Challa, S. Dong, L.D. Zhu

We present a hybrid spectral element-Fourier spectral method for solving the coupled system of Navier-Stokes and Cahn-Hilliard equations to simulate wall-bounded two-phase flows in a three-dimensional domain which is homogeneous in at least one direction. Fourier spectral expansions are employed along the homogeneous direction and $C^0$ high-order spectral element expansions are employed in the other directions. A critical component of the method is a strategy we developed in a previous work for dealing with the variable density/viscosity of the two-phase mixture, which makes the efficient use of Fourier expansions in the current work possible for two-phase flows with different densities and viscosities for the two fluids. The attractive feature of the presented method lies in that the two-phase computations in the three-dimensional space are transformed into a set of de-coupled two-dimensional computations in the planes of the non-homogeneous directions. The overall scheme consists of solving a set of de-coupled two-dimensional equations for the flow and phase-field variables in these planes. The linear algebraic systems for these two-dimensional equations have constant coefficient matrices that need to be computed only once and can be pre-computed. We present ample numerical simulations for different cases to demonstrate the accuracy and capability of the presented method in simulating the class of two-phase problems involving solid walls and moving contact lines.


          Improving resource elasticity in cloud computing thanks to model-free control. (arXiv:1810.03702v1 [cs.DC])      Cache   Translate Page      

Authors: Maria Bekcheva, Michel Fliess, Cédric Join, Alireza Moradi, Hugues Mounier

In cloud computing management, the dynamic adaptation of computing resource allocations under time-varying workload is an active domain of investigation. Several control strategies were already proposed. Here the model-free control setting and the corresponding "intelligent" controllers, which are most successful in many concrete engineering situations, are employed for the "horizontal elasticity." When compared to the commercial "Auto-Scaling" algorithms, our easily implementable approach, behaves better even with sharp workload fluctuations. This is confirmed by experiments on Amazon Web Services (AWS).


          Global Existence of Geometric Rough Flows. (arXiv:1810.03708v1 [math.DG])      Cache   Translate Page      

Authors: Bruce K. Driver

In this paper we consider rough differential equations on a smooth manifold $\left( M\right) .$ The main result of this paper gives sufficient conditions on the driving vector-fields so that the rough ODE's have global (in time) solutions. The sufficient conditions involve the existence of a complete Riemannian metric $\left( g\right) $ on $M$ such that the covariant derivatives of the driving fields and their commutators to a certain order (depending on the roughness of the driving path) are bounded. Many of the results of this paper are generalizations to manifolds of the fundamental results in \cite{Bailleul2015a}.


          Bounding the minimal number of generators of an Azumaya algebra. (arXiv:1810.03710v1 [math.RA])      Cache   Translate Page      

Authors: Ben Williams

A paper of U. First & Z. Reichstein proves that if $R$ is a commutative ring of dimension $d$, then any Azumaya algebra $A$ over $R$ can be generated as an algebra by $d+2$ elements, by constructing such a generating set, but they do not prove that this number of generators is required, or even that for an arbitrarily large $r$ that there exists an Azumaya algebra requiring $r$ generators. In this paper, for any given fixed $n\ge 2$, we produce examples of a base ring $R$ of dimension $d$ and an Azumaya algebra of degree $n$ over $R$ that requires $r(d,n) = \lfloor \frac{d}{2n-2} \rfloor + 2$ generators. While $r(d,n) < d+2$ in general, we at least show that there is no uniform upper bound on the number of generators required for Azumaya algebras. The method of proof is to consider certain varieties $B^r_n$ that are universal varieties for degree-$n$ Azumaya algebras equipped with a set of $r$ generators, and specifically we show that a natural map on Chow group $CH^{(r-1)(n-1)}_{PGL_n} \to CH^{(r-1)(n-1)}(B^r_n)$ fails to be injective, which is to say that the map fails to be injective in the first dimension in which it possibly could fail. This implies that for a sufficiently generic rank-$n$ Azumaya algebra, there is a characteristic class obstruction to generation by $r$ elements.


          Exponential matrices. (arXiv:1810.03719v1 [math.RT])      Cache   Translate Page      

Authors: Ryuji Tanimoto

In this article, we introduce a notion of an exponential matrix, which is a polynomial matrix with exponential properties, and a notion of an equivalence relation of two exponential matrices, and then we initiate to study classifying exponential matrices in positive characteristic, up to equivalence. We classify exponential matrices of Heisenberg groups in positive characteristic, up to equivalence. We also classify exponential matrices of size four-by-four in positive characteristic, up to equivalence. From these classifications, we obtain a classification of modular representations of elementary abelian $p$-groups into Heisenberg groups, up to equivalence, and a classification of four-dimensional modular representations of elementary abelian $p$-groups, up to equivalence.


          Optimal Steady-State Control for Linear Time-Invariant Systems. (arXiv:1810.03724v1 [math.OC])      Cache   Translate Page      

Authors: Liam S. P. Lawrence, Zachary E. Nelson, Enrique Mallada, John W. Simpson-Porco

We consider the problem of designing a feedback controller that guides the input and output of a linear time-invariant system to a minimizer of a convex optimization problem. The system is subject to an unknown disturbance that determines the feasible set defined by the system equilibrium constraints. Our proposed design enforces the Karush-Kuhn-Tucker optimality conditions in steady-state without incorporating dual variables into the controller. We prove that the input and output variables achieve optimality in equilibrium and outline two procedures for designing controllers that stabilize the closed-loop system. We explore key ideas through simple examples and simulations.


          Exotic Springer fibers for orbits corresponding to one-row bipartitions. (arXiv:1810.03731v1 [math.RT])      Cache   Translate Page      

Authors: Neil Saunders, Arik Wilbert

We study the geometry and topology of exotic Springer fibers for orbits corresponding to one-row bipartitions from an explicit, combinatorial point of view. This includes a detailed analysis of the structure of the irreducible components and their intersections as well as the construction of an explicit affine paving. Moreover, we compute the ring structure of cohomology by constructing a CW-complex homotopy equivalent to the exotic Springer fiber. This homotopy equivalent space admits an action of the type C Weyl group inducing Kato's original exotic Springer representation on cohomology. Our results are described in terms of the diagrammatics of the two-boundary Temperley-Lieb algebra. This provides a first step in generalizing the geometric versions of Khovanov's arc algebra to the exotic setting.


          Find the dimension that counts: Fast dimension estimation and Krylov PCA. (arXiv:1810.03733v1 [cs.NA])      Cache   Translate Page      

Authors: Shashanka Ubaru, Abd-Krim Seghouane, Yousef Saad

High dimensional data and systems with many degrees of freedom are often characterized by covariance matrices. In this paper, we consider the problem of simultaneously estimating the dimension of the principal (dominant) subspace of these covariance matrices and obtaining an approximation to the subspace. This problem arises in the popular principal component analysis (PCA), and in many applications of machine learning, data analysis, signal and image processing, and others. We first present a novel method for estimating the dimension of the principal subspace. We then show how this method can be coupled with a Krylov subspace method to simultaneously estimate the dimension and obtain an approximation to the subspace. The dimension estimation is achieved at no additional cost. The proposed method operates on a model selection framework, where the novel selection criterion is derived based on random matrix perturbation theory ideas. We present theoretical analyses which (a) show that the proposed method achieves strong consistency (i.e., yields optimal solution as the number of data-points $n\rightarrow \infty$), and (b) analyze conditions for exact dimension estimation in the finite $n$ case. Using recent results, we show that our algorithm also yields near optimal PCA. The proposed method avoids forming the sample covariance matrix (associated with the data) explicitly and computing the complete eigen-decomposition. Therefore, the method is inexpensive, which is particularly advantageous in modern data applications where the covariance matrices can be very large. Numerical experiments illustrate the performance of the proposed method in various applications.


          Random polymers via orthogonal Whittaker and symplectic Schur functions. (arXiv:1810.03734v1 [math.PR])      Cache   Translate Page      

Authors: Elia Bisi

This thesis deals with some $(1+1)$-dimensional lattice path models from the KPZ universality class: the directed random polymer with inverse-gamma weights (known as log-gamma polymer) and its zero temperature degeneration, i.e. the last passage percolation model, with geometric or exponential waiting times. We consider three path geometries: point-to-line, point-to-half-line, and point-to-line with paths restricted to stay in a half-plane. Through exact formulas, we establish new connections between integrable probabilistic models and the ubiquitous Whittaker and Schur functions.

More in detail, via the use of A. N. Kirillov's geometric Robinson-Schensted-Knuth (RSK) correspondence, we compute the Laplace transform of the polymer partition functions in the above geometries in terms of orthogonal Whittaker functions. In the case of the first two geometries we also provide multiple contour integral formulas.

For the corresponding last passage percolation problems, we obtain new formulas in terms of symplectic Schur functions, both directly via RSK on polygonal arrays and via zero temperature limit from the log-gamma polymer formulas. As scaling limits of the point-to-line and point-to-half-line models with exponential waiting times, we derive Sasamoto's Fredholm determinant formula for the GOE Tracy-Widom distribution, as well as the one-point marginal distribution of the ${\rm Airy}_{2\to1}$ process.


          Null screen quasi-conformal hypersurfaces in semi-Riemannian manifolds and applications. (arXiv:1810.03735v1 [math.DG])      Cache   Translate Page      

Authors: Matias Navarro, Oscar Palmas, Didier Solis

We introduce a class of null hypersurfaces of a semi-Riemannian manifold, namely, screen quasi-conformal hypersurfaces, whose geometry may be studied through the geometry of its screen distribution. In particular, this notion allows us to extend some results of previous works to the case in which the sectional curvature of the ambient space is different from zero. As applications, we study umbilical, isoparametric and Einstein null hypersurfaces in Lorentzian space forms and provide several classification results.


          Sunflowers of Convex Open Sets. (arXiv:1810.03741v1 [math.CO])      Cache   Translate Page      

Authors: R. Amzi Jeffs

A sunflower is a collection of sets $\{U_1,\ldots, U_n\}$ such that the pairwise intersection $U_i\cap U_j$ is the same for all choices of distinct $i$ and $j$. We study sunflowers of convex open sets in $\mathbb R^d$, and provide a Helly-type theorem describing a certain "rigidity" that they possess. In particular we show that if $\{U_1,\ldots, U_{d+1}\}$ is a sunflower in $\mathbb R^d$, then any hyperplane that intersects all $U_i$ must also intersect $\bigcap_{i=1}^{d+1} U_i$. We use our results to describe a combinatorial code $\mathcal C_n$ for all $n\ge 2$ which is on the one hand minimally non-convex, and on the other hand has no local obstructions. Along the way we further develop the theory of morphisms of codes, and establish results on the covering relation in the poset $\mathbb P_{\mathbf{Code}}$.


          Logarithmic Chow theory. (arXiv:1810.03746v1 [math.AG])      Cache   Translate Page      

Authors: Lawrence Jack Barrott

Log geometry was introduced by Kato based on ideas of Illusie and Fontaine, who expanded on it to control degenerations of varieties. This theory enhances a scheme with a sheaf of monoids over the structure sheaf. Many of the notions of algebraic geometry, such as smoothness and flatness, can be copied across to log geometry, as explained most vividly by Olsson. This led us to ask whether other geometric notions can be transferred to this setting.

In this paper we describe a refined Chow theory for log varieties. This was motivated by the construction by Abramovich, Chen, Gross and Siebert of log Gromov-Witten invariants. This produces a dimension graded family of Abelian groups supporting a push-forward and pull-back along proper and log flat morphisms respectively.


          Restricted percolation critical exponents in high dimensions. (arXiv:1810.03750v1 [math.PR])      Cache   Translate Page      

Authors: Shirshendu Chatterjee, Jack Hanson

Despite great progress in the study of critical percolation on $\mathbb{Z}^d$ for $d$ large, properties of critical clusters in high-dimensional fractional spaces and boxes remain poorly understood, unlike the situation in two dimensions. Closely related models such as critical branching random walk give natural conjectures for the value of the relevant high-dimensional critical exponents; see in particular the conjecture by Kozma-Nachmias that the probability that $0$ and $(n, n, n, \ldots)$ are connected within $[-n,n]^d$ scales as $n^{-2-2d}$.

In this paper, we study the properties of critical clusters in high-dimensional half-spaces and boxes. In half-spaces, we show that the probability of an open connection ("arm") from $0$ to the boundary of a sidelength $n$ box scales as $n^{-3}$. We also find the scaling of the half-space two-point function (the probability of an open connection between two vertices) and the tail of the cluster size distribution. In boxes, we obtain the scaling of the two-point function between vertices which are any macroscopic distance away from the boundary.


          The Brunn-Minkowski inequality and a Minkowski problem for $\mathcal{A}$-harmonic Green's function. (arXiv:1810.03752v1 [math.AP])      Cache   Translate Page      

Authors: Murat Akman, John Lewis, Olli Saari, Andrew Vogel

In this article we study two classical problems in convex geometry associated to $\mathcal{A}$-harmonic PDEs, quasi-linear elliptic PDEs whose structure is modeled on the $p$-Laplace equation. Let $p$ be fixed with $2\leq n\leq p<\infty$. For a convex compact set $E$ in $\mathbb{R}^{n}$, we define and then prove the existence and uniqueness of the so called $\mathcal{A}$-harmonic Green's function for the complement of $E$ with pole at infinity. We then define a quantity $\mbox{C}_{\mathcal{A}}(E)$ which can be seen as the behavior of this function near infinity.

In the first part of this article, we prove that $\mbox{C}_{\mathcal{A}}(\cdot)$ satisfies the following Brunn-Minkowski type inequality \[ \left[\mbox{C}_\mathcal{A} ( \lambda E_1 + (1-\lambda) E_2 )\right]^{\frac{1}{p-n}} \geq \lambda \, \left[\mbox{C}_\mathcal{A} ( E_1 )\right]^{\frac{1}{p-n}} + (1-\lambda) \left[\mbox{C}_\mathcal{A} (E_2 )\right]^{\frac{1}{p-n}} \] when $n<p<\infty$, $0 \leq \lambda \leq 1$, and $E_1, E_2$ are nonempty convex compact sets in $\mathbb{R}^{n}$. We also show that $\mbox{C}_\mathcal{A}(\cdot)$ satisfies a similar inequality when $p=n$. Moreover, if equality holds in the either of these inequalities for some $E_1$ and $E_2$ then under certain regularity and structural assumptions on $\mathcal{A}$ we show that these two sets are homothetic.

In the second part of this article we study a Minkowski type problem for a measure associated to the $\mathcal{A}$-harmonic Green's function for the complement of a convex compact set $E$ when $n\leq p<\infty$. If $\mu_E$ denotes this measure, then we show that necessary and sufficient conditions for existence under this setting are exactly the same conditions as in the classical Minkowski problem. We also show that this problem has a unique solution up to translation.


          Coded Energy-Efficient Beam-Alignment for Millimeter-Wave Networks. (arXiv:1810.03755v1 [cs.IT])      Cache   Translate Page      

Authors: Muddassar Hussain, Nicolo Michelusi

Millimeter-wave communications rely on narrow-beam transmissions to cope with the strong signal attenuation at these frequencies, thus demanding precise alignment between transmitter and receiver. However, the beam-alignment procedure may entail a huge overhead and its performance may be degraded by detection errors. This paper proposes a coded energy-efficient beam-alignment scheme, robust against detection errors. Specifically, the beam-alignment sequence is designed such that the error-free feedback sequences are generated from a codebook with the desired error correction capabilities. Therefore, in the presence of detection errors, the error-free feedback sequences can be recovered with high probability. The assignment of beams to codewords is designed to optimize energy efficiency, and a water-filling solution is proved. The numerical results with analog beams depict up to 4dB and 8dB gains over exhaustive and uncoded beam-alignment schemes, respectively.


          Thermodynamic Formalism for Topological Markov Chains on Borel Standard Spaces. (arXiv:1810.03757v1 [math.DS])      Cache   Translate Page      

Authors: L. Cioletti, E. A. Silva, M. Stadlbauer

We develop a Thermodynamic Formalism for bounded continuous potentials defined on the sequence space $X\equiv E^{\mathbb{N}}$, where $E$ is a general Borel standard space. In particular, we introduce meaningful concepts of entropy and pressure for shifts acting on $X$ and obtain the existence of equilibrium states as additive probability measures for any bounded continuous potential. Furthermore, we establish convexity and other structural properties of the set of equilibrium states, prove a version of the Perron-Frobenius-Ruelle theorem under additional assumptions on the regularity of the potential and show that the Yosida-Hewitt decomposition of these equilibrium states do not have a purely additive part.

We then apply our results to the construction of invariant measures of time-homogeneous Markov chains taking values on a general Borel standard space and obtain exponential asymptotic stability for a class of Markov operators. We also construct conformal measures for an infinite collection of interacting random paths which are associated to a potential depending on infinitely many coordinates. Under an additional differentiability hypothesis, we show how this process is related after a proper scaling limit to a certain infinite dimensional diffusion.


          Cubic Regularization with Momentum for Nonconvex Optimization. (arXiv:1810.03763v1 [math.OC])      Cache   Translate Page      

Authors: Zhe Wang, Yi Zhou, Yingbin Liang, Guanghui Lan

Momentum is a popular technique to accelerate the convergence in practical training, and its impact on convergence guarantee has been well-studied for first-order algorithms. However, such a successful acceleration technique has not yet been proposed for second-order algorithms in nonconvex optimization.In this paper, we apply the momentum scheme to cubic regularized (CR) Newton's method and explore the potential for acceleration. Our numerical experiments on various nonconvex optimization problems demonstrate that the momentum scheme can substantially facilitate the convergence of cubic regularization, and perform even better than the Nesterov's acceleration scheme for CR. Theoretically, we prove that CR under momentum achieves the best possible convergence rate to a second-order stationary point for nonconvex optimization. Moreover, we study the proposed algorithm for solving problems satisfying an error bound condition and establish a local quadratic convergence rate. Then, particularly for finite-sum problems, we show that the proposed algorithm can allow computational inexactness that reduces the overall sample complexity without degrading the convergence rate.


          The existence of perfect codes in Doob graphs. (arXiv:1810.03772v1 [cs.IT])      Cache   Translate Page      

Authors: Denis S. Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)

We solve the problem of existence of perfect codes in the Doob graph. It is shown that 1-perfect codes in the Doob graph D(m,n) exist if and only if 6m+3n+1 is a power of 2; that is, if the size of a 1-ball divides the number of vertices.


          The lifespan of solutions of semilinear wave equations with the scale invariant damping in one space dimension. (arXiv:1810.03780v1 [math.AP])      Cache   Translate Page      

Authors: Masakazu Kato, Hiroyuki Takamura, Kyouhei Wakasa

The critical constant of time-decaying damping in the scale invari- ant case is recently conjectured. It also has been expected that the lifespan estimate is the same as associated semilinear heat equations if the constant is in "heat-like" domain. In this paper, we point out that this is not true if the total integral of the sum of initial position and speed vanishes. In such a case, we have a new type of the lifespan estimates which is closely related to the non-damped case in shifted space dimensions.


          Low dimensional nilpotent n-Lie algebras. (arXiv:1810.03782v1 [math.RA])      Cache   Translate Page      

Authors: Mehdi Eshrati, Farshid Saeedi, Hamid Darabi

In this paper, nilpotent n-Lie algebras of dimension n + 3 as well as nilpotent n-Lie algebras of class 2 and dimension n + 4 are classified.


          Local Uniqueness of The Density From Partial Boundary Data for Isotropic Elastodynamics. (arXiv:1810.03784v1 [math.AP])      Cache   Translate Page      

Authors: Sombuddha Bhattacharyya

We consider an inverse problem in elastodynamics arising in seismic imaging. We prove locally uniqueness of the density of a non-homogeneous, isotropic elastic body from measurements taken on a part of the boundary. We measure the Dirichlet to Neumann map, only on a part of the boundary, corresponding to the isotropic elasticity equation of a 3-dimensional object. In earlier works it has been shown that one can determine the sheer and compressional speeds on a neighborhood of the part of the boundary (accessible part) where the measurements have been taken. In this article we show that one can determine the density of the medium as well, on a neighborhood of the accessible part of the boundary.


          A counterexample for the conjecture of finite simple groups. (arXiv:1810.03786v1 [math.GR])      Cache   Translate Page      

Authors: Wujie Shi

In this note we provide some counterexamples for the conjectures of finite simple groups, one of the conjectures said "all finite simple groups $G$ can be determined using their orders $|G|$ and the number of elements of order $p$, where $p$ the largest prime divisor of $|G|$".


          Atomic decomposition of product Hardy spaces via wavelet bases on spaces of homogeneous type. (arXiv:1810.03788v1 [math.CA])      Cache   Translate Page      

Authors: Yongsheng Han, Ji Li, M. Cristina Pereyra, Lesley A. Ward

We provide an atomic decomposition of the product Hardy spaces $H^p(\widetilde{X})$ which were recently developed by Han, Li, and Ward in the setting of product spaces of homogeneous type $\widetilde{X} = X_1 \times X_2$. Here each factor $(X_i,d_i,\mu_i)$, for $i = 1$, $2$, is a space of homogeneous type in the sense of Coifman and Weiss.

These Hardy spaces make use of the orthogonal wavelet bases of Auscher and Hyt\"onen and their underlying reference dyadic grids.

However, no additional assumptions on the quasi-metric or on the doubling measure for each factor space are made. To carry out this program, we introduce product $(p,q)$-atoms on $\widetilde{X}$ and product atomic Hardy spaces $H^{p,q}_{{\rm at}}(\widetilde{X})$. As consequences of the atomic decomposition of $H^p(\widetilde{X})$, we show that for all $q > 1$ the product atomic Hardy spaces coincide with the product Hardy spaces, and we show that the product Hardy spaces are independent of the particular choices of both the wavelet bases and the reference dyadic grids. Likewise, the product Carleson measure spaces ${\rm CMO}^p(\widetilde{X})$, the bounded mean oscillation space ${\rm BMO}(\widetilde{X})$, and the vanishing mean oscillation space ${\rm VMO}(\widetilde{X})$, as defined by Han, Li, and Ward, are also independent of the particular choices of both wavelets and reference dyadic grids.


          Orlicz-Besov imbedding and globally $n$-regular domains. (arXiv:1810.03796v1 [math.FA])      Cache   Translate Page      

Authors: Hongyan Sun

Denote by $ {\bf\dot B}^{\alpha,\phi}(\Omega)$ the Orlicz-Besov space, where $\alpha\in\mathbb{R}$, $\phi$ is a Young function and $\Omega\subset\mathbb{R}^n$ is a domain. For $\alpha\in(-n,0)$ and optimal $\phi$, in this paper we characterize domains supporting the imbedding ${\bf\dot B}^{\alpha,\phi}(\Omega)$ into $ L^{n/|\alpha|}(\Omega)$ via globally $n$-regular domains.

This extends the known characterizations for domains supporting the Besov imbedding ${\bf\dot B} ^s_{pp}(\Omega)$ into $ L^{np/(n-sp)}(\Omega)$ with $s\in(0,1)$ and $1\le p<n/s$. The proof of the imbedding ${\bf\dot B}^{\alpha,\phi}(\Omega)\to L^{n/|\alpha|}(\Omega)$ in globally $n$-regular domains $\Omega$ relies on a geometric inequality involving $\phi$ and $\Omega$ , which extends a known geometric inequality of Caffarelli et al.


          An inverse problem for the magnetic Schr\"{o}dinger operator on Riemannian manifolds from partial boundary data. (arXiv:1810.03797v1 [math.AP])      Cache   Translate Page      

Authors: Sombuddha Bhattacharyya

We consider the inverse problem of recovering the magnetic and potential term of a magnetic Schr\"{o}dinger operator on certain compact Riemannian manifolds with boundary from partial Dirichlet and Neumann data on suitable subsets of the boundary. The uniqueness proof relies on proving a suitable Carleman estimate for functions which vanish only on a part of boundary and constructing complex geometric optics solutions which vanish on a part of the boundary.


          The characteristic classes and Weyl invariants of Spin geometry. (arXiv:1810.03799v1 [math.AT])      Cache   Translate Page      

Authors: Haibao Duan

Based on a pair of cohomology operations on so called $\delta-2$-formal spaces, we construct the integral cohomology rings of the classifying spaces of the Lie groups $Spin(n)$ and $Spin^{c}(n)$. As applications, we introduce characteristic classes for the reduced topological $K_{Spin}$ theory, determine the ring of integral Weyl invariants of the group $Spin(n)$, and generalize the classical Rokhlin Theorem.


          Geometry of the minimal spanning tree of a random $3$-regular graph. (arXiv:1810.03802v1 [math.PR])      Cache   Translate Page      

Authors: Louigi Addario-Berry, Sanchayan Sen

The global structure of the minimal spanning tree (MST) is expected to be universal for a large class of underlying random discrete structures. But very little is known about the intrinsic geometry of MSTs of most standard models, and so far the scaling limit of the MST viewed as a metric measure space has only been identified in the case of the complete graph [4].

In this work, we show that the MST constructed by assigning i.i.d. continuous edge-weights to either the random (simple) $3$-regular graph or the $3$-regular configuration model on $n$ vertices, endowed with the tree distance scaled by $n^{-1/3}$ and the uniform probability measure on the vertices, converges in distribution with respect to Gromov-Hausdorff-Prokhorov topology to a random compact metric measure space. Further, this limiting space has the same law as the scaling limit of the MST of the complete graph identified in [4] up to a scaling factor of $6^{1/3}$. Our proof relies on a novel argument that uses a coupling between the $3$-regular configuration model and the Erd\H{o}s-R\'enyi random graph. The techniques of this paper can be used to establish the scaling limit of the MST in the setting of various different random graph models provided one additional technical condition is verified.


          A Dichotomy Theorem for First-Fit Chain Partitions. (arXiv:1810.03807v1 [math.CO])      Cache   Translate Page      

Authors: Kevin G. Milans, Michael C. Wigal

First-Fit is a greedy algorithm for partitioning the elements of a poset into chains. Let $\textrm{FF}(w,Q)$ be the maximum number of chains that First-Fit uses on a $Q$-free poset of width $w$. A result due to Bosek, Krawczyk, and Matecki states that $\textrm{FF}(w,Q)$ is finite when $Q$ has width at most $2$. We describe a family of posets $\mathcal{Q}$ and show that the following dichotomy holds: if $Q\in\mathcal{Q}$, then $\textrm{FF}(w,Q) \le 2^{c(\log w)^2}$ for some constant $c$ depending only on $Q$, and if $Q\not\in\mathcal{Q}$, then $\textrm{FF}(w,Q) \ge 2^w - 1$.


          Numerical study of ergodicity for the overdamped Generalized Langevin Equation with fractional noise. (arXiv:1810.03810v1 [math.NA])      Cache   Translate Page      

Authors: Di Fang, Lei Li

The Generalized Langevin Equation, in history, arises as a natural fix for the rather traditional Langevin equation when the random force is no longer memoryless. It has been proved that with fractional Gaussian noise (fGn) mostly considered by biologists, the overdamped Generalized Langevin equation satisfying fluctuation-dissipation theorem can be written as a fractional stochastic differential equation (FSDE). While the ergodicity is clear for linear forces, it remains less transparent for nonlinear forces. In this work, we present both a direct and a fast algorithm respectively to this FSDE model. The strong orders of convergence are proved for both schemes, where the role of the memory effects can be clearly observed. We verify the convergence theorems using linear forces, and then present the ergodicity study of the double well potentials in both 1D and 2D setups.


          On the Relationship between Energy Complexity and Other Boolean Function Measures. (arXiv:1810.03811v1 [cs.CC])      Cache   Translate Page      

Authors: Xiaoming Sun, Yuan Sun, Kewen Wu, Zhiyu Xia

In this work we investigate into energy complexity, a Boolean function measure related to circuit complexity. Given a circuit $\mathcal{C}$ over the standard basis $\{\vee_2,\wedge_2,\neg\}$, the energy complexity of $\mathcal{C}$, denoted by $\mathrm{EC}(\mathcal{C})$, is the maximum number of its activated inner gates over all inputs. The energy complexity of a Boolean function $f$, denoted by $\mathrm{EC}(f)$, is the minimum of $\mathrm{EC}(\mathcal{C})$ over all circuits $\mathcal{C}$ computing $f$. This concept has attracted lots of attention in literature. Recently, Denish, Otiv, and Sarma [COCOON'18] gave $\mathrm{EC}(f)$ an upper bound in terms of the decision tree complexity, $\mathrm{EC}(f)=O(\mathrm{D}(f)^3)$. They also showed that $\mathrm{EC}(f)\leq 3n-1$, where $n$ is the input size. Recall that the minimum size of circuit to compute $f$ could be as large as $2^n/n$. We improve their upper bounds by showing that $\mathrm{EC}(f)\leq\min\{\frac12\mathrm{D}(f)^2+O(\mathrm{D}(f)),n+2\mathrm{D}(f)-2\}$. For the lower bound, Denish, Otiv, and Sarma defined positive sensitivity, a complexity measure denoted by $\mathrm{psens}(f)$, and showed that $\mathrm{EC}(f)\ge\frac{1}{3}\mathrm{psens}(f)$. They asked whether $\mathrm{EC}(f)$ can also be lower bounded by a polynomial of $\mathrm{D}(f)$. In this paper we affirm it by proving $\mathrm{EC}(f)=\Omega(\sqrt{\mathrm{D}(f)})$. For non-degenerated functions with input size $n$, we give another lower bound $\mathrm{EC}(f)=\Omega(\log{n})$. All these three lower bounds are incomparable to each other. Besides, we also examine the energy complexity of $\mathtt{OR}$ functions and $\mathtt{ADDRESS}$ functions, which implies the tightness of our two lower bounds respectively. In addition, the former one answers another open question asking for a non-trivial lower bounds for the energy complexity of $\mathtt{OR}$ functions.


          SNAP: A semismooth Newton algorithm for pathwise optimization with optimal local convergence rate and oracle properties. (arXiv:1810.03814v1 [stat.ML])      Cache   Translate Page      

Authors: Jian Huang, Yuling Jiao, Xiliang Lu, Yueyong Shi, Qinglong Yang

We propose a semismooth Newton algorithm for pathwise optimization (SNAP) for the LASSO and Enet in sparse, high-dimensional linear regression. SNAP is derived from a suitable formulation of the KKT conditions based on Newton derivatives. It solves the semismooth KKT equations efficiently by actively and continuously seeking the support of the regression coefficients along the solution path with warm start. At each knot in the path, SNAP converges locally superlinearly for the Enet criterion and achieves an optimal local convergence rate for the LASSO criterion, i.e., SNAP converges in one step at the cost of two matrix-vector multiplication per iteration. Under certain regularity conditions on the design matrix and the minimum magnitude of the nonzero elements of the target regression coefficients, we show that SNAP hits a solution with the same signs as the regression coefficients and achieves a sharp estimation error bound in finite steps with high probability. The computational complexity of SNAP is shown to be the same as that of LARS and coordinate descent algorithms per iteration. Simulation studies and real data analysis support our theoretical results and demonstrate that SNAP is faster and accurate than LARS and coordinate descent algorithms.


          Feynman Integrals and Intersection Theory. (arXiv:1810.03818v1 [hep-th])      Cache   Translate Page      

Authors: Pierpaolo Mastrolia, Sebastian Mizera

We introduce the tools of intersection theory to the study of Feynman integrals, which allows for a new way of projecting integrals onto a basis. In order to illustrate this technique, we consider Baikov representation of maximal cuts in arbitrary space-time dimension. We introduce a minimal basis of differential forms with logarithmic singularities on the boundaries of the corresponding integration cycles. We give an algorithm for computing a basis decomposition of an arbitrary maximal cut using the so-called intersection numbers and describe two alternative ways of computing them. Furthermore, we show how to obtain Pfaffian systems of differential equations for the basis integrals using the same technique. All the steps are illustrated on the example of a two-loop non-planar triangle diagram with a massive loop.


          Sufficient and Necessary Conditions for the Identifiability of the $Q$-matrix. (arXiv:1810.03819v1 [math.ST])      Cache   Translate Page      

Authors: Yuqi Gu, Gongjun Xu

Restricted latent class models (RLCMs) have recently gained prominence in educational assessment, psychiatric evaluation, and medical diagnosis. Different from conventional latent class models, restrictions on RLCM model parameters are imposed by a design matrix to respect practitioners' scientific assumptions. The design matrix, called the $Q$-matrix in cognitive diagnosis literature, is usually constructed by practitioners and domain experts, yet it is subjective and could be misspecified. To address this problem, researchers have proposed to estimate the design $Q$-matrix from the data. On the other hand, the fundamental learnability issue of the $Q$-matrix and model parameters remains underexplored and existing studies often impose stronger than needed or even impractical conditions. This paper proposes the sufficient and necessary conditions for the joint identifiability of the $Q$-matrix and RLCM model parameters. The developed identifiability conditions only depend on the design matrix and therefore is easy to verify in practice.


          Serre weight conjectures for $p$-adic unitary groups of rank 2. (arXiv:1810.03827v1 [math.NT])      Cache   Translate Page      

Authors: Karol Koziol, Stefano Morra

We prove a version of the weight part of Serre's conjecture for mod $p$ Galois representations attached to automorphic forms on rank 2 unitary groups which are non-split at $p$. More precisely, let $F/F^+$ denote a CM extension of a totally real field such that every place of $F^+$ above $p$ is unramified and inert in $F$, and let $\overline{r}: \textrm{Gal}(\overline{F^+}/F^+) \longrightarrow {}^C\mathbf{U}_2(\overline{\mathbb{F}}_p)$ be a Galois parameter valued in the $C$-group of a rank 2 unitary group attached to $F/F^+$. We assume that $\overline{r}$ is semisimple and sufficiently generic at all places above $p$. Using base change techniques and (a strengthened version of) the Taylor-Wiles-Kisin conditions, we prove that the set of Serre weights in which $\overline{r}$ is modular agrees with the set of Serre weights predicted by Gee-Herzig-Savitt.


          An elliptic second main theorem. (arXiv:1810.03830v1 [math.CV])      Cache   Translate Page      

Authors: Julien Duval

We prove a second main theorem for elliptic projective planes.


          A Fourier extension based numerical integration scheme for fast and high-order approximation of convolutions with weakly singular kernels. (arXiv:1810.03835v1 [math.NA])      Cache   Translate Page      

Authors: Akash Anand, Awanish Kumar Tiwari

Computationally efficient numerical methods for high-order approximations of convolution integrals involving weakly singular kernels find many practical applications including those in the development of fast quadrature methods for numerical solution of integral equations. Most fast techniques in this direction utilize uniform grid discretizations of the integral that facilitate the use of FFT for $O(n\log n)$ computations on a grid of size $n$. In general, however, the resulting error converges slowly with increasing $n$ when the integrand does not have a smooth periodic extension. Such extensions, in fact, are often discontinuous and, therefore, their approximations by truncated Fourier series suffer from Gibb's oscillations. In this paper, we present and analyze an $O(n\log n)$ scheme, based on a Fourier extension approach for removing such unwanted oscillations, that not only converges with high-order but is also relatively simple to implement. We include a theoretical error analysis as well as a wide variety of numerical experiments to demonstrate its efficacy.


          Lipschitz regularity for orthotropic functionals with nonstandard growth conditions. (arXiv:1810.03837v1 [math.AP])      Cache   Translate Page      

Authors: Pierre Bousquet, Lorenzo Brasco

We consider a model convex functional with orthotropic structure and super-quadratic nonstandard growth conditions. We prove that bounded local minimizers are locally Lipschitz, with no restrictions on the ratio between the highest and the lowest growth rate.


          A class of univalent functions with real coefficients. (arXiv:1810.03839v1 [math.CV])      Cache   Translate Page      

Authors: Milutin Obradovic, Nikola Tuneski

In this paper we study class $\mathcal{S}^+$ of univalent functions $f$ such that $\frac{z}{f(z)}$ has real and positive coefficients. For such functions we give estimates of the Fekete-Szeg\H{o} functional and sharp estimates of their initial coefficients and logarithmic coefficients. Also, we present necessary and sufficient conditions for $f\in \mathcal{S}^+$ to be starlike of order $1/2$.


          Heights and periodic points for one-parameter families of H\'enon maps. (arXiv:1810.03841v1 [math.NT])      Cache   Translate Page      

Authors: Liang-Chung Hsia, Shu Kawaguchi

In this paper we study arithmetic properties of a one-parameter family ${\mathbf H}$ of H\'enon maps over the affine line. Given a family of initial points ${\mathbf P}$ satisfying a natural condition, we show the height function $h_{{\mathbf P}}$ associated to ${\mathbf H}$ and ${\mathbf P}$ is the restriction of the height function associated to a semipositive adelically metrized line bundle on projective line. We then show various local properties of $h_{{\mathbf P}}$. Next we consider the set $\Sigma({\mathbf P})$ consisting of periodic parameter values, and study when $\Sigma({\mathbf P})$ is an infinite set or not. We also study unlikely intersections of periodic parameter values.


          A Convex Optimization Approach to Dynamic Programming in Continuous State and Action Spaces. (arXiv:1810.03847v1 [math.OC])      Cache   Translate Page      

Authors: Insoon Yang

A convex optimization-based method is proposed to numerically solve dynamic programs in continuous state and action spaces. This approach using a discretization of the state space has the following salient features. First, by introducing an auxiliary optimization variable that assigns the contribution of each grid point, it does not require an interpolation in solving an associated Bellman equation and constructing a control policy. Second, the proposed method allows us to solve the Bellman equation with a desired level of precision via convex programming in the case of linear systems and convex costs. We can also construct a control policy of which performance converges to the optimum as the grid resolution becomes finer in this case. Third, when a nonlinear control-affine system is considered, the convex optimization approach provides an approximate control policy with a provable suboptimality bound. Fourth, for general cases, the proposed convex formulation of dynamic programming operators can be simply modified as a nonconvex bi-level program, in which the inner problem is a linear program, without losing convergence properties. From our convex methods and analyses, we observe that convexity in dynamic programming deserves attention as it can play a critical role in obtaining a tractable and convergent numerical solution.


          Sharp convergence of nonlinear functionals of a class of Gaussian random fields. (arXiv:1810.03850v1 [math.PR])      Cache   Translate Page      

Authors: Weijun Xu

We present a self-contained proof of a uniform bound on multi-point correlations of trigonometric functions of a class of Gaussian random fields. It corresponds to a special case of the general situation considered in [Hairer-Xu], but with improved estimates. As a consequence, we establish convergence of a class of Gaussian fields composite with more general functions. These bounds and convergences are useful ingredients to establish weak universalities of several singular stochastic PDEs.


          Hardy's Inequality for Laguerre Expansions of Hermite Type. (arXiv:1810.03859v1 [math.CA])      Cache   Translate Page      

Authors: Paweł Plewa

Hardy's inequality for Laguerre expansions of Hermite type with the index $\al\in(\{-1/2\}\cup[1/2,\infty))^d$ is proved in the multi-dimensional setting with the exponent $3d/4$. We also obtain the sharp analogue of Hardy's inequality with $L^1$ norm replacing $H^1$ norm at the expense of increasing the exponent by an arbitrarily small value.


          Application of Cheeger-Gromov theory to the $l^2$-cohomology of harmonic Higgs bundles over covering of finite volume complete manifolds. (arXiv:1810.03863v1 [math.CV])      Cache   Translate Page      

Authors: Pascal Dingoyan, Georg Schumacher

We review and apply Cheeger-Gromov theory on $l^2$-cohomology of infinite coverings of complete manifolds with bounded curvature and finite volume. Applications focus on $l^2$-cohomology of (pullback of) harmonic Higgs bundles on some covering of Zariski open sets of K\"ahler manifolds. The $l^2-$Dolbeault to DeRham spectral sequence of these Higgs bundles is seen to degenerate at $E_2$.


          Contraction-Based Sparsification in Near-Linear Time. (arXiv:1810.03865v1 [math.CO])      Cache   Translate Page      

Authors: On-Hei Solomon Lo, Jens M. Schmidt, Mikkel Thorup

Recently, Kawarabayashi and Thorup presented the first deterministic edge-connectivity recognition algorithm in near-linear time. A crucial step in their algorithm uses the existence of vertex subsets of a simple graph $G$ on $n$ vertices whose contractions leave a multigraph with $\tilde{O}(n/\delta)$ vertices and $\tilde{O}(n)$ edges that preserves all non-trivial min-cuts of $G$.

We show a very simple argument that improves this contraction-based sparsifier by eliminating the poly-logarithmic factors, that is, we show a contraction-based sparsification that leaves $O(n/\delta)$ vertices and $O(n)$ edges, preserves all non-trivial min-cuts and can be computed in near-linear time $\tilde{O}(|E(G)|)$. As consequence, every simple graph has $O((n/\delta)^2)$ non-trivial min-cuts.

Our approach allows to represent all non-trivial min-cuts of a graph by a cactus representation, whose cactus graph has $O(n/\delta)$ vertices. Moreover, this cactus representation can be derived directly from the standard cactus representation of all min-cuts in linear time.


          A sub-Finsler problem on the Cartan group. (arXiv:1810.03869v1 [math.DG])      Cache   Translate Page      

Authors: A. Ardentov, E. Le Donne, Yu. Sachkov

In this paper we study a sub-Finsler geometric problem on the free-nilpotent group of rank 2 and step 3. Such a group is also called Cartan group and has a natural structure of Carnot group, which we metrize considering the $\ell_\infty$ norm on its first layer. We adopt the point of view of time-optimal control theory. We characterize extremal curves via Pontryagin maximum principle. We describe abnormal and singular arcs, and construct the bang-bang flow.


          E. Cartan's attempt at bridge-building between Einstein and the Cosserats -- or how translational curvature became to be known as {\em torsion}. (arXiv:1810.03872v1 [math.HO])      Cache   Translate Page      

Authors: Erhard Scholz

\'Elie Cartan's "g\'en\'eralisation de la notion de courbure" (1922) arose from a creative evaluation of the geometrical structures underlying both, Einstein's theory of gravity and the Cosserat brothers generalized theory of elasticity. In both theories groups operating in the infinitesimal played a crucial role. To judge from his publications in 1922--24, Cartan developed his concept of generalized spaces with the dual context of general relativity and non-standard elasticity in mind. In this context it seemed natural to express the translational curvature of his new spaces by a rotational quantity (via a kind of Grassmann dualization). So Cartan called his translational curvature "torsion" and coupled it to a hypothetical rotational momentum of matter several years before spin was encountered in quantum mechanics.


          Spinor field equations and the problem of prescribing mean curvature on $S^2$. (arXiv:1810.03874v1 [math.DG])      Cache   Translate Page      

Authors: Tian Xu

Let $\Sigma$ denote the class of positive smooth functions on $S^2$, we show that there exists a $C^1$-dense subset $\mathscr{Q}$ of $\Sigma$ such that each $Q\in\mathscr{Q}$ can be prescribed as the mean curvature of a conformal isometric embedding $S^2\hookrightarrow\mathbb{R}^3$.


          Linear Codes Associated to Skew-symmetric Determinantal Varieties. (arXiv:1810.03878v1 [math.CO])      Cache   Translate Page      

Authors: Peter Beelen, Prasant Singh

In this article we consider linear codes coming from skew-symmetric determinantal varieties, which are defined by the vanishing of minors of a certain fixed size in the space of skew-symmetric matrices. In odd characteristic, the minimum distances of these codes are determined and a recursive formula for the weight of a general codeword in these codes is given.


          Finite orthogonal groups and periodicity of links. (arXiv:1810.03881v1 [math.GT])      Cache   Translate Page      

Authors: Maciej Borodzik, Przemysław Grabowski, Adam Król, Maria Marchwicka

For a prime number $q\neq 2$ and $r>0$ we study, whether there exists an isometry of order $q^r$ acting on a free $\mathbb{Z}_{p^k}$-module equipped with a scalar product. We investigate, whether there exists such an isometry with no non-zero fixed points. Both questions are completely answered in this paper if $p\neq 2,q$. As an application we refine Naik's criterion for periodicity of links in $S^3$. The periodicity criterion we obtain is effectively computable and gives concrete restrictions for periodicity of low-crossing knots.


          Fat and Thin Emergent Geometries of Hermitian One-Matrix Models. (arXiv:1810.03883v1 [math-ph])      Cache   Translate Page      

Authors: Jian Zhou

We use genus zero free energy functions of Hermitian matrix models to define spectral curves and their special deformations. They are special plane curves defined by formal power series with integral coefficients generalizing the Catalan numbers. This is done in two different versions, depending on two different genus expansions, and these two versions are in some sense dual to each other.


          POD model order reduction with space-adapted snapshots for incompressible flows. (arXiv:1810.03892v1 [math.NA])      Cache   Translate Page      

Authors: Carmen Gräßle, Michael Hinze, Jens Lang, Sebastian Ullmann

We consider model order reduction based on proper orthogonal decomposition (POD) for unsteady incompressible Navier-Stokes problems, assuming that the snapshots are given by spatially adapted finite element solutions. We propose two approaches of deriving stable POD-Galerkin reduced-order models for this context. In the first approach, the pressure term and the continuity equation are eliminated by imposing a weak incompressibility constraint with respect to a pressure reference space. In the second approach, we derive an inf-sup stable velocity-pressure reduced-order model by enriching the velocity reduced space with supremizers computed on a velocity reference space. For problems with inhomogeneous Dirichlet conditions, we show how suitable lifting functions can be obtained from standard adaptive finite element computations. We provide a numerical comparison of the considered methods for a regularized lid-driven cavity problem.


          The H-force sets of the graphs satisfying the condition of Ore's theorem. (arXiv:1810.03894v1 [math.CO])      Cache   Translate Page      

Authors: Xinhong Zhang, Ruijuan Li

Let $G$ be a Hamiltonian graph with $n$ vertices. A nonempty vertex set $X\subseteq V(G)$ is called a Hamiltonian cycle enforcing set (in short, an $H$-force set) of $G$ if every $X$-cycle of $G$ (i.e., a cycle of $G$ containing all vertices of $X$) is a Hamiltonian cycle. For the graph $G$, $h(G)$ is the smallest cardinality of an $H$-force set of $G$ and call it the $H$-force number of $G$. Ore's theorem states that the graph $G$ is Hamiltonian if $d(u)+d(v)\geq n$ for every pair of nonadjacent vertices $u,v$ of $G$. In this paper, we study the $H$-force sets of the graphs satisfying the condition of Ore's theorem, show that the $H$-force number of these graphs is possibly $n$, or $n-2$, or $\frac{n}{2}$ and give a classification of these graphs due to the $H$-force number.


          Integer-valued Polynomials, Pr\"ufer Domains and the Sacked Bases Property. (arXiv:1810.03898v1 [math.AC])      Cache   Translate Page      

Authors: Jacques Boulanger, Jean-Luc Chabert

To study the question of whether every two-dimensional Pr\"ufer domain possesses the stacked bases property, we consider the particular case of the Pr\"ufer domains formed by integer-valued polynomials. The description of the spectrum of the rings of integer-valued polynomials on a subset of a rank-one valuation domain enables us to prove that they all possess the stacked bases property. We also consider integer-valued polynomials on rings of integers of number fields and we reduce in this case the study of the stacked bases property to questions concerning $2\times 2$-matrices.


          On balayage and B-balayage operators. (arXiv:1810.03899v1 [math.CV])      Cache   Translate Page      

Authors: Maria Nowak, Paweł Sobolewski

Here we consider the balayage operator in the setting of $H^p$ spaces and its Bergman space version (B-balayage) introduced by H. Wulan, J. Yang and K. Zhu \cite{WYZ}, and extend some known results on these operators.


          A note on the (toric) Newton spectrum of a polynomial. (arXiv:1810.03901v1 [math.AG])      Cache   Translate Page      

Authors: Antoine Douai

We express the Newton spectrum of a polynomial in terms of twisted degrees of cohomology groups of toric varieties. We also define the toric Newton spectrum, which has a natural orbifold flavor.


          Packing chromatic vertex-critical graphs. (arXiv:1810.03904v1 [math.CO])      Cache   Translate Page      

Authors: Sandi Klavžar, Douglas F. Rall

The packing chromatic number $\chi_{\rho}(G)$ of a graph $G$ is the smallest integer $k$ such that the vertex set of $G$ can be partitioned into sets $V_i$, $i\in [k]$, where vertices in $V_i$ are pairwise at distance at least $i+1$. Packing chromatic vertex-critical graphs, $\chi_{\rho}$-critical for short, are introduced as the graphs $G$ for which $\chi_{\rho}(G-x) < \chi_{\rho}(G)$ holds for every vertex $x$ of $G$. If $\chi_{\rho}(G) = k$, then $G$ is $k$-$\chi_{\rho}$-critical. It is shown that if $G$ is $\chi_{\rho}$-critical, then the set $\{\chi_{\rho}(G) - \chi_{\rho}(G-x):\ x\in V(G)\}$ can be almost arbitrary. The $3$-$\chi_{\rho}$-critical graphs are characterized, and $4$-$\chi_{\rho}$-critical graphs are characterized in the case when they contain a cycle of length at least $5$ which is not congruent to $0$ modulo $4$. It is shown that for every integer $k\ge 2$ there exists a $k$-$\chi_{\rho}$-critical tree and that a $k$-$\chi_{\rho}$-critical caterpillar exists if and only if $k\le 7$. Cartesian products are also considered and in particular it is proved that if $G$ and $H$ are connected, vertex-transitive graphs, and ${\rm diam(G)} + {\rm diam}(H) \le \chi_{\rho}(G)$, then $G\,\square\, H$ is $\chi_{\rho}$-critical.


          Conjectures about Traffic Light Queues. (arXiv:1810.03906v1 [math.HO])      Cache   Translate Page      

Authors: Steven Finch, Guy Louchard

In discrete time, \ell-blocks of red lights are separated by \ell-blocks of green lights. Cars arrive at random. The maximum line length of idle cars is fully understood for \ell = 1, but only partially for 2 <= \ell <=3.


          On a class of solutions to the generalized derivative Schr\"odinger equations II. (arXiv:1810.03907v1 [math.AP])      Cache   Translate Page      

Authors: Felipe Linares, Gustavo Ponce, Gleison N. Santos

In this note we shall continue our study on the initial value problem associated for the generalized derivative Schr\"odinger (gDNLS) equation $$ \partial_tu=i\partial_x^2u + \mu\,|u|^{\alpha}\partial_x u, \hskip10pt x,t\in\mathbb{R}, \hskip5pt 0<\alpha \le 1\;\; {\rm and}\;\; |\mu|=1. $$ Inspiring by Cazenave-Naumkin's works we shall establish the local well-posedness for a class of data of arbitrary size in an appropriate weighted Sobolev space, thus removing the size restriction on the data required in our previous work. The main new tool in the proof is the homogeneous and inhomogeneous versions of the Kato smoothing effect for the linear Schr\"odinger equation with lower order variable coefficients established by Kenig-Ponce-Vega.


          Projections of SDEs onto Submanifolds. (arXiv:1810.03923v1 [math.PR])      Cache   Translate Page      

Authors: John Armstrong, Damiano Brigo, Emilio Rossi Ferrucci

In [AB16] the authors define three projections of $\mathbb R^d$-valued stochastic differential equations (SDEs) onto submanifolds: the Stratonovich, It\^o-vector and It\^o-jet projections. In this paper, after a brief survey of SDEs on manifolds, we begin by giving these projections a natural, coordinate-free description, each in terms of a specific representation of manifold-valued SDEs. We proceed by deriving formulae for the three projections in ambient $\mathbb R^d$-coordinates. We use these to show that the It\^o-vector and It\^o-jet projections satisfy respectively a weak and mean-square optimality criterion "for small t": this is achieved by solving constrained optimisation problems. These results confirm, but do not rely on the approach taken in [AB16], which is formulated in terms of weak and strong It\^o-Taylor expansions. In the final section we exhibit examples showing how the three projections can differ, and explore alternative notions of optimality.


          Critical weak-$L^{p}$ differentiability of singular integrals. (arXiv:1810.03924v1 [math.FA])      Cache   Translate Page      

Authors: Luigi Ambrosio, Augusto C. Ponce, Rémy Rodiac

We establish that for every function $u \in L^1_\mathrm{loc}(\Omega)$ whose distributional Laplacian $\Delta u$ is a signed Borel measure in an open set $\Omega$ in $\mathbb{R}^{N}$, the distributional gradient $\nabla u$ is differentiable almost everywhere in $\Omega$ with respect to the weak-$L^{\frac{N}{N-1}}$ Marcinkiewicz norm. We show in addition that the absolutely continuous part of $\Delta u$ with respect to the Lebesgue measure equals zero almost everywhere on the level sets $\{u = \alpha\}$ and $\{\nabla u = e\}$, for every $\alpha \in \mathbb{R}$ and $e \in \mathbb{R}^N$. Our proofs rely on an adaptation of Calder\'on and Zygmund's singular-integral estimates inspired by subsequent work by Haj\l asz.


          Harbourne constants under ramified morphisms. (arXiv:1810.03926v1 [math.AG])      Cache   Translate Page      

Authors: Piotr Pokora, Joaquim Roé

We describe the effect of ramified morphisms on Harbourne constants of reduced effective divisors. With this goal, we introduce the pullback of a weighted cluster of infinitely near points under a dominant morphism between surfaces, and describe some of its basic properties. As an application, we describe configurations of curves with transversal intersections and $H$-index arbitarily close to \(-25/7\simeq -3.571\), smaller than any previously known result.


          Parallelizable Algorithms for Optimization Problems with Orthogonality Constraints. (arXiv:1810.03930v1 [math.OC])      Cache   Translate Page      

Authors: Bin Gao, Xin Liu, Ya-xiang Yuan

To construct a parallel approach for solving optimization problems with orthogonality constraints is usually regarded as an extremely difficult mission, due to the low scalability of the orthonormalization procedure. However, such demand is particularly huge in some application areas such as materials computation. In this paper, we propose a proximal linearized augmented Lagrangian algorithm (PLAM) for solving optimization problems with orthogonality constraints. Unlike the classical augmented Lagrangian methods, in our algorithm, the prime variables are updated by minimizing a proximal linearized approximation of the augmented Lagrangian function, meanwhile the dual variables are updated by a closed-form expression which holds at any first-order stationary point. The orthonormalization procedure is only invoked once at the last step of the above mentioned algorithm if high-precision feasibility is needed. Consequently, the main parts of the proposed algorithm can be parallelized naturally. We establish global subsequence convergence, worst-case complexity and local convergence rate for PLAM under some mild assumptions. To reduce the sensitivity of the penalty parameter, we put forward a modification of PLAM, which is called parallelizable column-wise block minimization of PLAM (PCAL). Numerical experiments in serial illustrate that the novel updating rule for the Lagrangian multipliers significantly accelerates the convergence of PLAM and makes it comparable with the existent feasible solvers for optimization problems with orthogonality constraints, and the performance of PCAL does not highly rely on the choice of the penalty parameter. Numerical experiments under parallel environment demonstrate that PCAL attains good performance and high scalability in solving discretized Kohn-Sham total energy minimization problems.


          Distinguishing infinite graphs with bounded degrees. (arXiv:1810.03932v1 [math.CO])      Cache   Translate Page      

Authors: Florian Lehner, Monika Pilśniak, Marcin Stawiski

Call a colouring of a graph distinguishing, if the only colour preserving automorphism is the identity. A conjecture of Tucker states that if every automorphism of a graph $G$ moves infinitely many vertices, then there is a distinguishing $2$-colouring. We confirm this conjecture for graphs with maximum degree $\Delta \leq 5$. Furthermore, using similar techniques we show that if an infinite graph has maximum degree $\Delta \geq 3$, then it admits a distinguishing colouring with $\Delta - 1$ colours. This bound is sharp.


          Existence and uniqueness of the p-generalized modified error function. (arXiv:1810.03934v1 [math.CA])      Cache   Translate Page      

Authors: Julieta Bollati, María F. Natale, José A. Semitiel, Domingo A. Tarzia

In this paper, the p-generalized modified error function is defined as the solution to a non-linear ordinary differential problem of second order with a Robin type condition at $x=0$. Existence and uniqueness of a non-negative analytic solution is proved by using a fixed point strategy. It is shown that the p-generalized modified error function converges to the p-modified error function defined as the solution to a similar problem with a Dirichlet condition at x=0. In both problems, for p=1, the generalized modified error function and the modified error function, studied recently in literature, are recovered


          The spin-s homogeneous central spin model: exact spectrum and dynamics. (arXiv:1810.03937v1 [quant-ph])      Cache   Translate Page      

Authors: Rafael I. Nepomechie, Xi-Wen Guan

We consider the problem of a central spin with arbitrary spin s that interacts pairwise and uniformly with a bath of N spins with s=1/2. We present two approaches for determining the exact spectrum of this model, one based on properties of SU(2), and the other based on integrability. We also analyze the exact time evolution of a spin coherent state, and compute the time evolution of various quantities of physical interest, including the entanglement entropy, spin polarization and Loschmidt echo.


          Gradient flows and Evolution Variational Inequalities in metric spaces. I: structural properties. (arXiv:1810.03939v1 [math.FA])      Cache   Translate Page      

Authors: Matteo Muratori, Giuseppe Savaré

This is the first of a series of papers devoted to a thorough analysis of the class of gradient flows in a metric space $(X,\mathsf{d})$ that can be characterized by Evolution Variational Inequalities. We present new results concerning the structural properties of solutions to the $\mathrm{EVI}$ formulation, such as contraction, regularity, asymptotic expansion, precise energy identity, stability, asymptotic behaviour and their link with the geodesic convexity of the driving functional. Under the crucial assumption of the existence of an $\mathrm{EVI}$ gradient flow, we will also prove two main results: the equivalence with the De Giorgi variational characterization of curves of maximal slope and the convergence of the Minimizing Movement-JKO scheme to the $\mathrm{EVI}$ gradient flow, with an explicit and uniform error estimate of order $1/2$ with respect to the step size, independent of any geometric hypothesis (such as upper or lower curvature bounds) on $\mathsf{d}$. In order to avoid any compactness assumption, we will also introduce a suitable relaxation of the Minimizing Movement algorithm obtained by the Ekeland variational principle, and we will prove its uniform convergence as well.


          Hochschild cohomology ring for self-injective algebras of tree class $E_6$. II. (arXiv:1810.03950v1 [math.KT])      Cache   Translate Page      

Authors: Mariya Kachalova

We describe the Hochschild cohomology ring for a family of self-injective algebras of tree class $E_6$ in terms of generators and relations. Together with the results of the previous paper, this gives a complete description of the Hochschild cohomology ring for a self-injective algebras of tree class $E_6$.


          Fractional Diffusion Maps. (arXiv:1810.03952v1 [math.CA])      Cache   Translate Page      

Authors: Harbir Antil, Tyrus Berry, John Harlim

In locally compact, separable metric measure spaces, heat kernels can be classified as either local (having exponential decay) or nonlocal (having polynomial decay). This dichotomy of heat kernels gives rise to operators that include (but are not restricted to) the generators of the classical Laplacian associated to Brownian processes as well as the fractional Laplacian associated with $\beta$-stable L\'evy processes. Given embedded data that lie on or close to a compact Riemannian manifold, there is a practical difficulty in realizing this theory directly since these kernels are defined as functions of geodesic distance which is not directly accessible unless if the manifold (i.e., the embedding function or the Riemannian metric) is completely specified. This paper develops numerical methods to estimate the semigroups and generators corresponding to these heat kernels using embedded data that lie on or close to a compact Riemannian manifold (the estimators of the local kernels are restricted to Neumann functions for manifold with boundary). For local kernels, the method is basically a version of the diffusion maps algorithm which estimates the Laplace-Beltrami operator on compact Riemannian manifolds. For non-local heat kernels, the diffusion maps algorithm must be modified in order to estimate fractional Laplacian operators using polynomial decaying kernels. In this case, the graph distance is used to approximate the geodesic distance with appropriate error bounds. Numerical experiments supporting these theoretical results are presented. For manifolds with boundary, numerical results suggest that the proposed fractional diffusion maps framework implemented with non-local kernels approximates the regional fractional Laplacian.


          Para-Hermitian Geometry, Dualities and Generalized Flux Backgrounds. (arXiv:1810.03953v1 [hep-th])      Cache   Translate Page      

Authors: Vincenzo E. Marotta, Richard J. Szabo

We survey physical models which capture the main concepts of double field theory on para-Hermitian manifolds. We show that the geometric theory of Lagrangian and Hamiltonian dynamical systems is an instance of para-Kahler geometry which extends to a natural example of a Born geometry. The corresponding phase space geometry belongs to the family of natural almost para-Kahler structures which we construct explicitly as deformations of the canonical para-Kahler structure by non-linear connections. We extend this framework to a class of non-Lagrangian dynamical systems which naturally encodes the notion of fluxes in para-Hermitian geometry. In this case we describe the emergence of fluxes in terms of weak integrability defined by the D-bracket, and we extend the construction to arbitrary cotangent bundles where we reproduce the standard generalized fluxes of double field theory. We also describe the para-Hermitian geometry of Drinfel'd doubles, which gives an explicit illustration of the interplay between fluxes, D-brackets and different polarizations. The left-invariant para-Hermitian structure on a Drinfel'd double in a Manin triple polarization descends to a doubled twisted torus, which we use to illustrate how changes of polarizations give rise to different fluxes and string backgrounds in para-Hermitian geometry.


          Joining dessins together. (arXiv:1810.03960v1 [math.GR])      Cache   Translate Page      

Authors: Gareth A. Jones

An operation of joining coset diagrams for a given group, introduced by Higman and developed by Conder in connection with Hurwitz groups, is reinterpreted and generalised as a connected sum operation on dessins d'enfants of a given type. A number of examples are given.


          Intelligent Reflecting Surface Enhanced Wireless Network via Joint Active and Passive Beamforming. (arXiv:1810.03961v1 [cs.IT])      Cache   Translate Page      

Authors: Qingqing Wu, Rui Zhang

Intelligent reflecting surface (IRS) is envisioned to be a new and revolutionizing technology for achieving spectrum and energy efficient wireless communication networks cost-effectively in the future. Specifically, an IRS consists of a large number of low-cost passive elements each reflecting the incident signal with a certain phase shift to collaboratively achieve beamforming and/or interference suppression at designated receivers. In this paper, we study an IRS-aided multiuser multiple-input single-output (MISO) wireless system where one IRS is deployed to assist in the communication from a multi- antenna access point (AP) to multiple single-antenna users. As such, each user receives the superposed signals from the AP as well as the IRS via its reflection. We aim to minimize the total transmit power at the AP by jointly optimizing the transmit beamforming by active antenna array at the AP and reflect beamforming by passive phase shifters at the IRS, subject to users' individual signal-to-interference-plus-noise ratio (SINR) constraints. However, the formulated problem is non-convex and difficult to be solved optimally.


          A necessary and sufficient condition for the stability of linear Hamiltonian systems with periodic coefficients. (arXiv:1810.03971v1 [math-ph])      Cache   Translate Page      

Authors: Hong Qin

Linear Hamiltonian systems with time-dependent coefficients are of importance to nonlinear Hamiltonian systems, accelerator physics, plasma physics, and quantum physics. It is shown that the solution map of a linear Hamiltonian system with time-dependent coefficients can be parameterized by an envelope matrix $w(t)$, which has a clear physical meaning and satisfies a nonlinear envelope matrix equation. It is proved that a linear Hamiltonian system with periodic coefficients is stable iff the envelope matrix equation admits a solution with periodic $\sqrt{w^{\dagger}w}$ and a suitable initial condition. The mathematical devices utilized in this theoretical development with significant physical implications are time-dependent canonical transformations, normal forms for stable symplectic matrices, and horizontal polar decomposition of symplectic matrices. These tools systematically decompose the dynamics of linear Hamiltonian systems with time-dependent coefficients, and are expected to be effective in other studies as well, such as those on quantum algorithms for classical Hamiltonian systems.


          Collective evolution of weights in wide neural networks. (arXiv:1810.03974v1 [cs.NE])      Cache   Translate Page      

Authors: Dmitry Yarotsky

We derive a nonlinear integro-differential transport equation describing collective evolution of weights under gradient descent in large-width neural-network-like models. We characterize stationary points of the evolution and analyze several scenarios where the transport equation can be solved approximately. We test our general method in the special case of linear free-knot splines, and find good agreement between theory and experiment in observations of global optima, stability of stationary points, and convergence rates.


          Explicit optimal-length locally repairable codes of distance 5. (arXiv:1810.03980v1 [cs.IT])      Cache   Translate Page      

Authors: Allison Beemer, Ryan Coatney, Venkatesan Guruswami, Hiram H. López, Fernando Piñero

Locally repairable codes (LRCs) have received significant recent attention as a method of designing data storage systems robust to server failure. Optimal LRCs offer the ideal trade-off between minimum distance and locality, a measure of the cost of repairing a single codeword symbol. For optimal LRCs with minimum distance greater than or equal to 5, block length is bounded by a polynomial function of alphabet size. In this paper, we give explicit constructions of optimal-length (in terms of alphabet size), optimal LRCs with minimum distance equal to 5.


          (Di)graph decompositions and magic type labelings: a dual relation. (arXiv:1810.03994v1 [math.CO])      Cache   Translate Page      

Authors: S. C. López, F. A. Muntaner-Batle, M. Prabu

A graph $G$ is called edge-magic if there is a bijective function $f$ from the set of vertices and edges to the set $\{1,2,\ldots,|V(G)|+|E(G)|\}$ such that the sum $f(x)+f(xy)+f(y)$ for any $xy$ in $E(G)$ is constant. Such a function is called an edge-magic labelling of G and the constant is called the valence of $f$. An edge-magic labelling with the extra property that $f(V(G))= \{1,2,\ldots,|V(G)|\}$ is called super edge-magic. In this paper, we establish a relationship between the valences of (super) edge-magic labelings of certain types of bipartite graphs and the existence of a particular type of decompositions of such graphs.


          Brezis pseudomonotonicity is strictly weaker than Ky-Fan hemicontinuity. (arXiv:1810.03995v1 [math.FA])      Cache   Translate Page      

Authors: Daniel Steck

In 1968, H. Brezis introduced a notion of operator pseudomonotonicity which provides a unified approach to monotone and nonmonotone variational inequalities (VIs). A closely related notion is that of Ky-Fan hemicontinuity, a continuity property which arises if the famous Ky-Fan minimax inequality is applied to the VI framework. It is clear from the corresponding definitions that Ky-Fan hemicontinuity implies Brezis pseudomonotonicity, but quite surprisingly, a recent publication by Sadeqi and Paydar (J. Optim. Theory Appl., 165(2):344-358, 2015) claims the equivalence of the two properties. The purpose of the present note is to show that this equivalence is false; this is achieved by providing a concrete example of a nonlinear operator which is Brezis pseudomonotone but not Ky--Fan hemicontinuous.


          The floating-body problem: an integro-differential equation without irregular frequencies. (arXiv:1810.03998v1 [math-ph])      Cache   Translate Page      

Authors: Nikolay Kuznetsov

The linear boundary value problem under consideration describes time-harmonic motion of water in a horizontal three-dimensional layer of constant depth in the presence of an obstacle adjacent to the upper side of the layer (floating body). This problem for a complex-valued harmonic function involves mixed boundary conditions and a radiation condition at infinity. Under rather general geometric assumptions the existence of a unique solution is proved for all values of the nonnegative problem's parameter related to the frequency of oscillations. The proof is based on the representation of solution as a sum of simple- and double-layer potentials with densities distributed over the obstacle's surface and reducing the problem to an indefinite integro-differential equation. The latter is shown to be soluble for all continuous right-hand side terms for which purpose S.~G. Krein's theorem is used.


          Strong geodetic number of complete bipartite graphs, crown graphs and hypercubes. (arXiv:1810.04004v1 [math.CO])      Cache   Translate Page      

Authors: Valentin Gledel, Vesna Iršič

The strong geodetic number, $\text{sg}(G),$ of a graph $G$ is the smallest number of vertices such that by fixing one geodesic between each pair of selected vertices, all vertices of the graph are covered. In this paper, the study of the strong geodetic number of complete bipartite graphs is continued. The formula for $\text{sg}(K_{n,m})$ is given, as well as a formula for the crown graphs $S_n^0$. Bounds on $\text{sg}(Q_n)$ are also discussed.


          Spatial moments for high-dimensional critical contact process, oriented percolation and lattice trees. (arXiv:1810.04011v1 [math.PR])      Cache   Translate Page      

Authors: Akira Sakai, Gordon Slade

Recently, Holmes and Perkins identified conditions which ensure that for a class of critical lattice models the scaling limit of the range is the range of super-Brownian motion. One of their conditions is an estimate on a spatial moment of order higher than four, which they verified for the sixth moment for spread-out lattice trees in dimensions $d>8$. Chen and Sakai have proved the required moment estimate for spread-out critical oriented percolation in dimensions $d+1>4+1$. We prove estimates on all moments for the spread-out critical contact process in dimensions $d>4$, which in particular fulfills the spatial moment condition of Holmes and Perkins. Our method of proof is relatively simple, and, as we show, it applies also to oriented percolation and lattice trees.


          Algorithmic construction of representations of finite solvable groups. (arXiv:1810.04015v1 [math.RT])      Cache   Translate Page      

Authors: Soham Swadhin Pradhan

The dominant theme of this thesis is the construction of matrix representations of finite solvable groups using a suitable system of generators. For a finite solvable group $G$ of order $N = p_{1}p_{2}\dots p_{n}$, where $p_{i}$'s are primes, there always exists a subnormal series: $\langle {e} \rangle = G_{o} < G_{1} < \dots < G_{n} = G$ such that $G_{i}/G_{i-1}$ is isomorphic to a cyclic group of order $p_{i}$, $i = 1,2,\dots,n$. Associated with this series, there exists a system of generators consisting $n$ elements $x_{1}, x_{2}, \dots, x_{n}$ (say), such that $G_{i} = \langle x_{1}, x_{2}, \dots, x_{i} \rangle$, $i = 1,2,\dots,n$, which is called a "long system of generators". In terms of this system of generators and conjugacy class sum of $x_{i}$ in $G_{i}$, $i = 1,2, \dots, n$, we present an algorithm for constructing the irreducible matrix representations of $G$ over $\mathbb{C}$ within the group algebra $\mathbb{C}[G]$. This algorithmic construction needs the knowledge of primitive central idempotents, a well defined set of primitive (not necessarily central) idempotents and the "diagonal subalgebra" of $\mathbb{C}[G]$. In terms of this system of generators, we give simple expressions for the primitive central idempotents, a well defined system of primitive (not necessarily central) idempotents and a convenient set of generators of the "diagonal subalgebra" of $\mathbb{C}[G]$.

For a finite abelian group, we present an algorithm for constructing the inequivalent irreducible matrix representations over a field of characteristic $0$ or prime to the order of the group and a systematic way of computing the primitive central idempotents of the group algebra. Besides that, we give simple expressions of the primitive central idempotents of the rational group algebra of a finite abelian group using a "long presentation" and it's Wedderburn decomposition.


          Rank growth of elliptic curves in nonabelian extensions. (arXiv:1810.04018v1 [math.NT])      Cache   Translate Page      

Authors: Robert J. Lemke Oliver, Frank Thorne

Given an elliptic curve $E/\mathbb{Q}$, it is a conjecture of Goldfeld that asymptotically half of its quadratic twists will have rank zero and half will have rank one. Nevertheless, higher rank twists do occur: subject to the parity conjecture, Gouv\^ea and Mazur constructed $X^{1/2-\epsilon}$ twists by discriminants up to $X$ with rank at least two. For any $d\geq 3$, we build on their work to consider twists by degree $d$ $S_d$-extensions of $\mathbb{Q}$ with discriminant up to $X$. We prove that there are at least $X^{c_d-\epsilon}$ such twists with positive rank, where $c_d$ is a positive constant that tends to $1/4$ as $d\to\infty$. Moreover, subject to a suitable parity conjecture, we obtain the same result for twists with rank at least two.


          Boundedness of varieties of Fano type with alpha-invariants and volumes bounded below. (arXiv:1810.04019v1 [math.AG])      Cache   Translate Page      

Authors: Weichung Chen

We show that fixed dimensional klt weak Fano pairs with alpha-invariants and volumes bounded away from $0$ and the coefficients of the boundaries belong to the set of hyperstandard multiplicities $\Phi(\mathscr{R})$ associated to a fixed finite set $\mathscr{R}$ form a bounded family. We also show $\alpha(X,B)^{d-1}\mathrm{vol}(-(K_X+B))$ are bounded from above for all klt weak Fano pairs $(X,B)$ of a fixed dimension $d$.


          Testing exchangeability with martingale for change-point detection. (arXiv:1810.04022v1 [math.ST])      Cache   Translate Page      

Authors: Liang Dai, Mohamed-Rafik Bouguelia

This work studies the exchangeability test for a random sequence through a martingale based approach. Its main contributions include: 1) an additive martingale is introduced, which is more amenable for designing exchangeability tests by exploiting the Hoeffding-Azuma lemma; 2) different betting functions for constructing the additive martingale are studied. By choosing the underlying probability density function of p-values as betting function, it can be shown that, when change-point appears, a satisfying trade-off between the smoothness and expected one-step increment of the martingale sequence can be obtained. An online algorithm based on Beta distribution parametrization for constructing this betting function is discussed as well.


          The Disk-Based Origami Theorem and a Glimpse of Holography for Traversing Flows. (arXiv:1810.04023v1 [math.GT])      Cache   Translate Page      

Authors: Gabriel Katz

This paper describes a mechanism by which a traversally generic flow $v$ on a smooth connected manifold $X$ with boundary produces a compact $CW$-complex $\mathcal T(v)$, which is homotopy equivalent to $X$ and such that $X$ embeds in $\mathcal T(v)\times \mathbf R$. The $CW$-complex $\mathcal T(v)$ captures some residual information about the smooth structure on $X$ (such as the stable tangent bundle of $X$). Moreover, $\mathcal T(v)$ is obtained from a simplicial \emph{origami map} $O: D^n \to \mathcal T(v)$, whose source space is a disk $D^n \subset \partial X$ of dimension $n = \dim(X) -1$. The fibers of $O$ have the cardinality $(n+1)$ at most.

The knowledge of the map $O$, together with the restriction to $D^n$ of a Lyapunov function $f:X \to \mathbf R$ for $v$, make it possible to reconstruct the topological type of the pair $(X, \mathcal F(v))$, were $\mathcal F(v)$ is the $1$-foliation, generated by $v$. This fact motivates the use of "holography" in the title.


          On Characteristics of Hyperfields Obtained as Quotients of Finite Fields. (arXiv:1810.04035v1 [math.RA])      Cache   Translate Page      

Authors: Antonio Frigo, Hahn Lheem, Dylan Liu

Let $p$ be an odd prime. We show that there exists an explicit form for the characteristic of the hyperfield $\mathbb{F}_p/G$ where $|G|=1,2,3,4$. Finally, we prove a general form of the characteristic for hyperfields where $|G|$ is prime.


          Gr\"obner bases and dimension formulas for ternary partially associative operads. (arXiv:1810.04042v1 [math.RA])      Cache   Translate Page      

Authors: Fatemeh Bagherzadeh, Murray Bremner

Dotsenko and Vallette discovered an extension to nonsymmetric operads of Buchberger's algorithm for Gr\"obner bases of polynomial ideals. In the free nonsymmetric operad with one ternary operation $({\ast}{\ast}{\ast})$, we compute a Gr\"obner basis for the ideal generated by partial associativity $((abc)de) + (a(bcd)e) + (ab(cde)$. In the category of $\mathbb{Z}$-graded vector spaces with Koszul signs, the (homological) degree of $({\ast}{\ast}{\ast})$ may be even or odd. We use the Gr\"obner bases to calculate the dimension formulas for these operads.


          Algebraic deformation quantization of Leibniz algebras. (arXiv:1810.04050v1 [math.AT])      Cache   Translate Page      

Authors: Charles Alexandre, Martin Bordemann, Salim Riviere (LMJL), Friedrich Wagemann (LMJL)

In this paper we focus on a certain self-distributive multiplication on coalgebras, which leads to so-called rack bialgebra. We construct canon-ical rack bialgebras (some kind of enveloping algebras) for any Leibniz algebra. Our motivation is deformation quantization of Leibniz algebras in the sense of [6]. Namely, the canonical rack bialgebras we have constructed for any Leibniz algebra lead to a simple explicit formula of the rack-star-product on the dual of a Leibniz algebra recently constructed by Dherin and Wagemann in [6]. We clarify this framework setting up a general deformation theory for rack bialgebras and show that the rack-star-product turns out to be a deformation of the trivial rack bialgebra product.


          $p$-filtrations of dual Weyl modules. (arXiv:1810.04052v1 [math.RT])      Cache   Translate Page      

Authors: Henning Haahr Andersen

Let $G$ be a semisimple algebraic group over a field of characteristic $p > 0$. We prove that the dual Weyl modules for $G$ all have $p$-filtrations when $p$ is not too small. Moreover, we give applications of this theorem to $p^n$-filtrations for $n > 1$, to modules containing the Steinberg module as a tensor factor, and to the Donkin conjecture on modules having $p$-filtrations.


          Exact solution for a two-phase Stefan problem with variable latent heat and a convective boundary condition at the fixed face. (arXiv:1810.04054v1 [math-ph])      Cache   Translate Page      

Authors: Julieta Bollati, Domingo A. Tarzia

Recently it was obtained in [Tarzia, Thermal Sci. 21A (2017) 1-11] for the classical two-phase Lam\'e-Clapeyron-Stefan problem an equivalence between the temperature and convective boundary conditions at the fixed face under a certain restriction. Motivated by this article we study the two-phase Stefan problem for a semi-infinite material with a latent heat defined as a power function of the position and a convective boundary condition at the fixed face. An exact solution is constructed using Kummer functions in case that an inequality for the convective transfer coefficient is satisfied generalizing recent works for the corresponding one-phase free boundary problem. We also consider the limit to our problem when that coefficient goes to infinity obtaining a new free boundary problem, which has been recently studied in [Zhou-Shi-Zhou, J. Engng. Math. (2017) DOI 10.1007/s10665-017-9921-y].


          Testing hyperbolicity of real polynomials. (arXiv:1810.04055v1 [math.AG])      Cache   Translate Page      

Authors: Papri Dey, Daniel Plaumann

Hyperbolic polynomials are real multivariate polynomials with only real roots along a fixed pencil of lines. Testing whether a given polynomial is hyperbolic is a difficult task in general. We examine different ways of translating hyperbolicity into nonnegativity conditions, which can then be tested via sum-of-squares relaxations.


          Finite-size corrections for the attractive mean-field monomer-dimer model. (arXiv:1810.04057v1 [math-ph])      Cache   Translate Page      

Authors: Diego Alberici, Pierluigi Contucci, Rachele Luzi, Cecilia Vernia

The finite volume correction for a mean-field monomer-dimer system with an attractive interaction are computed for the pressure density, the monomer density and the susceptibility. The results are obtained by introducing a two-dimensional integral representation for the partition function decoupling both the hard-core interaction and the attractive one. The next-to-leading terms for each of the mentioned quantities is explicitly derived as well as the value of their sign that is related to their monotonic convergence in the thermodynamic limit.


          Dynamic Optimization with Convergence Guarantees. (arXiv:1810.04059v1 [math.OC])      Cache   Translate Page      

Authors: Martin P. Neuenhofen, Eric C. Kerrigan

We present a novel direct transcription method to solve optimization problems subject to nonlinear differential and inequality constraints. In order to provide numerical convergence guarantees, it is sufficient for the functions that define the problem to satisfy boundedness and Lipschitz conditions. Our assumptions are the most general to date; we do not require uniqueness, differentiability or constraint qualifications to hold and we avoid the use of Lagrange multipliers. Our approach differs fundamentally from state-of-the-art methods based on collocation. We follow a least-squares approach to finding approximate solutions to the differential equations. The objective is augmented with the integral of a quadratic penalty on the differential equation residual and a logarithmic barrier for the inequality constraints, as well as a quadratic penalty on the point constraint residual. The resulting unconstrained infinite-dimensional optimization problem is discretized using finite elements, while integrals are replaced by quadrature approximations if they cannot be evaluated analytically. Order of convergence results are derived, even if components of solutions are discontinuous.


          Simultaneous extension of two bounded operators between Hilbert spaces. (arXiv:1810.04062v1 [math.FA])      Cache   Translate Page      

Authors: Marko S. Djikić, Jovana Nikolov Radenković

The paper is concerned with the following question: if $A$ and $B$ are two bounded operators between Hilbert spaces $\mathcal{H}$ and $\mathcal{K}$, and $\mathcal{M}$ and $\mathcal{N}$ are two closed subspaces in $\mathcal{H}$, when will there exist a bounded operator $C:\mathcal{H}\to\mathcal{K}$ which coincides with $A$ on $\mathcal{M}$ and with $B$ on $\mathcal{N}$ simultaneously? Besides answering this and some related questions, we also wish to emphasize the role played by the class of so-called semiclosed operators and the unbounded Moore-Penrose inverse in this work. Finally, we will relate our results to several well-known concepts, such as the operator equation $XA=B$ and the theorem of Douglas, Halmos' two projections theorem, and Drazin's star partial order.


          A linear algorithm for computing Polynomial Dynamical System. (arXiv:1810.04069v1 [q-bio.MN])      Cache   Translate Page      

Authors: Ines Abdeljaoued-Tej, Alia BenKahla, Ghassen Haddad, Annick Valibouze

Computation biology helps to understand all processes in organisms from interaction of molecules to complex functions of whole organs. Therefore, there is a need for mathematical methods and models that deliver logical explanations in a reasonable time. For the last few years there has been a growing interest in biological theory connected to finite fields: the algebraic modeling tools used up to now are based on Gr\"obner bases or Boolean group. Let $n$ variables representing gene products, changing over the time on $p$ values. A Polynomial dynamical system (PDS) is a function which has several components, each one is a polynom with $n$ variables and coefficient in the finite field $Z/pZ$ that model the evolution of gene products. We propose herein a method using algebraic separators, which are special polynomials abundantly studied in effective Galois theory. This approach avoids heavy calculations and provides a first Polynomial model in linear time.


          Primal-Dual Reduced Basis Methods for Convex Minimization Variational Problems: Robust True Solution A Posteriori Error Certification and Adaptive Greedy Algorithms. (arXiv:1810.04073v1 [math.NA])      Cache   Translate Page      

Authors: Shun Zhang

The a posteriori error estimate and greedy algorithms play central roles in reduced basis method (RBM). A classic RBM uses residual error estimator. The error is estimated in some parameter independent genetic norm and an estimation of the stability constant is also needed. This type of error estimate is not robust with respect to the parameter-dependent energy norm, and it measures only the difference between the RB solution and an unrealistic "truth" finite element solution. The choice of the RB error tolerance is often heuristic and will cause under or over-computing. The finite element solutions for RB snapshots are often computed on a non-optimal mesh, or only computed on a mesh which is good for some parameters in the RB parameter set but not for others.

With the parametric reaction-diffusion and diffusion equations as examples, for a class of parametric convex minimization variational problems, we develop primal-dual reduced basis methods (PD-RBM) with robust true error certifications and adaptive greedy algorithms to overcome the shortcomings of the classic a posteriori error estimator and greedy algorithms in RBM.

For convex minimization variational problems, the duality gap between the primal and dual functionals is a perfect a posteriori error estimator. This primal dual error estimator is robust with respect to the parameters of the problem, and it can be used for both the mesh refinements of finite element methods and the true RB error certification.

We develop three versions of adaptive greedy algorithms to balance the finite element error, the exact reduced basis error, and the adaptive mesh refinements. Extensive numerical tests are performed to test the PD-RBM for three greedy algorithms.


          MMS-type problems for Johnson scheme. (arXiv:1810.04075v1 [math.CO])      Cache   Translate Page      

Authors: I.Yu.Mogilnykh, K.V.Vorob'ev, A.A.Valyuzhenich

In the current work we consider the minimization problems for the number of nonzero or negative values of vectors from the first and second eigenspaces of the Johnson scheme respectively. The topic is a meeting point for generalizations of the Manikam-Mikl\'{o}s-Singhi conjecture proven by Blinovski and the minimum support problem for the eigenspaces of the Johnson graph, asymptotically solved by authors in a recent paper.


          Global well-posedness for fractional Hartree equation on modulation spaces and Fourier algebra. (arXiv:1810.04076v1 [math.AP])      Cache   Translate Page      

Authors: Divyang G. Bhimani

We study the Cauchy problem for fractional Schr\"odinger equation with cubic convolution nonlinearity ($i\partial_t u - (-\Delta)^{\frac{\alpha}{2}}u\pm (K\ast |u|^2) u =0$) with Cauchy data in the modulation spaces $M^{p,q}(\mathbb R^{d}).$ For $K(x)= |x|^{-\gamma}$ $ (0< \gamma< \text{min} \{\alpha, d/2\})$, we establish global well-posedness results in $M^{p,q}(\mathbb R^{d}) (1\leq p \leq 2, 1\leq q < 2d/ (d+\gamma))$ when $\alpha =2, d\geq 1$, and with radial Cauchy data when $d\geq 2, \frac{2d}{2d-1}< \alpha < 2. $ Similar results are proven in Fourier algebra $\mathcal{F}L^1(\mathbb R^d) \cap L^2(\mathbb R^d).$


          Moore-Penrose Inverse of some Linear Maps on Infinite-Dimensional Vector Spaces. (arXiv:1810.04082v1 [math.RA])      Cache   Translate Page      

Authors: V. Cabezas Sánchez, F. Pablos Romo

The aim of this work is to characterize linear maps of inner pro\-duct infinite-dimensional vector spaces where the Moore-Penrose inverse exists. This MP inverse generalizes the well-known Moore-Penrose inverse of a matrix $A\in \text{Mat}_{n\times m} ({\mathbb C})$. Moreover, a method for the computation of the MP inverse of some endomorphisms on infinite-dimensional vector spaces is given. As an application, we study the least norm solution of an infinite linear system from the Moore-Penrose inverse offered.


          A note on O. Frolkina's paper "Pairwise disjoint Moebius bands in space". (arXiv:1810.04089v1 [math.GT])      Cache   Translate Page      

Authors: Sergey A. Melikhov

We note a simple algebraic proof of Frolkina's result that $\mathbb R^3$ does not contain uncountably many pairwise disjoint copies of the M\"obius band, and of a similar result in higher dimensions.


          Statistical Convergence of the EM Algorithm on Gaussian Mixture Models. (arXiv:1810.04090v1 [math.ST])      Cache   Translate Page      

Authors: Ruofei Zhao, Yuanzhi Li, Yuekai Sun

We study the convergence behavior of the Expectation Maximization (EM) algorithm on Gaussian mixture models with an arbitrary number of mixture components and mixing weights. We show that as long as the means of the components are separated by at least $\Omega(\sqrt{\min\{M,d\}})$, where $M$ is the number of components and $d$ is the dimension, the EM algorithm converges locally to the global optimum of the log-likelihood. Further, we show that the convergence rate is linear and characterize the size of the basin of attraction to the global optimum.


          On coupled systems of PDEs with unbounded coefficients. (arXiv:1810.04097v1 [math.AP])      Cache   Translate Page      

Authors: Luciana Angiuli, Luca Lorenzi

We study the Cauchy problem associated to parabolic systems of the form $D_t\boldsymbol{u}=\boldsymbol{\mathcal A}(t)\boldsymbol u$ in $C_b(\mathbb{R}^d;\mathbb{R}^m)$, the space of continuous and bounded functions $\boldsymbol{f}:\mathbb{R}^d\to\mathbb{R}^m$. Here $\boldsymbol{\mathcal A}(t)$ is a weakly coupled elliptic operator acting on vector-valued functions, having diffusion and drift coefficients which change from equation to equation. We prove existence and uniqueness of the evolution operator $\boldsymbol{G}(t,s)$ which governs the problem in $C_b(\mathbb{R}^d;\mathbb{R}^m)$ proving its positivity. The compactness of $\boldsymbol{G}(t,s)$ in $C_b(\mathbb{R}^d;\mathbb{R}^m)$ and some of its consequences are also studied. Finally, we extend the evolution operator $\boldsymbol{G}(t,s)$ to the $L^p$- spaces related to the so called "evolution system of measures" and we provide conditions for the compactness of $\boldsymbol{G}(t,s)$ in this setting.


          The algebraic area of closed lattice random walks. (arXiv:1810.04098v1 [math-ph])      Cache   Translate Page      

Authors: Stephane Ouvry, Shuang Wu

We propose a formula for the enumeration of closed lattice random walks of length $n$ enclosing a given algebraic area. The information is contained in the Kreft coefficients which encode, in the commensurate case, the Hofstadter secular equation for a quantum particle hopping on a lattice coupled to a perpendicular magnetic field. The algebraic area enumeration is possible because it is split in $2^{n/2-1}$ pieces, each tractable in terms of explicit combinatorial expressions.


          Characterization of Convex Objective Functions and Optimal Expected Convergence Rates for SGD. (arXiv:1810.04100v1 [math.OC])      Cache   Translate Page      

Authors: Marten van Dijk, Lam M. Nguyen, Phuong Ha Nguyen, Dzung T. Phan

We study Stochastic Gradient Descent (SGD) with diminishing step sizes for convex objective functions. We introduce a definitional framework and theory that defines and characterizes a core property, called curvature, of convex objective functions. In terms of curvature we can derive a new inequality that can be used to compute an optimal sequence of diminishing step sizes by solving a differential equation. Our exact solutions confirm known results in literature and allows us to fully characterize a new regularizer with its corresponding expected convergence rates.


          Mean values and moments of arithmetic functions over number fields. (arXiv:1810.04104v1 [math.NT])      Cache   Translate Page      

Authors: Jaitra Chattopadhyay, Pranendu Darbar

For an odd integer $d \geq 1$ and a finite Galois extension $K/\mathbb{Q}$ of degree $d$, G. L\"{u} and Z. Yang obtained in \cite{lu3} an asymptotic formula for the mean values of the divisor function for $K$ over square integers. In this article, we obtain the same for finitely many number fields of odd degree and pairwise coprime discriminants together with the moment of the error term arising here, following the method adopted by S. Shi in \cite{shi}. We also define the sum of divisor function over number fields and find the asymptotic behaviour of the summatory function of two number fields taken together.


          Performance of distributed algorithms for QoS in wireless ad hoc networks: arbitrary networks under the primary interference model, and line networks under the protocol interference model. (arXiv:1810.04109v1 [cs.IT])      Cache   Translate Page      

Authors: Ashwin Ganesan

Consider a wireless network where each communication link has a minimum bandwidth quality-of-service requirement. Certain pairs of wireless links interfere with each other due to being in the same vicinity, and this interference is modeled by a conflict graph. Given the conflict graph and link bandwidth requirements, the objective is to determine, using only localized information, whether the demands of all the links can be satisfied. At one extreme, each node knows the demands of only its neighbors; at the other extreme, there exists an optimal, centralized scheduler that has global information. The present work interpolates between these two extremes by quantitatively characterizing the tradeoff between the degree of decentralization and the performance of the distributed algorithm. This open problem is resolved for the primary interference model, and the following general result is obtained: if each node knows the demands of all links in a ball of radius $d$ centered at the node, then there is a distributed algorithm whose performance is away from that of an optimal, centralized algorithm by a factor of at most $(2d+3)/(2d+2)$. It is shown that for line networks under the protocol interference model, the row constraints are a factor of at most $3$ away from optimal. Both bounds are best possible.


          The Viterbi process, decay-convexity and parallelized maximum a-posteriori estimation. (arXiv:1810.04115v1 [math.PR])      Cache   Translate Page      

Authors: Nick Whiteley

The Viterbi process is the limiting maximum a-posteriori estimate of the unobserved path in a hidden Markov model as the length of the time horizon grows. The existence of such a process suggests that approximate estimation using optimization algorithms which process data segments in parallel may be accurate. For models on state-space $\mathbb{R}^{d}$ satisfying a new "decay-convexity" condition, we approach the existence of the Viterbi process through fixed points of ordinary differential equations in a certain infinite dimensional Hilbert space. Quantitative bounds on the distance to the Viterbi process show that approximate estimation via parallelization can indeed be accurate and scaleable to high-dimensional problems because the rate of convergence to the Viterbi process does not necessarily depend on $d$.


          Convergence Analysis of a Generalized Full Approximation Storage Scheme for Convex Optimization Problems. (arXiv:1810.04116v1 [math.NA])      Cache   Translate Page      

Authors: Long Chen, Xiaozhe Hu, Steven M. Wise

Full Approximation Scheme (FAS) is a widely used multigrid method for nonlinear problems. In this paper, a new framework to analyze FAS for convex optimization problems is developed. FAS can be recast as an inexact version of nonlinear multigrid methods based on space decomposition and subspace correction. The local problem in each subspace can be simplified to be linear and one gradient decent iteration is enough to ensure a linear convergence of FAS.


          Bijections Between {\L}ukasiewicz Walks and Generalized Tandem Walks. (arXiv:1810.04117v1 [math.CO])      Cache   Translate Page      

Authors: Frédéric Chyzak, Karen Yeats

In this article, we study the enumeration by length of several walk models on the square lattice. We obtain bijections between walks in the upper half-plane returning to the $x$-axis and walks in the quarter plane. A recent work by Bostan, Chyzak, and Mahboubi has given a bijection for models using small north, west, and south-east steps. We adapt and generalize it to a bijection between half-plane walks using those three steps in two colours and a quarter-plane model over the symmetrized step set consisting of north, north-west, west, south, south-east, and east. We then generalize our bijections to certain models with large steps: for given $p\geq1$, a bijection is given between the half-plane and quarter-plane models obtained by keeping the small south-east step and replacing the two steps north and west of length 1 by the $p+1$ steps of length $p$ in directions between north and west. This model is close to, but distinct from, the model of generalized tandem walks studied by Bousquet-M\'elou, Fusy, and Raschel.


          New Lower Bounds for the Estrada Index. (arXiv:1810.04120v1 [math.SP])      Cache   Translate Page      

Authors: Juan L. Aguayo, Juan R. Carmona, Jonnathan Rodríguez

Let $G$ be a graph on $n$ vertices and $\lambda_1,\lambda_2,\ldots,\lambda_n$ its eigenvalues. The Estrada index of $G$ is defined as $EE(G)=\sum_{i=1}^n e^{\lambda_i}.$ In this work, using a different demonstration technique, new lower bounds are obtained for the Estrada index, that depends on the number of vertices, the number of edges and the energy of the graph is given. Moreover, another lower bound for the Estrada index is obtained of an arbitrary Hermitian matrix are established.


          Multiscale Hydrophobic Lipid Dynamics Simulated by Efficient Integral Equation Methods. (arXiv:1810.04131v1 [math.NA])      Cache   Translate Page      

Authors: Szu-Pei P. Fu, Rolf J. Ryham, Andreas Klöckner, Matt Wala, Shidong Jiang, Yuan-Nan Young

In this paper, we first develop a mathematical model for long-range, hydrophobic attraction between amphiphilic particles. The non-pairwise interactions follow from the first variation of a hydrophobic attraction domain functional. The variation yields a hydrophobic stress that is used to numerically calculate trajectories for a collection of two-dimensional particles. The functional minimizer that accounts for hydrophobicity at molecular-aqueous interfaces is a solution to a boundary value problem of the screened Laplace equation. We reformulate the boundary value problem as a second-kind integral equation (SKIE), discretize the SKIE using a Nystr\"om discretization and `Quadrature by Expansion' (QBX) and solve the resulting linear system iteratively using GMRES. We evaluate the required layer potentials using the `GIGAQBX' fast algorithm, a variant of the Fast Multipole Method (FMM), yielding the required particle interactions with asymptotically optimal cost. The entire scheme is adaptive, high-order, and capable of handling close-to-touching geometry. The simulated particle systems exhibit a variety of multiscale behaviors over both time and length: Over short time scales, the numerical results show self-assembly for model lipid particles. For large system simulations, the particles form realistic configurations like micelles and bilayers. Over long time scales, the bilayer shapes emerging from the simulation appear to minimize a form of bending energy.


          Localizations and completions in motivic homotopy theory. (arXiv:1810.04134v1 [math.AG])      Cache   Translate Page      

Authors: Lorenzo Mantovani

Let $K$ be a perfect field and let $E$ be a homotopy commutative ring spectrum in the Morel-Voevodsky stable motivic homotopy category $\mathcal{SH}(K)$. In this work we investigate the relation between the $E$-homology localization and $E$-nilpotent completion of a spectrum X. Under reasonable assumptions on $E$ and $X$ we show that these two operations coincide and can be expressed in terms of formal completions or localizations in the usual sense of commutative algebra. We deduce convergence criteria for the $E$-based motivic Adams-Novikov spectral sequence.


          Taming Hamiltonian systems with balanced loss and gain via Lorentz interaction : General results and a case study with Landau Hamiltonian. (arXiv:1810.04137v1 [math-ph])      Cache   Translate Page      

Authors: Pijush K. Ghosh

The kinetic energy term of Hamiltonian systems with balanced loss and gain is not semi-positive-definite, leading to instabilities at the classical as well quantum level. It is shown that an additional Lorentz interaction in the Hamiltonian allows the kinetic energy term to be semi-positive-definite and thereby, improving the stability properties of the system. Further, a consistent quantum theory admitting bound states may be obtained on the real line instead of Stoke wedges on the complex plane. The Landau Hamiltonian in presence of balanced loss and gain is considered for elucidating the general result. The kinetic energy term is semi-positive-definite provided the magnitude of the applied external magnetic field is greater than the magnitude of the `analogous magnetic field' due to the loss gain terms. It is shown that the classical particle moves on an elliptical orbit with a cyclotron frequency that is less than its value in absence of the loss-gain terms. The quantum system share the properties of the standard Landau Hamiltonian, but, with the modified cyclotron frequency. It is shown that the Hall current has non-vanishing components along the direction of the external uniform electric field and to its transverse direction.


          Universal entanglement of typical states in constrained systems. (arXiv:1810.04157v1 [quant-ph])      Cache   Translate Page      

Authors: Siddhardh C. Morampudi, Anushya Chandran, Chris R. Laumann

Local constraints play an important role in the effective description of many quantum systems. Their impact on dynamics and entanglement thermalization are just beginning to be unravelled. We develop a large $N$ diagrammatic formalism to exactly evaluate the bipartite entanglement of random pure states in large constrained Hilbert spaces. The resulting entanglement spectra may be classified into `phases' depending on their singularities. Our closed solution for the spectra in the simplest class of constraints reveals a non-trivial phase diagram with a Marchenko-Pastur (MP) phase which terminates in a critical point with new singularities. The much studied Rydberg-blockaded/Fibonacci chain lies in the MP phase with a modified Page correction to the entanglement entropy, $\Delta S_1 = 0.513595\cdots$. Our results predict the entanglement of infinite temperature eigenstates in thermalizing constrained systems and provide a baseline for numerical studies.


          Andr\'{e}-Quillen homology and complete intersection flat dimension. (arXiv:1307.0860v3 [math.AC] UPDATED)      Cache   Translate Page      

Authors: Tirdad Sharif

We study the relation between the vanishing of Andr\'{e}-Quillen homology and complete intersection flat dimension and we extend some of the existing results in the literature.


          A model structure on the category of diffeological spaces. (arXiv:1311.5668v7 [math.AT] UPDATED)      Cache   Translate Page      

Authors: Tadayuki Haraguchi, Kazuhisa Shimakawa

We construct a model category structure on the category of diffeological spaces which is Quillen equivalent to the model structure on the category of topological spaces based on the notions of Serre fibrations and weak homotopy equivalences.


          Low-M-Rank Tensor Completion and Robust Tensor PCA. (arXiv:1501.03689v4 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Bo Jiang, Shiqian Ma, Shuzhong Zhang

In this paper, we propose a new approach for solving low-rank tensor completion and robust tensor PCA. Our new approach is based on some new notions of (even-order) tensor ranks, to be called the M-rank, the symmetric M-rank, and the strongly symmetric M-rank. We discuss the connections between these new tensor ranks and the CP-rank and the symmetric CP-rank of an even-order tensor. We show that the M-rank provides a reliable approximation to the CP-rank and it is much easier to compute than the CP-rank. As a result, we propose to replace the CP-rank by the M-rank in the low-CP-rank tensor completion and robust tensor PCA. Numerical results suggest that our new approach based on the M-rank outperforms the existing low-n-rank approach for solving low-rank tensor completion and robust tensor PCA.


          From vertex operator algebras to conformal nets and back. (arXiv:1503.01260v4 [math.OA] UPDATED)      Cache   Translate Page      

Authors: Sebastiano Carpi, Yasuyuki Kawahigashi, Roberto Longo, Mihály Weiner

We consider unitary simple vertex operator algebras whose vertex operators satisfy certain energy bounds and a strong form of locality and call them strongly local. We present a general procedure which associates to every strongly local vertex operator algebra V a conformal net A_V acting on the Hilbert space completion of V and prove that the isomorphism class of A_V does not depend on the choice of the scalar product on V. We show that the class of strongly local vertex operator algebras is closed under taking tensor products and unitary subalgebras and that, for every strongly local vertex operator algebra V, the map W\mapsto A_W gives a one-to-one correspondence between the unitary subalgebras W of V and the covariant subnets of A_V. Many known examples of vertex operator algebras such as the unitary Virasoro vertex operator algebras, the unitary affine Lie algebras vertex operator algebras, the known c=1 unitary vertex operator algebras, the moonshine vertex operator algebra, together with their coset and orbifold subalgebras, turn out to be strongly local. We give various applications of our results. In particular we show that the even shorter Moonshine vertex operator algebra is strongly local and that the automorphism group of the corresponding conformal net is the Baby Monster group. We prove that a construction of Fredenhagen and J\"{o}rss gives back the strongly local vertex operator algebra V from the conformal net A_V and give conditions on a conformal net A implying that A= A_V for some strongly local vertex operator algebra V.


          Cohomology of $\frak {sl}(2)$ acting on the space of $n$-ary differential operators on $\mathbb{R}$. (arXiv:1512.02847v3 [math.RT] UPDATED)      Cache   Translate Page      

Authors: Mabrouk Ben Ammar, Rabeb Sidaoui

We consider the spaces $\mathcal{F}_\mu$ of polynomial $\mu$-densities on the line as $\mathfrak{sl}(2)$-modules and then we compute the cohomological spaces $\mathrm{H}^1_\mathrm{diff}(\mathfrak{sl}(2), \mathcal{D}_{\bar{\lambda},\mu})$, where $\mu\in \mathbb{R}$, $\bar{\lambda}=(\lambda_1,\dots,\lambda_n) \in\mathbb{R}^n$ and $\mathcal{D}_{\bar{\lambda},\mu}$ is the space of $n$-ary differential operators from $\mathcal{F}_{\lambda_1}\otimes\cdots\otimes \mathcal{F}_{\lambda_n}$ to $\mathcal{F}_\mu$.


          Sentence Entailment in Compositional Distributional Semantics. (arXiv:1512.04419v2 [cs.CL] UPDATED)      Cache   Translate Page      

Authors: Esma Balkir, Dimitri Kartsaklis, Mehrnoosh Sadrzadeh

Distributional semantic models provide vector representations for words by gathering co-occurrence frequencies from corpora of text. Compositional distributional models extend these from words to phrases and sentences. In categorical compositional distributional semantics, phrase and sentence representations are functions of their grammatical structure and representations of the words therein. In this setting, grammatical structures are formalised by morphisms of a compact closed category and meanings of words are formalised by objects of the same category. These can be instantiated in the form of vectors or density matrices. This paper concerns the applications of this model to phrase and sentence level entailment. We argue that entropy-based distances of vectors and density matrices provide a good candidate to measure word-level entailment, show the advantage of density matrices over vectors for word level entailments, and prove that these distances extend compositionally from words to phrases and sentences. We exemplify our theoretical constructions on real data and a toy entailment dataset and provide preliminary experimental evidence.


          Rectifiability, interior approximation and Harmonic Measure. (arXiv:1601.08251v3 [math.CA] UPDATED)      Cache   Translate Page      

Authors: Murat Akman, Simon Bortz, Steve Hofmann, José Maria Martell

We prove a structure theorem for any $n$-rectifiable set $E\subset \mathbb{R}^{n+1}$, $n\ge 1$, satisfying a weak version of the lower ADR condition, and having locally finite $H^n$ ($n$-dimensional Hausdorff) measure. Namely, that $H^n$-almost all of $E$ can be covered by a countable union of boundaries of bounded Lipschitz domains contained in $\mathbb{R}^{n+1}\setminus E$. As a consequence, for harmonic measure in the complement of such a set $E$, we establish a non-degeneracy condition which amounts to saying that $H^n|_E$ is "absolutely continuous" with respect to harmonic measure in the sense that any Borel subset of $E$ with strictly positive $H^n$ measure has strictly positive harmonic measure in some connected component of $\mathbb{R}^{n+1}\setminus E$. We also provide some counterexamples showing that our result for harmonic measure is optimal. Moreover, we show that if, in addition, a set $E$ as above is the boundary of a connected domain $\Omega \subset \mathbb{R}^{n+1}$ which satisfies an infinitesimal interior thickness condition, then $H^n|_{\partial\Omega}$ is absolutely continuous (in the usual sense) with respect to harmonic measure for $\Omega$. Local versions of these results are also proved: if just some piece of the boundary is $n$-rectifiable then we get the corresponding absolute continuity on that piece. As a consequence of this and recent results by Azzam-Hofmann-Martell-Mayboroda-Mourgoglou-Tolsa-Volberg, we can decompose the boundary of any open connected set satisfying the previous conditions in two disjoint pieces: one that is $n$-rectifiable where Hausdorff measure is absolutely continuous with respect to harmonic measure and another purely $n$-unrectifiable piece having vanishing harmonic measure.


          On branched covering representation of 4-manifolds. (arXiv:1602.07459v5 [math.GT] UPDATED)      Cache   Translate Page      

Authors: Riccardo Piergallini, Daniele Zuddas

We provide new branched covering representations for bounded and/or non-compact 4-manifolds, which extend the known ones for closed 4-manifolds. Assuming $M$ to be a connected oriented PL 4-manifold, our main results are the following: (1) if $M$ is compact with (possibly empty) boundary, there exists a simple branched cover $p:M \to S^4 - \mathop{\mathrm{Int}}(B^4_1 \cup \dots \cup B^4_n)$, where the $B^4_i$'s are disjoint PL 4-balls, $n \geq 0$ is the number of boundary components of $M$; (2) if $M$ is open, there exists a simple branched cover $p : M \to S^4 - \mathop{\mathrm{End}} M$, where $\mathop{\mathrm{End}} M$ is the end space of $M$ tamely embedded in $S^4$. In both cases, the degree $d(p)$ and the branching set $B_p$ of $p$ can be assumed to satisfy one of these conditions: (1) $d(p)=4$ and $B_p$ is a properly self-transversally immersed locally flat PL surface; (2) $d(p)=5$ and $B_p$ is a properly embedded locally flat PL surface. In the compact (resp. open) case, by relaxing the assumption on the degree we can have $B^4$ (resp. $R^4$) as the base of the covering. We also define the notion of branched covering between topological manifolds, which extends the usual one in the PL category. In this setting, as an interesting consequence of the above results, we prove that any closed oriented topological 4-manifold is a 4-fold branched covering of $S^4$. According to almost-smoothability of 4-manifolds, this branched cover could be wild at a single point.


          On two cohomological Hall algebras. (arXiv:1604.01477v2 [math.RT] UPDATED)      Cache   Translate Page      

Authors: Yaping Yang, Gufang Zhao

We compare two cohomological Hall algebras (CoHA). The first one is the preprojective CoHA introduced by the authors in arXiv:1407.7994 associated to each quiver Q, and each algebraic oriented cohomology theory A. It is defined as the A-homology of the moduli of representations of the preprojective algebra of Q, generalizing the K-theoretic Hall algebra of commuting varieties of Schiffmann-Vasserot. The other one is the critical CoHA defined by Kontsevich-Soibelman associated to each quiver with potentials. It is defined using the equivariant cohomology with compact support with coefficients in the sheaf of vanishing cycles. In the present paper, we show that the critical CoHA, for the quiver with potential of Ginzburg, is isomorphic to the preprojective CoHA as algebras. As applications, we obtain an algebra homomorphism from the positive part of the Yangian to the critical CoHA.


          Analysis of multiscale integrators for multiple attractors and irreversible Langevin samplers. (arXiv:1606.09539v4 [math.NA] UPDATED)      Cache   Translate Page      

Authors: Jianfeng Lu, Konstantinos Spiliopoulos

We study multiscale integrator numerical schemes for a class of stiff stochastic differential equations (SDEs). We consider multiscale SDEs with potentially multiple attractors that behave as diffusions on graphs as the stiffness parameter goes to its limit. Classical numerical discretization schemes, such as the Euler-Maruyama scheme, become unstable as the stiffness parameter converges to its limit and appropriate multiscale integrators can correct for this. We rigorously establish the convergence of the numerical method to the related diffusion on graph, identifying the appropriate choice of discretization parameters. Theoretical results are supplemented by numerical studies on the problem of the recently developing area of introducing irreversibility in Langevin samplers in order to accelerate convergence to equilibrium.


          A proof of the $4$-variable Catalan polynomial of the Delta conjecture. (arXiv:1609.03497v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Mike Zabrocki

In The Delta Conjecture (arxiv:1509.07058), Haglund, Remmel and Wilson introduced a four variable $q,t,z,w$ Catalan polynomial, so named because the specialization of this polynomial at the values $(q,t,z,w) = (1,1,0,0)$ is equal to the Catalan number $\frac{1}{n+1}\binom{2n}{n}$. We prove the compositional version of this conjecture (which implies the non-compositional version) that states that the coefficient of $s_{r,1^{n-r}}$ in the expression $\Delta_{h_\ell} \nabla C_\alpha$ is equal to a weighted sum over decorated Dyck paths.


          The symbolic defect of an ideal. (arXiv:1610.00176v3 [math.AC] UPDATED)      Cache   Translate Page      

Authors: Federico Galetto, Anthony V. Geramita, Yong-Su Shin, Adam Van Tuyl

Let $I$ be a homogeneous ideal of $\Bbbk[x_0,\ldots,x_n]$. To compare $I^{(m)}$, the $m$-th symbolic power of $I$, with $I^m$, the regular $m$-th power, we introduce the $m$-th symbolic defect of $I$, denoted $\operatorname{sdefect}(I,m)$. Precisely, $\operatorname{sdefect}(I,m)$ is the minimal number of generators of the $R$-module $I^{(m)}/I^m$, or equivalently, the minimal number of generators one must add to $I^m$ to make $I^{(m)}$. In this paper, we take the first step towards understanding the symbolic defect by considering the case that $I$ is either the defining ideal of a star configuration or the ideal associated to a finite set of points in $\mathbb{P}^2$. We are specifically interested in identifying ideals $I$ with $\operatorname{sdefect}(I,2) = 1$.


          A Shrinking Target Problem with Target at Infinity in Rank One Homogeneous Spaces. (arXiv:1610.01870v3 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Cheng Zheng

In this paper, we give a definition of Diophantine points of type $\gamma$ for $\gamma\geq0$ in a homogeneous space $G/\Gamma$, and compute the Hausdorff dimension of the subset of points which are not Diophantine of type $\gamma$ when $G$ is a semisimple Lie group of real rank one. We also deduce a Jarn\'ik-Besicovitch Theorem on Diophantine approximation in Heisenberg groups.


          Non-crossing chords of a polygon with forbidden positions. (arXiv:1611.03166v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Dongyi Wei, Demin Zhang, Dong Zhang

In this paper, we systematically study non-crossing chords of simple polygons in the plane. We first introduce the reduced Euler characteristic of a family of line-segments, and subsequently investigate the structure of the diagonals and epigonals of a polygon. Interestingly enough, the reduced Euler characteristic of a subfamily of diagonals and epigonals characterizes the geometric convexity of polygons. In particular, an alternative and complete answer is given for a problem proposed by G. C. Shephard. Meanwhile, we extend such research to non-crossing diagonals and epigonals with forbidden positions in some appropriate sense. We prove that the reduced Euler characteristic of diagonals with forbidden positions only depends on the information involving convex partitions by those forbidden diagonals, and it determines the shapes of polygons in a surprising way. Incidentally, some kinds of generalized Catalan's numbers naturally arise.


          An abstract theory of singular operators. (arXiv:1611.03808v4 [math.CA] UPDATED)      Cache   Translate Page      

Authors: Grigori A. Karagulyan

We introduce a class of operators on abstract measure spaces, which unifies the Calder\'on-Zygmund operators on spaces of homogeneous type, the maximal functions and the martingale transforms. We prove that such operators can be dominated by simple sparse operators with a definite form of the domination constant. Applying these estimates, we improve several results obtained by different authors in recent years.


          On-line detection of qualitative dynamical changes in nonlinear systems: the resting-oscillation case. (arXiv:1611.05820v3 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Ying Tang, Alessio Franci, Romain Postoyan

Motivated by neuroscience applications, we introduce the concept of qualitative detection, that is, the problem of determining on-line the current qualitative dynamical behavior (e.g., resting, oscillating, bursting, spiking etc.) of a nonlinear system. The approach is thought for systems characterized by i) large parameter variability and redundancy, ii) a small number of possible robust, qualitatively different dynamical behaviors and, iii) the presence of sharply different characteristic timescales. These properties are omnipresent in neurosciences and hamper quantitative modeling and fitting of experimental data. As a result, novel control theoretical strategies are needed to face neuroscience challenges like on-line epileptic seizure detection. The proposed approach aims at detecting the current dynamical behavior of the system and whether a qualitative change is likely to occur without quantitatively fitting any model nor asymptotically estimating any parameter. We talk of qualitative detection. We rely on the qualitative properties of the system dynamics, extracted via singularity and singular perturbation theories, to design low dimensional qualitative detectors. We introduce this concept on a general class of singularly perturbed systems and then solve the problem for an analytically tractable class of two-dimensional systems with a single unknown sigmoidal nonlinearity and two sharply separated timescales. Numerical results are provided to show the performance of the designed qualitative detector.


          Coded Computation over Heterogeneous Clusters. (arXiv:1701.05973v4 [cs.DC] UPDATED)      Cache   Translate Page      

Authors: Amirhossein Reisizadeh, Saurav Prakash, Ramtin Pedarsani, Amir Salman Avestimehr

In large-scale distributed computing clusters, such as Amazon EC2, there are several types of "system noise" that can result in major degradation of performance: bottlenecks due to limited communication bandwidth, latency due to straggler nodes, etc. On the other hand, these systems enjoy abundance of redundancy - a vast number of computing nodes and large storage capacity. There have been recent results that demonstrate the impact of coding for efficient utilization of computation and storage redundancy to alleviate the effect of stragglers and communication bottlenecks in homogeneous clusters. In this paper, we focus on general heterogeneous distributed computing clusters consisting of a variety of computing machines with different capabilities. We propose a coding framework for speeding up distributed computing in heterogeneous clusters by trading redundancy for reducing the latency of computation. In particular, we propose Heterogeneous Coded Matrix Multiplication (HCMM) algorithm for performing distributed matrix multiplication over heterogeneous clusters that is provably asymptotically optimal for a broad class of processing time distributions. Moreover, we show that HCMM is unboundedly faster than any uncoded scheme. To demonstrate practicality of HCMM, we carry out experiments over Amazon EC2 clusters where HCMM is found to be up to $61\%$, $46\%$ and $36\%$ respectively faster than three benchmark load allocation schemes - Uniform Uncoded, Load-balanced Uncoded, and Uniform Coded. Additionally, we provide a generalization to the problem of optimal load allocation in heterogeneous settings, where we take into account the monetary costs associated with the clusters. We argue that HCMM is asymptotically optimal for budget-constrained scenarios as well, and we develop a heuristic algorithm for (HCMM) load allocation for budget-limited computation tasks.


          Error correction based on partial information. (arXiv:1701.06969v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Itzhak Tamo, Min Ye, Alexander Barg

We consider the decoding of linear and array codes from errors when we are only allowed to download a part of the codeword. More specifically, suppose that we have encoded $k$ data symbols using an $(n,k)$ code with code length $n$ and dimension $k.$ During storage, some of the codeword coordinates might be corrupted by errors. We aim to recover the original data by reading the corrupted codeword with a limit on the transmitting bandwidth, namely, we can only download an $\alpha$ proportion of the corrupted codeword. For a given $\alpha,$ our objective is to design a code and a decoding scheme such that we can recover the original data from the largest possible number of errors. A naive scheme is to read $\alpha n$ coordinates of the codeword. This method used in conjunction with MDS codes guarantees recovery from any $\lfloor(\alpha n-k)/2\rfloor$ errors. In this paper we show that we can instead read an $\alpha$ proportion from each of the codeword's coordinates. For a well-designed MDS code, this method can guarantee recovery from $\lfloor (n-k/\alpha)/2 \rfloor$ errors, which is $1/\alpha$ times more than the naive method, and is also the maximum number of errors that an $(n,k)$ code can correct by downloading only an $\alpha$ proportion of the codeword. We present two families of such optimal constructions and decoding schemes. One is a Reed-Solomon code with evaluation points in a subfield and the other is based on Folded Reed-Solomon codes. We further show that both code constructions attain asymptotically optimal list decoding radius when downloading only a part of the corrupted codeword. We also construct an ensemble of random codes that with high probability approaches the upper bound on the number of correctable errors when the decoder downloads an $\alpha$ proportion of the corrupted codeword.


          Periods of iterations of functions with restricted preimage sizes. (arXiv:1701.09148v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Rodrigo S. V. Martins, Daniel Panario, Claudio Qureshi, Eric Schmutz

We consider random mappings on n = kr nodes with preimage sizes restricted to a set of the form {0,k}, where k = k(r) is greater than 1. We prove that T, the least common multiple of the cycle lengths, and B= the product of the cycle lengths, are both asymptotically lognormal. The expected values of these random variables are also also estimated and compared with numerical results. This work is motivated, in part, by the use of these mappings as heuristic models for polynomials of the form x^k + a over the integers modulo p with p congruent to 1 mod k.


          Efficient Policy Learning. (arXiv:1702.02896v3 [math.ST] UPDATED)      Cache   Translate Page      

Authors: Susan Athey, Stefan Wager

In many areas, practitioners seek to use observational data to learn a treatment assignment policy that satisfies application-specific constraints, such as budget, fairness, simplicity, or other functional form constraints. For example, policies may be restricted to take the form of decision trees based on a limted set of easily observable individual characteristics. We propose a new approach to this problem motivated by the theory of semiparametrically efficient estimation. Our approach can be used to optimize either binary treatments or infinitesimal nudges to continuous treatments, and can leverage observational data where causal effects are identified using a variety of strategies, including selection-on-observables and instrumental variables. Given a doubly robust estimator of the causal effect of assigning everyone to treatment, we develop an algorithm for choosing whom to treat, and establish strong guarantees for the asymptotic utilitarian regret of the resulting policy.


          Incompressible fluid problems on embedded surfaces: Modeling and variational formulations. (arXiv:1702.02989v3 [math-ph] UPDATED)      Cache   Translate Page      

Authors: Thomas Jankuhn, Maxim A. Olshanskii, Arnold Reusken

Governing equations of motion for a viscous incompressible material surface are derived from the balance laws of continuum mechanics. The surface is treated as a time-dependent smooth orientable manifold of codimension one in an ambient Euclidian space. We use elementary tangential calculus to derive the governing equations in terms of exterior differential operators in Cartesian coordinates. The resulting equations can be seen as the Navier-Stokes equations posed on an evolving manifold. We consider a splitting of the surface Navier-Stokes system into coupled equations for the tangential and normal motions of the material surface. We then restrict ourselves to the case of a geometrically stationary manifold of codimension one embedded in $\Bbb{R}^n$. For this case, we present new well-posedness results for the simplified surface fluid model consisting of the surface Stokes equations. Finally, we propose and analyze several alternative variational formulations for this surface Stokes problem, including constrained and penalized formulations, which are convenient for Galerkin discretization methods.


          The Isostatic Conjecture. (arXiv:1702.08442v3 [math.MG] UPDATED)      Cache   Translate Page      

Authors: Robert Connelly, Steven J. Gortler, Evan Solomonides, Maria Yampolskaya

We show that a jammed packing of disks with generic radii, in a generic container, is such that the minimal number of contacts occurs and there is only one dimension of equilibrium stresses. We also point out some connections to packings with different radii and results in the theory of circle packings whose graph forms a triangulation of a given topological surface. We also point out a counterexample, due to F. Nazarov, to a previous conjecture that that triangulated packings with fixed numbers of disks with fixed numbers of disks for each radius claiming that such packings were the most dense.


          Speyer's elegant topological proof for Kasteleyn's Theorem. (arXiv:1703.02366v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Markus Fulmek

The purpose of this note is to rephrase Speyer's elegant topological proof for Kasteleyn's Theorem in a simple graph theoretical manner.


          Branching processes with interactions: the subcritical cooperative regime. (arXiv:1704.04203v4 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Adrián González Casanova, Juan Carlos Pardo, José Luis Perez

In this paper, we introduce a particular family of processes with values on the nonnegative integers that model the dynamics of populations where individuals are allow to have different types of inter- actions. The types of interactions that we consider include pairwise: competition, annihilation and cooperation; and interaction among several individuals that can be consider as catastrophes. We call such families of processes branching processes with interactions. In particular, we prove that a process in this class has a moment dual which turns out to be a jump-diffusion that can be thought as the evolution of the frequency of a trait or phenotype. The aim of this paper is to study the long term behaviour of branching processes with interac- tions under the assumption that the cooperation parameter satisfies a given condition that we called subcritical cooperative regime. The moment duality property is useful for our purposes.


          Quasi-Frobenius-splitting and lifting of Calabi-Yau varieties in characteristic $p$. (arXiv:1704.05604v2 [math.AG] UPDATED)      Cache   Translate Page      

Authors: Fuetaro Yobuko

Extending the notion of Frobenius-splitting, we prove that every finite height Calabi-Yau variety defined over an algebraically closed field of positive characteristic can be lifted to the ring of Witt vectors of length two.


          Binary de Bruijn Sequences via Zech's Logarithms. (arXiv:1705.03150v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Zuling Chang, Martianus Frederic Ezerman, Adamas Aqsa Fahreza, San Ling, Janusz Szmidt, Huaxiong Wang

The cycle joining method and the cross-join pairing are two main construction techniques for de Bruijn sequences. This work shows how to combine Zech's logarithms and each of the two techniques to efficiently construct binary de Bruijn sequences of large orders. A basic implementation is supplied as a proof-of-concept.

In the cycle joining method, the cycles are generated by an LFSR with a chosen period. We prove that determining Zech's logarithms is equivalent to identifying conjugate pairs shared by any pair of cycles. The approach quickly finds enough number of conjugate pairs between any two cycles to ensure the existence of trees containing all vertices in the adjacency graph of the LFSR. When the characteristic polynomial of the LFSR is a product of distinct irreducible polynomials, the approach via Zech's logarithms combines nicely with a recently proposed method to determine the conjugate pairs. This allows us to efficiently generate de Bruijn sequences with larger orders. Along the way, we establish new properties of Zech's logarithms.

The characterization of conjugate pairs via Zech's logarithms as positional markings is then adapted into identifying cross-join pairs in a de Bruijn sequence. We start from any de Bruijn sequence, although typically a modified $m$-sequence for ease of generation, and demonstrate how to use Zech's logarithms to identify all cross-join pairs in that sequence. The process can be repeated on each of the resulting sequences until a desired number of distinct sequences are produced. The computational process can be made more efficient by using a new analytic tool attributed to Fryers as well as prior algorithmic tools.


          Selective inference for effect modification via the lasso. (arXiv:1705.08020v3 [stat.ME] UPDATED)      Cache   Translate Page      

Authors: Qingyuan Zhao, Dylan S. Small, Ashkan Ertefaie

Effect modification occurs when the effect of the treatment on an outcome varies according to the level of other covariates and often has important implications in decision making. When there are tens or hundreds of covariates, it becomes necessary to use the observed data to select a simpler model for effect modification and then make valid statistical inference. We propose a two stage procedure to solve this problem. First, we use Robinson's transformation to decouple the nuisance parameters from the treatment effect of interest and use machine learning algorithms to estimate the nuisance parameters. Next, after plugging in the estimates of the nuisance parameters, we use the Lasso to choose a low-complexity model for effect modification. Compared to a full model consisting of all the covariates, the selected model is much more interpretable. Compared to the univariate subgroup analyses, the selected model greatly reduces the number of false discoveries. We show that the conditional selective inference for the selected model is asymptotically valid given the rate assumptions in classical semiparametric regression. Extensive simulation studies are conducted to verify the asymptotic results and an epidemiological application is used to demonstrate the method.


          The Hurwitz Subgroups of $E_6(2)$. (arXiv:1706.07970v3 [math.GR] UPDATED)      Cache   Translate Page      

Authors: Emilio Pierro

We prove that the exceptional group $E_6(2)$ is not a Hurwitz group. In the course of proving this, we complete the classification up to conjugacy of all Hurwitz subgroups of $E_6(2)$, in particular, those isomorphic to $L_2(8)$ and $L_3(2)$.


          Berry-Esseen Theorem and Quantitative homogenization for the Random Conductance Model with degenerate Conductances. (arXiv:1706.09493v3 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Sebastian Andres, Stefan Neukamm

We study the random conductance model on the lattice $\mathbb{Z}^d$, i.e. we consider a linear, finite-difference, divergence-form operator with random coefficients and the associated random walk under random conductances. We allow the conductances to be unbounded and degenerate elliptic, but they need to satisfy a strong moment condition and a quantified ergodicity assumption in form of a spectral gap estimate. As a main result we obtain in dimension $d\geq 3$ quantitative central limit theorems for the random walk in form of a Berry-Esseen estimate with speed $t^{-\frac 1 5+\varepsilon}$ for $d\geq 4$ and $t^{-\frac{1}{10}+\varepsilon}$ for $d=3$. Additionally, in the uniformly elliptic case in low dimensions $d=2,3$ we improve the rate in a quantitative Berry-Esseen theorem recently obtained by Mourrat. As a central analytic ingredient, for $d\geq 3$ we establish near-optimal decay estimates on the semigroup associated with the environment process. These estimates also play a central role in quantitative stochastic homogenization and extend some recent results by Gloria, Otto and the second author to the degenerate elliptic case.


          Branched coverings of $CP^2$ and other basic 4-manifolds. (arXiv:1707.03667v3 [math.GT] UPDATED)      Cache   Translate Page      

Authors: Riccardo Piergallini, Daniele Zuddas

We give necessary and sufficient conditions for a 4-manifold to be a branched covering of $CP^2$, $S^2\times S^2$, $S^2 \mathbin{\tilde\times} S^2$ and $S^3 \times S^1$, which are expressed in terms of the Betti numbers and the intersection form of the 4-manifold.


          Ribbon invariants I. (arXiv:1708.03876v12 [math.GT] UPDATED)      Cache   Translate Page      

Authors: Simeon Stefanov

A non-negative integer invariant, estimating from below the number of geometrically different critical points of a smooth function $f$ defined in the 2-disk, $f:\mathbb{B}^{2}\rightarrow\mathbb{R}$, is considered. (We denote it by "$\gamma$".) It depends on combined $C^{0}+C^{1}$ type conditions on the boundary $\partial(\mathbb{B}^{2})=\mathbb{S}^{1}$, that we call "ribbons" here. It turns out to be an alternative to the degree of the gradient map and almost independent from it. Note that the computation of the degree does not guarantee multiple critical points, unlike the ribbon invariant $\gamma$. In fact, this invariant is counting the number of essential components of the critical set, rather than simply the number of critical points. Various estimates of $\gamma$ are established. Some other "ribbon type" invariants of geometrical nature are defined and investigated. All these invariants turn out to be more combinatorial, rather than algebraic, in nature. Algorithms for the calculation of the ribbon invariants are presented. Interconnections with some different areas, such as the theory of immersed curves in the plane or independent domination in graphs, as well as various geometric applications, are commented. The latter topics will be investigated in detail in Part II of the present article. At the end, different questions about $\gamma$ are asked.


          Z-knotted triangulations. (arXiv:1708.04296v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Mark Pankov, Adam Tyc

Let $\Gamma$ be a connected simple finite graph embedded in a connected closed $2$-dimen\-sional surface. A zigzag is a closed path in $\Gamma$, where any two consequent edges lie on the same face and for any three consequent edges the face containing the first and second edges is distinct from the face which contains the second and third. The graph $\Gamma$ is $z$-knotted if it contains a singe zigzag. Such graphs are closely connected to Gauss code problem and have nice homological properties. We show that every triangulation of a connected closed $2$-dimensional surface admits a $z$-knotted shredding.


          A novel approach to fractional calculus: utilizing fractional integrals and derivatives of the Dirac delta function. (arXiv:1708.06605v2 [math.CA] UPDATED)      Cache   Translate Page      

Authors: Evan Camrud

While the definition of a fractional integral may be codified by Riemann and Liouville, an agreed-upon fractional derivative has eluded discovery for many years. This is likely a result of integral definitions including numerous constants of integration in their results. An elimination of constants of integration opens the door to an operator that reconciles all known fractional derivatives and shows surprising results in areas unobserved before, including the appearance of the Riemann Zeta Function and fractional Laplace and Fourier Transforms. A new class of functions, known as Zero Functions and closely related to the Dirac Delta Function, are necessary for one to perform elementary operations of functions without using constants. The operator also allows for a generalization of the Volterra integral equation, and provides a method of solving for Riemann's "complimentary" function introduced during his research on fractional derivatives.


          Canonical Gelfand-Zeitlin modules over orthogonal Gelfand-Zeitlin algebras. (arXiv:1709.01553v3 [math.RT] UPDATED)      Cache   Translate Page      

Authors: Nick Early, Volodymyr Mazorchuk, Elizaveta Vishnyakova

We prove that every orthogonal Gelfand-Zeitlin algebra $U$ acts on its Gelfand-Zeitlin subalgebra $\Gamma$. Considering the dual module, we show that every Gelfand-Zeitlin character of $\Gamma$ is realizable in a $U$-module. We observe that the Gelfand-Zeitlin formulae can be rewritten using divided difference operators. It turns out that the action of the latter operators on $\Gamma$ gives rise to an explicit basis in a certain Gelfand-Zeitlin submodule of the dual module mentioned above. This gives, generically, both in the case of regular and singular Gelfand-Zeitlin characters, an explicit construction of simple modules which realize given Gelfand-Zeitlin characters.


          Schur-type invariants of branched G-covers of surfaces. (arXiv:1709.03182v3 [math.GT] UPDATED)      Cache   Translate Page      

Authors: Eric Samperton (UC Davis)

Fix a finite group $G$ and a conjugacy invariant subset $C\subseteq G$. Let $\Sigma$ be an oriented surface, possibly with punctures. We consider the question of when two homomorphisms $\pi_1(\Sigma) \to G$ taking punctures into $C$ are equivalent up to an orientation preserving diffeomorphism of $\Sigma$. We provide an answer to this question in a stable range, meaning that $\Sigma$ has enough genus and enough punctures of every conjugacy type in $C$. If $C$ generates $G$, then we can assume $\Sigma$ has genus 0 (or any other constant). The main tool is a classifying space for (framed) $C$-branched $G$-covers, and related homology classes we call branched Schur invariants, since they take values in a torsor over a quotient of the Schur multiplier $H_2(G)$. We conclude with a brief discussion of applications to $(2+1)$-dimensional $G$-equivariant TQFT and symmetry-enriched topological phases.


          The Shark Random Swim (L\'evy flight with memory). (arXiv:1710.05671v3 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Silvia Businger

The Elephant Random Walk (ERW), first introduced by Sch\"utz and Trimper (2004), is a one-dimensional simple random walk on $ \mathbb{Z} $ having a memory about the whole past. We study the Shark Random Swim, a random walk whose steps are $ \alpha $-stable distributed with memory about the whole past. In contrast with the ERW, the steps of the Shark Random Swim have a heavy tailed distribution. Our aim in this work is to study the impact of the heavy tailed step distributions on the asymptotic behavior of the random walk. We shall see that, as for the ERW, the asymptotic behavior of the Shark Random Swim depends on its memory parameter $ p $, and that a phase transition can be observed at the critical value $ p=\frac{1}{\alpha} $.


          On uncountable strongly concentrated sets of reals. (arXiv:1711.04262v3 [math.LO] UPDATED)      Cache   Translate Page      

Authors: Eilon Bilinsky

We construct new models of $ZF$ with an uncountable set of reals that has a unique condensation point. This addresses a question by Sierpi\'{n}ski from 1918.


          The pressure function for infinite equilibrium measures. (arXiv:1711.05069v3 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Henk Bruin, Dalia Terhesiu, Mike Todd

Assume that $(X,f)$ is a dynamical system and $\phi:X \to [-\infty, \infty)$ is a potential such that the $f$-invariant measure $\mu_\phi$ equivalent to $\phi$-conformal measure is infinite, but that there is an inducing scheme $F = f^\tau$ with a finite measure $\mu_{\bar\phi}$ and polynomial tails $\mu_{\bar\phi}(\tau \geq n) = O(n^{-\beta})$, $\beta \in (0,1)$. We give conditions under which the pressure of $f$ for a perturbed potential $\phi+s\psi$ relates to the pressure of the induced system as $P(\phi+s\psi) = (C P(\overline{\phi+s\psi}))^{1/\beta} (1+o(1))$, together with estimates for the $o(1)$-error term. This extends results from Sarig to the setting of infinite equilibrium states. We give several examples of such systems, thus improving on the results of Lopes for the Pomeau-Manneville map with potential $\phi_t = - t\log f'$, as well as on the results by Bruin & Todd on countably piecewise linear unimodal Fibonacci maps. In addition, limit properties of the family of measures $\mu_{\phi+s\psi}$ as $s\to 0$ are studied and statistical properties (correlation coefficients and arcsine laws) under the limit measure are derived.


          Event-Triggered Communication and Control of Networked Systems for Multi-Agent Consensus. (arXiv:1712.00429v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Cameron Nowzari, Eloy Garcia, Jorge Cortes

This article provides an introduction to event-triggered coordination for multi-agent average consensus. We provide a comprehensive account of the motivations behind the use of event-triggered strategies for consensus, the methods for algorithm synthesis, the technical challenges involved in establishing desirable properties of the resulting implementations, and their applications in distributed control. We pay special attention to the assumptions on the capabilities of the network agents and the resulting features of the algorithm execution, including the interconnection topology, the evaluation of triggers, and the role of imperfect information.

The issues raised in our discussion transcend the specific consensus problem and are indeed characteristic of cooperative algorithms for networked systems that solve other coordination tasks. As our discussion progresses, we make these connections clear, highlighting general challenges and tools to address them widespread in the event-triggered control of networked systems.


          Limiting Distributions of Translates of Divergent Diagonal Orbits. (arXiv:1712.00630v3 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Uri Shapira, Cheng Zheng

We define a natural topology on the collection of (equivalence classes up to scaling of) locally finite measures on a homogeneous space and prove that in this topology, pushforwards of certain infinite volume orbits equidistribute in the ambient space. As an application of our results we prove an asymptotic formula for the number of integral points in a ball on some varieties as the radius goes to infinity.


          Isolated types of finite rank: an abstract Dixmier-Moeglin equivalence. (arXiv:1712.00933v2 [math.LO] UPDATED)      Cache   Translate Page      

Authors: Omar León Sánchez, Rahim Moosa

Suppose $T$ is totally transcendental and every minimal non-locally-modular type is nonorthogonal to a nonisolated minimal type over the empty set. It is shown that a finite rank type $p=tp(a/A)$ is isolated if and only if $a$ is independent from $q(\mathcal U)$ over $Ab$ for every $b\in \operatorname{acl}(Aa)$ and $q\in S(Ab)$ nonisolated and minimal. This applies to the theory of differentially closed fields -- where it is motivated by the differential Dixmier-Moeglin equivalence problem -- and the theory of compact complex manifolds.


          Proof of a conjecture on induced subgraphs of Ramsey graphs. (arXiv:1712.05656v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Matthew Kwan, Benny Sudakov

An n-vertex graph is called C-Ramsey if it has no clique or independent set of size C log n. All known constructions of Ramsey graphs involve randomness in an essential way, and there is an ongoing line of research towards showing that in fact all Ramsey graphs must obey certain "richness" properties characteristic of random graphs. More than 25 years ago, Erd\H{o}s, Faudree and S\'{o}s conjectured that in any C-Ramsey graph there are $\Omega\left(n^{5/2}\right)$ induced subgraphs, no pair of which have the same numbers of vertices and edges. Improving on earlier results of Alon, Balogh, Kostochka and Samotij, in this paper we prove this conjecture.


          Newtonian fluid flow in a thin porous medium with non-homogeneous slip boundary conditions. (arXiv:1712.05998v2 [math.AP] UPDATED)      Cache   Translate Page      

Authors: María Anguiano, Francisco J. Suárez-Grau

We consider the Stokes system in a thin porous medium $\Omega_\varepsilon$ of thickness $\varepsilon$ which is perforated by periodically distributed solid cylinders of size $\varepsilon$. On the boundary of the cylinders we prescribe non-homogeneous slip boundary conditions depending on a parameter $\gamma$. The aim is to give the asymptotic behavior of the velocity and the pressure of the fluid as $\varepsilon$ goes to zero. Using an adaptation of the unfolding method, we give, following the values of $\gamma$, different limit systems.


          Scattering fans. (arXiv:1712.06968v3 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Nathan Reading

Scattering diagrams arose in the context of mirror symmetry, Donaldson-Thomas theory, and integrable systems. We show that a consistent scattering diagram with minimal support cuts the ambient space into a complete fan. A special class of scattering diagrams, the cluster scattering diagrams, are closely related to cluster algebras. We show that the cluster scattering fan associated to an exchange matrix $B$ refines the mutation fan for $B$ (a complete fan that encodes the geometry of mutations of $B$). We conjecture that, when $B$ is $n\times n$ for $n>2$, these two fans coincide if and only if $B$ is of finite mutation type.


          Connection probabilities in Poisson random graphs with uniformly bounded edges. (arXiv:1712.07016v3 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Alessandra Faggionato, Hlafo Alfie Mimun

We consider random graphs with uniformly bounded edges on a Poisson point process conditioned to contain the origin. In particular we focus on the random connection model, the Boolean model and Miller-Abrahams random resistor network with lower-bounded conductances. The latter is relevant for the analysis of conductivity by Mott variable range hopping in strongly disordered systems. By using the method of randomized algorithms developed by Duminil-Copin et al. we prove that in the subcritical phase the probability that the origin is connected to some point at distance $n$ decays exponentially in $n$, while in the supercritical phase the probability that the origin is connected to infinity is strictly positive and bounded from below by a term proportional to $ (\lambda-\lambda_c)$, $\lambda$ being the density of the Poisson point process and $\lambda_c$ being the critical density.


          Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes. (arXiv:1712.09035v3 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Ning Cai, Masahito Hayashi

We analyze the security for network code when the eavesdropper can contaminate the information on the attacked edges (active attack) and can choose the attacked edges adaptively (adaptive attack). We show that active and adaptive attacks cannot improve the performance of the eavesdropper when the code is linear. Further, we give an non-linear example, in which an adaptive attack improves the performance of the eavesdropper. We derive the capacity for the unicast case and the capacity region for the multicast case or the multiple multicast case in several examples of relay networks, beyond the minimum cut theorem, when no additional random number is allowed as scramble variables in the intermediate nodes.


          Clustering in Block Markov Chains. (arXiv:1712.09232v2 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Jaron Sanders, Alexandre Proutière, Se-Young Yun

This paper considers cluster detection in Block Markov Chains (BMCs). These Markov chains are characterized by a block structure in their transition matrix. More precisely, the $n$ possible states are divided into a finite number of $K$ groups or clusters, such that states in the same cluster exhibit the same transition rates to other states. One observes a trajectory of the Markov chain, and the objective is to recover, from this observation only, the (initially unknown) clusters. In this paper we devise a clustering procedure that accurately, efficiently, and provably detects the clusters. We first derive a fundamental information-theoretical lower bound on the detection error rate satisfied under any clustering algorithm. This bound identifies the parameters of the BMC, and trajectory lengths, for which it is possible to accurately detect the clusters. We next develop two clustering algorithms that can together accurately recover the cluster structure from the shortest possible trajectories, whenever the parameters allow detection. These algorithms thus reach the fundamental detectability limit, and are optimal in that sense.


          A Fast Algorithm for Multiresolution Mode Decomposition. (arXiv:1712.09338v2 [math.NA] UPDATED)      Cache   Translate Page      

Authors: Gao Tang, Haizhao Yang

\emph{Multiresolution mode decomposition} (MMD) is an adaptive tool to analyze a time series $f(t)=\sum_{k=1}^K f_k(t)$, where $f_k(t)$ is a \emph{multiresolution intrinsic mode function} (MIMF) of the form \begin{eqnarray*} f_k(t)&=&\sum_{n=-N/2}^{N/2-1} a_{n,k}\cos(2\pi n\phi_k(t))s_{cn,k}(2\pi N_k\phi_k(t))\\&&+\sum_{n=-N/2}^{N/2-1}b_{n,k} \sin(2\pi n\phi_k(t))s_{sn,k}(2\pi N_k\phi_k(t)) \end{eqnarray*} with time-dependent amplitudes, frequencies, and waveforms. The multiresolution expansion coefficients $\{a_{n,k}\}$, $\{b_{n,k}\}$, and the shape function series $\{s_{cn,k}(t)\}$ and $\{s_{sn,k}(t)\}$ provide innovative features for adaptive time series analysis. The MMD aims at identifying these MIMF's (including their multiresolution expansion coefficients and shape functions series) from their superposition. This paper proposes a fast algorithm for solving the MMD problem based on recursive diffeomorphism-based spectral analysis (RDSA). RDSA admits highly efficient numerical implementation via the nonuniform fast Fourier transform (NUFFT); its convergence and accuracy can be guaranteed theoretically. Numerical examples from synthetic data and natural phenomena are given to demonstrate the efficiency of the proposed method.


          Arboreal Cantor actions. (arXiv:1801.01440v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Olga Lukina

In this paper, we consider minimal equicontinuous actions of discrete countably generated groups on Cantor sets, obtained from the arboreal representations of absolute Galois groups of fields. In particular, we study the asymptotic discriminant of these actions.

The asymptotic discriminant is an invariant obtained by restricting the action to a sequence of nested clopen sets, and studying the isotropies of the enveloping group actions in such restricted systems. An enveloping (Ellis) group of such an action is a profinite group.

A large class of actions of profinite groups on Cantor sets is given by arboreal representations of absolute Galois groups of fields. We show how to associate to an arboreal representation an action of a discrete group, and give examples of arboreal representations with stable and wild asymptotic discriminant.


          Uniform Hausdorff dimension result for the inverse images of stable L\'evy processes. (arXiv:1801.03008v3 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Renming Song, Yimin Xiao, Xiaochuan Yang

We establish a uniform Hausdorff dimension result for the inverse image sets of real-valued strictly $\alpha$-stable L\'evy processes with $1< \alpha\le 2$. This extends a theorem of Kaufman for Brownian motion. Our method is different from that of Kaufman and depends on covering principles for Markov processes.


          Throughput Maximization for UAV-Enabled Wireless Powered Communication Networks. (arXiv:1801.04545v4 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Lifeng Xie, Jie Xu, Rui Zhang

This paper studies an unmanned aerial vehicle (UAV)-enabled wireless powered communication network (WPCN), in which a UAV is dispatched as a mobile access point (AP) to serve a set of ground users periodically. The UAV employs the radio frequency (RF) wireless power transfer (WPT) to charge the users in the downlink, and the users use the harvested RF energy to send independent information to the UAV in the uplink. Unlike the conventional WPCN with fixed APs, the UAV-enabled WPCN can exploit the mobility of the UAV via trajectory design, jointly with the wireless resource allocation optimization, to maximize the system throughput. In particular, we aim to maximize the uplink common (minimum) throughput among all ground users over a finite UAV's flight period, subject to its maximum speed constraint and the users' energy neutrality constraints. The resulted problem is non-convex and thus difficult to be solved optimally. To tackle this challenge, we first consider an ideal case without the UAV's maximum speed constraint, and obtain the optimal solution to the relaxed problem. The optimal solution shows that the UAV should successively hover above a finite number of ground locations for downlink WPT, as well as above each of the ground users for uplink communication. Next, we consider the general problem with the UAV's maximum speed constraint. Based on the above multi-location-hovering solution, we first propose an efficient successive hover-and-fly trajectory design, jointly with the downlink and uplink wireless resource allocation, and then propose a locally optimal solution by applying the techniques of alternating optimization and successive convex programming (SCP). Numerical results show that the proposed UAV-enabled WPCN achieves significant throughput gains over the conventional WPCN with fixed-location AP.


          Distributionally Robust Optimization for Sequential Decision Making. (arXiv:1801.04745v2 [cs.SY] UPDATED)      Cache   Translate Page      

Authors: Zhi Chen, Pengqian Yu, William B. Haskell

The distributionally robust Markov Decision Process (MDP) approach asks for a distributionally robust policy that achieves the maximal expected total reward under the most adversarial distribution of uncertain parameters. In this paper, we study distributionally robust MDPs where ambiguity sets for the uncertain parameters are of a format that can easily incorporate in its description the uncertainty's generalized moment as well as statistical distance information. In this way, we generalize existing works on distributionally robust MDP with generalized-moment-based and statistical-distance-based ambiguity sets to incorporate information from the former class such as moments and dispersions to the latter class that critically depends on empirical observations of the uncertain parameters. We show that, under this format of ambiguity sets, the resulting distributionally robust MDP remains tractable under mild technical conditions. To be more specific, a distributionally robust policy can be constructed by solving a sequence of one-stage convex optimization subproblems.


          On closed Lie ideals of certain tensor products of C*-algebras II. (arXiv:1801.06705v3 [math.OA] UPDATED)      Cache   Translate Page      

Authors: Ved Prakash Gupta, Ranjana Jain, Bharat Talwar

We identify all closed Lie ideals of $A \otimes^{\alpha} B$ and $B(H) \otimes^{\alpha} B(H)$, where $\otimes^{\alpha}$ is either the Haagerup tensor product, the Banach space projective tensor product or the operator space projective tensor product, $A$ is any simple C*-algebra, $B$ is any C*-algebra with one of them admitting no tracial states, and $H$ is an infinite dimensional separable Hilbert space. Further, generalizing a result of Marcoux, we also identify all closed Lie ideals of $A\otimes^{\min} B$, where $A$ is a simple C*-algebra with at most one tracial state and $B$ is any commutative C*-algebra.


          Parameter estimation for discretely-observed linear birth-and-death processes. (arXiv:1802.05015v2 [math.ST] UPDATED)      Cache   Translate Page      

Authors: Anthony C. Davison, Sophie Hautphenne, Andrea Kraus

Birth-and-death processes are widely used to model the development of biological populations. Although they are relatively simple models, their parameters can be challenging to estimate, because the likelihood can become numerically unstable when data arise from the most common sampling schemes, such as annual population censuses. Simple estimators may be based on an embedded Galton-Watson process, but this presupposes that the observation times are equi-spaced. We estimate the birth, death, and growth rates of a linear birth-and-death process whose population size is periodically observed via an embedded Galton-Watson process, and by maximizing a saddlepoint approximation to the likelihood. We show that a Gaussian approximation to the saddlepoint-based likelihood connects the two approaches, we establish consistency and asymptotic normality of quasi-likelihood estimators, compare our estimators on some numerical examples, and apply our results to census data for two endangered bird populations and the H1N1 influenza pandemic.


          Stochastic Variance-Reduced Cubic Regularization for Nonconvex Optimization. (arXiv:1802.07372v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Zhe Wang, Yi Zhou, Yingbin Liang, Guanghui Lan

Cubic regularization (CR) is an optimization method with emerging popularity due to its capability to escape saddle points and converge to second-order stationary solutions for nonconvex optimization. However, CR encounters a high sample complexity issue for finite-sum problems with a large data size. %Various inexact variants of CR have been proposed to improve the sample complexity. In this paper, we propose a stochastic variance-reduced cubic-regularization (SVRC) method under random sampling, and study its convergence guarantee as well as sample complexity. We show that the iteration complexity of SVRC for achieving a second-order stationary solution within $\epsilon$ accuracy is $O(\epsilon^{-3/2})$, which matches the state-of-art result on CR types of methods. Moreover, our proposed variance reduction scheme significantly reduces the per-iteration sample complexity. The resulting total Hessian sample complexity of our SVRC is ${\Oc}(N^{2/3} \epsilon^{-3/2})$, which outperforms the state-of-art result by a factor of $O(N^{2/15})$. We also study our SVRC under random sampling without replacement scheme, which yields a lower per-iteration sample complexity, and hence justifies its practical applicability.


          Critical yield numbers and limiting yield surfaces of particle arrays settling in a Bingham fluid. (arXiv:1802.07560v3 [math.OC] UPDATED)      Cache   Translate Page      

Authors: José A. Iglesias, Gwenael Mercier, Otmar Scherzer

We consider the flow of multiple particles in a Bingham fluid in an anti-plane shear flow configuration. The limiting situation in which the internal and applied forces balance and the fluid and particles stop flowing, that is, when the flow settles, is formulated as finding the optimal ratio between the total variation functional and a linear functional. The minimal value for this quotient is referred to as the critical yield number or, in analogy to Rayleigh quotients, generalized eigenvalue. This minimum value can in general only be attained by discontinuous, hence not physical, velocities. However, we prove that these generalized eigenfunctions, whose jumps we refer to as limiting yield surfaces, appear as rescaled limits of the physical velocities. Then, we show the existence of geometrically simple minimizers. Furthermore, a numerical method for the minimization is then considered. It is based on a nonlinear finite difference discretization, whose consistency is proven, and a standard primal-dual descent scheme. Finally, numerical examples show a variety of geometric solutions exhibiting the properties discussed in the theoretical sections.


          Generic steady state bifurcations in monoid equivariant dynamics with applications in homogeneous coupled cell systems. (arXiv:1802.08490v3 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Sören Schwenker

We prove that steady state bifurcations in finite-dimensional dynamical systems that are symmetric with respect to a monoid representation generically occur along an absolutely indecomposable subrepresentation. This is stated as a conjecture in B. Rink and J. Sanders, "Coupled cell networks and their hidden symmetries", SIAM J. Math. Anal., 46 (2014). It is a generalization of the well-known fact that generic steady state bifurcations in equivariant dynamical systems occur along an absolutely irreducible subrepresentation if the symmetries form a group - finite or compact Lie. Our generalization also includes non-compact symmetry groups. The result has applications in bifurcation theory of homogeneous coupled cell networks as they can be embedded (under mild additional assumptions) into monoid equivariant systems.


          Divergent on average directions of Teichmuller geodesic flow. (arXiv:1803.00093v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Paul Apisa, Howard Masur

The set of directions from a quadratic differential that diverge on average under Teichmuller geodesic flow has Hausdorff dimension exactly equal to one-half.


          The quantum determinant of the elliptic algebra $\mathcal{A}_{q,p}(\mathfrak{\widehat{gl}}_N)$. (arXiv:1803.00311v3 [math.QA] UPDATED)      Cache   Translate Page      

Authors: L. Frappat, D. Issing, E. Ragoucy

We introduce the quantum determinant for the elliptic quantum algebra $\mathcal{A}_{q,p}(\mathfrak{\widehat{gl}}_N)$ and prove that it generates the center of this algebra.


          Robust Optimization for Electricity Generation. (arXiv:1803.06984v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Chaithanya Bandi, Krishnamurthy Dvijotham, David Morton, Haoxiang Yang

We consider a robust optimization problem in an electric power system under uncertain demand and availability of renewable energy resources. Solving the deterministic alternating current optimal power flow (ACOPF) problem has been considered challenging since the 1960s due to its nonconvexity. Linear approximation of the AC power flow system sees pervasive use, but does not guarantee a physically feasible system configuration. In recent years, various convex relaxation schemes for the ACOPF problem have been investigated, and under some assumptions, a physically feasible solution can be recovered. Based on these convex relaxation schemes, we construct a robust convex optimization problem with recourse to solve for optimal controllable injections (fossil fuel, nuclear, etc.) in electric power systems under uncertainty (renewable energy generation, demand fluctuation, etc.). We propose a cutting-plane method to solve this robust optimization problem, and we establish convergence and other desirable properties. Experimental results indicate that our robust convex relaxation of the ACOPF problem can provide a tight lower bound.


          A library of second-order models for synchronous machines. (arXiv:1803.09707v3 [cs.SY] UPDATED)      Cache   Translate Page      

Authors: Olaoluwapo Ajala, Alejandro Dominguez-garcia, Peter Sauer, Daniel Liberzon

This paper presents a library of second-order models for synchronous machines that can be utilized in power system dynamic performance analysis and control design tasks. The models have a similar structure to the classical model in that they consist of two dynamic states, the power angle and the angular speed. However, unlike the classical model, the models find applications beyond first swing stability analysis; for example, they can also be utilized in transient stability studies. The models are developed through a systematic reduction of a nineteenth-order model, using singular perturbation techniques, and they are validated by comparing their voltage, frequency, and phase profiles with that of the high-order model and that of the classical model.


          Dissipative numerical schemes on Riemannian manifolds with applications to gradient flows. (arXiv:1804.08104v3 [math.NA] UPDATED)      Cache   Translate Page      

Authors: Elena Celledoni, Sølve Eidnes, Brynjulf Owren, Torbjørn Ringholm

This paper concerns an extension of discrete gradient methods to finite-dimensional Riemannian manifolds termed discrete Riemannian gradients, and their application to dissipative ordinary differential equations. This includes Riemannian gradient flow systems which occur naturally in optimization problems. The Itoh--Abe discrete gradient is formulated and applied to gradient systems, yielding a derivative-free optimization algorithm. The algorithm is tested on two eigenvalue problems and two problems from manifold valued imaging: InSAR denoising and DTI denoising.


          On the K-theoretic classification of dynamically stable systems. (arXiv:1804.10111v2 [math-ph] UPDATED)      Cache   Translate Page      

Authors: Giuseppe De Nittis, Kiyonori Gomi

This paper deals with the construction of a suitable topological $K$-theory capable of classifying topological phases of dynamically stable systems described by gapped $\eta$-self-adjoint operators on a Krein space with indefinite metric $\eta$.


          Local B-model Yukawa couplings from A-twisted correlators. (arXiv:1805.02661v3 [hep-th] UPDATED)      Cache   Translate Page      

Authors: Yoshinori Honma, Masahide Manabe

Using the exact formula for the A-twisted correlation functions of the two dimensional $\mathcal{N}=(2,2)$ gauged linear sigma model, we reconsider the computation of the B-model Yukawa couplings of the local toric Calabi-Yau varieties. Our analysis is based on an exact result that has been evaluated from the supersymmetric localization technique and careful treatment of its application. We provide a detailed description of a procedure to investigate the local B-model Yukawa couplings and also test our prescription by comparing the results with known expressions evaluated from the local mirror symmetry approach. In particular, we find that the ambiguities of classical intersection numbers of a certain class of local toric Calabi-Yau varieties discovered previously can be interpreted as degrees of freedom of the twisted mass deformations.


          Joint Computation and Communication Cooperation for Energy-Efficient Mobile Edge Computing. (arXiv:1805.05906v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Xiaowen Cao, Feng Wang, Jie Xu, Rui Zhang, Shuguang Cui

This paper proposes a novel user cooperation approach in both computation and communication for mobile edge computing (MEC) systems to improve the energy efficiency for latency-constrained computation. We consider a basic three-node MEC system consisting of a user node, a helper node, and an access point (AP) node attached with an MEC server, in which the user has latency-constrained and computation-intensive tasks to be executed. We consider two different computation offloading models, namely the partial and binary offloading, respectively. Under this setup, we focus on a particular finite time block and develop an efficient four-slot transmission protocol to enable the joint computation and communication cooperation. Besides the local task computing over the whole block, the user can offload some computation tasks to the helper in the first slot, and the helper cooperatively computes these tasks in the remaining time; while in the second and third slots, the helper works as a cooperative relay to help the user offload some other tasks to the AP for remote execution in the fourth slot. For both cases with partial and binary offloading, we jointly optimize the computation and communication resources allocation at both the user and the helper (i.e., the time and transmit power allocations for offloading, and the CPU frequencies for computing), so as to minimize their total energy consumption while satisfying the user's computation latency constraint. Although the two problems are non-convex in general, we propose efficient algorithms to solve them optimally. Numerical results show that the proposed joint computation and communication cooperation approach significantly improves the computation capacity and energy efficiency at the user and helper nodes, as compared to other benchmark schemes without such a joint design.


          Energy-Efficient Interactive Beam-Alignment for Millimeter-Wave Networks. (arXiv:1805.06089v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Muddassar Hussain, Nicolo Michelusi

Millimeter-wave will be a key technology in next-generation wireless networks thanks to abundant bandwidth availability. However, the use of large antenna arrays with beamforming demands precise beam-alignment between transmitter and receiver, and may entail huge overhead in mobile environments. This paper investigates the design of an optimal interactive beam-alignment and data communication protocol, with the goal of minimizing power consumption under a minimum rate constraint. The base- station selects beam-alignment or data communication and the beam parameters, based on feedback from the user-end. Based on the sectored antenna model and uniform prior on the angles of departure and arrival (AoD/AoA), the optimality of a fixed-length beam-alignment phase followed by a data- communication phase is demonstrated. Moreover, a decoupled fractional beam-alignment method is shown to be optimal, which decouples over time the alignment of AoD and AoA, and iteratively scans a fraction of their region of uncertainty. A heuristic policy is proposed for non-uniform AoD/AoA prior with provable performance guarantees, and it is shown that the uniform prior is the worst-case scenario. The performance degradation due to detection errors is studied analytically and via simulation. The numerical results with analog beams depict up to 4dB, 7.5dB, and 14dB gains over a state-of-the-art bisection method, conventional and interactive exhaustive search policies, respectively, and demonstrate that the sectored model provides valuable insights for beam-alignment design.


          Geometry and Physics: An Overview. (arXiv:1805.06932v2 [math.HO] UPDATED)      Cache   Translate Page      

Authors: David R. Morrison

We present some episodes from the history of interactions between geometry and physics over the past century.


          Implicit Probabilistic Integrators for ODEs. (arXiv:1805.07970v2 [stat.ME] UPDATED)      Cache   Translate Page      

Authors: Onur Teymur, Han Cheng Lie, Tim Sullivan, Ben Calderhead

We introduce a family of implicit probabilistic integrators for initial value problems (IVPs), taking as a starting point the multistep Adams-Moulton method. The implicit construction allows for dynamic feedback from the forthcoming time-step, in contrast to previous probabilistic integrators, all of which are based on explicit methods. We begin with a concise survey of the rapidly-expanding field of probabilistic ODE solvers. We then introduce our method, which builds on and adapts the work of Conrad et al. (2016) and Teymur et al. (2016), and provide a rigorous proof of its well-definedness and convergence. We discuss the problem of the calibration of such integrators and suggest one approach. We give an illustrative example highlighting the effect of the use of probabilistic integrators - including our new method - in the setting of parameter inference within an inverse problem.


          Step Size Matters in Deep Learning. (arXiv:1805.08890v2 [cs.LG] UPDATED)      Cache   Translate Page      

Authors: Kamil Nar, S. Shankar Sastry

Training a neural network with the gradient descent algorithm gives rise to a discrete-time nonlinear dynamical system. Consequently, behaviors that are typically observed in these systems emerge during training, such as convergence to an orbit but not to a fixed point or dependence of convergence on the initialization. Step size of the algorithm plays a critical role in these behaviors: it determines the subset of the local optima that the algorithm can converge to, and it specifies the magnitude of the oscillations if the algorithm converges to an orbit. To elucidate the effects of the step size on training of neural networks, we study the gradient descent algorithm as a discrete-time dynamical system, and by analyzing the Lyapunov stability of different solutions, we show the relationship between the step size of the algorithm and the solutions that can be obtained with this algorithm. The results provide an explanation for several phenomena observed in practice, including the deterioration in the training error with increased depth, the hardness of estimating linear mappings with large singular values, and the distinct performance of deep residual networks.


          Symmetry and rigidity for the hinged composite plate problem. (arXiv:1805.10216v2 [math.AP] UPDATED)      Cache   Translate Page      

Authors: Francesca Colasuonno, Eugenio Vecchi

The composite plate problem is an eigenvalue optimization problem related to the fourth order operator $(-\Delta)^2$. In this paper we continue the study started in [10], focusing on symmetry and rigidity issues in the case of the hinged composite plate problem, a specific situation that allows us to exploit classical techniques like the moving plane method.


          Voros Coefficients for the Hypergeometric Differential Equations and Eynard-Orantin's Topological Recursion - Part I : For the Weber Equation. (arXiv:1805.10945v3 [math.CA] UPDATED)      Cache   Translate Page      

Authors: Kohei Iwaki, Tatsuya Koike, Yumiko Takei

We develop the theory of quantization of spectral curves via the topological recursion. We formulate a quantization scheme of spectral curves which is not necessarily admissible in the sense of Bouchard and Eynard. The main result of this paper and the second part [IKoT] establishes a relation between the Voros coefficients for the quantum curves and the free energy for spectral curves associated with the confluent family of Gauss hypergeometric differential equations. We focus on the Weber equation in this article, and generalize the result for the other members of the confluent family in the second part. We also find explicit formulas of free energy for those spectral curves in terms of the Bernoulli numbers.


          Momentum space approach to crossing symmetric CFT correlators. (arXiv:1805.11107v2 [hep-th] UPDATED)      Cache   Translate Page      

Authors: Hiroshi Isono, Toshifumi Noumi, Gary Shiu

We construct a crossing symmetric basis for conformal four-point functions in momentum space by requiring consistent factorization. Just as scattering amplitudes factorize when the intermediate particle is on-shell, non-analytic parts of conformal correlators enjoy a similar factorization in momentum space. Based on this property, Polyakov, in his pioneering 1974 work, introduced a basis for conformal correlators which manifestly satisfies the crossing symmetry. He then initiated the bootstrap program by requiring its consistency with the operator product expansion. This approach is complementary to the ordinary bootstrap program, which is based on the conformal block and requires the crossing symmetry as a consistency condition of the theory. Even though Polyakov's original bootstrap approach has been revisited recently, the crossing symmetric basis has not been constructed explicitly in momentum space. In this paper we complete the construction of the crossing symmetric basis for scalar four-point functions with an intermediate operator with a general spin, by using new analytic expressions for three-point functions involving one tensor. Our new basis manifests the analytic properties of conformal correlators. Also the connected and disconnected correlators are manifestly separated, so that it will be useful for the study of large $N$ CFTs in particular.


          Inequalities for some integrals involving modified Bessel functions. (arXiv:1806.00524v2 [math.CA] UPDATED)      Cache   Translate Page      

Authors: Robert E. Gaunt

Simple inequalities are established for some integrals involving the modified Bessel functions of the first and second kind. In most cases these inequalities are tight in certain limits. As a consequence, we deduce a tight double inequality, involving the modified Bessel function of the first kind, for a generalized hypergeometric function. We also present some open problems that arise from this research.


          Elliptic free-fermion model with OS boundary and elliptic Pfaffians. (arXiv:1806.00933v2 [math-ph] UPDATED)      Cache   Translate Page      

Authors: Kohei Motegi

We introduce and study a class of partition functions of an elliptic free-fermionic face model. We study the partition functions with a triangular boundary using the off-diagonal $K$-matrix at the boundary (OS boundary), which was introduced by Kuperberg as a class of variants of the domain wall boundary partition functions. We find explicit forms of the partition functions with OS boundary using elliptic Pfaffians. We find two expressions based on two versions of Korepin's method, and we obtain an identity between two elliptic Pfaffians as a corollary.


          Kobayashi hyperbolicity of moduli spaces of minimal projective manifolds of general type (with the appendix by Dan Abramovich). (arXiv:1806.01666v5 [math.AG] UPDATED)      Cache   Translate Page      

Authors: Ya Deng

In this work we first refine several results on the positivity of direct images by Koll\'ar and Viehweg-Zuo, along the lines of the fundamental work by Viehweg-Zuo as well as the recent breakthrough by Cao-P\u{a}un on the Iitaka $C_{n,m}$ conjecture. We then apply those results to produce an abundant supply of "negatively twisted" Higgs bundles (so-called Viehweg-Zuo Higgs bundles in the present paper) on moduli spaces of polarized manifolds with a big and nef canonical sheaf, which refines previous results by Viehweg-Zuo and Popa-Taji-Wu. These Higgs bundles are used to construct sufficiently many (possibly degenerate) Finsler metrics on those moduli spaces, whose holomorphic sectional curvatures are all bounded from above by a negative constant. In particular, we prove the Kobayashi hyperbolicity of base spaces of effectively parametrized families of minimal projective manifolds of general type. This generalizes previous work by To-Yeung, in which they further assumed that the families are canonically polarized.


          Multiphoton supercoherent states. (arXiv:1806.02337v2 [quant-ph] UPDATED)      Cache   Translate Page      

Authors: Erik Díaz-Bautista, David J Fernández C

In this paper we are going to build the multiphoton supercoherent states for the supersymmetric harmonic oscillator as eigenstates of the $m$-th power of a special form (but still with a free parameter) of the Kornbluth-Zypman supersymmetric annihilation operator. They become expressed in terms of the multiphoton coherent states for the standard harmonic oscillator. The Heisenberg uncertainty relation and some statistical properties for these states will be studied. Since the multiphoton supercoherent states turn out to be periodic, then the associated geometric phases will be as well evaluated.


          $\mathbb{F}_p((X))$ is decidable as a module over the ring of additive polynomials. (arXiv:1806.03123v2 [math.LO] UPDATED)      Cache   Translate Page      

Authors: Gönenç Onay

Let $p$ be a prime number, $K$ be the henselization of the rational functions over the finite field $\mathbb{F}_p$ and $R$ be the ring of additive polynomials over K. We show that the field of Laurent series over $\mathbb{F}_p$ is decidable seen as an R-module. Moreover, we provide a recursively enumerable axiom system (satisfied by $K$) in the language of $R$-modules together with a unary predicate for the valuation ring, modulo which every positive primitive formula is equivalent to a universal formula. Consequently the $R$-module theory of the field of Laurent series is model-complete in this language and admits $K$ as its prime model.


          Anchoring and Binning the Coordinate Bethe Ansatz. (arXiv:1806.07768v2 [hep-th] UPDATED)      Cache   Translate Page      

Authors: Jarah Evslin

The Coordinate Bethe Ansatz (CBA) expresses, as a sum over permutations, the matrix element of an XXX Heisenberg spin chain Hamiltonian eigenstate with a state with fixed spins. These matrix elements comprise the wave functions of the Hamiltonian eigenstates. However, as the complexity of the sum grows rapidly with the length N of the spin chain, the exact wave function in the continuum limit is too cumbersome to be exploited. In this note we provide an approximation to the CBA whose complexity does not directly depend upon N. This consists of two steps. First, we add an anchor to the argument of the exponential in the CBA. The anchor is a permutation-dependent integral multiple of 2 pi. Once anchored, the distribution of these arguments simplifies, becoming approximately Gaussian. The wave function is given by the Fourier transform of this distribution and so the calculation of the wave function reduces to the calculation of the moments of the distribution. Second, we parametrize the permutation group as a map between integers and we bin these maps. The calculation of the moments then reduces to a combinatorial exercise on the partitioning into bins. As an example we consider the matrix element between the classical and quantum ground states.


          How should we (correctly) compare multiple graphs?. (arXiv:1807.03368v3 [cs.DM] UPDATED)      Cache   Translate Page      

Authors: Sam Safavi, Jose Bento

Graphs are used in almost every scientific discipline to express relations among a set of objects. Algorithms that compare graphs, and output a closeness score, or a correspondence among their nodes, are thus extremely important. Despite the large amount of work done, many of the scalable algorithms to compare graphs do not produce closeness scores that satisfy the intuitive properties of metrics. This is problematic since non-metrics are known to degrade the performance of algorithms such as distance-based clustering of graphs (Stratis et al. 2018). On the other hand, the use of metrics increases the performance of several machine learning tasks (Indyk et al. 1999, Clarkson et al. 1999, Angiulli et al. 2002 and Ackermann et al, 2010). In this paper, we introduce a new family of multi-distances (a distance between more than two elements) that satisfies a generalization of the properties of metrics to multiple elements. In the context of comparing graphs, we are the first to show the existence of multi-distances that simultaneously incorporate the useful property of alignment consistency (Nguyen et al. 2011), and a generalized metric property, and that can be computed via convex optimization.


          Rank of weighted digraphs with blocks. (arXiv:1807.04208v2 [cs.DM] UPDATED)      Cache   Translate Page      

Authors: Ranveer Singh, Swarup Kumar Panda, Naomi Shaked-Monderer, Abraham Berman

Let $G$ be a digraph and $r(G)$ be its rank. Many interesting results on the rank of an undirected graph appear in the literature, but not much information about the rank of a digraph is available. In this article, we study the rank of a digraph using the ranks of its blocks. In particular, we define classes of digraphs, namely $r_2$-digraph, and $r_0$-digraph, for which the rank can be exactly determined in terms of the ranks of subdigraphs of the blocks. Furthermore, the rank of directed trees, simple biblock graphs, and some simple block graphs are studied.


          Mean residual life processes and associated submartingales. (arXiv:1807.05932v4 [math.PR] UPDATED)      Cache   Translate Page      

Authors: Antoine-Marie Bogso

We use Madan-Yor's argument to construct associated submartingales to a class of two-parameter processes that are ordered by the increasing convex dominance. This class includes processes which have MTP$_2$ integrated survival functions. We prove that the integrated survival function of an integrable two-parameter process is MTP$_2$ if and only if it is TP$_2$ in each pair of arguments when the remaining argument is fixed. This result can not be deduced from known results since there are several two-parameter processes whose integrated survival functions do not have interval support. The MTP$_2$ property of certain MRL processes is useful to exhibit numerous other processes having the same property.


          Renormalisation and locality: branched zeta values. (arXiv:1807.07630v2 [math-ph] UPDATED)      Cache   Translate Page      

Authors: Pierre Clavier, Li Guo, Sylvie Paycha, Bin Zhang

Multivariate renormalisation techniques are implemented in order to build, study and then renormalise at the poles, branched zeta functions associated with trees. For this purpose, we first prove algebraic results and develop analytic tools, which we then combine to study branched zeta functions. The algebraic aspects concern universal properties for locality algebraic structures, some of which had been discussed in previous work; we "branch/ lift" to trees operators acting on the decoration set of trees, and factorise branched maps through words by means of universal properties for words which we prove in the locality setup. The analytic tools are multivariate meromorphic germs of pseudodifferential symbols with linear poles which generalise the meromorphic germs of functions with linear poles studied in previous work. Multivariate meromorphic germs of pseudodifferential symbols form a locality algebra on which we build various locality maps in the framework of locality structures. We first show that the finite part at infinity defines a locality character from the latter symbol valued meromorphic germs to the scalar valued ones. We further equip the locality algebra of germs of pseudodifferential symbols with locality Rota-Baxter operators given by regularised sums and integrals. By means of the universal properties in the framework of locality structures we can lift Rota-Baxter operators to trees, and use the lifted discrete sums in order to build and study renormalised branched zeta values associated with trees. By construction these renormalised branched zeta values factorise on mutually independent (for the locality relation) trees.


          Choreographies in the $n$-vortex problem. (arXiv:1807.08212v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Renato Calleja, Eusebius Doedel, Carlos García-Azpeitia

We consider the equations of motion of $n$ vortices of equal circulation in the plane, in a disk and on a sphere. The vortices form a polygonal equilibrium in a rotating frame of reference. We use numerical continuation in a boundary value setting to determine the Lyapunov families of periodic orbits that arise from the polygonal relative equilibrium. When the frequency of a Lyapunov orbit and the frequency of the rotating frame have a rational relationship then the orbit is also periodic in the inertial frame. A dense set of Lyapunov orbits, with frequencies satisfying a diophantine equation, corresponds to choreographies of the $n$ vortices. We include numerical results for all cases, for various values of $n$, and we provide key details on the computational approach.


          The bounded derived categories of the Tamari lattices are fractionally Calabi-Yau. (arXiv:1807.08503v2 [math.RT] UPDATED)      Cache   Translate Page      

Authors: Baptiste Rognerud

We prove that the bounded derived category of the incidence algebra of the Tamari lattice is fractionally Calabi-Yau, giving a positive answer to a conjecture of Chapoton. The proof involves a combinatorial description of the Serre functor of this derived category on a sufficiently nice family of indecomposable objects.


          Spectrum of the second variation. (arXiv:1807.10527v2 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Andrei Agrachev

Second variation of a smooth optimal control problem at a regular extremal is a symmetric Fredholm operator. We study asymptotics of the spectrum of this operator and give an explicit expression for its determinant in terms of solutions of the Jacobi equation. In the case of the least action principle for the harmonic oscillator we obtain a classical Euler identity $\prod\limits_{n=1}^\infty\left(1-\frac{x^2}{(\pi n)^2}\right)=\frac{\sin x}{x}$. General case may serve as a rich source of new nice identities.


          Combinatorial proofs of the Newton-Girard and Chapman-Costas-Santos identities. (arXiv:1807.11749v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Sajal Kumar Mukherjee, Sudip Bera

In this paper we give combinatorial proofs of some well known identities and obtain some generalizations. We give a visual proof of a result of Chapman and Costas-Santos regarding the determinant of sum of matrices. Also we find a new identity expressing permanent of sum of matrices. Besides, we give a graphical interpretation of Newton-Girard identity.


          Matched pairs of discrete dynamical systems. (arXiv:1809.00521v2 [math-ph] UPDATED)      Cache   Translate Page      

Authors: Oğul Esen, Serkan Sütlü

Matched pairs of Lie groupoids and Lie algebroids are studied. Discrete Euler-Lagrange equations are written for the matched pairs of Lie groupoids. As such, a geometric framework to couple two mutually interacting discrete systems in the Lie groupoid setting is obtained. We particularly exhibit matched pair dynamics on Lie groups as well. Two examples are provided. One is the discrete dynamics on the matched pair decomposition of the trivial groupoid. The other is the discrete dynamics on matched pair decomposition of the special linear group.


          A variant of Schwarzian mechanics. (arXiv:1809.00904v2 [hep-th] UPDATED)      Cache   Translate Page      

Authors: Anton Galajinsky

The Schwarzian derivative is invariant under SL(2,R)-transformations and, as thus, any function of it can be used to determine the equation of motion or the Lagrangian density of a higher derivative SL(2,R)-invariant 1d mechanics or the Schwarzian mechanics for short. In this note, we consider the simplest variant which results from setting the Schwarzian derivative to be equal to a dimensionful coupling constant. It is shown that the corresponding dynamical system in general undergoes stable evolution but for one fixed point solution which is only locally stable. Conserved charges associated with the SL(2,R)-symmetry transformations are constructed and a Hamiltonian formulation reproducing them is proposed. An embedding of the Schwarzian mechanics into a larger dynamical system associated with the geodesics of a Brinkmann-like metric obeying the Einstein equations is constructed.


          Hidden Gibbs measures on shift spaces over countable alphabets. (arXiv:1809.05005v2 [math.DS] UPDATED)      Cache   Translate Page      

Authors: Godofredo Iommi, Camilo Lacalle, Yuki Yayama

We study the thermodynamic formalism for particular types of sub-additive sequences on a class of subshifts over countable alphabets. The subshifts we consider include factors of irreducible countable Markov shifts under certain conditions. We show the variational principle for topological pressure. We also study conditions for the existence and uniqueness of invariant ergodic Gibbs measures and the uniqueness of equilibrium states. As an application, we extend the theory of factors of (generalized) Gibbs measures on subshifts on finite alphabets to that on certain subshifts over countable alphabets.


          Underlay Drone Cell for Temporary Events: Impact of Drone Height and Aerial Channel Environments. (arXiv:1809.06699v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Xiaohui Zhou, Salman Durrani, Jing Guo, Halim Yanikomeroglu

Providing seamless connection to a large number of devices is one of the biggest challenges for the Internet of Things (IoT) networks. Using a drone as an aerial base station (ABS) to provide coverage to devices or users on ground is envisaged as a promising solution for IoT networks. In this paper, we consider a communication network with an underlay ABS to provide coverage for a temporary event, such as a sporting event or a concert in a stadium. Using stochastic geometry, we propose a general analytical framework to compute the uplink and downlink coverage probabilities for both the aerial and the terrestrial cellular system. Our framework is valid for any aerial channel model for which the probabilistic functions of line-of-sight (LOS) and non-line-of-sight (NLOS) links are specified. The accuracy of the analytical results is verified by Monte Carlo simulations considering two commonly adopted aerial channel models. Our results show the non-trivial impact of the different aerial channel environments (i.e., suburban, urban, dense urban and high-rise urban) on the uplink and downlink coverage probabilities and provide design guidelines for best ABS deployment height.


          Second-order Guarantees of Distributed Gradient Algorithms. (arXiv:1809.08694v3 [math.OC] UPDATED)      Cache   Translate Page      

Authors: Amir Daneshmand, Gesualdo Scutari, Vyacheslav Kungurtsev

We consider distributed smooth nonconvex unconstrained optimization over networks, modeled as a connected graph. We examine the behavior of distributed gradient-based algorithms near strict saddle points. Specifically, we establish that (i) the renowned Distributed Gradient Descent (DGD) algorithm likely converges to a neighborhood of a Second-order Stationary (SoS) solution; and (ii) the more recent class of distributed algorithms based on gradient tracking--implementable also over digraphs--likely converges to exact SoS solutions, thus avoiding (strict) saddle-points. Furthermore, a convergence rate is provided for the latter class of algorithms.


          Statistics on integer partitions arising from seaweed algebras. (arXiv:1809.09271v2 [math.CO] UPDATED)      Cache   Translate Page      

Authors: Vincent Coll, Andrew Mayers, Nick Mayers

Using the index theory of seaweed algebras, we explore various new integer partition statistics. We find relations to some well-known varieties of integer partitions as well as a surprising periodicity result.


          Perturbation theory for the spectral decomposition of Hermitian matrices. (arXiv:1809.09480v2 [math-ph] UPDATED)      Cache   Translate Page      

Authors: Marcus Carlsson

Let A and E be Hermitian self-adjoint matrices, where A is fixed and E a small perturbation. We study how the eigenvalues and eigenvectors of A+E depend on E, with the aim of obtaining first order formulas (and when possible also second order) that are explicitly computable in terms of the spectral decomposition of A and the entries in E. In particular we provide explicit Frechet type differentiability results. We also study the analogous line perturbation A + tF where t varies, which leads to explicit Gateaux type differentiability results.


          Multilevel Optimal Transport: a Fast Approximation of Wasserstein-1 distances. (arXiv:1810.00118v2 [stat.CO] UPDATED)      Cache   Translate Page      

Authors: Jialin Liu, Wotao Yin, Wuchen Li, Yat Tin Chow

We propose a fast algorithm for the calculation of the Wasserstein-1 distance, which is a particular type of optimal transport distance with homogeneous of degree one ground metric. Our algorithm is built on multilevel primal-dual algorithms. Several numerical examples and complexity analysis are provided to demonstrate its computational speed. On some commonly used image examples of size $512\times512$, the proposed algorithm gives solutions within $0.5$ seconds on a single CPU, which is much faster than the state-of-the-art algorithms.


          On the rationality of cycle integrals of meromorphic modular forms. (arXiv:1810.00612v2 [math.NT] UPDATED)      Cache   Translate Page      

Authors: Claudia Alfes-Neumann, Kathrin Bringmann, Markus Schwagenscheidt

We derive finite rational formulas for the traces of cycle integrals of certain meromorphic modular forms. Moreover, we prove the modularity of a completion of the generating function of such traces. The theoretical framework for these results is an extension of the Shintani theta lift to meromorphic modular forms of positive even weight.


          A framework for constructing sets without configurations. (arXiv:1810.01219v2 [math.CA] UPDATED)      Cache   Translate Page      

Authors: Robert Fraser

We discuss a framework for constructing large subsets of $\mathbb{R}^n$ and $K^n$ for non-archimedean local fields $K$. This framework is applied to obtain new estimates for the Hausdorff dimension of angle-avoiding sets and to provide a counterexample to a limiting version of the Capset problem.


          Bright Solitons Sustained by Long-Range Interactions in a System of Quantum Rotors. (arXiv:1810.02420v2 [nlin.PS] UPDATED)      Cache   Translate Page      

Authors: Ryan Plestid, D. H. J. O'Dell

The Hamiltonian Mean Field (HMF) model, which may be interpreted as a quantum rotor model with infinite-range interactions, is the most widely used toy model with which to study long-range interactions (LRI). It has demonstrated a remarkable ability to capture generic or universal features of $any$ system with LRI. In this work we provide a classification of $all~possible$ stationary solutions to the HMF model's generalized Gross-Pitaevskii equation (GGPE). These solutions are expressible in terms of Mathieu functions and arise due to a competition between free-Schr\"odinger dispersion and a $non\text{-}local$ non-linearity. Upon a Galilean transformation these solutions can transformed to finite velocity solitary waves (bright solitons). In contrast to the typical GPE, there are an infinite tower of bright solitons that emerge, each with a different number of nodes. Our results suggest that LRI can support solitary waves in manner that is novel relative to the typical short-range case.


          Tight Information Theoretic Converse Results for some Pliable Index Coding Problems. (arXiv:1810.02451v2 [cs.IT] UPDATED)      Cache   Translate Page      

Authors: Tang Liu, Daniela Tuninetti

This paper studies the Pliable Index CODing problem (PICOD), which models content-type distribution networks. In the PICOD$(t)$ problem there are $m$ messages, $n$ users and each user has a distinct message side information set, as in the classical Index Coding problem (IC). Differently from IC, where each user has a pre-specified set of messages to decode, in the PICOD$(t)$ a user is "pliable" and is satisfied if it can decode any $t$ messages that are not in its side information set. The goal is to find a code with the shortest length that satisfies all the users. This flexibility in determining the desired message sets makes the PICOD$(t)$ behave quite differently compared to the IC, and its analysis challenging.

This paper mainly focuses on the \emph{complete--$S$} PICOD$(t)$ with $m$ messages, where the set $S\subset[m]$ contains the sizes of the side information sets, and the number of users is $n=\sum_{s\in S}\binom{m}{s}$, with no two users having the same side information set. Capacity results are shown for: (i) the \emph{consecutive} complete--$S$ PICOD$(t)$, where $S=[s_{\min}:s_{\max}]$ for some $0 \leq s_{\min} \leq s_{\max} \leq m-t$, and (ii) the \emph{complement-consecutive} complete--$S$ PICOD$(t)$, where $S=[0:m-t]\backslash[s_{\min}:s_{\max}]$, for some $0 < s_{\min} \leq s_{\max} < m-t$. The novel converse proof is inspired by combinatorial design techniques and the key insight is to consider all messages that a user can eventually decode successfully, even those in excess of the $t$ required ones. This allows one to circumvent the need to consider all possible desired message set assignments at the users in order to find the one that leads to the shortest code length.

In addition, tight converse results are also shown for those PICOD$(1)$ with circular-arc network topology hypergraph.


          Schr\"odinger wave functional in quantum Yang-Mills theory from precanonical quantization. (arXiv:1805.05279v2 [hep-th] CROSS LISTED)      Cache   Translate Page      

Authors: Igor V. Kanatchikov (U. St Andrews)

A relation between the precanonical quantization of pure Yang-Mills fields and the functional Schr\"odinger representation in the temporal gauge is discussed. It is shown that the latter can be obtained from the former when the ultraviolet parameter $\varkappa$ introduced in precanonical quantization goes to infinity. In this limiting case, the Schr\"odinger wave functional can be expressed as the trace of the Volterra product integral of Clifford-algebra-valued precanonical wave functions restricted to a certain field configuration, and the canonical functional derivative Schr\"odinger equation together with the quantum Gau\ss\ constraint are derived from the Dirac-like precanonical Schr\"odinger equation.


          Веб-архивы как источники доказательств      Cache   Translate Page      

Заметка сотрудника Библиотеки Стенфордского университета д-ра Дэвида Розенталя (David Rosenthal – на фото, см. также https://www.lockss.org/contact-us/dshr/ ) была опубликована на его блоге (DSHR's Blog) 25 сентября 2018 года.

В своём недавнем посте «Блокчейн решит проблему обеспечения долговременной сохранности!» (Blockchain Solves Preservation! ,  https://blog.dshr.org/2018/09/blockchain-solves-preservation.html - перевод на русский язык здесь: https://rusrim.blogspot.com/2018/10/1.html - Н.Х.) я критиковал публикацию Джона Колломоссе и других авторов (John Collomosse et al) «Проект ARCHANGEL: Доверенные архивы электронных государственных документов» (ARCHANGEL: Trusted Archives of Digital Public Documents, см. https://arxiv.org/abs/1804.08342 , прямая ссылка на PDF-файл: https://arxiv.org/pdf/1804.08342.pdf ). По мнению авторов, проверка целостности путем использования хешей необходима, поскольку:
«Целостность документов имеет фундаментальное значение для доверия общественности к архивам. Однако в настоящее время доверие основано на репутации учреждения – это доверие к «вывеске» централизованного авторитетного органа или учреждения, такого, например, как национальный государственный архиве или университет.»
Но они также пишут, что:
«… доказательства верности/подлинности контента (content evidence) в конечном итоге могут начать приниматься в суде подобно доказательствам на основе анализа ДНК, но достижение такого уровня доверия потребует больших усилий по объяснения общественности особенностей блокчейна на понятном людям языке, - включая, в частности, объяснение того, почему можно доверять криптографическим подтверждениям, характерным для DLT-решений.»
По крайней мере в том, что касается работы судов, авторы ошибаются как в отношении «доверия к вывеске», так и в отношении того, как устанавливается доверие.

Кирен МакКарти (Kieren McCarthy) в статье «По мнению судей американского апелляционного суда, материалы «Машины прошлого» (Wayback Machine) на сайте Archive.org является надлежащим доказательством» (Archive.org's Wayback Machine is legit legal evidence, US appeals court judges rule, https://www.theregister.co.uk/2018/09/04/wayback_machine_legit/ ) рассказывает о постепенном процессе, в рамках которого апелляционные суды США допускают представление в качестве доказательств веб-страниц, извлеченных с помощью решения Wayback Machine ( https://archive.org/web/ ) компании «Интернет-Архив» (Internet Archive):
«В находящийся в Нью-Йорке федеральный апелляционный суд Второго судебного округа США этим летом поступила просьба рассмотреть обращение итальянского компьютерного хакера, в котором тот требовал исключить из числа допустимых доказательств скриншоты управлявшихся им веб-сайтов, устанавливавшие его причастность к вирусу и ботнету, за создание которых он был в конечном счете осужден. Прокуроры сделали скриншоты его веб-страниц, извлеченных из системы «Интернет-архива», и использовали их в качестве доказательств в суде - и хакер хотел, чтобы суд отказал в признании этих материалов допустимыми доказательствами.

Фабио Гасперини (Fabio Gasperini) утверждал, что извлеченные из Wayback Machine архивы его веб-страниц не были надлежащим образом аутентифицированы как аутентичные и не подвергавшиеся несанкционированному вмешательству, и поэтому эти материалы не должны были быть использованы в ходе уголовного процесса. ...

Однако в деле Гасперини, как отметил апелляционный суд Второго округа, обвинение представило показания руководителя офиса «Интернет-архива», «который объяснил, как Архив захватывает и обеспечивает долговременную сохранность свидетельств контента Интернета в определенный момент времени». ...

Данный руководитель также показал, что представленные обвинением скриншоты имеющегося в Wayback Machine архива веб-страниц сайтов Гасперини действительно соответствуют содержимому «Интернет-архива». В совокупности, это обеспечило достаточную степень аутентичности. Как отметил апелляционный суд, адвокатам Гасперини также была предоставлена возможность провести перекрёстный допрос руководителя офиса «Интернет-архива».»
Обратите внимание, что суд основывал своё решение о допустимости доказательств на показаниях свидетеля, лично знавшего процессы архива, а не вере в технологии широкой общественности. Заметьте также, что в ходе рассматривавшихся процессов действительно документировались хеши контента. Деревья хешей Меркла (Merkle trees) из этих хешей не формировались, поскольку такой подход при масштабах «Интернет-Архива» был бы слишком дорогостоящим.

Мой комментарий: Согласно определению в Википедии (см. https://ru.wikipedia.org/wiki/Дерево_хешей ), "Хеш-деревом или деревом Меркла называют полное двоичное дерево, в листовые вершины которого помещены хеши от блоков данных, а внутренние вершины содержат хеши от сложения значений в дочерних вершинах. Корневой узел дерева содержит хеш от всего набора данных, то есть хеш-дерево является однонаправленной хеш-функцией."

Третий судебный округ США пришёл к аналогичному выводу, пройдя по похожему пути:
«Решение судей апелляционного суда отразило аналогичное решение, принятое ещё в 2011 Третьим судебным округом по делу «США против Бансала» (United States v. Bansal), где свидетель объяснил на основе «личных знаний», как работает система Wayback Machine и насколько она надежна. Суд решил, что данные показания являлись «достаточное доказательством» того, что его сохраненные в архиве веб-страницы были аутентичными. ...

Разумеется, может случиться так, что если у обвинения не будет возможности представить в качестве свидетеля сотрудника «Интернет-архива», способного объяснить процесс, при помощи которого делается «снимок», и засвидетельствовать. что скриншоты не были подделаны, то впоследствии эти материалы могут быть исключены из числа надлежащих доказательств. ...

Можно себе представить, что в какой-то момент исчезнет необходимость представлять такого свидетеля, и Интернет-Архив будет рассматриваться (см. также https://www.theregister.co.uk/2017/11/16/head_like_a_memory_hole/ ) как вполне законный источник сведений о прошлой онлайн-деятельности.»
Правовая система постепенно укрепляет своё доверие к доказательной силе Wayback Machine, требуя личных показаний от людей, управляющих лежащими в основе работы этой системы процессами, и подвергая этих свидетелей перекрёстному допросу. Системы, на основе блокчейна должны будут пройти аналогичный процесс; и тем из них, в которых используются публичные блокчейны без ограничения доступа (public permissionless blockchains), будет сложно это сделать, поскольку в этом случае невозможно представить показания «людей, управляющих базовыми процессами». В случае решения ARCHANGEL, в котором предполагается использовать частный блокчейн с ограниченным доступом (permissioned), могут потребоваться свидетельские показания как от операторов сетевых узлов, так и от представителей архивов, генерирующих фиксируемые в блокчейн-цепочке хеши. Простое доверие общественности не будет и не должно быть достаточным.

Дэвид Розенталь (David Rosenthal)

Мой комментарий: Российские суды тоже начинают сталкиваться со случаями представления материалов из веб-архивов в качестве доказательств, и есть примеры, когда такие доказательства принимаются (см., например, https://rusrim.blogspot.com/2014/01/wayback-machine.html ).

Источник: DSHR's Blog
https://blog.dshr.org/2018/09/web-archives-as-evidence.html

          Search for top quark partners with charge 5/3 in the same-sign dilepton and single-lepton final states in proton-proton collisions at $\sqrt{s} =$ 13 TeV      Cache   Translate Page      
arXiv:1810.03188
CMS-B2G-17-014
CERN-EP-2018-258

by: Sirunyan, Albert M (Yerevan Phys. Inst.) et al.

Abstract:
A search for the pair production of heavy fermionic partners of the top quark with charge 5/3 (X$_{5/3}$) is performed in proton-proton collisions at a center-of-mass energy of 13 TeV with the CMS detector at the CERN LHC. The data sample analyzed corresponds to an integrated luminosity of 35.9 fb$^{-1}$. The X$_{5/3}$ quark is assumed always to decay into a top quark and a W boson. Both the right-handed and left-handed X$_{5/3}$ couplings to the W boson are considered. Final states with either a pair of same-sign leptons or a single lepton are studied. No significant excess of events is observed above the expected standard model background. Lower limits at 95% confidence level on the X$_{5/3}$ quark mass are set at 1.33 and 1.30 TeV respectively for the case of right-handed and left-handed couplings to W bosons in a combination of the same-sign dilepton and single-lepton final states.
          Distributions of Pseudo-Redshifts and Durations (Observed and Intrinsic) of Fermi GRBs      Cache   Translate Page      
arXiv:1810.04124
Astrophys.Space Sci. 363 (2018) 223

by: Zitouni, Hannachi
Abstract:
Ever since the insightful analysis of the durations of GRBs by [Kouveliotou:93], GRBs have most often been classified into two populations: "short bursts" (shorter than 2.0 seconds) and "long bursts" (longer than 2.0 seconds). However, recent works have suggested the existence of an intermediate population in the bursts observed by the Swift satellite. Moreover, some researchers have questioned the universality of the 2.0-second dividing line between short and long bursts: some bursts may be short but actually result from collapsars, the physical mechanism behind normally long bursts, and some long ones may originate from mergers, the usual progenitors of short GRBs. In this work, we focus on GRBs detected by the Fermi satellite and study the distribution of their durations measured in the observer's reference frame and, for those with known redshifts, in the bursts' reference frames. However, there are relatively few bursts with measured redshifts, and this makes an accurate study difficult. To overcome this problem, we follow [Zhang:2018] and determine a "pseudo-redshift" from the correlation relation between the luminosity $L_p$ and the energy $E_p$, both of which are calculated at the peak of the flux. Interestingly, we find that the uncertainties in the quantities observed and used in the determination of pseudo-redshifts, do affect the precision of the individual results significantly, but they keep the distribution of pseudo-redshifts very similar to that of the actual ones and thus allow us to use pseudo-redshifts for our statistical study. We use the reduced chi-square and the maximization of the log-likelihood to statistically analyze the distribution of Fermi GRB durations. Both methods show that the distribution of the observed and the intrinsic bursts durations are better represented by two groups, rather than three.
          Simulations at the Dwarf Scale: From Violent Dwarfs at Cosmic Dawn and Cosmic Noon to Quiet Discs today      Cache   Translate Page      
arXiv:1810.04148

by: Ceverino, Daniel
Abstract:
Dwarf galaxies with stellar masses around 10^9 Msun can be explored at high and low redshifts and they give a glimpse of the different conditions of galaxy formation at different epochs. Using a large sample of about 300 zoom-in cosmological hydrodynamical simulations of galaxy formation I will briefly describe the formation of dwarfs at this mass scale at 3 different epochs: cosmic dawn (Ceverino, Klessen, Glover 2018), cosmic noon (Ceverino, Primack, Dekel 2015), and today (Ceverino et al. 2017). I will describe the FirstLight simulations of first galaxies at redshifts 5-15. These first dwarfs have extremely high star formation efficiencies due to high gas fractions and high gas accretion rates. These simulations will make predictions that will be tested for the first time with the James Webb Space Telescope (JWST). At cosmic noon, z = 2, galaxy formation is still a very violent and dynamic process. The VELA simulations have generated a set of dispersion-dominated dwarfs that show an elongated morphology due to their prolate dark-matter halos. Between z = 1 and 0, the AGORA simulation shows the formation of a low-mass disc due to slow gas accretion. The disc agrees with many local scaling relations, such as the stellar-mass-halo-mass and the baryonic Tully-Fisher relation.
          The Feasibility of Magnetic Reconnection Powered Blazar Flares from Synchrotron Self-Compton Emission      Cache   Translate Page      
arXiv:1810.04139

by: Morris, Paul J.
Abstract:
Order of magnitude variability has been observed in the blazar sub-class of Active Galactic Nuclei on minute timescales. Such fast high energy flares are often difficult to explain with conventional shock acceleration models due to the small size of the emitting region inferred by the light crossing time. Recent particle-in-cell (PIC) simulations have shown that magnetic reconnection may offer a viable explanation. In this paper, we present a macroscopic emission model physically motivated by PIC simulations, where the energy for particle acceleration originates from the reconnecting magnetic field. We track the radial growth and relative velocity of a reconnecting plasmoid, modelling particle acceleration and radiative losses, which occur via synchrotron and synchrotron self-Compton (SSC) emission. We assume the reconnection layer consists of merging plasmoids, which grow as they merge. We use our model to successfully fit to the 2016 TeV flare of BL Lacertae, demonstrating that reconnection is able to produce TeV flares on the observed timescales. We find that the flaring light curve depends on the merge timescale and the magnetisation of the emitting plasma. However, the SEDs produced by our model are all synchrotron-dominated, and observable reconnection plasmoids have radii comparable to the jet radius. We conclude that while reconnection powered SSC flares can produce flares on the correct timescale, the primary source of emission cannot be SSC and the size of plasmoids required may be implausibly large.
          Onset of magnetic reconnection in a collisionless, high-beta plasma      Cache   Translate Page      
arXiv:1810.04135

by: Alt, Andrew
Abstract:
In a magnetized, collisionless plasma, the magnetic moment of the constituent particles is an adiabatic invariant. An increase in the magnetic-field strength in such a plasma thus leads to an increase in the thermal pressure perpendicular to the field lines. Above a $\beta$-dependent threshold (where $\beta$ is the ratio of thermal to magnetic pressure), this pressure anisotropy drives the mirror instability, producing strong distortions in the field lines on ion-Larmor scales. The impact of this instability on magnetic reconnection is investigated using a simple analytical model for the formation of a current sheet (CS) and the associated production of pressure anisotropy. The difficulty in maintaining an isotropic, Maxwellian particle distribution during the formation and subsequent thinning of a CS in a collisionless plasma, coupled with the low threshold for the mirror instability in a high-$\beta$ plasma, imply that the geometry of reconnecting magnetic fields can differ radically from the standard Harris-sheet profile often used in kinetic simulations of collisionless reconnection. As a result, depending on the rate of CS formation and the initial CS thickness, tearing modes whose growth rates and wavenumbers are boosted by this difference may disrupt the sheet before standard tearing modes are able to develop. A quantitative theory is developed to illustrate this process, which may find application in the tearing-mediated disruption of kinetic magnetorotational "channel" modes.
          Secondary Radio and X-ray Emissions from Galaxy Mergers      Cache   Translate Page      
arXiv:1810.04155

by: Yuan, Chengchao
Abstract:
Shocks arising in galaxy mergers could accelerate cosmic-ray (CR) ions to TeV-PeV energies. While propagating in the intergalactic medium, these CRs can produce high-energy neutrinos, electron-positron pairs and gamma-rays. In the presence of intergalactic magnetic fields, the secondary pairs will radiate observable emissions through synchrotron radiation and inverse Compton scattering. In this paper, we demonstrate that these emissions can explain the radio and X-ray fluxes of merging galaxies such as NGC 660 and NGC 3256. Using our model in combination with the observations, we can constrain the gas mass, shock velocity, magnetic field and the CR spectral index $s$ of these systems. For NGC 660 a single-zone model with a spectral index $2.1\lesssim s\lesssim2.2$ is able to reproduce simultaneously the radio and X-ray observations, while a simple one-zone scenario with $s\sim2$ can describe the radio and a large fraction of X-ray observations of NGC 3256. Our work provides a useful approach for studying the dynamics and physical parameters of galaxy mergers, which can play an important part in future multi-messenger studies of similar and related extragalactic sources.
          The long outburst of the black hole transient GRS 1716-249 observed in the X-ray and radio band      Cache   Translate Page      
arXiv:1810.03914

by: Bassi, T.
Abstract:
We present the spectral and timing analysis of X-ray observations performed on the Galactic black hole transient GRS 1716-249 during the 2016-2017 outburst. The source was almost continuously observed with the Neil Gehrels Swift Observatory from December 2016 until October 2017. The X-ray hardness ratio and timing evolution indicate that the source approached the soft state three times during the outburst, even though it never reached the canonical soft spectral state. Thus, GRS 1716-249 increases the number of black hole transients showing outbursts with "failed" state transition. During the softening events, XRT and BAT broadband spectral modeling, performed with thermal Comptonization plus a multicolor disc black-body, showed a photon index (Gamma < 2) and an inner disc temperature (kTin = 0.2-0.5 keV) characteristic of the hard intermediate state. This is in agreement with the root mean square amplitude of the flux variability (rms > 10%). We find that, coherently with a scenario in which the disc moves closer to the compact object, the accretion disc inner radius decreases with the increase of the inner disc temperature, until a certain point when the temperature starts to increase at constant radius. This, in addition with the spectral analysis results, suggests that either the accretion disc reached the innermost stable circular orbit during the hard intermediate state or the hot accretion flow might re-condensate in an inner mini-disc. We report on the radio observations performed during the outburst finding that GRS 1716-249 is located on the radio-quiet "outlier" branch of the radio/X-ray luminosity plane.
          Interplay and specific features of radiation mechanisms of electrons and positrons in crystalline undulators      Cache   Translate Page      
arXiv:1810.03852

by: Pavlov, Alexander V.
Abstract:
We predict peculiar changes in spectral distributions of radiation emitted by ultra-relativistic positrons and electrons in periodically bent crystals with variation of the bending amplitude. It is shown that the changes, being sensitive to the projectile energy, manifest themselves differently for negatively and positively charged projectiles. We demonstrate that the features observed are due to the interplay of different radiation mechanisms occurring in periodically bent crystals. The observations are important for design, practical realization and channeling experiments with periodically bent crystals as the key element of the novel light sources. The analysis presented is based on the grounds of accurate numerical simulations of the channeling process.
          Multiplexed readout of kinetic inductance bolometer arrays      Cache   Translate Page      
arXiv:1810.03848

by: Sipola, Hannu
Abstract:
Kinetic inductance bolometer (KIB) technology is a candidate for passive sub-millimeter wave and terahertz imaging systems. Its benefits include scalability into large 2D arrays and operation with intermediate cryogenics in the temperature range of 5 - 10 K. We have previously demonstrated basic figures of merit compatible with typical requirements in security screening applications, and demonstrated the scalability into large arrays in terms of device fabrication, optics integration, and cryogenics. In this article, we address the last missing ingredient, the readout. The concept, serial addressed frequency excitation (SAFE), is an alternative to full frequency-division multiplexing at microwave frequencies conventionally used to read out kinetic inductance detectors. We introduce the concept, and analyze the criteria of the multiplexed readout avoiding the degradation of the signal-to-noise ratio in the presence of a thermal anti-alias filter inherent to thermal detectors. We also present radiometric detection experiments demonstrating the noise properties. Furthermore, we present a practical scalable realization of a readout system integrated into a prototype imager with 8712 detectors, and demonstrate working progress by detection with up to 456 detectors. We also present practical detection experiments demonstrating the capacity of SAFE in concealed object detection.
          The XXL Survey: XXVII. The 3XLSS point source catalogue      Cache   Translate Page      
arXiv:1810.03929

by: Chiappetti, L.
Abstract:
We present the version of the point source catalogue of the XXL Survey that was used, in part, in the first series of XXL papers. In this paper we release, in our database in Milan and at CDS: (i) the X-ray source catalogue with 26056 objects in two areas of 25 deg2; (ii) the associated multiwavelength catalogues with candidate counterparts of the X-ray sources in the infrared, near-infrared, optical, and ultraviolet (plus spectroscopic redshift when available); and (iii) a catalogue of spectroscopic redshifts recently obtained in the southern XXL area. We also present the basic properties of the X-ray point sources and their counterparts. Other catalogues described in the second series of XXL papers will be released contextually, and will constitute the second XXL data release.
          The XXL Survey XX: The 365 cluster catalogue      Cache   Translate Page      
arXiv:1810.03849

by: Adami, C.
Abstract:
In the currently debated context of using clusters of galaxies as cosmological probes, the need for well-defined cluster samples is critical. The XXL Survey has been specifically designed to provide a well characterised sample of some 500 X-ray detected clusters suitable for cosmological studies. The main goal of present article is to make public and describe the properties of the cluster catalogue in its present state, as well as of associated catalogues as super-clusters and fossil groups. We release a sample containing 365 clusters in total. We give the details of the follow-up observations and explain the procedure adopted to validate the cluster spectroscopic redshifts. Considering the whole XXL cluster sample, we have provided two types of selection, both complete in a particular sense: one based on flux-morphology criteria, and an alternative based on the [0.5-2] keV flux within one arcmin of the cluster centre. We have also provided X-ray temperature measurements for 80$\%$ of the clusters having a flux larger than 9$\times$10$^{-15}$$\rm \thinspace erg \, s^{-1} \, cm^{-2}$. Our cluster sample extends from z$\sim$0 to z$\sim$1.2, with one cluster at z$\sim$2. Clusters were identified through a mean number of six spectroscopically confirmed cluster members. Our updated luminosity function and luminosity-temperature relation are compatible with our previous determinations based on the 100 brightest clusters, but show smaller uncertainties. We also present an enlarged list of super-clusters and a sample of 18 possible fossil groups. This intermediate publication is the last before the final release of the complete XXL cluster catalogue when the ongoing C2 cluster spectroscopic follow-up is complete. It provides a unique inventory of medium-mass clusters over a 50~\dd\ area out to z$\sim$1.
          Optical/X-ray correlations during the V404 Cyg June 2015 outburst      Cache   Translate Page      
arXiv:1810.03870

by: Alfonso-Garzón, J.
Abstract:
We present a multiwavelength analysis of the simultaneous optical and X-ray light curves of the microquasar V404 Cyg during the June 2015 outburst. We have performed a comprehensive analysis of all the INTEGRAL/IBIS, JEM-X, and OMC observations during the brightest epoch of the outburst, along with complementary NuSTAR, AAVSO, and VSNET data, to examine the timing relationship between the simultaneous optical and X-ray light curves, in order to understand the emission mechanisms and physical locations. We have identified all optical flares which have simultaneous X-ray observations, and performed cross-correlation analysis to estimate the time delays between the optical and soft and hard X-ray emission. We have also compared the evolution of the optical and X-ray emission with the hardness-ratios. We have identified several types of behaviour during the outburst. On many occasions, the optical flares occur simultaneously with X-ray flares, but at other times positive and negative time delays between the optical and X-ray emission are measured. We conclude that the observed optical variability is driven by different physical mechanisms, including reprocessing of X-rays in the accretion disc and/or the companion star, interaction of the jet ejections with surrounding material or with previously ejected blobs, and synchrotron emission from the jet.
          R-process nucleosynthesis in common envelope jets supernovae      Cache   Translate Page      
arXiv:1810.03889

by: Grichener, Aldana
Abstract:
We study r-process feasibility inside jets launched by a cold neutron star (NS) spiralling-in inside the core of a giant star, and find that such common envelope jets supernova (CEJSN) events might be a significant source of heavy r-process elements in the early Universe. We run the stellar evolution code MESA to follow the evolution of the low metalicity giant stars that swallow NSs during their late expansion phases and find that in many cases the NSs penetrate the core. The Bondi-Hoyle-Lyttleton mass accretion rate onto a NS as it spirals-in inside the core is sufficiently high to obtain a neutron rich ejecta as required for the strong r-process where the second and third r-process elements are synthesized. Due to the small radius of the NS the accretion is through an accretion disk and the outflow is in jets (or bipolar disk winds). The r-process nucleosynthesis takes place inside the jets. To account for the r-process abundances in the Galaxy we require that one in ten cases of a NS entering the envelope of a giant star ends as a CEJSN r-process event.
          Characterizing upward lightning with and without a terrestrial gamma-ray flash      Cache   Translate Page      
arXiv:1810.03853

by: Smith, D.M.
Abstract:
We compare two observations of gamma-rays before, during, and after lightning flashes initiated by upward leaders from a tower during low-altitude winter thunderstorms on the western coast of Honshu, Japan. While the two leaders appear similar, one produced a terrestrial gamma-ray flash (TGF) so bright that it paralyzed the gamma-ray detectors while it was occurring, and could be observed only via the weaker flux of neutrons created in its wake, while the other produced no detectable TGF gamma-rays at all. The ratio between the indirectly derived gamma-ray fluence for the TGF and the 95% confidence gamma-ray upper limit for the gamma-ray quiet flash is a factor of $1\times10^7$. With the only two observations of this type providing such dramatically different results -- a TGF probably as bright as those seen from space and a powerful upper limit -- we recognize that weak, sub-luminous TGFs in this situation are probably not common, and we quantify this conclusion. While the gamma-ray quiet flash appeared to have a faster leader and more powerful initial continuous current pulse than the flash that produced a TGF, the TGF-producing flash occurred during a weak gamma-ray "glow", while the gamma-ray quiet flash did not, implying a higher electric field aloft when the TGF was produced. We suggest that the field in the high-field region approached by a leader may be more important for whether a TGF is produced than the characteristics of the leader itself.
          Upgrade of a low-temperature scanning tunneling microscope for electron-spin resonance      Cache   Translate Page      
arXiv:1810.03887

by: Natterer, Fabian D.
Abstract:
Electron spin resonance with a scanning tunneling microscope (ESR-STM) combines the high energy resolution of spin resonance spectroscopy with the atomic scale control and spatial resolution of STM. Here we describe the upgrade of a helium-3 STM with a 2D vector-field magnet ($B_z$ = 8.0 T, $B_x$ = 0.8 T) to an ESR-STM. The system is capable of delivering RF power to the tunnel junction at frequencies up to 30 GHz. We demonstrate magnetic field sweep ESR for the model system TiH/MgO/Ag(100) and find a magnetic moment of $(1.004 \pm 0.001)$ $\mu_B$. Our upgrade enables to toggle between a DC mode, where the STM is operated with the regular control electronics, and an ultrafast-pulsed mode that uses an arbitrary waveform generator for pump-probe spectroscopy or reading of spin-states. Both modes allow for simultaneous radiofrequency excitation, which we add via a resistive pick-off tee to the bias voltage path. The RF cabling from room temperature to the 350 mK stage has an average attenuation of 18 dB between 5 and 25 GHz. The cable segment between the 350 mK stage and the STM tip presently attenuates an additional $34_{-3}^{+5}$ dB from 10 to 26 GHz and $38_{-2}^{+3}$ dB between 20 and 30 GHz. We discuss our transmission losses and indicate ways to reduce this attenuation. We finally demonstrate how to synchronize the arrival times of RF and DC pulses coming from different paths to the STM junction, a prerequisite for future pulsed ESR experiments.
          How does the stellar wind influence the radio morphology of a supernova remnant?      Cache   Translate Page      
arXiv:1810.03777

by: Zhang, M.F.
Abstract:
We simulate the evolutions of the stellar wind and the supernova remnant (SNR) originating from a runaway massive star in an uniform Galactic environment based on the three-dimensional magnetohydrodynamics models. Taking the stellar wind into consideration, we can explain the radio morphologies of many supernova remnants. The directions of the kinematic velocity of the progenitor, the magnetic field and the line of sight are the most important factors influencing the morphologies. If the velocity is perpendicular to the magnetic field, the simulation will give us two different unilateral SNRs and a bilateral symmetric SNR. If the velocity is parallel to the magnetic field, we can obtain a bilateral asymmetric SNR and a quasi-circular SNR. Our simulations show the stellar wind plays a key role in the radio evolution of a SNR, which implies the Galactic global density and magnetic field distribution play a secondary role in shaping a SNR.
          An intrinsic link between long-term UV/optical variations and X-ray loudness in quasars      Cache   Translate Page      
arXiv:1810.03776

by: Kang, Wen-yong
Abstract:
Observations have shown that UV/optical variation amplitude of quasars depend on several physi- cal parameters including luminosity, Eddington ratio, and likely also black hole mass. Identifying new factors which correlate with the variation is essential to probe the underlying physical processes. Combining ~ten years long quasar light curves from SDSS stripe 82 and X-ray data from Stripe 82X, we build a sample of X-ray detected quasars to investigate the relation between UV/optical variation amplitude ({\sigma}rms) and X-ray loudness. We find that quasars with more intense X-ray radiation (com- pared to bolometric luminosity) are more variable in UV/optical. Such correlation remains highly significant after excluding the effect of other parameters including luminosity, black hole mass, Ed- dington ratio, redshift, rest-frame wavelength (i.e., through partial correlation analyses). We further find the intrinsic link between X-ray loudness and UV/optical variation is gradually more prominent on longer timescales (up to 10 years in the observed frame), but tends to disappear at timescales < 100 days. This suggests a slow and long-term underlying physical process. The X-ray reprocessing paradigm, in which UV/optical variation is produced by a variable central X-ray emission illuminating the accretion disk, is thus disfavored. The discovery points to an interesting scheme that both the X-ray corona heating and UV/optical variation is quasars are closely associated with magnetic disc turbulence, and the innermost disc turbulence (where corona heating occurs) correlates with the slow turbulence at larger radii (where UV/optical emission is produced).
          Probing gas disc physics with LISA: simulations of an intermediate mass ratio inspiral in an accretion disc      Cache   Translate Page      
arXiv:1810.03623

by: Derdzinski, A.
Abstract:
The coalescence of a compact object with a $10^{4}-10^{7} {\rm M_\odot}$ supermassive black hole (SMBH) produces mHz gravitational waves (GWs) detectable by the future Laser Interferometer Space Antenna (LISA). If such an inspiral occurs in the accretion disc of an active galactic nucleus (AGN), the gas torques imprint a small deviation in the GW waveform. Here we present two-dimensional hydrodynamical simulations with the moving-mesh code DISCO of a BH inspiraling at the GW rate in a binary system with a mass ratio $q\!=\!M_2/M_1\!=\!10^{-3}$, embedded in an accretion disc. We assume a locally isothermal equation of state for the gas (with Mach number $\mathcal{M}=20$) and implement a standard $\alpha$-prescription for its viscosity (with $\alpha = 0.03$). We find disc torques on the binary that are weaker than in previous semi-analytic toy models, and are in the opposite direction: the gas disc slows down, rather than speeds up the inspiral. We compute the resulting deviations in the GW waveform, which scale linearly with the mass of the disc. The SNR of these deviations accumulates mostly at high frequencies, and becomes detectable in a 5-year LISA observation if the total phase shift exceeds a few radians. We find that this occurs if the disc surface density exceeds $\Sigma_0 \gtrsim 10^{2-3}\rm g\,cm^{-2}$, as may be the case in thin discs with near-Eddington accretion rates. Since the characteristic imprint on the GW signal is strongly dependent on disc parameters, a LISA detection of an intermediate mass ratio inspiral would probe the physics of AGN discs and migration.
          The Berkeley Sample of Stripped-Envelope Supernovae      Cache   Translate Page      
arXiv:1810.03650

by: Shivvers, saac
Abstract:
We present the complete sample of stripped-envelope supernova (SN) spectra observed by the Lick Observatory Supernova Search (LOSS) collaboration over the last three decades: 888 spectra of 302 SNe, 652 published here for the first time, with 384 spectra (of 92 SNe) having photometrically-determined phases. After correcting for redshift and Milky Way dust reddening and reevaluating the spectroscopic classifications for each SN, we construct mean spectra of the three major spectral subtypes (Types IIb, Ib, and Ic) binned by phase. We compare measures of line strengths and widths made from this sample to the results of previous efforts, confirming that O I {\lambda}7774 absorption is stronger and found at higher velocity in Type Ic SNe than in Types Ib or IIb SNe in the first 30 days after peak brightness, though the widths of nebular emission lines are consistent across subtypes. We also highlight newly available observations for a few rare subpopulations of interest.
          Non-Additive Viscous Dark Energy: A Bayesian Analysis      Cache   Translate Page      
arXiv:1810.03759

by: da Silva, W.J.C.
Abstract:
By assuming a fluid description for dark energy, we propose a phenomenological approach which takes into the account effects microscopic based on the non-additive thermodynamics. These effects lead to a tiny perturbation in the perfect fluid which is the thermodynamics part of the standard model ($\Lambda$CDM model). The extra energy-momentum arises from the microscopic correlations captured through the distribution function of the 4-momentum of the volume element of the dark energy fluid. These correlations are taking into the account as a non-additive effect which is also related to a mechanism called Nonextensive/Extensive correspondence. This mechanism provides a way to introduce a non-additive bulk viscosity, which should be vanished in the additive limit, recovered, thus, the perfect fluid description. From the phenomenological standpoint, we motivate three models of bulk viscosity for dark energy and dark matter proposed recently, in the context of the non-additive formulation. In order to test the model, we perform a Bayesian analysis based on the data of CMB Distance priors, Baryon Acoustic Oscillations Measurements, Cosmic Chronometers, and SNe Ia distance measurements.
          Predictions for the flux of high-energy cosmogenic neutrinos and the influence of the extragalactic magnetic field      Cache   Translate Page      
arXiv:1810.03769

by: Wittkowski, David
Abstract:
Cosmogenic neutrinos originate from interactions of cosmic rays propagating through the universe with cosmic background photons. Since both high-energy cosmic rays and cosmic background photons exist, the existence of high-energy cosmogenic neutrinos is almost certain. However, their flux has not been measured so far. Therefore, we calculated the flux of high-energy cosmogenic neutrinos arriving at the Earth on the basis of elaborate four-dimensional simulations that take into account three spatial degrees of freedom and the cosmological time-evolution of the universe. Our predictions for this neutrino flux are consistent with the recent upper limits obtained from large-scale cosmic-ray experiments. We also show that the extragalactic magnetic field has a strong influence on the neutrino flux. The results of this work are important for the design of future neutrino observatories, since they allow to assess the detector volume that is necessary to detect high-energy cosmogenic neutrinos in the near future. An observation of such neutrinos would push multimessenger astronomy to hitherto unachieved energy scales.
          Characterization of color cross-talk of CCD detectors and its influence in multispectral quantitative phase imaging      Cache   Translate Page      
arXiv:1810.03697

by: Ahmad, Azeem
Abstract:
Multi-spectral quantitative phase imaging (QPI) is an emerging imaging modality for wavelength dependent studies of several biological and industrial specimens. Simultaneous multi-spectral QPI is generally performed with color CCD cameras. However, color CCD cameras are suffered from the color crosstalk issue, which needed to be explored. Here, we present a new approach for accurately measuring the color crosstalk of 2D area detectors, without needing prior information about camera specifications. Color crosstalk of two different cameras commonly used in QPI, single chip CCD (1-CCD) and three chip CCD (3-CCD), is systematically studied and compared using compact interference microscopy. The influence of color crosstalk on the fringe width and the visibility of the monochromatic constituents corresponding to three color channels of white light interferogram are studied both through simulations and experiments. It is observed that presence of color crosstalk changes the fringe width and visibility over the imaging field of view. This leads to an unwanted non-uniform background error in the multi-spectral phase imaging of the specimens. It is demonstrated that the color crosstalk of the detector is the key limiting factor for phase measurement accuracy of simultaneous multi-spectral QPI systems.
          On energy equipartition between cosmic rays and magnetic fields      Cache   Translate Page      
arXiv:1810.03683

by: Seta, Amit
Abstract:
Interpretations of synchrotron observations often assume a tight correlation between magnetic and cosmic ray energy densities. We examine this assumption using both test-particle simulations of cosmic rays and MHD simulations which include cosmic rays as a diffusive fluid. We find no spatial correlation between the cosmic rays and magnetic field energy densities at turbulent scales. Moreover, the cosmic ray number density and magnetic field energy density are statistically independent. Nevertheless, the cosmic ray spatial distribution is highly inhomogeneous, especially at low energies because the particles are trapped between random magnetic mirrors. These results can significantly change the interpretation of synchrotron observations and thus our understanding of the strength and structure of magnetic fields in the Milky Way and nearby spiral galaxies.
          X-ray and multi-epoch optical/UV investigations of BAL to non-BAL quasar transformations      Cache   Translate Page      
arXiv:1810.03625

by: Sameer
Abstract:
We report on an X-ray and optical/UV study of eight Broad Absorption Line (BAL) to non-BAL transforming quasars at $z\,\approx\,$1.7-2.2 over 0.29-4.95 rest-frame years with at least three spectroscopic epochs for each quasar from the SDSS, BOSS, $Gemini$, and ARC 3.5-m telescopes. New $Chandra$ observations obtained for these objects show their values of $\alpha_{\rm ox}$ and $\Delta{\alpha}_{\rm ox}$, as well as their spectral energy distributions, are consistent with those of non-BAL quasars. Moreover, our targets have X-ray spectral shapes that are, on average, consistent with weakened absorption with an effective power-law photon index of $\Gamma_{\rm eff}\,=\,1.69^{+0.25}_{-0.25}$. The newer $Gemini$ and ARC 3.5-m spectra reveal that the BAL troughs have remained absent since the BOSS observations where the BAL disappearance was discovered. The X-ray and optical/UV results in tandem are consistent with at least the X-ray absorbing material moving out of the line-of-sight, leaving an X-ray unabsorbed non-BAL quasar. The UV absorber might have become more highly ionized (in a shielding-gas scenario) or also moved out of the line-of-sight (in a wind-clumping scenario).
          No cores in dark matter-dominated dwarf galaxies with bursty star formation histories      Cache   Translate Page      
arXiv:1810.03635

by: Bose, Sownak
Abstract:
Measurements of the rotation curves of dwarf galaxies are often interpreted as requiring a constant density core at the centre, at odds with the "cuspy" inner profiles predicted by $N$-body simulations of cold dark matter (CDM) haloes. It has been suggested that this conflict could be resolved by fluctuations in the inner gravitational potential caused by the periodic removal of gas following bursts of star formation. Earlier work has suggested that core formation requires a bursty and extended star formation history (SFH). Here we investigate the structure of CDM haloes of dwarf galaxies ($M_{{\rm DM}} \sim 10^9-5\times10^{10}\,{\rm M}_\odot$) formed in the APOSTLE and Auriga cosmological hydrodynamic simulations. Our simulations have comparable or better resolution than others that make cores. Yet, we do not find evidence of core formation at any mass or any correlation between the inner slope of the DM density profile and temporal variations in the SFH. APOSTLE and Auriga dwarfs display a similar diversity in their cumulative SFHs to available data for Local Group dwarfs. Dwarfs in both simulations are DM-dominated on all resolved scales at all times, likely limiting the ability of gas outflows to alter significantly the central density profiles of their haloes. We conclude that recurrent bursts of star formation are not sufficient to cause the formation of cores, and that other conditions must also be met for baryons to be able to modify the central DM cusp.
          Pesarrodona declara als Jutjats de Manresa per un delicte de desobediència greu      Cache   Translate Page      
El regidor confia que s'arxivi la causa i denuncia que és una venjança per la foto del nas de pallasso al departament de Governació
          [経済]1960年代のFRBにおける経済分析の変容      Cache   Translate Page      

という論文をMostly Economicsが紹介している。論文の原題は「The transformation of economic analysis at the Federal Reserve during the 1960s」で、著者はリール大博士課程のJuan Acostaとセルジー・ポントワーズ大THEMA(Théorie Économique, Modélisation, Application)のBeatrice Cherrier*1

以下はその要旨。

In this paper, we build on data on Fed officials, oral history repositories and hitherto under-researched archival sources to unpack the torturous path toward crafting an institutional and intellectual space for postwar economic analysis within the Fed. We show that growing attention to new macroeconomic research was a reaction to both mounting external criticisms against the Fed’s decision-making process and a process internal to the discipline whereby institutionalism was displaced by neoclassical theory and econometrics. We argue that the rise of the number of PhD economists working at the Fed is a symptom rather than a cause of this transformation.

Key to our story are a handful of economists from the Board of Governor’s Division of Research and Statistics (DRS) who paradoxically did not always held a PhD, but envisioned their role as going beyond mere data accumulation and got involved into large-scale macroeconometric model building. We conclude that the divide between PhD and non-PhD economists may not be fully relevant to understand both the shift in the type of economics practiced at the Fed and the uses of this knowledge in the decision making-process. Equally important was the rift between different styles of economic analysis.

(拙訳)

本稿では、FRBの職員に関するデータやオーラルヒストリーの記録やこれまで十分に研究されてこなかった記録保管所の情報に基づき、戦後のFRB内部で経済分析の制度的・知的空間を作り出そうとした苦闘の軌跡を明らかにする。我々は、新たなマクロ経済研究への関心が増したのは、FRBの意思決定プロセスへの外部からの批判が高まったこと、および、制度学派が新古典派理論と計量経済学によって置き換えられた経済学の内的プロセス、という2つの事象への反応だったことを示す。FRBで働くPhDの人数が増えたことは、この変容の原因というよりはその表れであった、ということを我々は示す。

我々の話で鍵となるのは、皮肉なことに必ずしも常にPhDを保有しているわけではなかった理事会の調査統計部門の一握りの経済学者が、単なるデータの蓄積を超えた役割を自らに想定し、大規模なマクロ計量経済モデルの構築に携わったことにある。我々は、PhDを持つ経済学者と持たない経済学者との間の分断は、FRBで実践された経済学のタイプが変化したこと、および、その知識が意思決定プロセスで利用されたこと、の両者を理解する上で、全面的な重要性を有しているわけではないだろう、と結論する。同程度に重要だったのは、経済分析の異なるスタイルの間の分断であった。

FRBにおいてPhDの勢力が伸長した歴史的過程については、ここで紹介したジャスティン・フォックスの記事も参照(論文でも参照されている)。また、こうした傾向への最近の反動はここで紹介した本を参照。

*1:cf. ここここ


          What Do You Call a Moon's Moon?      Cache   Translate Page      
article-image

Two astronomers have asked a question for the ages: Can moons have moons?

The delightful, if theoretical, answer is: Yes—yes, they can.

As Gizmodo reports, this particular scientific inquiry began with a question from Juna Kollmeier’s son. Kollemeier, who works at the Observatories of the Carnegie Institution of Washington, recruited Sean Raymond, of the University of Bordeaux, to help her answer the question.

In a paper posted on arXiv, they lay out their case that moons can have moons. The conditions have to be right—the primary moon has to be big enough and far away enough from the planet it’s orbiting for the smaller, secondary moon to survive. But, even given these caveats, they found that moons in our very own solar system could theoretically have their own smaller moons. Two of Saturn’s moons and one of Jupiter’s are candidates. So is our favorite moon—the Earth’s moon.

There’s a serious scientific reason to investigate the presence or absence of moon’s moons: As Kollmeier and Raymond write, it can help give us clues about how planets and their moons were formed. But, all justification aside, there’s something inexplicably pleasing about what Atlas Obscura has taken to calling “recursive places.”

Our favorites of these may be islands within islands, such as the sub-sub-sub-island on Victoria Island, or Vulcan Point, which is an “island in the middle of a lake, in the middle of a volcano, in the middle of a bigger lake, in the middle of a bigger island.” There are also countries-within-countries, such as many of the world’s micronations or Dahala Khagrabari, “a piece of India inside a piece of Bangladesh inside a piece of India inside a piece of Bangladesh.” Or how about a volcano in a volcano? There’s also something truly mind-boggling about bodies of water within other bodies of water. (What? How?) But they exist: Here’s a lake under a sea, an underwater river, or a sea surrounded by… more sea.

One of the great challenges of talking about recursive places is deciding what call them. The prefix “sub-” can do a lot of work here: We can islands within islands “subislands,” and in the arXiv paper, Kollmeier and Raymond call a moon’s moon a “submoon.”

But there are other options. New Scientist notes that “moonmoon” has been put forth as a name for a moon’s moon. For those of us who are less than fluent in meme culture: This is a reference to Moon Moon, sometimes described as the internet’s derpiest wolf. Moon Moon was born in 2013, from a werewolf name generator, and soon started frolicking across Tumblr and all other places memes can be found.

So, a moon’s moon might be called a submoon or a moon-moon. But why let it stop there? Other suggestions include mini-moon, second-order moon, binary moons, and nested moons. Atlas staffers’ contributions: Meta-moon? Moon squared? Moon2?

And is there a way to standardize how we talk about recursive places in general? Because if a moon's moon is a moon-moon, shouldn't an island in an island be an island-island? And a volcano in a volcano be a volcano-volcano? Personally, I am fan of adopting either the sub- convention or the meta- convention—submoons, subislands, subvolcanoes or metamoons, metaislands, metavolcanoes.

But as in all things linguistic, the majority will rule: Whatever the most people decide to call these fascinating places, that's what will stick.


          Scientists claim we haven’t found alien life because we haven’t been looking hard enough      Cache   Translate Page      
If intelligent alien life exists somewhere in space it's abundantly clear that we haven't made meaningful contact with it yet. Various scientific bodies have devoted themselves to searching for signs of extraterrestrial intelligence and come up totally blank, but why? The famous Fermi paradox, named for physicist Enrico Fermi, asks if life is indeed common or even not-super-rare in the universe, why haven't we seen evidence of it yet? After all, we've been gazing into space for a while now, listening with high-powered radio telescopes and sending out our own signals in a feeble attempt at alerting ET to our existence, right? A new research effort attempts to put all this in perspective and arrives at a simple answer: We haven't found life because we're just not looking hard enough. Researchers from Pennsylvania State University decided to attempt to quantify the amount of searching humans have actually done, comparing that effort with what we think we know about the size of the universe. Ultimately, the team arrived at the conclusion that efforts like SETI — the Search for Extraterrestrial Intelligence — are tiny drops in an absolutely massive bucket. The researchers explain that mankind can only realistically search for alien communications out to a distance of around 30,000 light years with modern technology. That's a mere stone's throw in astronomical terms, and when you consider that the Milky Way — just one of countless galaxies that we can see — is 100,000 light years across, it's clear that we're really only just scratching the surface. For added perspective, the team calculated how much of space we've actually taken the time to explore, comparing that to the area that we haven't even begun to search. As MIT Technology Review explains, if the entire search area is the size of Earth's oceans, humans have sporadically searched an area about the size of a hot tub. Put simply, we may think we're doing a good job of keeping our eyes on the skies for evidence of alien civilizations, but in truth we're barely doing anything at all.
          Exploring LSTMs      Cache   Translate Page      

It turns out LSTMs are a fairly simple extension to neural networks, and they're behind a lot of the amazing achievements deep learning has made in the past few years. So I'll try to present them as intuitively as possible – in such a way that you could have discovered them yourself.

But first, a picture:

LSTM

Aren't LSTMs beautiful? Let's go.

(Note: if you're already familiar with neural networks and LSTMs, skip to the middle – the first half of this post is a tutorial.)

Neural Networks

Imagine we have a sequence of images from a movie, and we want to label each image with an activity (is this a fight?, are the characters talking?, are the characters eating?).

How do we do this?

One way is to ignore the sequential nature of the images, and build a per-image classifier that considers each image in isolation. For example, given enough images and labels:

  • Our algorithm might first learn to detect low-level patterns like shapes and edges.
  • With more data, it might learn to combine these patterns into more complex ones, like faces (two circular things atop a triangular thing atop an oval thing) or cats.
  • And with even more data, it might learn to map these higher-level patterns into activities themselves (scenes with mouths, steaks, and forks are probably about eating).

This, then, is a deep neural network: it takes an image input, returns an activity output, and – just as we might learn to detect patterns in puppy behavior without knowing anything about dogs (after seeing enough corgis, we discover common characteristics like fluffy butts and drumstick legs; next, we learn advanced features like splooting) – in between it learns to represent images through hidden layers of representations.

Mathematically

I assume people are familiar with basic neural networks already, but let's quickly review them.

  • A neural network with a single hidden layer takes as input a vector x, which we can think of as a set of neurons.
  • Each input neuron is connected to a hidden layer of neurons via a set of learned weights.
  • The jth hidden neuron outputs \(h_j = \phi(\sum_i w_{ij} x_i)\), where \(\phi\) is an activation function.
  • The hidden layer is fully connected to an output layer, and the jth output neuron outputs \(y_j = \sum_i v_{ij} h_i\). If we need probabilities, we can transform the output layer via a softmax function.

In matrix notation:

$$h = \phi(Wx)$$
$$y = Vh$$

where

  • x is our input vector
  • W is a weight matrix connecting the input and hidden layers
  • V is a weight matrix connecting the hidden and output layers
  • Common activation functions for \(\phi\) are the sigmoid function, \(\sigma(x)\), which squashes numbers into the range (0, 1); the hyperbolic tangent, \(tanh(x)\), which squashes numbers into the range (-1, 1), and the rectified linear unit, \(ReLU(x) = max(0, x)\).

Here's a pictorial view:

Neural Network

(Note: to make the notation a little cleaner, I assume x and h each contain an extra bias neuron fixed at 1 for learning bias weights.)

Remembering Information with RNNs

Ignoring the sequential aspect of the movie images is pretty ML 101, though. If we see a scene of a beach, we should boost beach activities in future frames: an image of someone in the water should probably be labeled swimming, not bathing, and an image of someone lying with their eyes closed is probably suntanning. If we remember that Bob just arrived at a supermarket, then even without any distinctive supermarket features, an image of Bob holding a slab of bacon should probably be categorized as shopping instead of cooking.

So what we'd like is to let our model track the state of the world:

  1. After seeing each image, the model outputs a label and also updates the knowledge it's been learning. For example, the model might learn to automatically discover and track information like location (are scenes currently in a house or beach?), time of day (if a scene contains an image of the moon, the model should remember that it's nighttime), and within-movie progress (is this image the first frame or the 100th?). Importantly, just as a neural network automatically discovers hidden patterns like edges, shapes, and faces without being fed them, our model should automatically discover useful information by itself.
  2. When given a new image, the model should incorporate the knowledge it's gathered to do a better job.

This, then, is a recurrent neural network. Instead of simply taking an image and returning an activity, an RNN also maintains internal memories about the world (weights assigned to different pieces of information) to help perform its classifications.

Mathematically

So let's add the notion of internal knowledge to our equations, which we can think of as pieces of information that the network maintains over time.

But this is easy: we know that the hidden layers of neural networks already encode useful information about their inputs, so why not use these layers as the memory passed from one time step to the next? This gives us our RNN equations:

$$h_t = \phi(Wx_t + Uh_{t-1})$$
$$y_t = Vh_t$$

Note that the hidden state computed at time \(t\) (\(h_t\), our internal knowledge) is fed back at the next time step. (Also, I'll use concepts like hidden state, knowledge, memories, and beliefs to describe \(h_t\) interchangeably.)

RNN

Longer Memories through LSTMs

Let's think about how our model updates its knowledge of the world. So far, we've placed no constraints on this update, so its knowledge can change pretty chaotically: at one frame it thinks the characters are in the US, at the next frame it sees the characters eating sushi and thinks they're in Japan, and at the next frame it sees polar bears and thinks they're on Hydra Island. Or perhaps it has a wealth of information to suggest that Alice is an investment analyst, but decides she's a professional assassin after seeing her cook.

This chaos means information quickly transforms and vanishes, and it's difficult for the model to keep a long-term memory. So what we'd like is for the network to learn how to update its beliefs (scenes without Bob shouldn't change Bob-related information, scenes with Alice should focus on gathering details about her), in a way that its knowledge of the world evolves more gently.

This is how we do it.

  1. Adding a forgetting mechanism. If a scene ends, for example, the model should forget the current scene location, the time of day, and reset any scene-specific information; however, if a character dies in the scene, it should continue remembering that he's no longer alive. Thus, we want the model to learn a separate forgetting/remembering mechanism: when new inputs come in, it needs to know which beliefs to keep or throw away.
  2. Adding a saving mechanism. When the model sees a new image, it needs to learn whether any information about the image is worth using and saving. Maybe your mom sent you an article about the Kardashians, but who cares?
  3. So when new a input comes in, the model first forgets any long-term information it decides it no longer needs. Then it learns which parts of the new input are worth using, and saves them into its long-term memory.
  4. Focusing long-term memory into working memory. Finally, the model needs to learn which parts of its long-term memory are immediately useful. For example, Bob's age may be a useful piece of information to keep in the long term (children are more likely to be crawling, adults are more likely to be working), but is probably irrelevant if he's not in the current scene. So instead of using the full long-term memory all the time, it learns which parts to focus on instead.

This, then, is an long short-term memory network. Whereas an RNN can overwrite its memory at each time step in a fairly uncontrolled fashion, an LSTM transforms its memory in a very precise way: by using specific learning mechanisms for which pieces of information to remember, which to update, and which to pay attention to. This helps it keep track of information over longer periods of time.

Mathematically

Let's describe the LSTM additions mathematically.

At time \(t\), we receive a new input \(x_t\). We also have our long-term and working memories passed on from the previous time step, \(ltm_{t-1}\) and \(wm_{t-1}\) (both n-length vectors), which we want to update.

We'll start with our long-term memory. First, we need to know which pieces of long-term memory to continue remembering and which to discard, so we want to use the new input and our working memory to learn a remember gate of n numbers between 0 and 1, each of which determines how much of a long-term memory element to keep. (A 1 means to keep it, a 0 means to forget it entirely.)

Naturally, we can use a small neural network to learn this remember gate:

$$remember_t = \sigma(W_r x_t + U_r wm_{t-1}) $$

(Notice the similarity to our previous network equations; this is just a shallow neural network. Also, we use a sigmoid activation because we need numbers between 0 and 1.)

Next, we need to compute the information we can learn from \(x_t\), i.e., a candidate addition to our long-term memory:

$$ ltm'_t = \phi(W_l x_t + U_l wm_{t-1}) $$

\(\phi\) is an activation function, commonly chosen to be \(tanh\).

Before we add the candidate into our memory, though, we want to learn which parts of it are actually worth using and saving:

$$save_t = \sigma(W_s x_t + U_s wm_{t-1})$$

(Think of what happens when you read something on the web. While a news article might contain information about Hillary, you should ignore it if the source is Breitbart.)

Let's now combine all these steps. After forgetting memories we don't think we'll ever need again and saving useful pieces of incoming information, we have our updated long-term memory:

$$ltm_t = remember_t \circ ltm_{t-1} + save_t \circ ltm'_t$$

where \(\circ\) denotes element-wise multiplication.

Next, let's update our working memory. We want to learn how to focus our long-term memory into information that will be immediately useful. (Put differently, we want to learn what to move from an external hard drive onto our working laptop.) So we learn a focus/attention vector:

$$focus_t = \sigma(W_f x_t + U_f wm_{t-1})$$

Our working memory is then

$$wm_t = focus_t \circ \phi(ltm_t)$$

In other words, we pay full attention to elements where the focus is 1, and ignore elements where the focus is 0.

And we're done! Hopefully this made it into your long-term memory as well.


To summarize, whereas a vanilla RNN uses one equation to update its hidden state/memory:

$$h_t = \phi(Wx_t + Uh_{t-1})$$

An LSTM uses several:

$$ltm_t = remember_t \circ ltm_{t-1} + save_t \circ ltm'_t$$
$$wm_t = focus_t \circ tanh(ltm_t)$$

where each memory/attention sub-mechanism is just a mini brain of its own:

$$remember_t = \sigma(W_r x_t+ U_r wm_{t-1}) $$
$$save_t = \sigma(W_s x_t + U_s wm_{t-1})$$
$$focus_t = \sigma(W_f x_t + U_f wm_{t-1})$$
$$ ltm'_t = tanh(W_l x_t + U_l wm_{t-1}) $$

(Note: the terminology and variable names I've been using are different from the usual literature. Here are the standard names, which I'll use interchangeably from now on:

  • The long-term memory, \(ltm_t\), is usually called the cell state, denoted \(c_t\).
  • The working memory, \(wm_t\), is usually called the hidden state, denoted \(h_t\). This is analogous to the hidden state in vanilla RNNs.
  • The remember vector, \(remember_t\), is usually called the forget gate (despite the fact that a 1 in the forget gate still means to keep the memory and a 0 still means to forget it), denoted \(f_t\).
  • The save vector, \(save_t\), is usually called the input gate (as it determines how much of the input to let into the cell state), denoted \(i_t\).
  • The focus vector, \(focus_t\), is usually called the output gate, denoted \(o_t\). )

LSTM

Snorlax

I could have caught a hundred Pidgeys in the time it took me to write this post, so here's a cartoon.

Neural Networks

Neural Network

Recurrent Neural Networks

RNN

LSTMs

LSTM

Learning to Code

Let's look at a few examples of what an LSTM can do. Following Andrej Karpathy's terrific post, I'll use character-level LSTM models that are fed sequences of characters and trained to predict the next character in the sequence.

While this may seem a bit toyish, character-level models can actually be very useful, even on top of word models. For example:

  • Imagine a code autocompleter smart enough to allow you to program on your phone. An LSTM could (in theory) track the return type of the method you're currently in, and better suggest which variable to return; it could also know without compiling whether you've made a bug by returning the wrong type.
  • NLP applications like machine translation often have trouble dealing with rare terms. How do you translate a word you've never seen before, or convert adjectives to adverbs? Even if you know what a tweet means, how do you generate a new hashtag to capture it? Character models can daydream new terms, so this is another area with interesting applications.

So to start, I spun up an EC2 p2.xlarge spot instance, and trained a 3-layer LSTM on the Apache Commons Lang codebase. Here's a program it generates after a few hours.

While the code certainly isn't perfect, it's better than a lot of data scientists I know. And we can see that the LSTM has learned a lot of interesting (and correct!) coding behavior:

  • It knows how to structure classes: a license up top, followed by packages and imports, followed by comments and a class definition, followed by variables and methods. Similarly, it knows how to create methods: comments follow the correct orders (description, then @param, then @return, etc.), decorators are properly placed, and non-void methods end with appropriate return statements. Crucially, this behavior spans long ranges of code – see how giant the blocks are!
  • It can also track subroutines and nesting levels: indentation is always correct, and if statements and for loops are always closed out.
  • It even knows how to create tests.

How does the model do this? Let's look at a few of the hidden states.

Here's a neuron that seems to track the code's outer level of indentation:

(As the LSTM moves through the sequence, its neurons fire at varying intensities. The picture represents one particular neuron, where each row is a sequence and characters are color-coded according to the neuron's intensity; dark blue shades indicate large, positive activations, and dark red shades indicate very negative activations.)

Outer Level of Indentation

And here's a neuron that counts down the spaces between tabs:

Tab Spaces

For kicks, here's the output of a different 3-layer LSTM trained on TensorFlow's codebase:

There are plenty of other fun examples floating around the web, so check them out if you want to see more.

Investigating LSTM Internals

Let's dig a little deeper. We looked in the last section at examples of hidden states, but I wanted to play with LSTM cell states and their other memory mechanisms too. Do they fire when we expect, or are there surprising patterns?

Counting

To investigate, let's start by teaching an LSTM to count. (Remember how the Java and Python LSTMs were able to generate proper indentation!) So I generated sequences of the form

aaaaaXbbbbb

(N "a" characters, followed by a delimiter X, followed by N "b" characters, where 1 <= N <= 10), and trained a single-layer LSTM with 10 hidden neurons.

As expected, the LSTM learns perfectly within its training range – and can even generalize a few steps beyond it. (Although it starts to fail once we try to get it to count to 19.)

aaaaaaaaaaaaaaaXbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbbbb
aaaaaaaaaaaaaaaaaaaXbbbbbbbbbbbbbbbbbb # Here it begins to fail: the model is given 19 "a"s, but outputs only 18 "b"s.

We expect to find a hidden state neuron that counts the number of a's if we look at its internals. And we do:

Neuron #2 Hidden State

I built a small web app to play around with LSTMs, and Neuron #2 seems to be counting both the number of a's it's seen, as well as the number of b's. (Remember that cells are shaded according to the neuron's activation, from dark red [-1] to dark blue [+1].)

What about the cell state? It behaves similarly:

Neuron #2 Cell State

One interesting thing is that the working memory looks like a "sharpened" version of the long-term memory. Does this hold true in general?

It does. (This is exactly as we would expect, since the long-term memory gets squashed by the tanh activation function and the output gate limits what gets passed on.) For example, here is an overview of all 10 cell state nodes at once. We see plenty of light-colored cells, representing values close to 0.

Counting LSTM Cell States

In contrast, the 10 working memory neurons look much more focused. Neurons 1, 3, 5, and 7 are even zeroed out entirely over the first half of the sequence.

Counting LSTM Hidden States

Let's go back to Neuron #2. Here are the candidate memory and input gate. They're relatively constant over each half of the sequence – as if the neuron is calculating a += 1 or b += 1 at each step.

Counting LSTM Candidate Memory

Input Gate

Finally, here's an overview of all of Neuron 2's internals:

Neuron 2 Overview

If you want to investigate the different counting neurons yourself, you can play around with the visualizer here.

(Note: this is far from the only way an LSTM can learn to count, and I'm anthropomorphizing quite a bit here. But I think viewing the network's behavior is interesting and can help build better models – after all, many of the ideas in neural networks come from analogies to the human brain, and if we see unexpected behavior, we may be able to design more efficient learning mechanisms.)

Count von Count

Let's look at a slightly more complicated counter. This time, I generated sequences of the form

aaXaXaaYbbbbb

(N a's with X's randomly sprinkled in, followed by a delimiter Y, followed by N b's). The LSTM still has to count the number of a's, but this time needs to ignore the X's as well.

Here's the full LSTM. We expect to see a counting neuron, but one where the input gate is zero whenever it sees an X. And we do!

Counter 2 - Cell State

Above is the cell state of Neuron 20. It increases until it hits the delimiter Y, and then decreases to the end of the sequence – just like it's calculating a num_bs_left_to_print variable that increments on a's and decrements on b's.

If we look at its input gate, it is indeed ignoring the X's:

Counter 2 - Input Gate

Interestingly, though, the candidate memory fully activates on the irrelevant X's – which shows why the input gate is needed. (Although, if the input gate weren't part of the architecture, presumably the network would have presumably learned to ignore the X's some other way, at least for this simple example.)

Counter 2 - Candidate Memory

Let's also look at Neuron 10.

Counter 2 - Neuron 10

This neuron is interesting as it only activates when reading the delimiter "Y" – and yet it still manages to encode the number of a's seen so far in the sequence. (It may be hard to tell from the picture, but when reading Y's belonging to sequences with the same number of a's, all the cell states have values either identical or within 0.1% of each other. You can see that Y's with fewer a's are lighter than those with more.) Perhaps some other neuron sees Neuron 10 slacking and helps a buddy out.

Remembering State

Next, I wanted to look at how LSTMs remember state. I generated sequences of the form

AxxxxxxYa
BxxxxxxYb

(i.e., an "A" or B", followed by 1-10 x's, then a delimiter "Y", ending with a lowercase version of the initial character). This way the network needs to remember whether it's in an "A" or "B" state.

We expect to find a neuron that fires when remembering that the sequence started with an "A", and another neuron that fires when remembering that it started with a "B". We do.

For example, here is an "A" neuron that activates when it reads an "A", and remembers until it needs to generate the final character. Notice that the input gate ignores all the "x" characters in between.

A Neuron - #8

Here is its "B" counterpart:

B Neuron - #17

One interesting point is that even though knowledge of the A vs. B state isn't needed until the network reads the "Y" delimiter, the hidden state fires throughout all the intermediate inputs anyways. This seems a bit "inefficient", but perhaps it's because the neurons are doing a bit of double-duty in counting the number of x's as well.

Copy Task

Finally, let's look at how an LSTM learns to copy information. (Recall that our Java LSTM was able to memorize and copy an Apache license.)

(Note: if you think about how LSTMs work, remembering lots of individual, detailed pieces of information isn't something they're very good at. For example, you may have noticed that one major flaw of the LSTM-generated code was that it often made use of undefined variables – the LSTMs couldn't remember which variables were in scope. This isn't surprising, since it's hard to use single cells to efficiently encode multi-valued information like characters, and LSTMs don't have a natural mechanism to chain adjacent memories to form words. Memory networks and neural Turing machines are two extensions to neural networks that help fix this, by augmenting with external memory components. So while copying isn't something LSTMs do very efficiently, it's fun to see how they try anyways.)

For this copy task, I trained a tiny 2-layer LSTM on sequences of the form

baaXbaa
abcXabc

(i.e., a 3-character subsequence composed of a's, b's, and c's, followed by a delimiter "X", followed by the same subsequence).

I wasn't sure what "copy neurons" would look like, so in order to find neurons that were memorizing parts of the initial subsequence, I looked at their hidden states when reading the delimiter X. Since the network needs to encode the initial subsequence, its states should exhibit different patterns depending on what they're learning.

The graph below, for example, plots Neuron 5's hidden state when reading the "X" delimiter. The neuron is clearly able to distinguish sequences beginning with a "c" from those that don't.

Neuron 5

For another example, here is Neuron 20's hidden state when reading the "X". It looks like it picks out sequences beginning with a "b".

Neuron 20 Hidden State

Interestingly, if we look at Neuron 20's cell state, it almost seems to capture the entire 3-character subsequence by itself (no small feat given its one-dimensionality!):

Neuron 20 Cell State

Here are Neuron 20's cell and hidden states, across the entire sequence. Notice that its hidden state is turned off over the entire initial subsequence (perhaps expected, since its memory only needs to be passively kept at that point).

Copy LSTM - Neuron 20 Hidden and Cell

However, if we look more closely, the neuron actually seems to be firing whenever the next character is a "b". So rather than being a "the sequence started with a b" neuron, it appears to be a "the next character is a b" neuron.

As far as I can tell, this pattern holds across the network – all the neurons seem to be predicting the next character, rather than memorizing characters at specific positions. For example, Neuron 5 seems to be a "next character is a c" predictor.

Copy LSTM - Neuron 5

I'm not sure if this is the default kind of behavior LSTMs learn when copying information, or what other copying mechanisms are available as well.

States and Gates

To really hone in and understand the purpose of the different states and gates in an LSTM, let's repeat the previous section with a small pivot.

Cell State and Hidden State (Memories)

We originally described the cell state as a long-term memory, and the hidden state as a way to pull out and focus these memories when needed.

So when a memory is currently irrelevant, we expect the hidden state to turn off – and that's exactly what happens for this sequence copying neuron.

Copy Machine

Forget Gate

The forget gate discards information from the cell state (0 means to completely forget, 1 means to completely remember), so we expect it to fully activate when it needs to remember something exactly, and to turn off when information is never going to be needed again.

That's what we see with this "A" memorizing neuron: the forget gate fires hard to remember that it's in an "A" state while it passes through the x's, and turns off once it's ready to generate the final "a".

Forget Gate

Input Gate (Save Gate)

We described the job of the input gate (what I originally called the save gate) as deciding whether or not to save information from a new input. Thus, it should turn off at useless information.

And that's what this selective counting neuron does: it counts the a's and b's, but ignores the irrelevant x's.

Input Gate

What's amazing is that nowhere in our LSTM equations did we specify that this is how the input (save), forget (remember), and output (focus) gates should work. The network just learned what's best.

Extensions

Now let's recap how you could have discovered LSTMs by yourself.

First, many of the problems we'd like to solve are sequential or temporal of some sort, so we should incorporate past learnings into our models. But we already know that the hidden layers of neural networks encode useful information, so why not use these hidden layers as the memories we pass from one time step to the next? And so we get RNNs.

But we know from our own behavior that we don't keep track of knowledge willy-nilly; when we read a new article about politics, we don't immediately believe whatever it tells us and incorporate it into our beliefs of the world. We selectively decide what information to save, what information to discard, and what pieces of information to use to make decisions the next time we read the news. Thus, we want to learn how to gather, update, and apply information – and why not learn these things through their own mini neural networks? And so we get LSTMs.

And now that we've gone through this process, we can come up with our own modifications.

  • For example, maybe you think it's silly for LSTMs to distinguish between long-term and working memories – why not have one? Or maybe you find separate remember gates and save gates kind of redundant – anything we forget should be replaced by new information, and vice-versa. And now you've come up with one popular LSTM variant, the GRU.
  • Or maybe you think that when deciding what information to remember, save, and focus on, we shouldn't rely on our working memory alone – why not use our long-term memory as well? And now you've discovered Peephole LSTMs.

Making Neural Nets Great Again

Let's look at one final example, using a 2-layer LSTM trained on Trump's tweets. Despite the tiny big dataset, it's enough to learn a lot of patterns.

For example, here's a neuron that tracks its position within hashtags, URLs, and @mentions:

Hashtags, URLs, @mentions

Here's a proper noun detector (note that it's not simply firing at capitalized words):

Proper Nouns

Here's an auxiliary verb + "to be" detector ("will be", "I've always been", "has never been"):

Modal Verbs

Here's a quote attributor:

Quotes

There's even a MAGA and capitalization neuron:

MAGA

And here are some of the proclamations the LSTM generates (okay, one of these is a real tweet):

Tweets Tweet

Unfortunately, the LSTM merely learned to ramble like a madman.

Recap

That's it. To summarize, here's what you've learned:

Candidate Memory

Here's what you should save:

Save

And now it's time for that donut.

Thanks to Chen Liang for some of the TensorFlow code I used, Ben Hamner and Kaggle for the Trump dataset, and, of course, Schmidhuber and Hochreiter for their original paper. If you want to explore the LSTMs yourself, feel free to play around!




Next Page: 10000

Site Map 2018_01_14
Site Map 2018_01_15
Site Map 2018_01_16
Site Map 2018_01_17
Site Map 2018_01_18
Site Map 2018_01_19
Site Map 2018_01_20
Site Map 2018_01_21
Site Map 2018_01_22
Site Map 2018_01_23
Site Map 2018_01_24
Site Map 2018_01_25
Site Map 2018_01_26
Site Map 2018_01_27
Site Map 2018_01_28
Site Map 2018_01_29
Site Map 2018_01_30
Site Map 2018_01_31
Site Map 2018_02_01
Site Map 2018_02_02
Site Map 2018_02_03
Site Map 2018_02_04
Site Map 2018_02_05
Site Map 2018_02_06
Site Map 2018_02_07
Site Map 2018_02_08
Site Map 2018_02_09
Site Map 2018_02_10
Site Map 2018_02_11
Site Map 2018_02_12
Site Map 2018_02_13
Site Map 2018_02_14
Site Map 2018_02_15
Site Map 2018_02_15
Site Map 2018_02_16
Site Map 2018_02_17
Site Map 2018_02_18
Site Map 2018_02_19
Site Map 2018_02_20
Site Map 2018_02_21
Site Map 2018_02_22
Site Map 2018_02_23
Site Map 2018_02_24
Site Map 2018_02_25
Site Map 2018_02_26
Site Map 2018_02_27
Site Map 2018_02_28
Site Map 2018_03_01
Site Map 2018_03_02
Site Map 2018_03_03
Site Map 2018_03_04
Site Map 2018_03_05
Site Map 2018_03_06
Site Map 2018_03_07
Site Map 2018_03_08
Site Map 2018_03_09
Site Map 2018_03_10
Site Map 2018_03_11
Site Map 2018_03_12
Site Map 2018_03_13
Site Map 2018_03_14
Site Map 2018_03_15
Site Map 2018_03_16
Site Map 2018_03_17
Site Map 2018_03_18
Site Map 2018_03_19
Site Map 2018_03_20
Site Map 2018_03_21
Site Map 2018_03_22
Site Map 2018_03_23
Site Map 2018_03_24
Site Map 2018_03_25
Site Map 2018_03_26
Site Map 2018_03_27
Site Map 2018_03_28
Site Map 2018_03_29
Site Map 2018_03_30
Site Map 2018_03_31
Site Map 2018_04_01
Site Map 2018_04_02
Site Map 2018_04_03
Site Map 2018_04_04
Site Map 2018_04_05
Site Map 2018_04_06
Site Map 2018_04_07
Site Map 2018_04_08
Site Map 2018_04_09
Site Map 2018_04_10
Site Map 2018_04_11
Site Map 2018_04_12
Site Map 2018_04_13
Site Map 2018_04_14
Site Map 2018_04_15
Site Map 2018_04_16
Site Map 2018_04_17
Site Map 2018_04_18
Site Map 2018_04_19
Site Map 2018_04_20
Site Map 2018_04_21
Site Map 2018_04_22
Site Map 2018_04_23
Site Map 2018_04_24
Site Map 2018_04_25
Site Map 2018_04_26
Site Map 2018_04_27
Site Map 2018_04_28
Site Map 2018_04_29
Site Map 2018_04_30
Site Map 2018_05_01
Site Map 2018_05_02
Site Map 2018_05_03
Site Map 2018_05_04
Site Map 2018_05_05
Site Map 2018_05_06
Site Map 2018_05_07
Site Map 2018_05_08
Site Map 2018_05_09
Site Map 2018_05_15
Site Map 2018_05_16
Site Map 2018_05_17
Site Map 2018_05_18
Site Map 2018_05_19
Site Map 2018_05_20
Site Map 2018_05_21
Site Map 2018_05_22
Site Map 2018_05_23
Site Map 2018_05_24
Site Map 2018_05_25
Site Map 2018_05_26
Site Map 2018_05_27
Site Map 2018_05_28
Site Map 2018_05_29
Site Map 2018_05_30
Site Map 2018_05_31
Site Map 2018_06_01
Site Map 2018_06_02
Site Map 2018_06_03
Site Map 2018_06_04
Site Map 2018_06_05
Site Map 2018_06_06
Site Map 2018_06_07
Site Map 2018_06_08
Site Map 2018_06_09
Site Map 2018_06_10
Site Map 2018_06_11
Site Map 2018_06_12
Site Map 2018_06_13
Site Map 2018_06_14
Site Map 2018_06_15
Site Map 2018_06_16
Site Map 2018_06_17
Site Map 2018_06_18
Site Map 2018_06_19
Site Map 2018_06_20
Site Map 2018_06_21
Site Map 2018_06_22
Site Map 2018_06_23
Site Map 2018_06_24
Site Map 2018_06_25
Site Map 2018_06_26
Site Map 2018_06_27
Site Map 2018_06_28
Site Map 2018_06_29
Site Map 2018_06_30
Site Map 2018_07_01
Site Map 2018_07_02
Site Map 2018_07_03
Site Map 2018_07_04
Site Map 2018_07_05
Site Map 2018_07_06
Site Map 2018_07_07
Site Map 2018_07_08
Site Map 2018_07_09
Site Map 2018_07_10
Site Map 2018_07_11
Site Map 2018_07_12
Site Map 2018_07_13
Site Map 2018_07_14
Site Map 2018_07_15
Site Map 2018_07_16
Site Map 2018_07_17
Site Map 2018_07_18
Site Map 2018_07_19
Site Map 2018_07_20
Site Map 2018_07_21
Site Map 2018_07_22
Site Map 2018_07_23
Site Map 2018_07_24
Site Map 2018_07_25
Site Map 2018_07_26
Site Map 2018_07_27
Site Map 2018_07_28
Site Map 2018_07_29
Site Map 2018_07_30
Site Map 2018_07_31
Site Map 2018_08_01
Site Map 2018_08_02
Site Map 2018_08_03
Site Map 2018_08_04
Site Map 2018_08_05
Site Map 2018_08_06
Site Map 2018_08_07
Site Map 2018_08_08
Site Map 2018_08_09
Site Map 2018_08_10
Site Map 2018_08_11
Site Map 2018_08_12
Site Map 2018_08_13
Site Map 2018_08_15
Site Map 2018_08_16
Site Map 2018_08_17
Site Map 2018_08_18
Site Map 2018_08_19
Site Map 2018_08_20
Site Map 2018_08_21
Site Map 2018_08_22
Site Map 2018_08_23
Site Map 2018_08_24
Site Map 2018_08_25
Site Map 2018_08_26
Site Map 2018_08_27
Site Map 2018_08_28
Site Map 2018_08_29
Site Map 2018_08_30
Site Map 2018_08_31
Site Map 2018_09_01
Site Map 2018_09_02
Site Map 2018_09_03
Site Map 2018_09_04
Site Map 2018_09_05
Site Map 2018_09_06
Site Map 2018_09_07
Site Map 2018_09_08
Site Map 2018_09_09
Site Map 2018_09_10
Site Map 2018_09_11
Site Map 2018_09_12
Site Map 2018_09_13
Site Map 2018_09_14
Site Map 2018_09_15
Site Map 2018_09_16
Site Map 2018_09_17
Site Map 2018_09_18
Site Map 2018_09_19
Site Map 2018_09_20
Site Map 2018_09_21
Site Map 2018_09_23
Site Map 2018_09_24
Site Map 2018_09_25
Site Map 2018_09_26
Site Map 2018_09_27
Site Map 2018_09_28
Site Map 2018_09_29
Site Map 2018_09_30
Site Map 2018_10_01
Site Map 2018_10_02
Site Map 2018_10_03
Site Map 2018_10_04
Site Map 2018_10_05
Site Map 2018_10_06
Site Map 2018_10_07
Site Map 2018_10_08
Site Map 2018_10_09
Site Map 2018_10_10